Shifting Roles for Security in the Virtualized Data Center: Who Owns What?



Similar documents
Security in the Software Defined Data Center

Itex VMware NSX Network Virtualization Presentation

Business Values of Network and Security Virtualization

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

How Network Virtualization can improve your Data Center Security

Software Defined Data Centers Network Virtualization & Security. Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security

A Look at the New Converged Data Center

Catbird 6.0: Private Cloud Security

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Software Defined Environments

Securing the Virtualized Data Center With Next-Generation Firewalls

Advancing Security with Software Defined Datacenter. Karen Law Senior Systems Consultant VMware Hong Kong Ltd

Analysis of Network Segmentation Techniques in Cloud Data Centers

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera VERSION May, 2015

Netzwerkvirtualisierung? Aber mit Sicherheit!

Virtualization, SDN and NFV

Limiting the Spread of Threats: A Data Center for Every User

Data Center Networking Designing Today s Data Center

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

Data Center Micro-Segmentation

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

How To Build A Software Defined Data Center

STRATEGIC WHITE PAPER. The next step in server virtualization: How containers are changing the cloud and application landscape

(R)Evolution im Software Defined Datacenter Hyper-Converged Infrastructure

VMware vcloud Networking and Security Overview

Simplify IT. With Cisco Application Centric Infrastructure. Barry Huang Nov 13, 2014

Avaya Virtualization Provisioning Service

How To Protect A Data Center From A Hacker Attack

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Building the Virtual Information Infrastructure

VMware vcloud Networking and Security

SDDC: A New Architecture for a New Era of Ed IT

Managing Cloud Infrastructure

Enabling the vision of the Modern Datacenter. System Center 2012 SP2 Azure

White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com

Mitigating Information Security Risks of Virtualization Technologies

Advanced Security Services with Trend Micro Deep Security and VMware NSX Platforms

Unified Threat Management, Managed Security, and the Cloud Services Model

Automating the Virtual Datacenter. Saša Hederić VMware Systems Engineer SE Europe

Software Defined Network (SDN)

What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates

Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure

Softverski definirani data centri - 2. dio

1518 Best Practices in Virtualization & Cloud Security with Symantec

Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain

Atos Managed Services The Digital Data Center

Designing Virtual Network Security Architectures Dave Shackleford

Software defined networking. Your path to an agile hybrid cloud network

Lecture 02b Cloud Computing II

Network Access Control in Virtual Environments. Technical Note

7 Ways OpenStack Enables Automation & Agility for KVM Environments

Group-Based Policy for OpenStack

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer

Optimally Manage the Data Center Using Systems Management Tools from Cisco and Microsoft

Visibility into the Cloud and Virtualized Data Center // White Paper

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

WHITE PAPER: Egenera Cloud Suite for EMC VSPEX. The Proven Solution For Building Cloud Services

VMware NSX A Perspective for Service Providers part 2

W H I T E P A P E R E n a b l i n g D a t a c e n t e r A u t o mation with Virtualized Infrastructure

Benefits of virtualizing your network

IT Infrastructure Services. White Paper. Utilizing Software Defined Network to Ensure Agility in IT Service Delivery

Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc.

Microsoft Private Cloud

SINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER

VMware's Cloud Management Platform Simplifies and Automates Operations of Heterogeneous Environments and Hybrid Clouds

REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION

Use Case Brief CLOUD MANAGEMENT SOFTWARE AUTOMATION

Virtualization Impact on Compliance and Audit

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

The Importance of Information Delivery in IT Operations

Network Virtualization and Software-defined Networking. Chris Wright and Thomas Graf Red Hat June 14, 2013

Open Source Networking for Cloud Data Centers

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

Driving Down the Cost and Complexity of Application Networking with Multi-tenancy

Software-Defined Storage Extending the Power of Your Datacenter Eric Tsai Senior Technic Architect Presale Division Enterprise Group Taiwan

Brocade One Data Center Cloud-Optimized Networks

Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager

The Changing Role of Software in the New Era George L. Lotridge Senior Partner Technology Strategist VMware, Inc.

Outline. Why Neutron? What is Neutron? API Abstractions Plugin Architecture

VMware vshield App Design Guide TECHNICAL WHITE PAPER

Cisco Unified Computing Remote Management Services

Service Orchestration: The Key to the Evolution of the Virtual Data Center

Virtual Machine Manager Domains

The ROI of Automated Agentless Endpoint Management

Deliver the Next Generation Intelligent Datacenter Fabric with the Cisco Nexus 1000V, Citrix NetScaler Application Delivery Controller and Cisco vpath

Hitachi Unified Compute Platform (UCP) Pro for VMware vsphere

Transcription:

Shifting Roles for Security in the Virtualized Data Center: Who Owns What? SESSION ID: CSV-T07 Rob Randell, CISSP Director Systems Engineering Principal Security Architect VMware / NSBU Malcolm Rieke Director of Product Management Catbird

Agenda Current State of the Data Center and the SDDC Why Should I Care about the SDDC? Current State of Data Center Security The Software-Defined Data Center (SDDC) IT Organizational Structure Current Roles and Duties in Data Center Overlap of Roles and Duties in Data Center How the SDDC is Forcing a New Convergence of Roles and Functionality 2

Why Do I Care??? 60 Ports in Millions 40 20 Virtual Server Access Ports 32% CAGR Physical Server Access Ports 0 2010 2011 2012 2013 2014 2015 CREHAN RESEARCH Inc. Half of all Server Access Ports are already virtual and are on track to be ~67% in 2 years *40% of vadmins manage virtual switching

Traditional Network-Based Security Building Blocks

Scaling the Basic Blocks

Day in the Life of a Network/Security Admin Request: I want to deploy a new web application with two tiers. Internet Net/Sec Admin: How do I implement that topology? Web App 1 7 6 2 3 8 4 5 9

Challenge: Applying Security Policies is a Moving Target Tying security policies to physical constructs is ineffective. No single source of truth for where security policies are applied in the software-defined data center CISO: We need to make sure the Firewall is protecting the RED VMs appropriately. Can you confirm this?

8 Fundamental Security Problems in the Modern Data Center 1 Perimeter-Centric 2 Hyper Connected Computing Base 3 Shared Component Base 4 Highly Accessible Info on I/F and Topology 5 Control Choke Points 6 Managing Security in a Distributed State 7 Security Expressed Over Bad Identifier 8 Policy Abstraction and Management

Primary Use Case: Agility & Efficiency Fast is the new better, Fast is the new cheaper, Faster is the new faster! Chris Launey Director, Cloud Hosting The Walt Disney Company

Software-Defined Data Center SOFTWARE-DEFINED DATACENTER All infrastructure is virtualized and delivered as a service, and the control of this datacenter is entirely automated by software.

5 Key Security Advantages of SDDC Micro- Segmentation Virtualized Dist. Services Lean/Fast Sensor Fewer Shared Services App-Centric Policy Reduces number of addressable targets from any infection Greatly limits lateral movement and makes it much more detectable. More pervasive security services End to End visibility. Achieved more efficiently (less hair-pinning/tromboning). Simpler policy: Control points are protecting a more focused resource (closer to the app boundary) Virtualized sensor less loaded, and therefore more scalable. Embed security functionality into the virtual switch Enables policy to efficiently follow the workload as it moves and scale out Services are smaller, less vulnerable, easier to manage. Fewer single points of failure. Having the context of how services are composed (relevant components, linkages) and how they relate to the virtual and physical infrastructure. Simplify policy. Improve alignment of security controls. Greater context & transparency of gaps, etc.

Provisioning via the SDDC Programmatic provisioning Place any workload anywhere Move any workload anywhere Decoupled from hardware Operationally efficient True Cloud Application!!

Challenge: Manual Workflows Are Time Consuming & Error Prone Operator uses one security product to detect an event and then has to manually trigger another security product to remediate Services Vulnerability Mgmt AV Service Host Integrity Service Monitor Events Ask for VLAN Tag Identify Threat Report Correlate to IP (Attempt) File Ticket With NetBios ID Receive Ticket Notification Web Servers Determine VM -> Subnet -> Tag Realize NAT Issue? Create Rule Open Ticket To Patch Machine Close Ticket Verify Rule

Security Service Consumption in an SDDC Security services can now be consumed more efficiently in the software-defined data center. Provision. Provision and monitor uptime of different services, using one method. Apply. Apply and visualize security policies for workloads, in one place. Automate. Automate workflows across different services, without custom integration.

Automate Vulnerability Management Workflow Prerequisites: Security groups defined by tag membership and relevant policies 1. Desktop group scanned scanned for vulnerabilities Security Group = Desktops 2. Solution tags VMs to indicate vulnerabilities Security Group = Monitor Zone Members = {Tag = VULNERABILITY_MANAGEMENT.VulnerabilityFound 3. Vulnerable VM automatically gets added to Monitor Zone, based on tag 4. Patches are tested in staging environment before being applied; VM is re-scanned 5. Tag removed and VM moved out of Monitor Zone

Information Technology Organization Chief Information Officer Chief Information Security Officer Systems Administration Network Administration Information Security Technology skill silos are the basis for current organizational divisions.

Skill Diversity Who Is Doing What? Network Administration Define Network Platform» VLAN, IP Space, QoS Consult App Owners and Architects Deploy Switches, Routers, Load Balancers Operation & Maintenance of Network Platform System Administration Define Compute Platform Consult App Owners and Architects Deploy Compute Platform Operation and Maintenance of OS/App/Compute Platform Information Security Define & implement policy for FW, IDS, Vuln Mgmt, A/V, Access Collaborate with» App Owners & Architects» Network Admin» Systems Admin» GRC Deploy/Configure Security Controls Operation of Controls & Incident Response

Overlap Exists Server Admin <> Network Admin Virtual Switching Technology: Consolidates Network Access Layer Administration Homogenizes Network Technology Skill Requirement for Access Layer Automated Dual Provisioning of Compute and Network Resources

Overlap Exists Network Admin <> Security Admin Firewall and IDS are network devices and by necessity are managed by Network Groups Networking resources engage in and support incident response

Overlap Exists Security Admin <> Server Admin Virtualized Security Components: Leverage Perfect Inventory Provision in concert with Computer and Network Leverage commodity hardware Breaking existing skill and organizational silos

Skillset Convergence in SDDC and Cloud Software Defined Data Center Provisioning and Operations

Convergence Systems Administration In progress with the adoption of virtualization technologies Network Virtualization at switch layer approaching 50% of access layer Routing and Network topologies becoming virtual Software Defined Data Center

Convergence Network Administration Network technology vendors moving to virtual Cisco Nexus 1000v virtual switch extends physical network configuration paradigm into VI VXLAN and VXLAN Routing support Native virtualized switches typically managed by vadmin Software Defined Data Center

Convergence Security Administration Software Defined Data Center Virtualized and virtualization aware security components Endpoint security completely virtualized (no agents) Perfect inventory from VI enhances all security controls vswitch integration and control adds determinism and automation to network based security controls

Convergence of Security Controls Firewall Vulnerability Management IDS Anti-Virus Access Controls

Converged Software Defined Security Controls Firewall Vuln Mgmt IDS Virtualization and Cloud Software Defined Security Firewall IDS Vuln Mgmt Anti-Virus Access Control Anti-Virus Access Controls

Shifting Skills to Match Shifting Roles Systems Administration Network Administration (hardware only) Information Security (hardware only) Reskill and enable teams Cross-train Become virtualizationaware Virtualization Team Virtual System Admin Virtual Network Admin Virtual Security Admin

Key Takeaways Systems administration has been greatly enhanced through the adoption of virtualization technologies Networks are becoming virtualized at access layer and will support virtual network topologies independent of physical network (flattening physical network) Virtualized and Virtualization aware security technologies benefit from speed and automation of virtualization making security controls as easy to deploy and manage as virtual machines Organizational divisions based on Systems/Network/Security skill siloes struggle to realize benefits of all three skills sets Software Defined Data Center features ubiquitously secure applications providing higher levels of security if your organization can embrace and adapt to these technologies

Visit Catbird in booth 2505 to be entered in an exclusive raffle for session attendees! Q&A Rob Randell Malcolm Rieke rrandell@vmware.com malcolm@catbird.com VMware Catbird Booth 1621 Booth 2505