SoftLayer Fundamentals. Security / Firewalls. August, 2014

Similar documents
Mirantis OpenStack Express: Security White Paper

Tenzing Security Services and Best Practices

KeyLock Solutions Security and Privacy Protection Practices

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Boas Betzler. Planet. Globally Distributed IaaS Platform Examples AWS and SoftLayer. November 9, IBM Corporation

TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1

AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II

Firewall Defaults and Some Basic Rules

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

Fireware Essentials Exam Study Guide

Altus UC Security Overview

Data Protection & Security for SME

Netop Environment Security. Unified security to all Netop products while leveraging the benefits of cloud computing

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

IBX Business Network Platform Information Security Controls Document Classification [Public]

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Fortigate Features & Demo

Client Security Risk Assessment Questionnaire

Birst Security and Reliability

Tenzing Security Services and Best Practices

e2e Secure Cloud Connect Service - Service Definition Document

Managed Security Services for Data

FormFire Application and IT Security. White Paper

StratusLIVE for Fundraisers Cloud Operations

SECTION 1: INTRODUCTION

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

Small Business IT Risk Assessment

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Hosted SharePoint: Questions every provider should answer

Recommended IP Telephony Architecture

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

SonicWALL PCI 1.1 Implementation Guide

PCI Requirements Coverage Summary Table

STREAM FRBC

Vyatta Network OS for Network Virtualization

SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our

THE BLUENOSE SECURITY FRAMEWORK

Security Features: Lettings & Property Management Software

Cisco Small Business ISA500 Series Integrated Security Appliances

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

PCI Requirements Coverage Summary Table

74% 96 Action Items. Compliance

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Vendor Questionnaire

Ranch Networks for Hosted Data Centers

Unified Threat Management, Managed Security, and the Cloud Services Model

Endian Unified Threat Management

SaaS architecture security

Perceptive Software Platform Services

Cloud Hosting. Quick Guide 7/30/ EarthLink. Trademarks are property of their respective owners. All rights reserved.

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

THE SIS MANAGED SOLUTION CENTER

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

How To Understand Your Potential Customer Opportunity Profile (Cop) From A Profit Share To A Profit Profit (For A Profit)

How to Prevent a Data Breach and Protect Your Business

SNAP WEBHOST SECURITY POLICY

SonicOS 5.9 One Touch Configuration Guide

Frankfurt Data Centre Overview

CompTIA Network+ (Exam N10-005)

Table of Contents. CSC CloudCompute Service Description Summary CSC 1

VIEWABILL. Cloud Security and Operational Architecture. featuring RUBY ON RAILS

NETASQ MIGRATING FROM V8 TO V9

DOWNTIME CAN SPELL DISASTER

Astaro Deployment Guide High Availability Options Clustering and Hot Standby

Table of Contents. Page 1 of 6 (Last updated 30 July 2015)

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

HEC Security & Compliance

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

H.I.P.A.A. Compliance Made Easy Products and Services

Apteligent White Paper. Security and Information Polices

Who s Endian?

Security + Certification (ITSY 1076) Syllabus

Sophos Certified Architect Course overview

Cherwell Software Hosted Environment

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Plan for Success with a Hybrid Cloud! Thanks to IBM Power Systems OpenStack SoftLayer and UrbanCode

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

RE Cloud from Richardson Eyres

Security Controls for the Autodesk 360 Managed Services

Cloud Management. Overview. Cloud Managed Networks

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

QUOTATION FOR UTM 4/26(1)/2009/EDP-HO 06/08/2015

Cisco QuickVPN Installation Tips for Windows Operating Systems

Fortinet Solutions for Compliance Requirements

OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Delivering Managed Services Using Next Generation Branch Architectures

VMware vcloud Air Security TECHNICAL WHITE PAPER

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Security Information & Policies

Cloud S ecurity Security Processes & Practices Jinesh Varia

Powering the Cloud Desktop: OS33 Data Centers

Transcription:

SoftLayer Fundamentals Security / Firewalls August, 2014

Security Overview SoftLayer provides a security-rich environment for deploying and running customer workloads. Architecture and operational responsibilities in the SoftLayer offerings. The environment is achieved through a combination of: Additional security capabilities delivered through partners (Open Ecosystem). Certified physical and logical security of the SoftLayer data centers. Ease of use when enabling SoftLayer security features. 2

Securing the environment SoftLayer offers security services that can be used by the customer to secure their environment. These services include: Vulnerability scanning Antivirus and anti-spyware protection Host-based intrusion protection Firewall and network based threat protection (IPS, DDoS) Network Gateways Virtual Private Networking (VPN): IPSEC SSL PPTP Two factor authentication to the SoftLayer Customer Portal SSL Certificates that enable confidentiality of data-in-transit 3

Securing the environment (cont.) Nessus Vulnerability Assessment Security Scanner Can be run from the Portal Shows a detailed summary page McAfee LinuxShield Antivirus: Free Windows VirusScan Anti-Virus: Free Total Protection (adds AntiSpyware): $5 Host Intrusion Protection (IDS) w/reporting (only for Windows): $30 PCI Compliance w/mcafee SECURE 4

Software Firewall Windows Firewall Installed by Default Configured with the following ports RDP 3389; FTP 20,21; HTTP 80; HTTPS443 DNS 53; SMTP 25; POP 110; IMAP 143 IDENT 113; ICMP echo reply If Plesk is installed: Ports open per Plesk requirements Linux Firewall IPTables is installed APF Advanced Policy Firewall Others: IPFW, SmoothWall, IPCop, Ebox 5

Standard Hardware Firewall Secure Individual Servers Can be ordered with the purchase of a server Sold based on Port speed (must match server) Shared Firewall Fortigate 3950B 6

Dedicated Hardware Firewall Secure Single VLAN Cannot be ordered with a server; must be ordered after a server has been provisioned 1 Gbps Firewall with redundant links: Customer servers do not have to match link speed High Availability as an option Cannot have a Shared Firewall and Dedicated Firewall on the same VLAN Fortigate 310B 7

Using Network Gateways to Protect the Environment SoftLayer also offers a network gateway appliance powered by the Vyatta Network OS. Vyatta Network OS subscription edition deployed on a bare metal server. Managed by the customer Network configuration is extended through deployment of additional software images, not new physical network hardware. Capabilities: Firewall VPN Load-balancing NAT QoS 8

Using Network Gateways to Protect the Environment (cont.) A customer can construct a self-managed solution for software-based network connectivity. Choice may be based on skill and experience within their team, functional and non-functional requirements. Security capabilities will vary according to the chosen technology. Options include: 9

Managing VPN Connections to SoftLayer There are two overall types of VPN connections to SoftLayer: VPN System Administration Management 1 Gb link for VPN access for customers to perform administrative tasks on the private network. Additional tunnels can be requested through the Customer Portal SSL VPN, PPTP VPN, and IPSec VPN connections available through the Customer Portal. VPN Production Access The recommended solutions for any customer required production VPN access to the SoftLayer network is to use either: The FortiGate Security Appliance The Vyatta Gateway Appliance 10

Direct Connection to SoftLayer It s possible to direct connect to SoftLayer: Customer Ethernet circuit handoff Provides a customer with an direct Ethernet interface to the SoftLayer private network. A Customer s Telco provider brings an Ethernet circuit(s) to one of the 18 SoftLayer Points of Presence (PoP) around the world. Customer (or their Telco) contracts with the PoP s location provider for any space, power, and cross connect charges to bring their circuit and any customer premise equipment (CPE) to that PoP. Customer contacts SoftLayer to accept an Ethernet handoff connection to SoftLayer equipment at the PoP. SoftLayer Ethernet cross-connections are available in 1 Gbps or 10 Gbps sizes. 11

Other security resources 12

Securing the Data Centers SoftLayer data centers are Tier 3 data centers. Tier 4 99.995% availability Annual downtime.04 hours Two independent utility path Fully redundant (2N+1) Sustain 96-hour power outage Tier 3 99.982% availability Annual downtime 1.6 hours Multi power and cooling paths Fault tolerant (N+1) Sustain 72-hour power outage Tier 2 99.749% availability Annual downtime 22.0 hours One path of power and cooling Some redundancy in power Tier 1 99.671% availability Annual downtime 28.8 hours Single path power and cooling No redundant components 13

Securing the Data Centers (cont.) Data center and server room security Data centers located only in facilities with controlled access and 24- hour security. No server room doors are public-facing. Server rooms are staffed 24 x 7. Unmarked entry and exit doors into server rooms. Digital security video surveillance is used in the data center and server rooms Biometric security systems are used throughout the data center. Server room access strictly limited to SoftLayer employees and escorted contractors or visitors. Barcode-only identification on hardware; no customer markings of any type on the servers themselves. 14

Securing the Data Centers (cont.) Operational security Engineers and technicians trained on internal industry standard policies and procedures, and audited yearly. Geographic redundancy for all core systems for disaster recovery and business continuity. Two-factor authentication for Customer Portal access adds greater server security. All data removed from re-provisioned machines with drive wipe software approved by the US Department of Defense. Ongoing PCI DSS compliance for SoftLayer s own handling of credit card information. Current SSAE 16 SOC1 report, with no exceptions noted. 15

16