Cloud Network Security End to End Cloud Overview



Similar documents
VXLAN: Scaling Data Center Capacity. White Paper

How To Extend Security Policies To Public Clouds

Chapter 11 Cloud Application Development

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

How Network Virtualization can improve your Data Center Security

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Lecture 02b Cloud Computing II

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Virtualization, SDN and NFV

Analysis of Network Segmentation Techniques in Cloud Data Centers

Securing Virtual Applications and Servers

Expert Reference Series of White Papers. vcloud Director 5.1 Networking Concepts

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera VERSION May, 2015

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure

VMware vcloud Air Networking Guide

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, :32 pm Pacific

Extending Networking to Fit the Cloud

Outline VLAN. Inter-VLAN communication. Layer-3 Switches. Spanning Tree Protocol Recap

Simplify IT. With Cisco Application Centric Infrastructure. Barry Huang Nov 13, 2014

VMware vcloud Networking and Security Overview

VXLAN Bridging & Routing

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

VMware Network Virtualization Design Guide. January 2013

Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

How To Orchestrate The Clouddusing Network With Andn

Cloud Security Best Practices

Software Defined Network (SDN)

Multitenancy Options in Brocade VCS Fabrics

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates

SDN CONTROLLER. Emil Gągała. PLNOG, , Kraków

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

Palo Alto Networks. Security Models in the Software Defined Data Center

8. Firewall Design & Implementation

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Enhancing Cisco Networks with Gigamon // White Paper

Security Technology: Firewalls and VPNs

Vyatta Network OS for Network Virtualization

Secure networks are crucial for IT systems and their

SOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

A Network Design Primer

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

DCB for Network Virtualization Overlays. Rakesh Sharma, IBM Austin IEEE 802 Plenary, Nov 2013, Dallas, TX

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam

Cisco Virtual Security Gateway for Nexus 1000V Series Switch

Stretched Active- Active Application Centric Infrastructure (ACI) Fabric

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

Network Virtualization for Large-Scale Data Centers

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Enabling Solutions in Cloud Infrastructure and for Network Functions Virtualization

Visibility into the Cloud and Virtualized Data Center // White Paper

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

A Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio and Benny Rochwerger IBM

Cloud Networking From Theory to Practice" Ivan Pepelnjak NIL Data Communications"

Network Virtualization Network Admission Control Deployment Guide

Business Values of Network and Security Virtualization

End to End Security in a Hosted Collaboration Environment

Network Virtualization

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Network Virtualization

INTRUSION DETECTION SYSTEMS and Network Security

AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II

Expert Reference Series of White Papers. VMware vsphere Distributed Switches

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

Cisco Nexus 1000V Switch for Microsoft Hyper-V

OpenFlow and Software Defined Networking presented by Greg Ferro. OpenFlow Functions and Flow Tables

WAN Failover Scenarios Using Digi Wireless WAN Routers

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Securing Networks with PIX and ASA

Scalable Extraction, Aggregation, and Response to Network Intelligence

FIREWALLS & CBAC. philip.heimer@hh.se

Secure Cloud-Ready Data Centers Juniper Networks

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

CMPT 471 Networking II

Data Center Network Virtualisation Standards. Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair

INTRODUCTION TO FIREWALL SECURITY

Use Case Brief CLOUD MANAGEMENT SOFTWARE AUTOMATION

Packet Optimization & Visibility with Wireshark and PCAPs. Gordon Beith Director of Product Management VSS Monitoring

VLAN and QinQ Technology White Paper

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Roman Hochuli - nexellent ag / Mathias Seiler - MiroNet AG

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Chapter 1 The Principles of Auditing 1

New Security Perspective for Virtualized Platforms

Nuage Networks Virtualised Services Platform. Packet Pushers White Paper

Transcription:

Cloud Network Security End to End Cloud Overview Session 17007 Thursday, March 5, 2015: 3:15 PM-4:15 PM Issaquah A (Sheraton Seattle) Junnie Sadler jrsadler@cisco.com Kevin Manweiler - kmanweil@cisco.com

Abstract This session focuses on the components that make up the network component of Data Center security and the challenges imposed by the Cloud and how they are addressed.

Learning Objectives On completion of this session participants will be able to Understand the basic components and features that make up network security Understand the challenges that Cloud introduces and what options are available to deal with them Understand the challenges that Virtualization introduces and how to deal with them

Cloud Network Security Challenges Cloud Network Security Components Cloud Network Segmentation Security Compliance

Cloud Data Center Security Challenges Complexity Compliance Visibility Too many different security components No easy way of collecting data and correlate Integration is a nightmare Growing Regulatory Requirements: PCI, HIPAA, FISMA Little to No Guidance On How to Meet New Standards Huge non-compliance fines Need to know complete context Utilize global intelligence with data analytics Behavioral analysis and forensic investigations

Security Must Be Part of The DC/Cloud Architecture 7% 76% 17% Within the DC (East/West) 76% DC to User (North/South) 17% Data center traffic will continue to dominate Internet traffic for the foreseeable future, but the nature of data center traffic is undergoing a fundamental transformation brought about by cloud applications, services, and infrastructure. DC to DC (Multi-site) 7%

Tenant Requirements of the Cloud Provider Regulatory compliance Is my Cloud Provider able to ensure compliance with regulations such as PCI, HIPAA, or FISMA? Secure Multi-Tenancy Can my Cloud Provider safeguard my workloads, protect sensitive data, and maintain complete isolation to prevent compromise? End-to-End Visibility Impact Can I see my cloud environment as part of my DC, including access to forensic and remediation data? Privileged user access Can my Cloud Provider ensure than only my authorized users have access to my cloud environment? Revenue loss Loss of reputation Damaged customer relationships Significant Fines and Fees Litigation or Arbitration

Detection is Key to Response and Recovery 85% of attacks begin compromising their target within minutes 60% of attacks begin exfiltrating data within hours 85% of attacks are not discovered for weeks or months 59% of attacks are not contained for weeks or months AFTER discovery Source: Verizon 2012 Data Breach Investigation Report

Network Security Components

Implications for Security Process and Technology BEFORE See it, Control it DURING Intelligent & Context Aware AFTER Retrospective Security Defending Attacks Discovering/Catching Attacks Remediating Attacks Network Endpoint Mobile Virtual Cloud

Implications for Security Process and Technology BEFORE See it, Control it DURING Intelligent & Context Aware AFTER Retrospective Security Defending Attacks FIREWALL Discovering/Catching Attacks IPS Remediating Attacks MALWARE PROTECTION VPN WWW WEB NETWORK ANALYSIS CONTEXT EMAIL

Simplified Cloud Reference Architecture Secured and Private VPN MPLS or IPSec / SSL NAS WAN Edge L2 or L3 VPN Access Aggregation Each Tenant in unique VRF Services VRF / VLAN map to unique vfw/lb Access Map to Virtual Machine Compute Tenant VRF map to unique VLAN Tenant A WAN Data Center Core Tenant B Sub Tenant B1 and B2 NEXUS 1000v

FW - Firewall The workhorse of network security Acts as a packet filter - allows the good packets through and discards the bad

FW Firewall (2) Can perform Network Address Translation (NAT) and Port Address Translation (PAT) Translates inside (protected) address to an outside (unprotected) address For TCP traffic also randomizes sequence starting ID s to help prevent hijacking Can act as a VPN termination point

FW Firewall (3) Can be deployed in High Availability mode 1 active and 1 standby. Stateful firewalls require symmetric traffic flow; ie, if it goes out one side it has to come back the same way.

FW Firewall Black List Let s all traffic pass by default

FW Firewall White List Denies all traffic by default except what is explicitly configured to be let through. Creates more hassle for application deployment all protocol/packet types must be enumerated in the change request

IPS Intrusion Prevention System Combination of IDS (Intrusion Detection System) and Firewall or Router. IDS component monitors traffic and looks for anomalous or malicious traffic. Logs information about the suspicious traffic and tries to prevent it with accesslist or firewall rule dynamically.

DDoS Traffic Scrubber Distributed Denial of Service (DDoS) traffic scrubbers help identify and divert suspicious traffic for further processing and cleansing Some versions divert and scrub traffic locally Other versions divert traffic to processing centers which scrub the traffic and return the clean traffic back to the data center. Usually performed with DNS diversion Example is Arbor s Prevail appliance and Arbor Cloud service

ACLs - Access Control Lists Router feature to allow/block traffic on a per port basis First line of defense for routers Usually applied on User/Host/Edge facing ports Like Firewall rules, consist of individual configuration lines which are applied in order Can mix and match permitting some traffic while denying other traffic On most platforms performed by ASICs rather than the route processor (RP)

User Credentials Access to network devices is protected with userid/password combination Uses TACACS or RADIUS protocol to communicate with a credentials server Access is usually via Telnet (weak) or SSH (strong)

Private VLANs Mechanism to provide isolation Cisco feature originally but open standard Different port types: Promiscuous, Isolated, Community

SPAN / rspan / Port Mirroring Used to copy packets from a port, set of ports, or VLAN on a network device Sends the traffic out a port (SPAN) or tunnels it (rspan) While used predominantly for sending copies of traffic to network Sniffers for troubleshooting, also used to send traffic to security monitoring and telemetry appliances and applications for DPI (Deep Packet Inspection)

NetFlow/JFlow Used to send information about traffic flows through the network. Basically collects information about source/destination traffic flows and packet counts Date flow start Duration Proto Src IP Addr:Port Dst IP Addr:Port Packets Bytes Flows 2010-09-01 00:00:00.459 0.000 UDP 127.0.0.1:24920 -> 192.168.0.1:22126 1 46 1 2010-09-01 00:00:00.363 0.000 UDP 192.168.0.1:22126 -> 127.0.0.1:24920 1 80 1 Other vendor flow protocols: Jflow / cflowd NetStream NetStream Cflowd Rflow AppFlow sflow Juniper 3Com/HP Huawei Alcatel-Lucent Erricsson Citrix [multiple]

Anti-spoofing/Unicast Reverse Path Forwarding Port check to ensure that users are who they say they are. Example: User is assigned an address in the 1.1.1.0/24 subnet but sends a Smurf attack to user 2.2.2.76 on subnet 2.2.2.0/24 using a source address of 2.2.2.111. When the first hop router receives the packet it checks to see that the source address of the packet is in the same subnet as assigned to the interface. If it doesn t match the packet is discarded. (note: this could be done using an access list but is easier to administrate don t have to change if the subnet changes.

ESA Email Security Appliance Intercepts email and inspects it again attacks such as phishing, Spam, malware, embedded links, etc. Handles encrypting of outbound email

Cloud Challenges

Segmentation Per-Tenant Isolation VRF-lite (virtual routing and forwarding) at aggregation layers provides per-tenant isolation at L3 Server-to-Server Traffic Denied By Default Separate dedicated per-tenant routing and forwarding tables ensure that all inter-tenant traffic within the data center is prohibited, unless explicitly allowed Tagging provides ID-Based Segmentations VLAN IDs and the 802.1q tag provide isolation and identification of tenant traffic across the L2 domain Segmentation for Compute, Storage, and Applications Compute Separation (vnics, VLANs, Port Profiles) Storage Separation (VSAN, LUN Masking) Application Tier (Network Centric, Logical, and Physical segmentation with L2/L3 firewalling and security zoning)

WAN Edge Core VRF s VRF allows multiple instances of a routing table to co-exists within the same router. Due to the fact that routing instances are independent, they play a very crucial role in end-to-end separation of tenant traffic flows in a multi-tenant environment. IP Switching IP Switching 802.1q 802.1q VRF VRF SVI or Sub-Interface (Layer 3) VRF SVI or Sub-Interface (Layer 3)

Virtual Extensible Local Area Network (VXLAN) Offers virtual separation Currently an IETF draft submitted by Cisco, VMware, Citrix, Broadcom and others IP Multicast used for L2 broadcast/multicast Can cross Layer 3 vapp VXLAN 1 External Network VXLAN 2 VXLAN 3 Ethernet in IP Overlay L2 frame encapsulated in UDP 50 bytes overhead DB VM App VM Web VM Edge Gateway Uses 24bit VXLAN identified 16M Logical networks Outer MAC DA Outer MAC SA Outer 802.1Q Outer IP DA Outer IP SA Outer UDP VXLAN ID (24 bits) Inner MAC DA InnerM AC SA Optional Inner 802.1Q Original Ethernet Payload CRC VXLAN Encapsulation Original Ethernet Frame

QFabric Juniper s solution to linking devices together in a data center Flattens out the network makes everything a single tier Used in IBM s Cloud

Virtualization Challenges Source: Verizon 2012 Data Breach Investigation Report

Question What do all the network security devices listed above need to have in order to work?

Answer Traffic coming into the device Visibility into what s going on (yes, and power and connectivity.)

Virtualized Devices Boundary of network visibility No visibility to individual traffic from each VM Unable to troubleshoot, apply policy, or address performance issues

Two Solutions for Visibility and Policy on Virtualized Servers 1 Redirect VM traffic via VLANs to external (physical) appliances 2 Apply hypervisor-based network services Web Server App Server Database Server Web Server App Server Database Server Hypervisor Hypervisor VLANs Virtual Contexts Traditional Service Nodes VSN VSN Virtual Service Nodes

VMotion and locally switched traffic VMotion Problems: VMotion may move VMs across physical ports policy must follow Impossible to view or apply policy to locally switched traffic VLAN 101 Cannot correlate traffic on physical links from multiple VMs Three solutions: Virtual ports and VLAN s VXLAN VN-TAG and vpath

Cloud Security Standards and Compliance

Control Ownership Clarity

Ownership Accountability Presentation modality Presentation Platform Provider Data OS & Applications VMs/Containers Consumer Data OS & Applications Integration and middleware Consumer Data API s Applications Meta data Integration and middleware Conte nt API s Abstraction Core connectivity Provider API s Abstraction Core connectivity Provider API s Abstraction Core connectivity Hardware Hardware Hardware Facilities Facilities IaaS PaaS SaaS Security Is Shared Facilities

Compliance is NOT Security Compliance is currently one of the biggest drivers of security activity Compliance, however, does not equal effective security Many compliant organizations have experienced significant outages, compromises, and losses Even without incidents, compliance efforts can result in lost productivity and money Redundant silos of compliance may exist within an organization Compliance activities may be inefficient and poorly aligned or coordinated

Industry Standard Regulatory Compliance Guidance There are different regulatory compliance laws for different market verticals: PCI DSS For credit card data and processors HIPAA and related privacy laws For health care segment FISMA and related government regulations For government agencies and their service providers

Cloud Security Alliance Cloud Controls Matrix

Cloud Security Alliance Cloud Controls Matrix

Thank you! Stay Secure