SlideShare uma empresa Scribd logo
1 de 19
Cloud security and virtualized
data center
Himani Singh
Feb 2017
Agenda
• Cloud security domains
• Flaws in security approaches
• Data center requirement
• VMware NSX
• Good to have
• Functions of the Ideal Solution
• Smart Solution
• Micro-segmentation
• Assessment of micro-segmentation
Data Center Concerns
• Cloud security can be divided into four categories
Cloud data protection Cloud Data Governance
Cloud access policy and
intelligence
Cloud workload Security
audit and Management
• Cloud Application security concerns
– Cloud access policy and intelligence
– Cloud Data protection
– Cloud Data Governance
Categories : CASB
Gap1: CASB doesn’t address workload security or infrastructure!
Only focuses on
- User account and Data in the SaaS application
- Web and mobile
• Workload security concerns
– Protecting of work loads
– Web, App and data-at-rest
Flaws in the security approaches
Next slides are going to address the security short
coming cloud security.
• Traditional approach in deployment
Deployment approach
• Protection is on perimeter
• Visibility inside data center
• Distributed security
Flaws in the security approaches
• Traditional approach in deployment
• Cloud Deployment
– Most people will add a set of VMs’ with firewall and so on.
– VFW’s shares same hypervisor with another servers
• The above approach is same as a physical data center
LB
VNGFW
Server
LB
App Web
Server
DB
Server
FW
With SDN and virtualization when workloads (VMs) are dynamically
created, moved between hypervisors, We need a differed security
solution
Flaws in the security approaches
• Type of traffic North-South vs East-West
– North-South traffic is defined by traffic from
enterprise to SaaS application /cloud
– East-west traffic is defined as traffic inside the data
center between different work loads
• Protection is on perimeter
– Most security emphasis is on North-South traffic
• All security devices are focused on perimeter
– App to App traffic monitoring is been ignore
– Once a breach is inside the data center, it is very hard
to detect. It is like lateral moment
Flaws in the security approaches
• Monitoring and tracking
– Traffic
• Monitor the east-to-west between App to App
• Apply L4 and L7 rules between traffic
• Insufficient logging and access control between traffic. In OWSP 2017, a new
new category was added called as “Insufficient logging and traffic”
– Workload VMs
• Remember VM’s are dynamically created, moved or destroyed
• Tracking and protecting a new instance of workload
– What about the logs
• For Elasticity the new VM’s are create and automatically teardown
• The logging history is lost
– VFW session
• When a VFW is been destroyed, the VFW sessions are lost.
– Drawback: Current solution don’t retain the history for breach
detection and analysis
Flaws in the security approaches
• What logs are important
– SIEMs have too much logs to process
– It is hard to collect the correct solution
– Some solution needs the end-point agent
– Some solution only send alert but doesn’t send
block it
Flaws in the security approaches
• Monitoring, Visibility and access control
– Visibility is the biggest issue in the data center
– VFW’s performance issues, VFW’s performance is depends
on the vCPUs
– Since most of the VFWs’ functionality is based on
traditional ones, they are not designed for modern data
center.
– Such as they are based on layer4 or applications, but not
on container or Docker
• VFWs has many flavors
– VFW vendors like PAN, Checkpoint and Fortinet, have
released based on public or private cloud provider, like
different FW for AWS, Azure, VmWare and more
VMware NSX(till 2017 Jan)
VMware NSX provides NFV and layer 2-4 security. It
automatically keeps track of workload creation and moves.
NSX solution
– Provide security tagging for workloads inside the data-center
– Automatically tracks the workload creation, movement and
deletion
– Layer2-4 security policies are inbuilt
– Layer7 security such as statful FW, NGFW, DLP, IDS are provided
by external vendors such as PAN, Fortinet, Juniper and
Checkpoint
• The VM is created and associated with a group of VM’s
• When any new member is added to that security group, those policies
is applied automatically.
• Any FW deployed on NSX has the maximum throughput of
650 Mbps
Flaws in the security approaches
• Private cloud, most of security vendors still depend on
VMware’s NSX for creating the new VFW instance when a
workload is created, moved and destroyed
– NSX = l4 + PAN (L7)
– NSX has started offering its own Application security solution
• Multi-layer security solution
– Need to use different VM for security protection.
• Some vendors have one product for each solution:
– Mail, Web, ADC, Auth and Gateway
• Some vendors product for all security services in one service
– Different flavor for AWS, Azure, ESXi, NSX , KVM, ZEN,
Hyper-V, Xen
Good to have
An ideal solution should have
• Visibility
• Monitoring (Tracking and logs )
• Prevention
• Automation of security profile when new
workload is provisioned
• Layer4 to Layer7 security
• Focused approach to filter out unnecessary alerts
• Ideal combination of signature based and
behavior based solution
Functions of the Ideal Solution
• Prevention
– Reduce the potential attack surface:
• Firewall policies, IPS, user segmentation, patch management, and infrastructure design
– Apply the policies inside the data center between workloads based on security tags
• Automation of security profile when new workload is provisioned
– Dynamic Security profile creation when workloads are moved, created or deleted
• For layer 2- layer 7
– AWS
• Has inbuilt security for LaaS
• Marketplace is used to buy security solutions
• Single vendor security solution for correlation between events
– It would be nice to have one vendor who can protect from layer4 to layer7 for the
workloads
– Centralized logs
Functions of the Ideal Solution
• Independent
• Maintain one flavor for Virtual Security solution rather than vIPS, vNGFW, vMAIL
• Solution that is independent of underlying technology such as ESXi , Rackspace, KVM...
• Workload
– Works for all kind of workload such as webserver, http server
– Only relevant functionality should be unzip and active
• DETECT
– IDS, WAF, anomaly detection, NIDS, HIDS,
• RESPOND
– report and communication to stack holders by email, alert, text
– Immediate Isolation of the workload
• PREDICT
– Regular scans, penetration testing
– Dynamically and continuously change the policy
– Updating the methods
CheckPoint vSEC(datasheet bases on 2016 Dec)
• Public Cloud
• AWS gateway R77.30
– vSEC NGTP (Firewall + IPS + Application Control +
URL Filter + Anti-Virus + Anti-Bot)
• c4.8xlarge (36 virtual core) :: estimation 1600 Mbps
• c4.4xlarge (16 virtual core) :: 1000 Mbps
• Private cloud
– vSEC for VMware NSX,Cisco ACI, openStack
• No published data
PAN V-100 (datasheet bases on 2016 Dec)
• Capacities
– VM-300: Max sessions 250,000
– VM-200: Max sessions 100,000
– VM-100: Max sessions 50,000
• Too many solutions for different requirements:
– VM-Series for AWS, Citrix, KVM & OpenStack
– VM-Series for Microsoft Azure, Microsoft Hyper-V
– VM-Series for VMware NSX, ESXi/vCloud Air
– VM-1000-HV, VM-300, VM-200 and VM-100
micro segmentation
• Agent approach
– A software that sits on top of Hypervisor
– Provide the monitoring, security control and
logging
– Deeper level security module based on
workload, i.e. if workload is Linux/https the only
web related service module should be loaded
DC
SLB
App Web
Server
DB
Server
Virtual
UTM
Hypervisor
SLB
App Web
Server
DB
Server
Virtual
UTM
Hypervisor
Single management
plane for Security points
Micro-Segmentation
• Ubiquity
– Apply to all workloads
– Different security levels based on VM type, such as
webserver, db, application server, mailserver
• Zero-attack prevention
– No trust between workloads
– IPS, DLP, agentless malware protections, SD
distributed FW
• Suppress the noise
– All logs /events are not useful
Assessment of Micro-segment
• Throughput
• Detection
• App based FW
• IPS
• Malware
• Threat protection
• Compliance
• Ubiquity

Mais conteúdo relacionado

Mais procurados

Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantageMoshe Ferber
 
Tour to Azure Security Center
Tour to Azure Security CenterTour to Azure Security Center
Tour to Azure Security CenterLalit Rawat
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASBKyle Watson
 
What the auditor need to know about cloud computing
What the auditor need to know about cloud computingWhat the auditor need to know about cloud computing
What the auditor need to know about cloud computingMoshe Ferber
 
Cloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesCloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesGokul Alex
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Moshe Ferber
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security OverviewAlert Logic
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud SecurityAlert Logic
 
Technologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudTechnologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudCloudPassage
 
Webinar compiled powerpoint
Webinar compiled powerpointWebinar compiled powerpoint
Webinar compiled powerpointCloudPassage
 
Secure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsSecure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsCloudPassage
 
AWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and ComplianceAWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and ComplianceGaurav "GP" Pal
 
Cyber Ranges: A New Approach to Security
Cyber Ranges: A New Approach to SecurityCyber Ranges: A New Approach to Security
Cyber Ranges: A New Approach to SecuritySecurity Innovation
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Moshe Ferber
 
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...CloudPassage
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityIBM Security
 

Mais procurados (20)

Security OF The Cloud
Security OF The CloudSecurity OF The Cloud
Security OF The Cloud
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
Tour to Azure Security Center
Tour to Azure Security CenterTour to Azure Security Center
Tour to Azure Security Center
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASB
 
What the auditor need to know about cloud computing
What the auditor need to know about cloud computingWhat the auditor need to know about cloud computing
What the auditor need to know about cloud computing
 
AWS Security
AWS Security AWS Security
AWS Security
 
Cloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesCloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and Techniques
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
 
Technologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudTechnologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the Cloud
 
Webinar compiled powerpoint
Webinar compiled powerpointWebinar compiled powerpoint
Webinar compiled powerpoint
 
Secure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsSecure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOps
 
AWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and ComplianceAWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and Compliance
 
Cyber Ranges: A New Approach to Security
Cyber Ranges: A New Approach to SecurityCyber Ranges: A New Approach to Security
Cyber Ranges: A New Approach to Security
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...
 
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 

Semelhante a Securing virtual workload and cloud

Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureCloudPassage
 
Winning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our TimeWinning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our TimeCloudHesive
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudCloudHesive
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraRogerChaucaZea
 
VMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSXVMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSXVMworld
 
Building a Global Multi-Tenant Monitoring Platform
Building a Global Multi-Tenant Monitoring PlatformBuilding a Global Multi-Tenant Monitoring Platform
Building a Global Multi-Tenant Monitoring PlatformAmazon Web Services
 
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)Tsz Wing Chu
 
vRA + NSX Technical Deep-Dive
vRA + NSX Technical Deep-DivevRA + NSX Technical Deep-Dive
vRA + NSX Technical Deep-DiveVMUG IT
 
Cisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformCisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformShashi Kiran
 
Self service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxSelf service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxsolarisyougood
 
What's New VMware NSX Advanced Load Balancer (Avi Networks)
What's New VMware NSX Advanced Load Balancer (Avi Networks)What's New VMware NSX Advanced Load Balancer (Avi Networks)
What's New VMware NSX Advanced Load Balancer (Avi Networks)Avi Networks
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...Amazon Web Services
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingDavid Wallom
 

Semelhante a Securing virtual workload and cloud (20)

Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
Winning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our TimeWinning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our Time
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
 
Un-clouding the cloud
Un-clouding the cloudUn-clouding the cloud
Un-clouding the cloud
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 
VMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSXVMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSX
 
QualysGuard InfoDay 2013 - Web Application Firewall
QualysGuard InfoDay 2013 - Web Application FirewallQualysGuard InfoDay 2013 - Web Application Firewall
QualysGuard InfoDay 2013 - Web Application Firewall
 
Cloud.pptx
Cloud.pptxCloud.pptx
Cloud.pptx
 
Building a Global Multi-Tenant Monitoring Platform
Building a Global Multi-Tenant Monitoring PlatformBuilding a Global Multi-Tenant Monitoring Platform
Building a Global Multi-Tenant Monitoring Platform
 
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
 
vRA + NSX Technical Deep-Dive
vRA + NSX Technical Deep-DivevRA + NSX Technical Deep-Dive
vRA + NSX Technical Deep-Dive
 
Cisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformCisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud Platform
 
Self service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxSelf service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsx
 
Security on AWS
Security on AWSSecurity on AWS
Security on AWS
 
What's New VMware NSX Advanced Load Balancer (Avi Networks)
What's New VMware NSX Advanced Load Balancer (Avi Networks)What's New VMware NSX Advanced Load Balancer (Avi Networks)
What's New VMware NSX Advanced Load Balancer (Avi Networks)
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 

Último

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Último (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Securing virtual workload and cloud

  • 1. Cloud security and virtualized data center Himani Singh Feb 2017
  • 2. Agenda • Cloud security domains • Flaws in security approaches • Data center requirement • VMware NSX • Good to have • Functions of the Ideal Solution • Smart Solution • Micro-segmentation • Assessment of micro-segmentation
  • 3. Data Center Concerns • Cloud security can be divided into four categories Cloud data protection Cloud Data Governance Cloud access policy and intelligence Cloud workload Security audit and Management • Cloud Application security concerns – Cloud access policy and intelligence – Cloud Data protection – Cloud Data Governance Categories : CASB Gap1: CASB doesn’t address workload security or infrastructure! Only focuses on - User account and Data in the SaaS application - Web and mobile • Workload security concerns – Protecting of work loads – Web, App and data-at-rest
  • 4. Flaws in the security approaches Next slides are going to address the security short coming cloud security. • Traditional approach in deployment Deployment approach • Protection is on perimeter • Visibility inside data center • Distributed security
  • 5. Flaws in the security approaches • Traditional approach in deployment • Cloud Deployment – Most people will add a set of VMs’ with firewall and so on. – VFW’s shares same hypervisor with another servers • The above approach is same as a physical data center LB VNGFW Server LB App Web Server DB Server FW With SDN and virtualization when workloads (VMs) are dynamically created, moved between hypervisors, We need a differed security solution
  • 6. Flaws in the security approaches • Type of traffic North-South vs East-West – North-South traffic is defined by traffic from enterprise to SaaS application /cloud – East-west traffic is defined as traffic inside the data center between different work loads • Protection is on perimeter – Most security emphasis is on North-South traffic • All security devices are focused on perimeter – App to App traffic monitoring is been ignore – Once a breach is inside the data center, it is very hard to detect. It is like lateral moment
  • 7. Flaws in the security approaches • Monitoring and tracking – Traffic • Monitor the east-to-west between App to App • Apply L4 and L7 rules between traffic • Insufficient logging and access control between traffic. In OWSP 2017, a new new category was added called as “Insufficient logging and traffic” – Workload VMs • Remember VM’s are dynamically created, moved or destroyed • Tracking and protecting a new instance of workload – What about the logs • For Elasticity the new VM’s are create and automatically teardown • The logging history is lost – VFW session • When a VFW is been destroyed, the VFW sessions are lost. – Drawback: Current solution don’t retain the history for breach detection and analysis
  • 8. Flaws in the security approaches • What logs are important – SIEMs have too much logs to process – It is hard to collect the correct solution – Some solution needs the end-point agent – Some solution only send alert but doesn’t send block it
  • 9. Flaws in the security approaches • Monitoring, Visibility and access control – Visibility is the biggest issue in the data center – VFW’s performance issues, VFW’s performance is depends on the vCPUs – Since most of the VFWs’ functionality is based on traditional ones, they are not designed for modern data center. – Such as they are based on layer4 or applications, but not on container or Docker • VFWs has many flavors – VFW vendors like PAN, Checkpoint and Fortinet, have released based on public or private cloud provider, like different FW for AWS, Azure, VmWare and more
  • 10. VMware NSX(till 2017 Jan) VMware NSX provides NFV and layer 2-4 security. It automatically keeps track of workload creation and moves. NSX solution – Provide security tagging for workloads inside the data-center – Automatically tracks the workload creation, movement and deletion – Layer2-4 security policies are inbuilt – Layer7 security such as statful FW, NGFW, DLP, IDS are provided by external vendors such as PAN, Fortinet, Juniper and Checkpoint • The VM is created and associated with a group of VM’s • When any new member is added to that security group, those policies is applied automatically. • Any FW deployed on NSX has the maximum throughput of 650 Mbps
  • 11. Flaws in the security approaches • Private cloud, most of security vendors still depend on VMware’s NSX for creating the new VFW instance when a workload is created, moved and destroyed – NSX = l4 + PAN (L7) – NSX has started offering its own Application security solution • Multi-layer security solution – Need to use different VM for security protection. • Some vendors have one product for each solution: – Mail, Web, ADC, Auth and Gateway • Some vendors product for all security services in one service – Different flavor for AWS, Azure, ESXi, NSX , KVM, ZEN, Hyper-V, Xen
  • 12. Good to have An ideal solution should have • Visibility • Monitoring (Tracking and logs ) • Prevention • Automation of security profile when new workload is provisioned • Layer4 to Layer7 security • Focused approach to filter out unnecessary alerts • Ideal combination of signature based and behavior based solution
  • 13. Functions of the Ideal Solution • Prevention – Reduce the potential attack surface: • Firewall policies, IPS, user segmentation, patch management, and infrastructure design – Apply the policies inside the data center between workloads based on security tags • Automation of security profile when new workload is provisioned – Dynamic Security profile creation when workloads are moved, created or deleted • For layer 2- layer 7 – AWS • Has inbuilt security for LaaS • Marketplace is used to buy security solutions • Single vendor security solution for correlation between events – It would be nice to have one vendor who can protect from layer4 to layer7 for the workloads – Centralized logs
  • 14. Functions of the Ideal Solution • Independent • Maintain one flavor for Virtual Security solution rather than vIPS, vNGFW, vMAIL • Solution that is independent of underlying technology such as ESXi , Rackspace, KVM... • Workload – Works for all kind of workload such as webserver, http server – Only relevant functionality should be unzip and active • DETECT – IDS, WAF, anomaly detection, NIDS, HIDS, • RESPOND – report and communication to stack holders by email, alert, text – Immediate Isolation of the workload • PREDICT – Regular scans, penetration testing – Dynamically and continuously change the policy – Updating the methods
  • 15. CheckPoint vSEC(datasheet bases on 2016 Dec) • Public Cloud • AWS gateway R77.30 – vSEC NGTP (Firewall + IPS + Application Control + URL Filter + Anti-Virus + Anti-Bot) • c4.8xlarge (36 virtual core) :: estimation 1600 Mbps • c4.4xlarge (16 virtual core) :: 1000 Mbps • Private cloud – vSEC for VMware NSX,Cisco ACI, openStack • No published data
  • 16. PAN V-100 (datasheet bases on 2016 Dec) • Capacities – VM-300: Max sessions 250,000 – VM-200: Max sessions 100,000 – VM-100: Max sessions 50,000 • Too many solutions for different requirements: – VM-Series for AWS, Citrix, KVM & OpenStack – VM-Series for Microsoft Azure, Microsoft Hyper-V – VM-Series for VMware NSX, ESXi/vCloud Air – VM-1000-HV, VM-300, VM-200 and VM-100
  • 17. micro segmentation • Agent approach – A software that sits on top of Hypervisor – Provide the monitoring, security control and logging – Deeper level security module based on workload, i.e. if workload is Linux/https the only web related service module should be loaded DC SLB App Web Server DB Server Virtual UTM Hypervisor SLB App Web Server DB Server Virtual UTM Hypervisor Single management plane for Security points
  • 18. Micro-Segmentation • Ubiquity – Apply to all workloads – Different security levels based on VM type, such as webserver, db, application server, mailserver • Zero-attack prevention – No trust between workloads – IPS, DLP, agentless malware protections, SD distributed FW • Suppress the noise – All logs /events are not useful
  • 19. Assessment of Micro-segment • Throughput • Detection • App based FW • IPS • Malware • Threat protection • Compliance • Ubiquity

Notas do Editor

  1. A typical kill chain will be EXTERNAL RECON →Weaponries -> attack to less secure host ->internal reconn-> later movement ->installation ->data staging -> exfilteration
  2. The prevention policy should include: Patch management includes the new signature  Update blacklist of host, IP’s  and URL’s