Network Security Requirements and Solutions

Similar documents
How To Protect Your Cloud From Attack

Securing the Virtualized Data Center With Next-Generation Firewalls

Implementing Software- Defined Security with CloudPassage Halo

Agile Security at the Speed of Modern Business.

Business Values of Network and Security Virtualization

Enterprise Cloud Use Cases and Security Considerations

A Look at the New Converged Data Center

Lecture 02b Cloud Computing II

How to survive in a world of Virtualization and Cloud Computing, where you even can t trust your own environment anymore. Raimund Genes, CTO

Cloud Services Catalog with Epsilon

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

What CSOs Need To Know About Software-Defined Security

Network Access Control in Virtual Environments. Technical Note

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Vulnerability Management Isn t Simple (or, How to Make Your VM Program Great)

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

H Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments

Trend Micro. Advanced Security Built for the Cloud

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Research Perspectives

Safeguarding the cloud with IBM Dynamic Cloud Security

Ensuring security the last barrier to Cloud adoption

STRATEGIC WHITE PAPER. The next step in server virtualization: How containers are changing the cloud and application landscape

Security Issues in Cloud Computing

Unified Threat Management, Managed Security, and the Cloud Services Model

What Do You Mean My Cloud Data Isn t Secure?

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Dynamic Security for the Hybrid Cloud

Vulnerability Management for the Distributed Enterprise. The Integration Challenge

ILLUMIO ADAPTIVE SECURITY PLATFORM TM

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

Total Cloud Protection

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera VERSION May, 2015

Security Virtual Infrastructure - Cloud

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer

CloudPassage Halo Technical Overview

Realities of Private Cloud Security

Securing Virtual Applications and Servers

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

CONNECTRIA MANAGED AMAZON WEB SERVICES (AWS)

Netzwerkvirtualisierung? Aber mit Sicherheit!

Virtualization, SDN and NFV

Virtualization with VMware and IBM: Enjoy the Ride, but Don t Forget to Buckle Up!

CloudCheck Compliance Certification Program

Critical Security Controls

Service Automation to implement and operate your Cloud initiatives

CSA Virtualisation Working Group Best Practices for Mitigating Risks in Virtualized Environments

Protecting the un-protectable Addressing Virtualisation Security Challenges

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

ILLUMIO ADAPTIVE SECURITY PLATFORM TM

How To Build A Software Defined Data Center

Virtualization Essentials

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Innovative Defense Strategies for Securing SCADA & Control Systems

Feliciano Intini Responsabile dei programmi di Sicurezza e Privacy Microsoft Italia

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

without the fixed perimeters of legacy security.

Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

SDN Security for VMware Data Center Environments

PICO Compliance Audit - A Quick Guide to Virtualization

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Network Virtualization Solutions - A Practical Solution

Data Center Security That Accelerates Your Business

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Securing Cloud Infrastructures with Elastic Security

APAC OF POSSIBILITIES: TIPS FOR INCREASING CLOUD SECURITY AND ADOPTION

SERENA SOFTWARE Serena Service Manager Security

DARMADI KOMO: Hello, everyone. This is Darmadi Komo, senior technical product manager from SQL Server marketing.

Securing the Database Stack

The ROI of Automated Agentless Endpoint Management

Effective End-to-End Cloud Security

How To Protect A Virtual Desktop From Attack

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

What are your firm s plans to adopt x86 server virtualization? Not interested

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Halo. for PCI Compliance. Who Needs PCI in the Cloud? What It Takes to be PCI Compliant

Cloud Security. Are you on the train or the tracks? ISSA CISO Executive Forum April 18, Brian Grayek CISSP, CCSK, ITILv3

Preparing an RFI for. This RFI has been updated to reflect the new requirements in Version 3.0 of the PCI DSS, which took effect January 2015.

Security Orchestration with IF-MAP

Cloud and Data Center Security

Virtualization and Cloud: Orchestration, Automation, and Security Gaps

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Extreme Networks Security Analytics G2 Vulnerability Manager

Get more value from virtualisation

Evolution from the Traditional Data Center to Exalogic: An Operational Perspective

Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments

AUTOMATING SECURITY FOR GREATER SaaS SUCCESS

STREAM FRBC

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Copyright 11/1/2010 BMC Software, Inc 1

Secure Virtualization in the Federal Government

SESSION 703 Wednesday, November 4, 9:00am - 10:00am Track: Advancing ITSM

Increased Security, Greater Agility, Lower Costs for AWS DELPHIX FOR AMAZON WEB SERVICES WHITE PAPER

Outgoing VDI Gateways:

Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc.

Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration

Transcription:

Critical Criteria For (Cloud) Workload Security Steve Armendariz Enterprise Sales Director CloudPassage October 3, 2015 @NTXISSA #NTXISSACSC3

Does anyone remember when server security was EASY? NTX ISSA Cyber Security Conference October 2-3, 2015 @NTXISSA #NTXISSACSC3 2

Times have changed! NTX ISSA Cyber Security Conference October 2-3, 2015 @NTXISSA #NTXISSACSC3 3

Classic Data Center Architecture @NTXISSA #NTXISSACSC3 NTX ISSA Cyber Security Conference October 2-3, 2015 4

Act 1 - Tenants of Traditional Server Security Servers in a trusted network Segmentation for added protection Anti-malware (virus) for all servers, added security capability for critical servers Security had time to plan, test & deploy for each new application Provisioned with plentiful overhead Servers viewed as investments NTX ISSA Cyber Security Conference October 2-3, 2015 @NTXISSA #NTXISSACSC3 5

Act 2 - Server Virtualization A New Dawn Economic benefit to adoption Combatting data center sprawl Physical servers more powerful Pressure applied on Security to be: Faster More efficient More accurate Traditional tools proved adequate NTX ISSA Cyber Security Conference October 2-3, 2015 @NTXISSA #NTXISSACSC3 6

Virtualization Impacts Traditional Security Servers in a trusted network Segmentation for added protection (shared hardware = segmentation challenges) Anti-malware (virus) for all servers, added security products for critical servers (difficult given VM density, overhead impact and licensing) Security had time to test & deploy for each new application (policies and images became more powerful) Provision with plentiful overhead (at odds with VM density) NTX ISSA Cyber Security Conference October 2-3, 2015 @NTXISSA #NTXISSACSC3 7

Act 3 - Server Workloads - The Next Wave Utility Computing Cloud servers or Cloud server workloads in the data center, public cloud, private cloud or any combination These server workloads are: On-demand, Elastic and Agile Cloned, Orchestrated and Automated Often short-lived Can be containers (i.e. Docker) Possibly never patched Part of an overall movement of deploying and updating faster (DevOps) NTX ISSA Cyber Security Conference October 2-3, 2015 @NTXISSA #NTXISSACSC3 8

Data Center Architecture Changes Public Cloud Data Center Critical Server Instances Internet Critical Server Instances Some Semi-critical Server Instances On-server security: - Anti-Malware - Vulnerability Scan Semi-critical Server Instances On-server security: - Anti-Malware - Vulnerability Scan On-server security: - Anti-Malware - Vulnerability Scan - Config. Monitor - HIPS/HIDS - FIM Non-Critical Server Instances - Anti-Malware NTX ISSA Cyber Security Conference October 2-3, 2015 @NTXISSA #NTXISSACSC3 9

Server Workloads Break Security Servers in a trusted network (Cloud viewed as non-trusted) Segmentation for added protection (shared hardware = segmentation challenges) Anti-malware (virus) for all servers, added security products for critical servers (difficult given VM density, overhead impact and licensing) Security had time to test & deploy for each new application (Security must move faster often with little lead time) Provision with plentiful overhead (at odds with VM density) Servers viewed as application building blocks NTX ISSA Cyber Security Conference October 2-3, 2015 @NTXISSA #NTXISSACSC3 10

Cloud VPC = Bringing The Trusted Network Back? Public Cloud servers only accessible from inside the data center s trusted network Positioned by many cloud providers to resolve Tenant #1 Servers in a trusted network Issues Can be cost prohibitive May impact performance Does not mitigate security issues NTX ISSA Cyber Security Conference October 2-3, 2015 @NTXISSA #NTXISSACSC3 11

Are Data Center Networks Really Secure? NTX ISSA Cyber Security Conference October 2-3, 2015 @NTXISSA #NTXISSACSC3 12

Workload Security The New Tenants Embrace the Workload as an Application Building Block philosophy Take advantage of automation and orchestration Small footprints matter Minimize staff overhead Total visibility Limit server communication Integrate versus manage stand-alone NTX ISSA Cyber Security Conference October 2-3, 2015 @NTXISSA #NTXISSACSC3 13

The Basics Still Apply Use server (host) firewalls Reduce attack surface Manage East-West traffic Require multi-factor authentication for server logins Monitor configurations for drift Discover & address vulnerabilities Monitor system file integrity Monitor security logs Dump anti-malware (if you can) Radical Thought!!!! NTX ISSA Cyber Security Conference October 2-3, 2015 @NTXISSA #NTXISSACSC3 14

Approaches to Workload Security Do it manually with multiple security tools Too time consuming Many consoles, difficult integration Use orchestration tools with multiple security tools Many consoles, difficult integration Set of security tools can consume more resources than what they re protecting Use CloudPassage Halo NTX ISSA Cyber Security Conference October 2-3, 2015 @NTXISSA #NTXISSACSC3 15

CloudPassage Halo: Instant Layered Security for Every Server Workload One tool providing 8 layers of visibility & enforcement Using less compute resources than a single-layer point product Highly automated; set and forget security Add to gold images, protects servers at instantiation NTX ISSA Cyber Security Conference October 2-3, 2015 @NTXISSA #NTXISSACSC3 16

CloudPassage Halo A Security Orchestration Framework Integrated and layered security Automated into your workflow Visibility See vulnerabilities, configuration errors, file integrity, access no matter where the workload is Apply controls even quarantine workloads Compliance Drive automation to audits Continuous vs. point-in-time NTX ISSA Cyber Security Conference October 2-3, 2015 @NTXISSA #NTXISSACSC3 17

CloudPassage Halo Architecture NTX ISSA Cyber Security Conference October 2-3, 2015 @NTXISSA #NTXISSACSC3 18

Questions NTX ISSA Cyber Security Conference October 2-3, 2015 @NTXISSA #NTXISSACSC3 19

The Collin College Engineering Department Collin College Student Chapter of the North Texas ISSA North Texas ISSA (Information Systems Security Association) Thank you NTX ISSA Cyber Security Conference October 2-3, 2015 @NTXISSA #NTXISSACSC3 20