WestJet s Security Architecture Made Simple We Finally Got It Right!



Similar documents
Business Values of Network and Security Virtualization

Securing the Virtualized Data Center With Next-Generation Firewalls

This presentation describes the IBM Tivoli Monitoring 6.1 Firewall Implementation: KDE Gateway Component.

How Network Virtualization can improve your Data Center Security

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

Netzwerkvirtualisierung? Aber mit Sicherheit!

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Palo Alto Networks Cyber Security Platform for the Software Defined Data center. Zekeriya Eskiocak Security Consultant Palo Alto Networks

Optimizing the Mobile Cloud Era Through Agility and Automation

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

About the VM-Series Firewall

VMware NSX A Perspective for Service Providers part 2

Decrease your HMI/SCADA risk

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Enterprise Security Platform for Government

Limiting the Spread of Threats: A Data Center for Every User

Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain

Network Services in the SDN Data Center

CSCE 465 Computer & Network Security

Good Guys vs. the Bad Guys: Can Big Data Tools Counteract Advanced Threats?

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

WHITE PAPER. Data Center Fabrics. Why the Right Choice is so Important to Your Business

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Mobile Device Strategy

Simplifying IT with SDN & Virtual Application Networks

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Security Information & Event Management (SIEM)

Itex VMware NSX Network Virtualization Presentation

Risk Analytics for Cyber Security

Ultra-strong authentication to protect network access and assets

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

PCI Requirements Coverage Summary Table

How To Extend Security Policies To Public Clouds

AL RAFEE ENTERPRISES Solutions & Expertise.

Ultra-strong authentication to protect network access and assets

ENTERPRISE IT SECURITY ARCHITECTURE SECURITY ZONES: NETWORK SECURITY ZONE STANDARDS. Version 2.0

Firewall Environments. Name

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Cloud Roadmap to Success. October, 2014

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

How To Protect A Network From Attack From A Hacker (Hbss)

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

PCI Requirements Coverage Summary Table

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

Citrix XenApp 6.5 Advanced Administration (CXA-301)

Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures

Set Up a VM-Series Firewall on the Citrix SDX Server

Customer Cloud Architecture for Mobile.

McAfee Network Security Platform

A Modern Framework for Network Security in Government

ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Microsoft Private Cloud

SANS Top 20 Critical Controls for Effective Cyber Defense

Guideline on Firewall

STRATEGIC WHITE PAPER. The next step in server virtualization: How containers are changing the cloud and application landscape

Seven Things To Consider When Evaluating Privileged Account Security Solutions

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer

Secure Enterprise Mobility Management The system integrator point of view.

The Defense RESTs: Automation and APIs for Improving Security

REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION

SOFTWARE DEFINED NETWORKING

CITY UNIVERSITY OF HONG KONG Network and Platform Security Standard

Virtualization and Cloud Computing

Best Practices for PCI DSS V3.0 Network Security Compliance

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Breaking the Cyber Attack Lifecycle

VMware vcloud Networking and Security

Does your Citrix or Terminal Server environment have an Achilles heel?

SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network

Deployment Guide for Citrix XenDesktop

Building Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000

CloudStack Networking. Paul Angus Cloud

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

System Security Plan University of Texas Health Science Center School of Public Health

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

About the VM-Series Firewall

Palo Alto Networks. Security Models in the Software Defined Data Center

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Blind as a Bat? Supporting Packet Decryption for Security Scanning

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Use Case Brief NETWORK SECURITY

Overlay Networks: Connecting and Protecting Across Regions with Docker. Patrick Kerpan, CEO

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios

Transcription:

SESSION ID: ASD-R03 WestJet s Security Architecture Made Simple We Finally Got It Right! Richard Sillito Solution Architect, IT Security WestJet @dhoriyo

Fort Henry Ontario

Flight Plan Applying Principals The Solution Summary The Problem Questions 3

The Problem

What wrong with the network?

The underlying problem Zones DMZ North/South Internal Secured Internal East/West

The Threat Infiltration Discovery Extraction Exfiltration Large Number of Attackers Smaller Amount of Attackers Smaller Amount of Attackers Using a Large Number of Attacks Using a Standard Approach Using Normal Access Methods It Doesn t Matter! You re Too Late! Very Hard to Detect or Defend Easier to Detect and Defend Hard to Defend or Detect

Vulnerability Surface Vulnerability Surface Developer Datacenter Application/Service Datacenter OS Bios Network - Link Network - Transport Network - Application Client OS Client Application Users

DMZ Internal Existing Datacenter Never Worked Employees The Internet Guests Remote Users Untrusted Users? Secured Internal? Datacenter Contractors Trusted Users?

The Solution

Security Architecture Made Simple (SAMS) Infrastructure Device Network Application & Services Data Elements Classification Access Identity Position Role Authorization

Security Architecture Made Simple (SAMS) Infrastructure Device Network Application & Services

Application Gateway Application Services Backend Services Security Architecture Made Simple (SAMS) SAMS - Infrastructure Guests Employees Contractor/Partner End User Devices Jump Patch Monitor Everywhere But the Datacenter (Untrusted) Deploy Test IT Administration Datacenter (Trusted) Scan

SAMS Infrastructure Logical Network View Application Gateway Application Services Services Mail Gateway Citrix Port 25 Port 443,995 Mail Gateway MS Exchange Port 443 Port 25 Port 443 Data Services Netscaler XenApp Port 443 Port 8443 Citrix Intranet Site XenDesk Email Services Gateway Provision Mobile App Reverse Proxy Port Port 8443443 ERP Data App Services

SAMS Infrastructure Logical Network View IT Admin Jump Point Monitoring Alerting Patching

Using Core Router and Core Firewall Service F Service A Service B Service E Service D Service C 16

Traditional Approach Pros Known Technology Somewhat Flexible Minimal Training Cons Difficult to Scale the Solution Hub Model Requires all Traffic Traverse the Core Difficult to Insert Additional Security Services 17

Host 3 Overlay Networks Host 2 Host 1 The Software Defined Approach Service F Service A Service B Service E Service D Service C Service F Service A Service B Service E Service D Service C Service F Service A Service B Service E Service D Service C 18

SDN/S Approach Pros Easily Scaled Very Flexible Optimized Routing Allows Insertion of Security Services Automation/Orchestration Cons Emerging Technology Standards are Not Well Defined Vendor Eco Systems are Developing Monitoring Solutions are Not Well Developed 19

Security Architecture Made Simple (SAMS) Data Elements Classification

Security Architecture Made Simple SAMS Data Data Elements Information Objects Products Fields Elements Function Macro Routine Reports XML package File Message Guest details Charge Amount Departure Time Flight Loads Revenues Metrics Reports Webservices File Transfers

SAMS Data Example Report Security Enforced Information Objects Security Maybe Refined Data Element Security Define

Security Architecture Made Simple (SAMS) Access Identity Position Role Authorization

Security Architecture Made Simple SAMS Access App/Service Role Company Role Company Position Function Within an Application or Service Function Within a Company Position the Employee was hired into Administrator Super User Standard User Auditor Safety Office Financial Office Maint. Lead ERP Admin CEO Manager, Sales Analyst III, IT

Security Architecture Made Simple SAMS Access Company Position Human Resource System Company Role Identity Management System Application or Service Role Enterprise Directory Service or Local Directory Service

Security Architecture Made Simple (SAMS) Infrastructure Device Network Application Access To Infrastructure Storage & Transmission of Data Access To Info. Access Identity Position Role Authorization Data Elements Classification Roles and Responsibilities

Products to look for (HyperLinked) Vmware NSX Palo alto, Check Point McAfee NSM Tivoli Identity Management Arkin Net Analytics Platform (www.arkin.net) 27

Apply Slide Consider network challenges Decide on a security strategy that will work for your organization Familiarize yourself with Software Defined Network & Security Accept that Bring Your Own Device is really your friend Figure out a plan to migrate your network Start making changes (evolution not revolution) 28

Summary If you can't explain it to a six year old, you don't understand it yourself. Albert Einstein 29

Thanks and Recognition Inspiration Dump your DMZ by Joern Wettern BYOD and the Death of the DMZ by Lori MacVittie Zero Trust Model John Kindervag Thanks VTeam Dominador DeLeon Sr. TSA - Infrastructure Ops Justin Domshy Manager of Environments Mike Gromek - Technical Architect III Darrell Lizotte Technical Architect III Randy Seabrook Manager Architecture Derek Sharman - Sr. Analyst-Config Management Walter Wenzl - Sr Analyst-Config Management Michael Slavens - Security Support Analyst III Peter Graw - Technical Architect III, IT Infrastructure Quentin Hall - Technical Architect III Tao Yu - Sr. TSA Telecomm VMWare Vern Bolinius Ray Budavari Bruno Germain Darren Humphries Bosses Cheryl Smith (Former CIO) Dan Neal (My Boss) My Family Patrick, Brittney, Taz

Q & A 31

Bonus Slides 32

Price Product People Process Prevention Detection Assessment Response Service Development Operate Support (ITOC, Security Admin) Develop Technicians (Senior Analyst I, II) Strategy Manage Focus Blueprint Vision Driver Tech Leaders (Security Analyst III) Manager Director Architecture Technology Council Business

Define Future State Start at the top and get aligned!

Define Future State Break your world down into smaller pieces

Define Future State Have an approach!

Define Future State Figure out how you re going to get the work done

Define Future State Now put it all together

Dealing with an evolving technology Software Defined Datacenter Target Architecture Industry Direction Target Architecture Industry Direction Target Architecture Industry Direction Industry Target Direction Architecture Target Architecture Target Architecture Dev/Te st Tenant s Staging Tenants Production Tenants Second Datacenter Full SDN Network

The Evolution

Software Defined Datacenter (De-mystifying the cloud)