SlideShare uma empresa Scribd logo
1 de 28
Baixar para ler offline
1©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
Amit Schnitzer| Cloud Security Solution Expert, Checkpoint
Dr. Alexander Zimmermann | Cloud Architect, Accenture
MIGRATING YOUR DATACENTERS TO
AWS WITH AUTOMATED SECURITY
2©2018 Check Point Software Technologies Ltd.
CLOUD IS THE NEW NORM
3©2018 Check Point Software Technologies Ltd.
Companies want their cloud environments to be
Efficient Scalable Agile
And Secure!
4©2018 Check Point Software Technologies Ltd.
Legacy security architecture doesn’t work anymore
• Cloud applications are everywhere
perimeter security is not enough – we need
security inside the cloud
• Cloud applications are elastic
legacy security is static
• DevOps wants agile environment
security is a showstopper
5©2018 Check Point Software Technologies Ltd.
European power utility company
“In 5 years from now all our services and
application will be running on the cloud”
Client Facts
• Worldwide ~100.000 employees in 100+ locations
• Revenue: ~25 Bn EUR
• Migration drivers:
̶ Improve performance and availability of IT services
̶ Enhance cost control by standardization
̶ Reduce Time-To-Market
6©2018 Check Point Software Technologies Ltd.
CLIENT USE CASE
7©2018 Check Point Software Technologies Ltd.
Design principle: centralized multi-account approach
Application
Accounts
Application
Accounts
• Reducing the Blast Radius: Leveraging multiple AWS accounts to
reduce the blast radius by deploying only applications into one
account per region that belong together
• At least three account types: Next to the Billing Account at least one
account is to be used for the application and one for security isolation
 Main account is owned for example by the application team
 Another account is owned by the security team and is used for
audit and control access  control network connectivity to
Internet and premise data center
• AWS account size: The account segregation is chosen based on things
that are clearly separate. It can be either
 Single application per account, or
 Group of applications based on shared resources, similarity of
policies, or routing tables required to protect the account
Billing Account
Central Security
Account(s)
Datacenter
Application
Account(s)
Multiple AWS
accounts to
manage security
and reduce the
blast radius
8©2018 Check Point Software Technologies Ltd.
• Centralized DMZ Account: Controlling access
towards AWS platform by limiting access points
to one account
̶ Accounts that require access from the Public
Internet use a centralized DMZ Account for
ingress internet traffic
̶ The DMZ contains centrally administered
Check Point CloudGuard firewalls for
firewalling, URL filtering, and NAT
̶ DMZ VPC for productive workloads will be set
up high available
• Private accounts (Prod | QA | Dev): Private
application accounts have no Internet Gateway
and no VPC Peering to the DMZ  no access
from the Public Internet
Centralized DMZ account
DMZ Account
DMZ VPC for
Production (HA)
DMZ VPC for Dev
and QA (non HA)
Public
Production
Account
Public Internet
Public
QA
Account
Public
Developing
Account
Private
[Prod | QA | Dev]
Account
VPC PeeringInternet GatewayLegend:
9©2018 Check Point Software Technologies Ltd.
Application
Accounts
Application
Accounts
Transit
Account
On-Premise
Datacenter
Application
Accounts
MPLS
(AWS Direct
Connect)
Checkpoint
CloudGuard
VMs
Centralized Transit account
Public Internet
• The centralized Transit account is the only
possibility for applications to communicate to on
premise resources
• There is no way to bypass this account as it is the
only account where the MPLS terminate
• In the Transit account two Check Point
CloudGuard firewalls are in use
• Application accounts connect to the Transit
account via VPN connection utilizing AWS’ native
service “Virtual Private Gateway”
VPN Internet Gateway Virtual Private GatewayLegend:
10©2018 Check Point Software Technologies Ltd.
Application
Accounts
Application
Accounts
Transit
Account
On-Premise
Datacenter
Application
Accounts
Public Internet
MPLS
(AWS Direct
Connect)
VMs
Shared Services
Account
VPC Peering
Centralized Shared Services account
VPN Internet Gateway Virtual Private Gateway
• Although the Transit VPC can be classified as a
shared service, AWS recommends to use a
separate account – the Shared Services account
• This segregation i. a. improves network
connectivity and reduces network-transfer costs
• The objective of this account is to provide lower-
latency access to replicated services and proxy-
controlled access to on-premises resources
• Shared Services are offered to Application
accounts via VPC Peering, that enables you to
route traffic between each other as if they are
within the same network.
Legend:
Checkpoint
CloudGuard
Checkpoint
Management
11©2018 Check Point Software Technologies Ltd.
Application accounts
Availability Zone BAvailability Zone A
Application Tier
(Private Subnet)
Database Tier
(Private Subnet)
Presentation Tier
(“Public” or Private Subnet)
Application Tier
(Private Subnet)
Database Tier
(Private Subnet)
Presentation Tier
(“Public” or Private Subnet)
• To isolate various tiers of infrastructure, a three-
tier-architecture is used - public-facing web
applications in a Public Subnet and application
and database server hosted in Private Subnets.
• In standard configured Application accounts a
three-tier-architecture is always deployed in two
Availability Zones to offer High Availability by
design
Legend: VPC Router Virtual Private Gateway Internet Gateway [Public Accounts only]
13©2018 Check Point Software Technologies Ltd.
SECURITY BLUEPRINT FOR CLOUD ERA
16©2018 Check Point Software Technologies Ltd.
Spoke 1 Spoke 2 Spoke 3 Spoke N…
Check Point’s cloud security blueprint
17©2018 Check Point Software Technologies Ltd.
Spoke 1 Spoke 2 Spoke 3 Spoke N…
Check Point’s cloud security blueprint
18©2018 Check Point Software Technologies Ltd.
Northbound
Hub
Southbound Hub
Spoke 1 Spoke 2 Spoke 3 Spoke N…
Check Point’s cloud security blueprint
19©2018 Check Point Software Technologies Ltd.
Northbound
Hub
Southbound Hub
Spoke 1 Spoke 2 Spoke 3 Spoke N…
Check Point’s cloud security blueprint
20©2018 Check Point Software Technologies Ltd.
Northbound
Hub
Southbound Hub
Spoke 1 Spoke 2 Spoke 3 Spoke N…
Check Point’s cloud security blueprint
21©2018 Check Point Software Technologies Ltd.
Northbound
Hub
Southbound Hub
Spoke 1 Spoke 2 Spoke 3 Spoke N…
VPN
Check Point’s cloud security blueprint
22©2018 Check Point Software Technologies Ltd.
Putting all together…
DMZ
ServiceTransit
PROD
Workload
QA
Private QA Private Prod
Public QA
Public Prod
Internet gateway
VPC Peering
VPN gateway
VPN connection
Customer Gateway
Load Balancer
Direct Connect
Checkpoint
CloudGuard
Internet Egress
Internet Ingress
VPN Connection
Transit
VPC Peering SSC
Legend
On-Premise
Datacenter
Public Dev
Private Dev
23©2018 Check Point Software Technologies Ltd.
Live Demo
24©2018 Check Point Software Technologies Ltd.
Security Architecture that enables innovation
• Agile – new spokes created by DevOps will
automatically get protected
• Automatic – security architecture deployment
• Via AWS CloudFormation
• Via Azure solution templates
• In Control – Security admin gains full visibility for
east-west and north-south traffic
25©2018 Check Point Software Technologies Ltd.
Security architecture for Multi-Cloud environment
ACI
Unified management
• Securely connecting the clouds
with VPN
• Single access rule within a
unified policy which allows
seamless secure connectivity
across cloud environments
26©2018 Check Point Software Technologies Ltd.
This also works across cloud platforms
27©2018 Check Point Software Technologies Ltd.
Security Blueprint
Check Point CloudGuard Security architecture
• Empowers Innovation
• Enables fast & robust scalability
• Bringing clouds together securely
28©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
Amit Schnitzer| Cloud Security Solution Expert, Checkpoint
amitsc@checkpoint.com
Dr. Alexander Zimmermann | Cloud Architect, Accenture
Alexander.zimmermann@accenture.com
THANK YOU !
29©2018 Check Point Software Technologies Ltd.
CloudGuard at the glance
Cloud Security
Operation
Cloud Security
Blueprint
Cloud Cyber
Attacks
30©2018 Check Point Software Technologies Ltd.
Everybody is moving to the cloud
Companies cloud strategy
• Public cloud first
• Hybrid Cloud
• Multi-Clouds
31©2018 Check Point Software Technologies Ltd.
Security in the cloud
• Best effective protection from
modern attacks – regular access
control is not enough
• Adaptive security operation that
enables cloud innovation which
scales on demand
• Cloud security architecture that is
unified, efficient, agile, elastic and
robust

Mais conteúdo relacionado

Mais procurados

Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
Nattira Panbun
 

Mais procurados (20)

Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness
 
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- DetailedCheck Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
Check Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast AgentCheck Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast Agent
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
 
SACON - Devops-container (Richard Bussiere)
SACON - Devops-container (Richard Bussiere)SACON - Devops-container (Richard Bussiere)
SACON - Devops-container (Richard Bussiere)
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
 
Security architecture proposal template
Security architecture proposal templateSecurity architecture proposal template
Security architecture proposal template
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal
 
BlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow upBlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow up
 
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
 
Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement
 
NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
 
Check point Infinity Overview
Check point Infinity OverviewCheck point Infinity Overview
Check point Infinity Overview
 
Ecosystem
EcosystemEcosystem
Ecosystem
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
 

Semelhante a Check Point and Accenture Webinar

InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...
Daniel Berg
 

Semelhante a Check Point and Accenture Webinar (20)

Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013
Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013
Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud Adoption
 
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellersCloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
 
Cloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace SoftwareCloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace Software
 
Smart Integration to the Cloud - Kellton Tech Webinar
Smart Integration to the Cloud - Kellton Tech WebinarSmart Integration to the Cloud - Kellton Tech Webinar
Smart Integration to the Cloud - Kellton Tech Webinar
 
Scaling Your SaaS with Analytics-Driven Insights and Wavefront Integrations f...
Scaling Your SaaS with Analytics-Driven Insights and Wavefront Integrations f...Scaling Your SaaS with Analytics-Driven Insights and Wavefront Integrations f...
Scaling Your SaaS with Analytics-Driven Insights and Wavefront Integrations f...
 
Maximize the Capabilities of Oracle® Golden Gate: Replicate Data Bi-Direction...
Maximize the Capabilities of Oracle® Golden Gate: Replicate Data Bi-Direction...Maximize the Capabilities of Oracle® Golden Gate: Replicate Data Bi-Direction...
Maximize the Capabilities of Oracle® Golden Gate: Replicate Data Bi-Direction...
 
ENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated Industries
 
CNCF On-Demand Webinar_ LitmusChaos Project Updates.pdf
CNCF On-Demand Webinar_ LitmusChaos Project Updates.pdfCNCF On-Demand Webinar_ LitmusChaos Project Updates.pdf
CNCF On-Demand Webinar_ LitmusChaos Project Updates.pdf
 
Is Citrix Cloud Enterprise Ready? Best Practices to Get the Most Out of Citri...
Is Citrix Cloud Enterprise Ready? Best Practices to Get the Most Out of Citri...Is Citrix Cloud Enterprise Ready? Best Practices to Get the Most Out of Citri...
Is Citrix Cloud Enterprise Ready? Best Practices to Get the Most Out of Citri...
 
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDBMongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
 
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
 Webinar Fondazione CRUI e VMware: VMware vRealize Suite Webinar Fondazione CRUI e VMware: VMware vRealize Suite
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
 
Javier Hijas & Ori Kuyumgiski - Security at the speed of DevOps [rooted2018]
Javier Hijas & Ori Kuyumgiski	- Security at the speed of DevOps [rooted2018]Javier Hijas & Ori Kuyumgiski	- Security at the speed of DevOps [rooted2018]
Javier Hijas & Ori Kuyumgiski - Security at the speed of DevOps [rooted2018]
 
One And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptxOne And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptx
 
Securely Connecting Your Customers to Their Cloud-Hosted App – In Minutes
Securely Connecting Your Customers to Their Cloud-Hosted App – In MinutesSecurely Connecting Your Customers to Their Cloud-Hosted App – In Minutes
Securely Connecting Your Customers to Their Cloud-Hosted App – In Minutes
 
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...
 
Creating your Hybrid Cloud with AWS -Technical 201
Creating your Hybrid Cloud with AWS -Technical 201Creating your Hybrid Cloud with AWS -Technical 201
Creating your Hybrid Cloud with AWS -Technical 201
 
Does Using Citrix Cloud Make Performance Monitoring Easier?
Does Using Citrix Cloud Make Performance Monitoring Easier?Does Using Citrix Cloud Make Performance Monitoring Easier?
Does Using Citrix Cloud Make Performance Monitoring Easier?
 
Cloud Migration Services | Mindtree
Cloud Migration Services | MindtreeCloud Migration Services | Mindtree
Cloud Migration Services | Mindtree
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Check Point and Accenture Webinar

  • 1. 1©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. Amit Schnitzer| Cloud Security Solution Expert, Checkpoint Dr. Alexander Zimmermann | Cloud Architect, Accenture MIGRATING YOUR DATACENTERS TO AWS WITH AUTOMATED SECURITY
  • 2. 2©2018 Check Point Software Technologies Ltd. CLOUD IS THE NEW NORM
  • 3. 3©2018 Check Point Software Technologies Ltd. Companies want their cloud environments to be Efficient Scalable Agile And Secure!
  • 4. 4©2018 Check Point Software Technologies Ltd. Legacy security architecture doesn’t work anymore • Cloud applications are everywhere perimeter security is not enough – we need security inside the cloud • Cloud applications are elastic legacy security is static • DevOps wants agile environment security is a showstopper
  • 5. 5©2018 Check Point Software Technologies Ltd. European power utility company “In 5 years from now all our services and application will be running on the cloud” Client Facts • Worldwide ~100.000 employees in 100+ locations • Revenue: ~25 Bn EUR • Migration drivers: ̶ Improve performance and availability of IT services ̶ Enhance cost control by standardization ̶ Reduce Time-To-Market
  • 6. 6©2018 Check Point Software Technologies Ltd. CLIENT USE CASE
  • 7. 7©2018 Check Point Software Technologies Ltd. Design principle: centralized multi-account approach Application Accounts Application Accounts • Reducing the Blast Radius: Leveraging multiple AWS accounts to reduce the blast radius by deploying only applications into one account per region that belong together • At least three account types: Next to the Billing Account at least one account is to be used for the application and one for security isolation  Main account is owned for example by the application team  Another account is owned by the security team and is used for audit and control access  control network connectivity to Internet and premise data center • AWS account size: The account segregation is chosen based on things that are clearly separate. It can be either  Single application per account, or  Group of applications based on shared resources, similarity of policies, or routing tables required to protect the account Billing Account Central Security Account(s) Datacenter Application Account(s) Multiple AWS accounts to manage security and reduce the blast radius
  • 8. 8©2018 Check Point Software Technologies Ltd. • Centralized DMZ Account: Controlling access towards AWS platform by limiting access points to one account ̶ Accounts that require access from the Public Internet use a centralized DMZ Account for ingress internet traffic ̶ The DMZ contains centrally administered Check Point CloudGuard firewalls for firewalling, URL filtering, and NAT ̶ DMZ VPC for productive workloads will be set up high available • Private accounts (Prod | QA | Dev): Private application accounts have no Internet Gateway and no VPC Peering to the DMZ  no access from the Public Internet Centralized DMZ account DMZ Account DMZ VPC for Production (HA) DMZ VPC for Dev and QA (non HA) Public Production Account Public Internet Public QA Account Public Developing Account Private [Prod | QA | Dev] Account VPC PeeringInternet GatewayLegend:
  • 9. 9©2018 Check Point Software Technologies Ltd. Application Accounts Application Accounts Transit Account On-Premise Datacenter Application Accounts MPLS (AWS Direct Connect) Checkpoint CloudGuard VMs Centralized Transit account Public Internet • The centralized Transit account is the only possibility for applications to communicate to on premise resources • There is no way to bypass this account as it is the only account where the MPLS terminate • In the Transit account two Check Point CloudGuard firewalls are in use • Application accounts connect to the Transit account via VPN connection utilizing AWS’ native service “Virtual Private Gateway” VPN Internet Gateway Virtual Private GatewayLegend:
  • 10. 10©2018 Check Point Software Technologies Ltd. Application Accounts Application Accounts Transit Account On-Premise Datacenter Application Accounts Public Internet MPLS (AWS Direct Connect) VMs Shared Services Account VPC Peering Centralized Shared Services account VPN Internet Gateway Virtual Private Gateway • Although the Transit VPC can be classified as a shared service, AWS recommends to use a separate account – the Shared Services account • This segregation i. a. improves network connectivity and reduces network-transfer costs • The objective of this account is to provide lower- latency access to replicated services and proxy- controlled access to on-premises resources • Shared Services are offered to Application accounts via VPC Peering, that enables you to route traffic between each other as if they are within the same network. Legend: Checkpoint CloudGuard Checkpoint Management
  • 11. 11©2018 Check Point Software Technologies Ltd. Application accounts Availability Zone BAvailability Zone A Application Tier (Private Subnet) Database Tier (Private Subnet) Presentation Tier (“Public” or Private Subnet) Application Tier (Private Subnet) Database Tier (Private Subnet) Presentation Tier (“Public” or Private Subnet) • To isolate various tiers of infrastructure, a three- tier-architecture is used - public-facing web applications in a Public Subnet and application and database server hosted in Private Subnets. • In standard configured Application accounts a three-tier-architecture is always deployed in two Availability Zones to offer High Availability by design Legend: VPC Router Virtual Private Gateway Internet Gateway [Public Accounts only]
  • 12. 13©2018 Check Point Software Technologies Ltd. SECURITY BLUEPRINT FOR CLOUD ERA
  • 13. 16©2018 Check Point Software Technologies Ltd. Spoke 1 Spoke 2 Spoke 3 Spoke N… Check Point’s cloud security blueprint
  • 14. 17©2018 Check Point Software Technologies Ltd. Spoke 1 Spoke 2 Spoke 3 Spoke N… Check Point’s cloud security blueprint
  • 15. 18©2018 Check Point Software Technologies Ltd. Northbound Hub Southbound Hub Spoke 1 Spoke 2 Spoke 3 Spoke N… Check Point’s cloud security blueprint
  • 16. 19©2018 Check Point Software Technologies Ltd. Northbound Hub Southbound Hub Spoke 1 Spoke 2 Spoke 3 Spoke N… Check Point’s cloud security blueprint
  • 17. 20©2018 Check Point Software Technologies Ltd. Northbound Hub Southbound Hub Spoke 1 Spoke 2 Spoke 3 Spoke N… Check Point’s cloud security blueprint
  • 18. 21©2018 Check Point Software Technologies Ltd. Northbound Hub Southbound Hub Spoke 1 Spoke 2 Spoke 3 Spoke N… VPN Check Point’s cloud security blueprint
  • 19. 22©2018 Check Point Software Technologies Ltd. Putting all together… DMZ ServiceTransit PROD Workload QA Private QA Private Prod Public QA Public Prod Internet gateway VPC Peering VPN gateway VPN connection Customer Gateway Load Balancer Direct Connect Checkpoint CloudGuard Internet Egress Internet Ingress VPN Connection Transit VPC Peering SSC Legend On-Premise Datacenter Public Dev Private Dev
  • 20. 23©2018 Check Point Software Technologies Ltd. Live Demo
  • 21. 24©2018 Check Point Software Technologies Ltd. Security Architecture that enables innovation • Agile – new spokes created by DevOps will automatically get protected • Automatic – security architecture deployment • Via AWS CloudFormation • Via Azure solution templates • In Control – Security admin gains full visibility for east-west and north-south traffic
  • 22. 25©2018 Check Point Software Technologies Ltd. Security architecture for Multi-Cloud environment ACI Unified management • Securely connecting the clouds with VPN • Single access rule within a unified policy which allows seamless secure connectivity across cloud environments
  • 23. 26©2018 Check Point Software Technologies Ltd. This also works across cloud platforms
  • 24. 27©2018 Check Point Software Technologies Ltd. Security Blueprint Check Point CloudGuard Security architecture • Empowers Innovation • Enables fast & robust scalability • Bringing clouds together securely
  • 25. 28©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. Amit Schnitzer| Cloud Security Solution Expert, Checkpoint amitsc@checkpoint.com Dr. Alexander Zimmermann | Cloud Architect, Accenture Alexander.zimmermann@accenture.com THANK YOU !
  • 26. 29©2018 Check Point Software Technologies Ltd. CloudGuard at the glance Cloud Security Operation Cloud Security Blueprint Cloud Cyber Attacks
  • 27. 30©2018 Check Point Software Technologies Ltd. Everybody is moving to the cloud Companies cloud strategy • Public cloud first • Hybrid Cloud • Multi-Clouds
  • 28. 31©2018 Check Point Software Technologies Ltd. Security in the cloud • Best effective protection from modern attacks – regular access control is not enough • Adaptive security operation that enables cloud innovation which scales on demand • Cloud security architecture that is unified, efficient, agile, elastic and robust