Virtual Desktop Infrastructure (VDI)



Similar documents
Cloud Security Framework (CSF): Gap Analysis & Roadmap

Cloud Security Framework (CSF): Gap Analysis & Roadmap

How To Write A Cloud Security Framework

How To Write A Virtual Desktop Infrastructure (Vdi) Protocol Problem Statement For Iet-81

Cloud Computing Standards: Overview and ITU-T positioning

Web Application Firewall

Interwise Connect. Working with Reverse Proxy Version 7.x

ACE Management Server Deployment Guide VMware ACE 2.0

Interoperable Cloud Storage with the CDMI Standard

Configuring Nex-Gen Web Load Balancer

Alliance Key Manager Solution Brief

Cloud Security & Standardization. Markku Siltanen Tietoturvakonsultti CISA, CGEIT, CRISC

Cloudbuz at Glance. How to take control of your File Transfers!

Web Application Security

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Apigee Gateway Specifications

Cloud Infrastructure Planning. Chapter Six

Security Overview Enterprise-Class Secure Mobile File Sharing

Lecture 11 Web Application Security (part 1)

SECURE CLOUD COMPUTING

Cloud Computing Actionable Standards An Overview of Cloud Specifications

CompTIA Cloud+ 9318; 5 Days, Instructor-led

Configuring the CSS and Cache Engine for Reverse Proxy Caching

SiteCelerate white paper

CLOUD COMPUTING OVERVIEW OF CLOUD COMPUTING PRINCIPLES AND TECHNOLOGIES

OpenNebula Open Souce Solution for DC Virtualization. C12G Labs. Online Webinar

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

Cisco Physical Access Manager

User Guide. WS_FTP Server

Cloud Computing Security Issues

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

BlackBerry Enterprise Service 10 version 10.2 preinstallation and preupgrade checklist

vcloud Air Platform Programmer's Guide

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

Flexible Identity Federation

Cloud Security. Are you on the train or the tracks? ISSA CISO Executive Forum April 18, Brian Grayek CISSP, CCSK, ITILv3

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Check list for web developers

Lecture 02b Cloud Computing II

NAT TCP SIP ALG Support

User Guide. WS_FTP Server

Requirement Priority Name Requirement Text Response Comment

DMTF Management Standards for Edge Virtual. Port Profiles. Hemal Shah, Associate Technical Director, Broadcom Corporation.

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Installing and Configuring vcloud Connector

VMware Identity Manager Connector Installation and Configuration

Conformance of Avaya Aura Workforce Optimization Quality Monitoring Recording Solution with the PCI Data Security Standard

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM System with VMware View

OpenNebula Open Souce Solution for DC Virtualization

Deploy XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 with Amazon VPC

September 2009 Cloud Storage for Cloud Computing

Working With Virtual Hosts on Pramati Server

This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.

Cloud Architecture and Management. M.I. Deen General Manager (Enterprise Solutions) Sri Lanka Telecom

IBM Watson Ecosystem. Getting Started Guide

Network Services Management - A Practical Paper

Cloud Security Case Study Amazon Web Services. Ugo Piazzalunga Technical Manager, IT Security

Web application security

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

Onegini Token server / Web API Platform

Enterprise File Share and Sync Fabric. Feature Briefing

IPFW Innovate Cloud Service Task Force

CNS-301-3I ~ Citrix NetScaler 11 Advanced Implementation

TrustedX - PKI Authentication. Whitepaper

Storage Clouds. Karthik Ramarao. Director of Strategy and Technology and CTO Asia Pacific, NetApp Board Director SNIA South Asia

Building High Growth Services on the Microsoft Cloud Platform. Rich Cannon Senior Director, US Partner Hosting and Cloud Services

Creating a DUO MFA Service in AWS

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Cloud up to business processes

VMware vcloud Director for Service Providers

VMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware.

EMC ENCRYPTION AS A SERVICE

AppSentry Application and Database Security Auditing

Securing Networks with PIX and ASA

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM

User Guide - Table of Contents

APV9650. Application Delivery Controller

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

COMP 112 Assignment 1: HTTP Servers

How IT Can Aid Sarbanes Oxley Compliance

vcloud Director User's Guide

OpenNebula Open Souce Solution for DC Virtualization

Flexible Identity Federation

The OpenNebula Cloud Platform for Data Center Virtualization

Identity and Access Management for the Cloud What You Need to Know About Managing Access to Your Clouds

Transcription:

Virtual Desktop Infrastructure (VDI) Contributors: Suren Karavettil, Bhumip Khasnabish, Ning So, Russell Wang, Suan Ma, Meng Yu, Zhenping You Please send comments & suggestions to Suren Karavettil (surenck@gmail.com) March 04 th, 2010 1

IETF IPR and Copyright Statements This document (future Internet-Draft) is being prepared for IETF in full conformance with the provisions of BCP 78 and BCP 79 Copyright Notice Copyright (c) 2010 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents in effect on the date of publication of this document (http://trustee.ietf.org/license-info) 2

Outline Purpose Protocol Representation Protocol Definition Payload Types Header Attributes & Methods VDI Requirement Areas Other Standards Development Organizations (SDO) Roadmap Next steps 3

List of Acronyms IETF Internet Engineering Task Force CSP Cloud Service Provider VDI Virtual Desktop Infrastructure VDC Virtual Desktop Client VDA Virtual Desktop Agent VM Virtual Machine DC Data Center CSA Cloud Security Alliance SDO Standards Development Organizations PCI - Payment Card Industry DSS - Data Security Standards SOX Sarbanes Oxley 4

Purpose The purpose of the Virtual Desktop Infrastructure (VDI) Working Group: Protocol & Profiles 5

Protocol Representation 6

Protocol Definition Attributes & Methods corresponding to the following: Application Protocol Header HTTP/SMTP/VOIP/IPTV GRC Header - SOX, PCI DSS Non Functional Header business continuity (network, reliability, availability & performance) Functional Header REST/SOAP, cloud security attributes Payload POST Data/AVI/MPEG 7

Payload Types Live Web Application Form Data (Structured text/html) Image Voice Video Attachments (unstructured/mime data types) Unstructured data Archive Structured Data (Database, etc) Files Data PDF, DOC, Excel, etc Image - JPEG, GIF, PNG, etc Voice archive MP-3, etc Video Archive MPEG-4, MPEG-2, MJPEG, AVCHD, etc Unstructured data 8

Client Attributes Header Attributes & Methods (Sampling) Host Attributes Data Attributes Network Channel Attributes Facility Attributes URL Protocol attributes referrer, etc Encrypted or Not Secure Channel Personnel Access Control Session Id Hostname (virtual or hard) & port Location DMZ or Core Data center Servers RFIDs Page Id Context root Sanitized or Not Bandwidth Available Data center room cameras User Identity Application Context Connection Type Cookie Enabled Session Context Route Http Only & Secure Flag Query parameters Consumer Id & Location Id Method Id Page Context Cluster, Load Balanced, Failover & DR Provider Id & Resource Location Id Server Configurations (Timeouts) Identity Management I/O Data Validation Safe Coding Practices Safe Install & Config Practices Facility Management Multi-factor, Single-Sign on Federation, Authentication Input Sanitization for SQL, LDAP, Header Injection Encoding, Logging, etc LDAP/AD config for multitenancy Time of Day rules Authorization Encoding of output of javascript or HTML data Database configuration for multi-tenancy Access Controls Auditing Input Length Check to avoid overflows VLAN for multi-tenancy Note: Do not assume all cloud resources are virtualized to support multi-tenancy 9

VDI Requirement Areas VDC Personalization VDC to & fro VDA communication VDA profile resources management (across CSPs) 10

Other Standards Development Organizations (SDO) Cloud Security Alliance (CSA) VMWare s DMTF vcloud API & Open Virtualization Format (OVF) TM Forum s Cloud Program Open Cloud Computing Interface Working Group Amazon EC2 API Sun s Open Cloud API Rackspace API GoGrid API Trust Computing Group National Institute of Standards and Technology (NIST) OASIS SNIA Security Forum 11

Roadmap Next Steps Thoughts & Ideas for next steps 12