Cloud Architecture and Management. M.I. Deen General Manager (Enterprise Solutions) Sri Lanka Telecom



Similar documents
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Proactively Secure Your Cloud Computing Platform

Hybrid Cloud Computing

Expert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

SUSE Cloud 2.0. Pete Chadwick. Douglas Jarvis. Senior Product Manager Product Marketing Manager

Lecture 02b Cloud Computing II

Security Issues in Cloud Computing

CloudPlatform XenDesktop/XenApp cloud provisioning. Gaby Grau - gaby.grau@citrix.com Systems Engineer Networking & Cloud October 2014

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

Cloud Courses Description

KEMP LoadMaster. Enabling Hybrid Cloud Solutions in Microsoft Azure

Moving beyond Virtualization as you make your Cloud journey. David Angradi

Cloud Computing and Data Center Consolidation

Consumption IT. Michael Shepherd Business Development Manager. Cisco Public Sector May 1 st 2014

Avnet's Guide to Cloud Computing

SolidFire SF3010 All-SSD storage system with Citrix CloudPlatform Reference Architecture

Why Use OPTIMIS? Build and Run Services in the Most Suitable Cloud Venues. May 2013

Cloud models and compliance requirements which is right for you?

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

How To Protect Your Cloud From Attack

Cloud Infrastructure Planning. Chapter Six

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

Potecting your business assets in The Cloud, with. Secure Multitency Environment from CloudHPT.

Cloud Computing Security Issues

Federal Aviation Administration. efast. Cloud Computing Services. 25 October Federal Aviation Administration

Build. an Amazon-like experience for Cloud Services. Key Challenges. you click it. you see it. you got it. October

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

With Eversync s cloud data tiering, the customer can tier data protection as follows:

VMware vcloud Powered Services

HOW SDN AND (NFV) WILL RADICALLY CHANGE DATA CENTRE ARCHITECTURES AND ENABLE NEXT GENERATION CLOUD SERVICES

Delivering Managed Services Using Next Generation Branch Architectures

Using ArcGIS for Server in the Amazon Cloud

Cloud Courses Description

Visions of Clouds and Cloud Security. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

An enterprise- grade cloud management platform that enables on- demand, self- service IT operating models for Global 2000 enterprises

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

Dell Cloud Services. Services

Enhancing Operational Capacities and Capabilities through Cloud Technologies

What Cloud computing means in real life

Cloud Computing Technology

Cloud Security Introduction and Overview

How To Manage A Cloud From A Server On A Hypervisor On A Citrix Cloud Platform

Windows Azure and private cloud

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

AUTOMATION. Tihomir Hrastovscak HP Software

NIST Cloud Computing Security Reference Architecture (SP draft)

On- Prem MongoDB- as- a- Service Powered by the CumuLogic DBaaS Platform

Professional Cloud Solutions and Service Practices

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

Managing Cloud Computing Risk

Modern App Architecture for the Enterprise Delivering agility, portability and control with Docker Containers as a Service (CaaS)

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Becloud. IaaS in the channel. Mar ch 13

HP OpenStack & Automation

Guide to AWS. Brought to you by

Virtualization Impact on Compliance and Audit

Building High Growth Services on the Microsoft Cloud Platform. Rich Cannon Senior Director, US Partner Hosting and Cloud Services

VMware vcloud Architecture Toolkit Public VMware vcloud Service Definition

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Cloud Standards - A Telco Perspective

Chapter 11 Cloud Application Development

ArcGIS for Server: In the Cloud

Implementing Microsoft Azure Infrastructure Solutions

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

Monetizing the Cloud with Cisco Desktop-as-a-Service Solutions

CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs

IDENTITY & ACCESS MANAGEMENT IN THE CLOUD

Vyatta Network OS for Network Virtualization

WHY SERVICE PROVIDERS NEED A CARRIER PaaS SOLUTION cpaas for Network

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

vcloud Air Simone Brunozzi, VP and Chief Technologist, vcloud 2014 VMware Inc. All rights reserved.

Modern Application Architecture for the Enterprise

Public Cloud Workshop Offerings

Building Private & Hybrid Cloud Solutions

Web Application Hosting Cloud Solution Architecture.

OVERVIEW Cloud Deployment Services

C a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l t e r r e m a r k. c o m

Deploying Public, Private, and Hybrid Storage Clouds. Marty Stogsdill, Oracle

IT Audit in the Cloud

TOSCA Interoperability Demonstration

From Virtualized to ITaaS. Copyright 2011 EMC Corporation. All rights reserved.

Hybrid Cloud: Overview of Intercloud Fabric. Sutapa Bansal Sr. Product Manager Cloud and Virtualization Group

Cloud Computing and Open Source: Watching Hype meet Reality

Introduction to Cloud Computing

Transcription:

Cloud Architecture and Management M.I. Deen General Manager (Enterprise Solutions) Sri Lanka Telecom

Cloud Computing Architecture Reference Architecture, Terminology and Definitions Akaza Cloud Architecture Feature/Aspects of the cloud architecture Cloud Computing Portability Key considerations for cloud portability Use case : App Life Cycle Management Cloud Computing Interoperability Key considerations for cloud interoperability Use Case : Integration with Enterprise Private cloud and SP Private cloud Security and Compliance Security and Compliance from CSP and customer perspective Physical implementation of security between enterprise and cloud Some common compliance standards Telco Cloud vision Where Enterprise Cloud meets Telco Cloud

Cloud Computing Architecture

Basic Tenets of a Cloud Computing Architecture On demand self service Broad network access Resource pooling Rapid elasticity Measured service Cloud Portal Pool of resources Computing Storage Connectivity

Cloud Computing Reference Architecture Figure 1: NIST The Conceptual Reference Model

Cloud Service Auditor Cloud Service Broker Cloud Service Consumer Cloud Service Developer Cloud Service Provider Terminology of the Reference Architecture (NIST Refernece Model) (1) A party that can conduct independent examination of Cloud Service controls with the intent to express an opinion thereon. (2) Audits are performed to verify conformance to standards through review of objective evidence. (1) An entity that manages the use, performance, and delivery of Cloud Services, and negotiates relationships between Cloud Service Providers and Cloud Service Consumers. (2) Key capabilities provided by Cloud Service Brokers are: Cloud Service onboarding, Cloud readiness assessment, Application and data migration, Cloud Service Provider capabilities evaluation (1) An entity as the principal stakeholder that maintains a business relationship with, and uses the service from, a Cloud Service Provider. (1) An entity that develops the technical as well as the business aspects of a Cloud Service offering, which may be part of the organization of the Cloud Service Consumer or Cloud Service Provider. (2) A Cloud Service Developer leverages the development and operational tools to develop and compose a service or set of services. An entity which is responsible for making a Cloud Service available to interested parties.

Salient Aspects of the Akaza Cloud Architecture Self Contained Architecture leveraging on Citrix Cloudstack and Cloud Portal Business Manager Total Cloud Service Lifecycle Management from Lead Management > Product/Order Management > Resource Management > Showback/Chargeback > Billing Integration REST based API allowing Service Integration (including integration and portability to AWS) PaaS Cumulogic AppaaS/SaaS Appcara DaaS Xen Desktop (Shared/Dedicated) Service Aggregation through the Cloud Portal Channel Management for Reseller enablement Extensible to conformance of Security/Firewall control and Compliance Different availability Zones for different categories/characteristics (eg. Product category)

Cloud Computing Portability

Key consideration for cloud computing portability categories Category Description Challenges/Considerations Data Portability Application Portability (1) Enables re use of data components across different applications. (2) Degree of ease in porting data and environment when changing SaaS vendors. (3) SLA and commercial arrangements is the focus. (1) Application portability enables the re use of application components across cloud PaaS services and traditional computing platforms (1) Moving the Enterprise App from one PaaS provider to a different PaaS provider for cost/performance reasons. (2) Application and Platform adhere to standard interface Platform Portability (1) Re use of platform components across cloud IaaS services and non cloud infrastructure platform source portability (2) Re use of bundles containing applications and data with their supporting platforms machine image portability

Graphical Depiction of Cloud Computing Portability

Docker is a very nicely constructed container architecture that provides better cloud to cloud portability and workload management. It also sets a great foundation to build cloud based distributed systems that can be moved around much easier than the cloud workloads we manage these days

Akaza : Towards Applications/IT Life Cycle Management Dev/Test (Cumulogic) Service Staging (Appcara/CPBM) Operations/Appstore (CPBM) IDE Integration /Software Tools Application /OS and VM configuration tool Support Dev/Test/Ops environment for Application lifecycle on the cloud Software onboarding assurance though rule based scripts Software version management Ability to integrate to other private and public clouds

Cloud management Interface Manage Application Life cycle Via Cloud

Cloud Computing Interoperability

Key consideration for cloud computing interoperability categories Category Description Application Interoperability (1) Interoperability between application components Deployed as SaaS As Applications using PaaS, As Applications on platforms using IaaS in a traditional enterprise IT environment, or on client devices. (2) An application component may be a complete monolithic application, or a part of a distributed application. Platform Interoperability Management Interoperability Public & Software Acquisition Interoperability Interoperability between platform components, which may be deployed As PaaS As Platforms on IaaS, in a traditional enterprise IT environment, or on client devices. Interoperability between cloud services (SaaS, PaaS, or IaaS) and programs concerned with the implementation of on demand self service. Interoperability between platforms, which includes PaaS services, App Stores and App Marketplace. Standard interfaces to these stores would lower the cost of cloud computing for software providers and users.

USE CASE ON INTEROPERABILITY Enterprise Private Cloud Akaza Private Cloud Private IP VPN between clouds Features : Interoperability at the software integration level between software Components in multiple clouds using REST API Unified view of VMWare (Enterprise) and Xen Hypevisor workloads on the Citrix Cloudplatform http accessibilty Enterprise customer to Cloudportal/Appstore on a Private Web interface

Security and Compliance

Cloud Service Provider Security Governance/Risk/Compliance Cloud Assets/Infrastructure Install dedicated security team Deploy VA in a proactive manner Delieanate Management traffic to Workload traffic Install log management and event correlation management Firewalled VM Images Security between tenancy and zone separation as firewall segments Deploy Global IDS/IPS and WAF (for internal management system) Automate Everything Managed Security As A Service Security Policy Document Best Practices and Guidance from Cloud Security Alliance Adoption of standards such as ISMS, ISO 27002 For Application Specific Hosting and Geo based hosting adopt relevant standards such as ecommerce PCI DSS and Healthcare HIPAA

Initial Risk Assessment as articulated by Cloud Security Alliance for Cloud Customers Point of Address Identify the Assets for the Cloud Deployment Impact addressed Data Application/Function/Processes Evaluate the Asset Map the Asset to a potential cloud deployment model Evaluate potential cloud service model and providers Map out the potential data flow How important is the (Asset) data/function to the organization The impact analysis in moving the asset/function etc. to the cloud eg. Public cloud Degree of control at CSP tier and risk assessment of providers Map out the data flow between organization, cloud and other nodes Depending on the potential risk level in the deployment organizations could adhere To guidance in 14 Domain Areas in security given by CSA. See https://downloads.cloudsecurityalliance.org/initiatives/guidance/csaguide.v3.0.pdf

Some of the common compliance standards

A secure bridge and access between cloud and enterprise data center A secure bridge needs to be maintained between the cloud data center and the enterprise. This provides seamless, secure connectivity and enables certain security services (e.g., compliance reporting) running in the cloud to be used with applications running within the enterprise datacenter. This also allows the identity management infrastructure (e.g., directory services) running in the enterprise to be leveraged by applications running in the cloud.

Cloud Computing Interoperability

AKAZA Extension to the cloud Network -Akaza SDN +DSL +4G LTE WIFI C E A IP/MPLS Software Define Network (SDN) AKAZA CLOUD Apps Apps Apps Apps End to End Customers application network Management FTTx