Sichere Virtualisierung mit VMware



Similar documents
Securing the Journey to the Private Cloud. Dominique Dessy RSA, the Security Division of EMC

RSA Security Solutions for Virtualization

The growing importance of a secure Cloud environment

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Effective End-to-End Cloud Security

VMware Integrated Partner Solutions for Networking and Security

Security in the Software Defined Data Center

Netzwerkvirtualisierung? Aber mit Sicherheit!

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Journey to the Private Cloud. Key Enabling Technologies

Presentation for ISACA Chapter NL. Auditing Virtual Servers. VMware: Security and Operations. Gert-Jan Timmer 3. September, 2012

Trend Micro Deep Security

Agentless Security for VMware Virtual Data Centers and Cloud

Architecting Security for the Private Cloud. Todd Thiemann

RSA Solutions for VMware and Vblock. Dominique Dessy Senior Technical Consultant

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Trend Micro Sicherheit in den Tiefen des Hypervisors. Richard Javet und Gabriel Kälin Trend Micro (Schweiz)

VMware vsphere: Install, Configure, Manage [V5.0]

Agenda. Virtualization with the Power of Memory. 08:30 08:40 Begrüssung Einleitung W. Keller

Secure Administration of Virtualization - A Checklist ofVRATECH

Mitigating Information Security Risks of Virtualization Technologies

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

VMware Workspace Portal Reference Architecture

The best platform for building cloud infrastructures. Ralf von Gunten Sr. Systems Engineer VMware

Comprehensive security platform for physical, virtual, and cloud servers

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Building the Private cloud

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5

EMC Security for Microsoft Exchange Solution: Data Loss Prevention and Secure Access Management

VMware Overview Journey to Cloud Computing Adam Oaten Technical Partner Manager

Potecting your business assets in The Cloud, with. Secure Multitency Environment from CloudHPT.

Cloud Infrastructure Licensing, Packaging and Pricing

VirtualclientTechnology 2011 July

VMware for SMB environments(min st year)

Networking for Caribbean Development

Grant Aitken. Area Vice-President VMware Canada (B) (M)

VMware vcloud Networking and Security

Delivering Unprecedented Innovation to Create Flexible Virtual Environments

JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI

VMware vsphere: [V5.5] Admin Training

vcloud Air Simone Brunozzi, VP and Chief Technologist, vcloud 2014 VMware Inc. All rights reserved.

Oracle Solutions on Top of VMware vsphere 4. Saša Hederić VMware Adriatic

VMware vsphere 4. Pricing, Packaging and Licensing Overview W H I T E P A P E R

VDI Security for Better Protection and Performance

Acronis Backup Product Line

VMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware.

Bitdefender GravityZone Sales Presentation

Dell Cloud Services. Services

vcloud Suite Architecture Overview and Use Cases

VMware vcloud Powered Services

WHITE PAPER. VMware vsphere 4 Pricing, Packaging and Licensing Overview

Cloud and Data Center Security

Virtual Desktop Infrastructure

How To Protect Your Cloud From Attack

Security & Cloud Services IAN KAYNE

Whitepaper. NexentaConnect for VMware Virtual SAN. Full Featured File services for Virtual SAN

VMware Virtualization. Garrett Hartney VMware Evangelist

How RSA has helped EMC to secure its Virtual Infrastructure

RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2

From VDI to VMware View

vshield Quick Start Guide vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint 1.0

Building an Internal Cloud that is ready for the external Cloud

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

Endpoint protection for physical and virtual desktops

vsphere 6.0 Advantages Over Hyper-V

Hardening and Hacking vsphere and Private Cloud Everything you need to know about vsphere Security

Network Segmentation in Virtualized Environments B E S T P R A C T I C E S

vshield Administration Guide

Security Solution Architecture for VDI

Cloud Services. May 28 th, 2014 Athens, Greece

Barnaby Jeans Sr. Solution Architect Business Critical Applications

Automating Cloud Security Control and Compliance Enforcement for PCI DSS 3.0

EMC IT AUTOMATES ENTERPRISE PLATFORM AS A SERVICE

Khóa học dành cho các kỹ sư hệ thống, quản trị hệ thống, kỹ sư vận hành cho các hệ thống ảo hóa ESXi, ESX và vcenter Server

Endpoint protection for physical and virtual desktops

Virtualization Journey Stages

VMware vcloud Networking and Security Overview

Secure Virtualization in the Federal Government

VMware vsphere: Fast Track [V5.0]

vshield Quick Start Guide

Security Compliance in a Virtual World

Simplifying the Transition to Virtualization TS17

Total Cloud Protection

F5 and VMware Solution Guide. Virtualization solutions to optimize performance, improve availability, and reduce complexity

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

Cloud Optimize Your IT

Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments

A Guide to Disaster Recovery in the Cloud. Simple, Affordable Protection for Your Applications and Data

Enterprise Desktop Solutions: VMware View 4.5

Transform EMC Object Storage Into Enterprise Storage Services

VMware ESXi 3.5 update 2

vshield Installation and Upgrade Guide

TRANSFORMING DATA PROTECTION

TGL VMware Presentation. Guangzhou Macau Hong Kong Shanghai Beijing

Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER

VMware vsphere with Operations Management and VMware vsphere

1. VMware is part technology and part sales and marketing genius. As a result of their marketing efforts many people in IT (especially the newer

Transcription:

Sichere Virtualisierung mit VMware Stefan Bohnengel, VMware Harald Speckbrock, RSA Neuss, 12.11.2009

Building The Private Cloud private cloud Flexibility Control Choice your applications your information enterprise IT resources virtualized infrastructure any device any where cloud operating system cloud internetwork enterprise infrastructure: servers network -- storage provider infrastructure: servers network -- storage

Security and Virtualization: New Opportunities, New Approaches In the virtual world: IT infrastructure is more agile Information is more fluid any device any where Entire applications and computing processes are portable private cloud your applications your information enterprise IT resources virtualized infrastructure cloud operating system enterprise infrastructure: servers network -- storage cloud internetwork provider infrastructure: servers network -- storage Organizations need to rethink and adjust how they keep information secure in a virtual world where classic perimeters and boundaries no longer exist The key: an information-centric, risk-based approach to security Make security pervasive in the infrastructure Make security persistent with the information itself Apply security based on risk to the business

VMware vcloud Initiative Enterprise Ready Proven robust platform used by 150K+ customers Policy-based management, SLA, security, high availability for the cloud vcloud Choice Across internal and external clouds Broadest ecosystem of service providers Broad Application Compatibility Optimized for new and existing applications No need to rewrite or re-implement your applications

vcloud: Summary of VMworld Announcements Enterprise Ready Technology Ecosystem Choice vsphere vcenter vcloud API *NEW* vcloud Initiative 1000+ service providers Major new cloud services: Verizon, Savvis *NEW* vcloud Express *NEW* *NEW* Content Broad Application Compatibility New vcloud ISV partners SpringSource *NEW* *NEW*

VMware Security Strategy Core Platform Security Phase 1: Surface Area Reduction Shrink size of core platform Eliminate interfaces (service console, etc.) Operationalize Utilize standard Security interfaces Phase 2: Lockdown, Configuration Best practices on configuring, deploying and locking down system Eliminate or turn off unused processes and interfaces Phase 3: Hardening Host Services Integrity on disk Integrity in memory De-privilege VMX Consistent Authentication and Authorization New platform hardening features further enhance robust security capabilities Thin-hypervisor strategy Integrate VMware products into existing operational policies in the enterprise ESXi TPM (Trusted Platform Module) support Code & driver signing Memory Protection 6

Example: Securing VMware View Infrastructure with Strong Authentication Clients VMware VI3 Platform Hosted virtual desktops VMware View Manager Manages connection from client to hosted desktop. Active Directory RSA Authentication Manager

Example: EMC s Proven Solution for Scalable and Secure Architecture for Virtualizing MS Exchange RSA SecurID for Strong Authentication of Admin users RSA Data Loss Prevention Network for monitoring of sensitive content in email RSA envision platform for overall security Compliance monitoring

VMware Security Strategy.OVF Core Platform Security Operationalize Security Security Virtual Appliances Better Than Physical: Adaptive Security Infrastructure New platform hardening features further enhance robust security capabilities Thin-hypervisor strategy Integrate VMware products into existing operational policies in the enterprise Enable broad-based security for every VM in the environment Democratize security Self-describing, Selfconfiguring security Impact security by taking advantage of unique VMware technologies Focus on products and operations 9

VMsafe Security VM HIPS Firewall IPS/IDS Anti-Virus Security API vsphere New security solutions can be developed and integrated into VMware virtual infrastructure Protect the VM by inspection of virtual components (CPU, Memory, Network and Storage) Complete integration and awareness of VMotion, Storage VMotion, HA, etc. Provides an unprecedented level of security for the application and the data inside the VM

vshield Zones: Capabilities and Benefits Capabilities Bridge, firewall, or isolate VM zones based on familiar VI containers Monitor allowed and disallowed activity by application-based protocols One-click flow-to-firewall blocks precise network traffic Benefits Well-defined security posture within virtual environment Monitoring and assured policies, even through VMotion and VM lifecycle events Simple zone-based rules reduces policy errors

vshield Zones DMZ App VDI vshield Zones vshield Zones vshield Manager VMware vsphere VMware vsphere vcenter Server

Key Use Cases for vshield Zones Virtualizing the datacenter DMZ servers Collapsing DMZ boundary using virtual firewalls Compliance Intrusion prevention, web app firewalls, other prescribed network security Monitoring of successful and unsuccessful network connections Consistent network security policies for replicated environments Failover and high availability backups Datacenter-in-a-box for SMB and Remote Office/Branch Office Network isolation for multi-tenant clouds

RSA Data Leakage Prevention & envision RSA envision (SIEM) DMZ App VDI RSA DLP (future) VMsafe-zones VMsafe-zones vshield Manager VMware vsphere VMware vsphere vcenter Server

vsphere Integration with RSA envision

RSA Data Leakage Prevention User sends email Sends Credit card info

RSA Data Leakage Prevention Breach detected Alert sent Details of breach available for review

RSA Solutions Center POC for DLP PCI Use Case Leverage VMware s hardening guidelines Re-examine current security practices in terms of effectiveness in a virtual world Engage EMC/RSA Professional Services Secure infrastructure Strong authentication SIEM Secure information DLP Encryption Leverage VMware View to consolidate and manage the endpoint

Thank you