SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Security & Compliance for
Enterprise Cloud Infrastructure
Carson Sweet
CEO, CloudPassage
carson@cloudpassage.com
Agenda
• Evolving cloud use cases and trends
• System and data protection, then and now
• Pros and cons of common “next-generation”
system and data protection approaches
• CloudPassage approach to cloud application
infrastructure protection
• Discussion, Q&A
2
Top Cloud Infrastructure Use Cases
3
Dev-
Test
Big
Data
ITaaS
Shared infrastructure, automated, self-
service IT-as-a-Service (a.k.a. private cloud)
Move development and test environments
to public IaaS providers
Leverage shared private cloud or public
IaaS resources for big-data analytics
ITaaS / Private Cloud
Drivers / Benefits
• Increased hardware utilization
• Self-service provisioning
• Decreases IT workload
• Rapid scalability / elasticity
Security Considerations
• Limited-to-no change control
• Flat network architecture
• Not everyone knows security
• Cloud-capable security tools
• Raw tech & ops scaling issues
Dev/Test in Public Clouds
Drivers / Benefits
• Decreases IT workload
• Self-sufficient BU
developers
• Opens datacenter capacity
• Less configuration effort
Security Considerations
• Public cloud exposures
• Visibility / oversight
• Production data in test/dev
• Intellectual property
Big Data Analytics
Drivers / Benefits
• Massive new capabilities
• Leverage collected data
• Previously unattainable intel
• Product enhancements, risk
intelligence, BI, BPM, etc.
• Cloud analytics = scalable!
Security Considerations
• Private data, public cloud
• Analytics engine contains IP
• Geographic data hosting
• Integrity is paramount
Cloud Infrastructure
Security Challenges
7
Cloud Benefits Create Security Headaches
8
Virtualized networks
New topologies
No hardware
Highly dynamic
Shared infrastructure
These cloud
“pros” become
security “cons”
What Infrastructure Looked Like
• Traditional datacenter infrastructure model
–Vertical application scalability
–Apps running on hardware “islands”
–Few environments to contend with
• Vertical application architectures
–Scalability via hardware choices & optimization
–Topology and hardware essentially arbitrary
–Physical proximity of application components
9
11
Application A Application B
Application C
Application D
Application E
12
Web Tier VMs
A A
A A
Data Tier VMs
A
A
Web App
Appliance
Crypto
Gateway
Network
Firewall
CRITICAL SUCCESS FACTORS:
• Physical Topology Access
• Hardware Acceleration
Network
IDS / IPS
Where Infrastructure Is Going
13
• Infrastructure-as-a-Service (public or private)
– Virtualized sharing of commodity hardware
– ITaaS (opex, scalable, dynamic, self-service)
– Flat physical network, distributed topologies
• Horizontal application architectures
– Scale achieved through cloning workloads
– Physical topology, hardware abstracted
– Wide dispersion of application & data components is
desirable
A
A A A
A A A
A
A A
A
A A
A
A A
A A
A A
B
B
B
B
C C
C
C
C
C C
D
D D
D
D
D
D D
D D
D
E
E E
E E E
E E E E
E E E
E E
E
E
E
E
E
E E
E E
Web App
Applianc
e
Crypto
Gateway
Network
Firewall
Network
IDS / IPS
You must reconcile critical security needs with
new infrastructure delivery parameters
• Strong access control
• Vulnerability, exposure and
threat management
• Protection of data in motion
and at rest
• Security & compliance
intelligence
• Operational oversight
Security Hasn’t Changed
• Must work anywhere with
diminished to no control
• Network security highly limited
• Access to hardware
accelerated appliances limited
• Dramatically higher rate of
code & infrastructure change
Delivery Parameters Have
“Next-Generation”
Infrastructure Security
18
Next Generation Approaches
• Virtual Appliances
– Existing appliance / gateway solutions
• In-Hypervisor Controls
– Controls deployed in virtualization control planes
• Workload-Based Security
– Deployment of controls within actual workloads
(a.k.a. “microperimeters”)
Virtual Appliances
• Benefits
– Mirrors existing models, easy to understand
– Existing vendors may offer this model
• Pitfalls
– No hardware acceleration = scalability challenges
– Topological dependencies hinder workload distribution
– Limited functionality, for the same reasons
• Field Observations
– We’ve only seen network security / WAF appliances, none
operating at significant scale
In-Hypervisor Controls
• Benefits
– Services available to all VMs on protected hypervisors
– Cannot be modified from within guest VMs
• Pitfalls
– Often hypervisor-specific, cannot be used in public IaaS
– Significant impact to VM density & performance
• Field Observations
– Useful in data centers / private clouds, not hybrid
– Performance and operational challenges abound
Workload-Based Security
• Benefits
– Workload is the intersection of scale, portability, control
– Moves security close to application & data constructs
• Pitfalls
– Resource and performance impacted unless done right
– Not operationally scalable without control automation
• Field Observations
– The model that CloudPassage chose as core design
– Being implemented at large scale in finserv, software
CloudPassage Approach to
Workload-Based Security
23
CUSTOMER CLOUD / DATACENTER
HOSTING ENVIRONMENTS
www
node1,2,(n)
mysql
node1,2,(n)
mongo-db
node1,2,(n)
HALO HALO HALO
• “Dumb” agents with minimal system
overhead (6 MB in memory, under 0.5% CPU)
• Highly scalable centralized security analytics
absorbs 98%+ of required compute cycles
• Transparently scales to protect a few
workloads to tens of thousands
Halo Architecture
“Naked” VM Instance
Operating System
Application Code
System Administration Services
Application
Stack
App Storage
Volume
System Storage
Volume
Halo Security Agent
1
2
4 5
67
Agent activates firewall on boot, applies latest
policies, and orchestrates ongoing policy updates.
1
Halo secures privileged access via dynamic firewall
rules using multi-factor user authentication.
2
Scans O.S. configurations for vulnerabilities and
continuously monitors O.S. state and activity.
3
Application configurations are scanned for
vulnerabilities and are continuously monitored.
4
Cryptographic integrity monitoring ensures app
code and binaries are not compromised.
5
Platform monitors system binary and config files
for correct ACLs, file integrity, and vulnerabilities.
6 3
Application data stores are monitored for access;
outbound firewall rules prevent data extrusion.
7
60 Seconds in the Life of a Halo’ed Workload
Halo API
Halo Portal
What’s Special about CloudPassage Halo?
• Portable, built-in security & compliance automation
– Control provisioning & management automation built into workloads
– Security & telemetry operates transparently across cloud environments
– Enables public, hybrid cloud compliance (PCI, FFIEC, SOC2, HIPAA, etc)
• Technically, financially, operationally scalable
– Central analytics = low impact to systems, low friction with sysadmins
– Metered usage = pay for what’s used (hourly licensing, volume discounts)
– Automation = built-in controls with zero provisioning or configuration
• Consistency, efficiency through automation
– Security is built directly into the stack, synched every 60 seconds
– REST API and toolkit for extensive integration with existing investments
– One central point of visibility and control for systems across multiple clouds
Wrapping Up
• Infrastructure-centric security doesn’t work for cloud
– Your cloud migration will demand new approaches
– Next-generation alternatives have pros and cons
• Workload-based security offers distinct advantages
– Moves security closer to applications
– Enables greater scalability and portability
– Can operate in any infrastructure environment
• Talk to your team and start the process now
– Visit cloudpassage.com for white papers, etc.
www.cloudpassage.com

Weitere ähnliche Inhalte

Was ist angesagt?

QualysGuard InfoDay 2013 - QualysGuard RoadMap for H2-­2013/H1-­2014
QualysGuard InfoDay 2013 - QualysGuard RoadMap for H2-­2013/H1-­2014QualysGuard InfoDay 2013 - QualysGuard RoadMap for H2-­2013/H1-­2014
QualysGuard InfoDay 2013 - QualysGuard RoadMap for H2-­2013/H1-­2014
Risk Analysis Consultants, s.r.o.
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
EnergySec
 
Cloud university intel security
Cloud university intel securityCloud university intel security
Cloud university intel security
Ingram Micro Cloud
 
SAP Cloud security overview 2.0
SAP Cloud security overview 2.0SAP Cloud security overview 2.0
SAP Cloud security overview 2.0
Rasmi Swain
 

Was ist angesagt? (20)

QualysGuard InfoDay 2013 - QualysGuard RoadMap for H2-­2013/H1-­2014
QualysGuard InfoDay 2013 - QualysGuard RoadMap for H2-­2013/H1-­2014QualysGuard InfoDay 2013 - QualysGuard RoadMap for H2-­2013/H1-­2014
QualysGuard InfoDay 2013 - QualysGuard RoadMap for H2-­2013/H1-­2014
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
 
Pros and Cons of Moving to Cloud and Managed Services
Pros and Cons of Moving to Cloud and Managed ServicesPros and Cons of Moving to Cloud and Managed Services
Pros and Cons of Moving to Cloud and Managed Services
 
AWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - Intel
 
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
 
#ALSummit: Realities of Security in the Cloud
#ALSummit: Realities of Security in the Cloud#ALSummit: Realities of Security in the Cloud
#ALSummit: Realities of Security in the Cloud
 
Security for cloud native workloads
Security for cloud native workloadsSecurity for cloud native workloads
Security for cloud native workloads
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation
 
Securing Healthcare Data on AWS for HIPAA
Securing Healthcare Data on AWS for HIPAASecuring Healthcare Data on AWS for HIPAA
Securing Healthcare Data on AWS for HIPAA
 
#ALSummit: Architecting Security into your AWS Environment
#ALSummit: Architecting Security into your AWS Environment#ALSummit: Architecting Security into your AWS Environment
#ALSummit: Architecting Security into your AWS Environment
 
best practices-managing_security_in_the hybrid cloud
 best practices-managing_security_in_the hybrid cloud best practices-managing_security_in_the hybrid cloud
best practices-managing_security_in_the hybrid cloud
 
Cloud university intel security
Cloud university intel securityCloud university intel security
Cloud university intel security
 
Migrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best PracticesMigrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best Practices
 
CSA SV Threat detection and prediction
CSA SV Threat detection and predictionCSA SV Threat detection and prediction
CSA SV Threat detection and prediction
 
SAP Cloud security overview 2.0
SAP Cloud security overview 2.0SAP Cloud security overview 2.0
SAP Cloud security overview 2.0
 
Application visibility across the security estate the value and the vision ...
Application visibility across the security estate   the value and the vision ...Application visibility across the security estate   the value and the vision ...
Application visibility across the security estate the value and the vision ...
 
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
 
Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS Applications
 
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and RoutersEnsuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
 
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
#ALSummit: Amazon Web Services: Understanding the Shared Security Model#ALSummit: Amazon Web Services: Understanding the Shared Security Model
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
 

Ähnlich wie Security and Compliance for Enterprise Cloud Infrastructure

Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessSecurity that works with, not against, your SaaS business
Security that works with, not against, your SaaS business
CloudPassage
 

Ähnlich wie Security and Compliance for Enterprise Cloud Infrastructure (20)

Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
 
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)在小學有效運用雲端電腦以促進電子學習(第一節筆記)
在小學有效運用雲端電腦以促進電子學習(第一節筆記)
 
Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessSecurity that works with, not against, your SaaS business
Security that works with, not against, your SaaS business
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
 
Winning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our TimeWinning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our Time
 
Ask The Architect: RightScale & AWS Dive Deep into Hybrid IT
Ask The Architect: RightScale & AWS Dive Deep into Hybrid ITAsk The Architect: RightScale & AWS Dive Deep into Hybrid IT
Ask The Architect: RightScale & AWS Dive Deep into Hybrid IT
 
Cloud Computing basic concept to understand
Cloud Computing basic concept to understandCloud Computing basic concept to understand
Cloud Computing basic concept to understand
 
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
 
Cloud monitoring - An essential Platform Service
Cloud monitoring  - An essential Platform ServiceCloud monitoring  - An essential Platform Service
Cloud monitoring - An essential Platform Service
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Securing virtual workload and cloud
Securing virtual workload and cloudSecuring virtual workload and cloud
Securing virtual workload and cloud
 
Backup Solution
Backup SolutionBackup Solution
Backup Solution
 
VTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud ComputingVTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Boot camp - Migration to AWS
Boot camp - Migration to AWSBoot camp - Migration to AWS
Boot camp - Migration to AWS
 

Mehr von CloudPassage

Integrating Security into DevOps
Integrating Security into DevOpsIntegrating Security into DevOps
Integrating Security into DevOps
CloudPassage
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud Guidelines
CloudPassage
 
Meeting PCI DSS Requirements with AWS and CloudPassage
Meeting PCI DSS Requirements with AWS and CloudPassageMeeting PCI DSS Requirements with AWS and CloudPassage
Meeting PCI DSS Requirements with AWS and CloudPassage
CloudPassage
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage Overview
CloudPassage
 
Automating Security for the Cloud - Make it Easy, Make it Safe
Automating Security for the Cloud - Make it Easy, Make it SafeAutomating Security for the Cloud - Make it Easy, Make it Safe
Automating Security for the Cloud - Make it Easy, Make it Safe
CloudPassage
 
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecSecuring Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSec
CloudPassage
 

Mehr von CloudPassage (16)

CloudPassage Careers
CloudPassage CareersCloudPassage Careers
CloudPassage Careers
 
Transforming the CSO Role to Business Enabler
Transforming the CSO Role to Business EnablerTransforming the CSO Role to Business Enabler
Transforming the CSO Role to Business Enabler
 
SecDevOps: The New Black of IT
SecDevOps: The New Black of ITSecDevOps: The New Black of IT
SecDevOps: The New Black of IT
 
Comprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated ApproachComprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated Approach
 
Integrating Security into DevOps
Integrating Security into DevOpsIntegrating Security into DevOps
Integrating Security into DevOps
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud Guidelines
 
What You Haven't Heard (Yet) About Cloud Security
What You Haven't Heard (Yet) About Cloud SecurityWhat You Haven't Heard (Yet) About Cloud Security
What You Haven't Heard (Yet) About Cloud Security
 
Meeting PCI DSS Requirements with AWS and CloudPassage
Meeting PCI DSS Requirements with AWS and CloudPassageMeeting PCI DSS Requirements with AWS and CloudPassage
Meeting PCI DSS Requirements with AWS and CloudPassage
 
Delivering Secure OpenStack IaaS for SaaS Products
Delivering Secure OpenStack IaaS for SaaS ProductsDelivering Secure OpenStack IaaS for SaaS Products
Delivering Secure OpenStack IaaS for SaaS Products
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage Overview
 
PCI and the Cloud
PCI and the CloudPCI and the Cloud
PCI and the Cloud
 
Halo Installfest Slides
Halo Installfest SlidesHalo Installfest Slides
Halo Installfest Slides
 
Automating Security for the Cloud - Make it Easy, Make it Safe
Automating Security for the Cloud - Make it Easy, Make it SafeAutomating Security for the Cloud - Make it Easy, Make it Safe
Automating Security for the Cloud - Make it Easy, Make it Safe
 
BSides SF - Automating Security for the Cloud
BSides SF - Automating Security for the CloudBSides SF - Automating Security for the Cloud
BSides SF - Automating Security for the Cloud
 
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecSecuring Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSec
 
BayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes EverythingBayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes Everything
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Security and Compliance for Enterprise Cloud Infrastructure

  • 1. Security & Compliance for Enterprise Cloud Infrastructure Carson Sweet CEO, CloudPassage carson@cloudpassage.com
  • 2. Agenda • Evolving cloud use cases and trends • System and data protection, then and now • Pros and cons of common “next-generation” system and data protection approaches • CloudPassage approach to cloud application infrastructure protection • Discussion, Q&A 2
  • 3. Top Cloud Infrastructure Use Cases 3 Dev- Test Big Data ITaaS Shared infrastructure, automated, self- service IT-as-a-Service (a.k.a. private cloud) Move development and test environments to public IaaS providers Leverage shared private cloud or public IaaS resources for big-data analytics
  • 4. ITaaS / Private Cloud Drivers / Benefits • Increased hardware utilization • Self-service provisioning • Decreases IT workload • Rapid scalability / elasticity Security Considerations • Limited-to-no change control • Flat network architecture • Not everyone knows security • Cloud-capable security tools • Raw tech & ops scaling issues
  • 5. Dev/Test in Public Clouds Drivers / Benefits • Decreases IT workload • Self-sufficient BU developers • Opens datacenter capacity • Less configuration effort Security Considerations • Public cloud exposures • Visibility / oversight • Production data in test/dev • Intellectual property
  • 6. Big Data Analytics Drivers / Benefits • Massive new capabilities • Leverage collected data • Previously unattainable intel • Product enhancements, risk intelligence, BI, BPM, etc. • Cloud analytics = scalable! Security Considerations • Private data, public cloud • Analytics engine contains IP • Geographic data hosting • Integrity is paramount
  • 8. Cloud Benefits Create Security Headaches 8 Virtualized networks New topologies No hardware Highly dynamic Shared infrastructure These cloud “pros” become security “cons”
  • 9. What Infrastructure Looked Like • Traditional datacenter infrastructure model –Vertical application scalability –Apps running on hardware “islands” –Few environments to contend with • Vertical application architectures –Scalability via hardware choices & optimization –Topology and hardware essentially arbitrary –Physical proximity of application components 9
  • 10.
  • 11. 11 Application A Application B Application C Application D Application E
  • 12. 12 Web Tier VMs A A A A Data Tier VMs A A Web App Appliance Crypto Gateway Network Firewall CRITICAL SUCCESS FACTORS: • Physical Topology Access • Hardware Acceleration Network IDS / IPS
  • 13. Where Infrastructure Is Going 13 • Infrastructure-as-a-Service (public or private) – Virtualized sharing of commodity hardware – ITaaS (opex, scalable, dynamic, self-service) – Flat physical network, distributed topologies • Horizontal application architectures – Scale achieved through cloning workloads – Physical topology, hardware abstracted – Wide dispersion of application & data components is desirable
  • 14.
  • 15. A A A A A A A A A A A A A A A A A A A A B B B B C C C C C C C D D D D D D D D D D D E E E E E E E E E E E E E E E E E E E E E E E E
  • 17. You must reconcile critical security needs with new infrastructure delivery parameters • Strong access control • Vulnerability, exposure and threat management • Protection of data in motion and at rest • Security & compliance intelligence • Operational oversight Security Hasn’t Changed • Must work anywhere with diminished to no control • Network security highly limited • Access to hardware accelerated appliances limited • Dramatically higher rate of code & infrastructure change Delivery Parameters Have
  • 19. Next Generation Approaches • Virtual Appliances – Existing appliance / gateway solutions • In-Hypervisor Controls – Controls deployed in virtualization control planes • Workload-Based Security – Deployment of controls within actual workloads (a.k.a. “microperimeters”)
  • 20. Virtual Appliances • Benefits – Mirrors existing models, easy to understand – Existing vendors may offer this model • Pitfalls – No hardware acceleration = scalability challenges – Topological dependencies hinder workload distribution – Limited functionality, for the same reasons • Field Observations – We’ve only seen network security / WAF appliances, none operating at significant scale
  • 21. In-Hypervisor Controls • Benefits – Services available to all VMs on protected hypervisors – Cannot be modified from within guest VMs • Pitfalls – Often hypervisor-specific, cannot be used in public IaaS – Significant impact to VM density & performance • Field Observations – Useful in data centers / private clouds, not hybrid – Performance and operational challenges abound
  • 22. Workload-Based Security • Benefits – Workload is the intersection of scale, portability, control – Moves security close to application & data constructs • Pitfalls – Resource and performance impacted unless done right – Not operationally scalable without control automation • Field Observations – The model that CloudPassage chose as core design – Being implemented at large scale in finserv, software
  • 24. CUSTOMER CLOUD / DATACENTER HOSTING ENVIRONMENTS www node1,2,(n) mysql node1,2,(n) mongo-db node1,2,(n) HALO HALO HALO • “Dumb” agents with minimal system overhead (6 MB in memory, under 0.5% CPU) • Highly scalable centralized security analytics absorbs 98%+ of required compute cycles • Transparently scales to protect a few workloads to tens of thousands Halo Architecture
  • 25. “Naked” VM Instance Operating System Application Code System Administration Services Application Stack App Storage Volume System Storage Volume Halo Security Agent 1 2 4 5 67 Agent activates firewall on boot, applies latest policies, and orchestrates ongoing policy updates. 1 Halo secures privileged access via dynamic firewall rules using multi-factor user authentication. 2 Scans O.S. configurations for vulnerabilities and continuously monitors O.S. state and activity. 3 Application configurations are scanned for vulnerabilities and are continuously monitored. 4 Cryptographic integrity monitoring ensures app code and binaries are not compromised. 5 Platform monitors system binary and config files for correct ACLs, file integrity, and vulnerabilities. 6 3 Application data stores are monitored for access; outbound firewall rules prevent data extrusion. 7 60 Seconds in the Life of a Halo’ed Workload
  • 27. What’s Special about CloudPassage Halo? • Portable, built-in security & compliance automation – Control provisioning & management automation built into workloads – Security & telemetry operates transparently across cloud environments – Enables public, hybrid cloud compliance (PCI, FFIEC, SOC2, HIPAA, etc) • Technically, financially, operationally scalable – Central analytics = low impact to systems, low friction with sysadmins – Metered usage = pay for what’s used (hourly licensing, volume discounts) – Automation = built-in controls with zero provisioning or configuration • Consistency, efficiency through automation – Security is built directly into the stack, synched every 60 seconds – REST API and toolkit for extensive integration with existing investments – One central point of visibility and control for systems across multiple clouds
  • 28. Wrapping Up • Infrastructure-centric security doesn’t work for cloud – Your cloud migration will demand new approaches – Next-generation alternatives have pros and cons • Workload-based security offers distinct advantages – Moves security closer to applications – Enables greater scalability and portability – Can operate in any infrastructure environment • Talk to your team and start the process now – Visit cloudpassage.com for white papers, etc.

Hinweis der Redaktion

  1. ----- Meeting Notes (1/13/14 14:01) ----- They are doing hosting in the cloud, some test-dev and some production; this is very early, may not make sense for them.