Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop



Similar documents
Securing Virtual Applications and Servers

Chapter 1 The Principles of Auditing 1

Cisco Secure BYOD Solution

Cisco TrustSec Solution Overview

Secure Your Mobile Device Access with Cisco BYOD Solutions

Cisco Actualtests Exam Questions & Answers

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

Cisco Cloud Security Accelerates Cloud Adoption

Network Virtualization

Readiness Assessments: Vital to Secure Mobility

Cisco AnyConnect Secure Mobility Solution Guide

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Cisco Passguide Exam Questions & Answers

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

Deploying Firewalls Throughout Your Organization

Cisco Nexus 1000V Switch for Microsoft Hyper-V

Bring Your Own Device

Extending Collaboration to BYOD Devices

Implementing Cisco IOS Network Security

Cisco IWAN and Akamai Intelligent Platform : Maximize Your WAN Investment

Cisco Virtual Security Gateway for Nexus 1000V Series Switch

Cisco SecureX Product Brochure

Securing Networks with Cisco Routers and Switches 1.0 (SECURE)

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

IINS Implementing Cisco Network Security 3.0 (IINS)

Cisco Virtual Office: Flexibility and Productivity for Your Workforce

Cisco Security Optimization Service

Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments

Advanced Security for Account Managers-ASAM

Cisco Intercloud Fabric Security Features: Technical Overview

Internet Content Provider Safeguards Customer Networks and Services

Business Benefits. Cisco Virtual Networking solutions offer the following benefits:

BYOD Security Challenges in Education: Protect the Network, Information, and Students

Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations

VMware vcloud Networking and Security Overview

Cisco ASA 1000V Cloud Firewall

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Policy Management: The Avenda Approach To An Essential Network Service

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition

Secure networks are crucial for IT systems and their

Security Practices for Online Collaboration and Social Media

Cisco IOS Advanced Firewall

Cisco RSA Announcement Update

Network Considerations to Optimize Virtual Desktop Deployment

The Advantages of Cloud Services

Cisco Data Center Network Manager Release 5.1 (LAN)

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

How To Secure A Remote Worker Network

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

How To Extend Security Policies To Public Clouds

Virtualization Beyond the Data Center: Increase Network Infrastructure Utilization and Efficiency to Reduce Operational Costs

Cisco Application Networking for IBM WebSphere

Secure Cloud-Ready Data Centers Juniper Networks

Best Practices for Outdoor Wireless Security

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Cisco Virtual Network Management Center

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Cisco Application Networking for BEA WebLogic

SECURITY PLATFORM FOR HEALTHCARE PROVIDERS

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Cisco Medical-Grade Network: Build a Secure Network for HIPAA Compliance

OVERVIEW OF VIRTUAL FIREWALLS ON VBLOCK INFRASTRUCTURE PLATFORMS

Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems Improve Processes...

The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:

Payment Card Industry Data Security Standard

Mission-Critical Mobile Security: A Stronger, Sensible Approach

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

Intelligent WAN 2.0 principles. Pero Gvozdenica, Systems Engineer, Vedran Hafner, Systems Engineer,

SNRS. Securing Networks with Cisco Routers and Switches. Length 5 days. Format Lecture/lab

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

IT Networking and Security

What Is Cisco Mobile Workspace Solution?

How To Protect Your Network From Attack From A Network Security Threat

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Network Virtualization Network Admission Control Deployment Guide

SECURITY ACCESS AND DATA FLOW CONTROL IN NETWORKS

Sygate Secure Enterprise and Alcatel

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment Adaptive Network Security...

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business.

Threat-Centric Security for Service Providers

Cisco & Big Data Security

Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. sduernbe@cisco.com. Co-Author Bitkom Leitfaden BYOD

A HELPING HAND TO PROTECT YOUR REPUTATION

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

Lecture 02b Cloud Computing II

Cisco Certified Security Professional (CCSP)

Virtual Networking Features of the VMware vnetwork Distributed Switch and Cisco Nexus 1000V Series Switches

Cisco Wide Area Application Services (WAAS) Software Version 4.0

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Best Practices for Secure Remote Access. Aventail Technical White Paper

Transcription:

White Paper Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop What You Will Learn Cisco Virtualization Experience Infrastructure (VXI) delivers a service-optimized desktop virtualization platform with comprehensive services across three Cisco architectures: Cisco Data Center, Borderless Networks, and Collaboration. Cisco VXI is redefining desktop virtualization to encompass the full suite of tools that make up an employee s collaborative workspace, delivering an uncompromised user experience that supports pervasive, interactive media not traditionally supported in a virtual desktop environment. Cisco VXI permits you to deliver to your employees an environment that is both agile and efficient, that enables personalized and pervasive user interactions, and that combines both openness and control through centralization and consolidation of business assets, while delivering a fully virtualized, collaborative workspace. The centralization of desktops as virtual machines in a data center presents new security challenges, necessitating a holistic, end-to-end security approach that extends from the client endpoint to virtual machine. Why Is Cisco VXI Security Important? Cisco VXI is an end-to-end system across three architectures: Cisco Data Center, Borderless Networks, and Collaboration. Best practices in security must be applied in this architecture, employing traditional security measures to protect the data center and the infrastructure, secure remote access, and securing the traffic from endpoints. Additional measures must be taken to secure the virtual desktops and the communication between one virtual desktop and another as well as communication between one virtual desktop and a virtual server. Because virtual desktops are now consolidated within the data center, it is more important than ever to separate desktop and server traffic and protect mission-critical servers and applications running on the back end. Virtual desktops add a new set of security challenges. Hosted virtual desktops (HVDs) replace a very static environment (physical users and machines) with a potentially very dynamic one. Virtual machines can be viewed as containers that use an allocation of a physical host s CPU, memory, network interface, storage, I/O processing, etc. and that dictate the boundaries and rules of engagement with the hypervisor. Hosted virtual desktops are contained in these virtual machines and use the parameters associated with the virtual machine. If a disaster (natural or human made) occurs, or if the organization simply needs to rebalance the use of physical hosts or perform an equipment upgrade during a maintenance window, virtual desktops can be migrated from one cluster of physical hosts to another. This migration can be implemented through administrator intervention, or it can be automated using rules and policies established with the hypervisor management platform. When virtual machines move between servers, maintaining a security policy for the virtual machine requires constant monitoring of the virtual machine. Monitoring these policies is critical to help ensure that any data access being requested from within the HVD has security policies associated with the HVD so that the end user can access only the servers and applications that the user is allowed to access. There is also a risk of an insider having access to all the virtual machines in the same virtual LAN. Current solutions to solve the problem with Layer 3 firewalling mechanisms are often inefficient and can negatively affect data center scalability and performance. 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 6

Virtualization also opens up a new area of attacks. The hypervisor can act as a single point of failure and can be a source of corruption for any virtual desktops that it hosts. Virtual machine API calls are targets for malicious code, and it is important to enforce policies that allow only authenticated and authorized API calls to be made, keeping the performance intact. It is also important to implement best practices, such as eliminating the exposure of hypervisor IP addresses. Exposure of hypervisor IP addresses can lead to distributed-denial-of-service (DDoS) attacks, which in turn can lead to risk of losing encryption keys residing in virtual memory. Another consideration relates to the organization s migration to virtual desktops. During the transition, there will be a mixed environment of PCs and virtual desktops. This raises the additional challenge of maintaining security in both traditional and virtual environments and performing compliance checks in mixed environments. It is important to reduce the inconsistency and deliver a security policy and administrative mechanism that is well suited to both environments. Additionally, moving to HVDs does not eliminate the need for traditional security. Traditional security challenges still apply for the virtualized environment, and most of the existing firewall, Intrusion Prevention, Email and Web Security, and secure mobility continue to apply to the data center and end-user perimeters. Traditional Security for the End User A system administrator must facilitate access to the data center from multiple locations. The administrator also must challenge the end user for authentication. The connection originating from the end user must be encrypted. Depending on where the user is accessing the desktop, the type of VPN encryption technology varies: EasyVPN, Dynamic Multipoint VPN (DMVPN), or SSLVPN. In addition, the end user is authenticated for IEEE 802.1x against the role-based access policies defined by Cisco Identity Service Engine (ISE). Capabilities on the LAN such as hop-to-hop LAN Security (MACsec) encryption can encrypt the display protocol on the LAN. Traditional Security for the Data Center A system administrator must protect the data center against all threats. Appropriate firewall policies at the edge allow or deny the display protocol traffic destined for the data center. Therefore a key data center security mechanism is a high performance firewall that controls network access to sensitive information assets and critical resources in a data center. Furthermore, an intrusion prevention system is necessary to detect and stop viruses, malware or hackers from attacking data center resources. In addition, the VPN head-end at the data center must terminate the VPN connections originating from the end client. Also, all email and web traffic leaving the enterprise must be scanned to meet regulatory and corporate compliance regulations. Cisco IronPort Email and Web Security Solutions provide integrated in depth scanning and only allow authorized content to enter and leave the premises. Secure Borderless Networks for Cisco VXI Cisco Borderless Networks integrate into the network to grant highly secure resource access to the right people using the right devices. The Cisco Borderless Networks portfolio helps enable: Controlled access to data center resources with a consistent, context-aware security policy Delivery of virtualization-aware, enhanced application performance Enforced security policies for traffic between virtual machines Policy consistency for highly mobile, densely populated virtual machines Delivery of more secure video, voice, wireless, and data services to your remote workforce Confidence that your systems are safeguarded from the latest threats. 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 6

Protection of valuable data, control and monitoring of network access, and enforcement of content policies Cisco s leadership in security makes Cisco well positioned to solve the security challenges for both physical and virtual desktops (Figure 1). Its end-to-end security architecture can scale well and create uniformity in policy creation for both virtual and non-virtual environments. Typically, servers are maintained in the server administrative group, and security, compliance, and the network is the domain of the security and network groups. In most companies, the group enforcing security policies is different than the group handling server administration. Security policies and regulatory compliance are best handled when the end-to-end scope of implementation is under the administration of one group. Now security administrators can use familiar tools, approaches, and policies to extend their control over domains that they do not currently manage, such as virtual machines. Figure 1. Securing Virtual Environments Virtualization Security Cisco Nexus 1000V Switch: Follow Virtual Machine Security Policies The Cisco Nexus 1000V Switch offers a management interface similar to a command-line interface (CLI), which allows network and security administrators to apply access policies and other parameters through an administrative interface with which they are already familiar and to create the port profiles individually. These port profiles are then attached to the virtual machines by the server administrators, and they remain attached to the virtual machines even when the virtual machines (and the virtual desktops residing within them) migrate between servers. This approach helps ensure that an appropriate access policy for the user is enforced with the virtual machine regardless of where the virtual machine is hosted. Cisco Virtual Security Gateway: Virtual Machine to Virtual Machine Firewall and Virtual Machine Zoning Cisco Virtual Security Gateway (VSG) provides secure segmentation of data center virtual machines using granular, zone-based control and monitoring with context-aware security policies (Figure 2). Controls can be applied across organizational zones, lines of business, or multi-tenant environments. Context-based access logs are generated with network and virtual machine activity levels. Trust zones and security templates can be provisioned on demand as virtual machines are created. These zones, containing like-purposed virtual machines 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 6

(user desktop zone, enterprise resource planning [ERP] application zone, web server zone, etc.) can be applied globally. Figure 2. Healthcare Use Case: Bringing it all together Cisco VSG employs the virtual network service data path (vpath) technology that is embedded in the Cisco Nexus 1000V distributed virtual switch. Cisco vpath steers traffic to a designated Cisco VSG for initial policy evaluation and enforcement. Subsequent policy enforcement is offloaded directly to vpath. Cisco VSG can provide protection across multiple physical servers and virtual machines. As a result, in a typical healthcare setting, for example, doctors can be in zone 1, and nurses can be separated into a zone 2. Doctors will be given access to dictation notes about patients, patient records, etc., but access for nurses can be limited to other databases that allow them to enter patients vital signs, view patients blood work, etc. The hospital administrators will be in a separate zone (zone 3) and will not have access to the patient records database because they are concerned with general administration of the hospital and not patient records. There can also be a fourth zone (zone 4, the guest zone) for patients and guests that allows access to the Internet 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 6

through secure, browser-based kiosks running on Microsoft Windows 7 non-persistent virtual desktops. Giving desktop virtualization based Internet access during wait time is one way to improve patient satisfaction without the burden of maintaining the desktop. The IT administrative can mitigate any malicious activity or high-bandwidthconsuming activity and to make administrative decisions such as moving a virtual machine from zone 3 to a quarantine zone. Intervirtual machine security can also be taken one step further in improving the security of the hypervisor itself. The hypervisor abstracts the physical host s resources into virtualized resources each virtual machine can access. It also manages the system s LAN and SAN interfaces. It is essential to ensure that only necessary, authenticated, and authorized API calls are made to the hypervisor from guest virtual machines. Cisco AnyConnect and AnyConnect Secure Mobility Solutions Beyond data center security, organizations need to consider the security of the WAN and extended remote branch-office and small-office and home-office (SOHO) environments from which users will access their virtual desktops. They must help ensure that the connection to the data center itself is secure. HVDs can be accessed through a variety of end clients such as thin clients, zero clients, repurposed PCs, and business tablets, and users can be expected to demand access to their HVDs at any time, and from anywhere. Cisco AnyConnect Secure Mobility provides the capability to connect to an HVD session securely through SSL and maintain encrypted access even when the user is mobile. Cisco AnyConnect capabilities such as always-on VPN and session persistence help ensure an optimal user experience. Cisco AnyConnect offers secure split tunneling capability and directs traffic to enterprise or to Cisco ScanSafe software-as-a-solution(saas) based web security. The Cisco ScanSafe solution works with the Cisco AnyConnect solution, and users can access Cisco ScanSafe services from outside the corporate infrastructure. Its location-aware capabilities and high availability offers an excellent user experience while continuing to offer web security both on and off premises. In a geographically dispersed data center deployment, HVDs within the remote data center can access the Cisco ScanSafe services that are closest to the data center and improve security without compromising the user experience. Threat Defense and Cisco Data Loss Prevention In addition to intervirtual machine security, traditional security mechanisms such as firewall and intrusion protection systems (IPS) are still required to protect the data center infrastructure itself. Even though the data in an HVD session is considered secure primarily due to the consolidation of data storage and access in the data center, there is still a risk of data loss either through email or the web. A user can accidently attach a highly confidential document to an unintended recipient in the email. An inappropriate posting of content to the web can also lead to the leaking of important documents. Cisco s content security continues to offer data leak protection for email and web data originating from an HVD. Conclusion Cisco is well positioned to address the security challenges presented by the new and evolving virtualized collaborative workspace. In both physical and virtual environments, Cisco VXI can address the security challenges from the client to the hypervisor: in campus and off campus, at remote branches, in SOHO environments, at hotspots, and within the data center (Table 1). Table 1. Cisco VXI Security Portfolio Challenge Security For Solution Secure remote access Thin clients, thick clients, zero client, smartphones, and tablets Cisco AnyConnect Secure Mobility (Cisco AnyConnect 3.0 for email and web security); and EasyVPN, DMVPN, and GETVPN for site-tosite VPN technologies 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 6

Challenge Security For Solution Virtualization security Hypervisor, virtual machines, and virtual switches Cisco VSG, Cisco Nexus 1000V, virtual machine LAN security, PVLAN, IP source guard, Domain Host Configuration Protocol (DHCP) snooping, Address Resolution Protocol (ARP) Inspection, and NetFlow Threat defense Data center defense Cisco ASA 5585-X Adaptive Security Appliance, firewall, and IPS Application and content Security Secure user virtual experience HTTP an XML attacks Display protocol and interactive media Email and web security with Cisco IronPort and Cisco ScanSafe appliances Secure integrated desktop virtualization and secure interactive media experience The Cisco VXI offers these security benefits: Cisco Unified Computing System and Cisco VN-Link technology provide visibility into and security of the network to the virtual machine and address the challenge of the complexity of security policy enforcement on the virtual ports of the server. The Cisco Nexus 1000V and Cisco VSG secure intervirtual machine traffic and address the challenges of user segmentation and isolation from mission-critical applications such as ERP, customer relationship management (CRM), and web services. Users are placed in multiple zones, and appropriate security policies are applied to the zone, even as virtual machine based desktops migrate from one physical host to another. Cisco AnyConnect Secure Mobility and Cisco ASA enable any time, anywhere secure access to HVDs and integrate with Cisco email and web security to deliver a secure and productive end user experience. Role-based access restrictions with Cisco ISE address the challenge of restricting user access on the basis of the user's role, user's device and its posture compliance. Cisco VXI security is well suited to address the challenges of desktop virtualization security whether the deployment is for customers with no prior virtualization solutions or for customers in the process of migrating to HVDs. Cisco VXI helps ensure that security best practices for physical systems are extended to virtual systems, allowing coexistence of physical and virtual desktops and consistent security policy enforcement across the two architectures. For More Information Cisco Desktop Virtualization Solutions: http://www.cisco.com/go/vdi Cisco Virtualization Experience Infrastructure: http://www.cisco.com/go/vxi Printed in USA C11-665340-00 05/11 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 6