SlideShare a Scribd company logo
1 of 29
NAVAL POSTGRADUATE SCHOOL
New Threats, New Approaches
in Modern Data Centers
Why did we re-architect our Data
Center
• Understand the architecture and design
requirements of multi-tenancy environment
• Isolate threats through micro-segmentation
and granular network controls
• Apply flexible security policies at the VM
level
Center for Cyberwarfare - CCW
The lab is used to conduct research
and education to provide the modern
warfighter with tactical and
operational responses to cyber threats.
• Built by CCW with pizza box servers using
various adhoc storage systems.
• ITACS took over responsibilities of maintaining
the cyberlab project in late 2014.
• Inadequate resources – not scalable.
• Many single points of failure.
• Missing adequate licensing for some services.
• Not in a data center environment.
Legacy lab implementation
Why have lab isolation?
• Advanced Persistent Threats
• Human error – Insider Threat
• Protection against coordinated attacks
• Provide researchers with sandbox for malware
inspection
• Offer a clean slate for each class room from quarter
to quarter
Challenges overcome
• Cyberlab 2.0 addresses the following issues:
– Single points of failure removed
– Replaced AD Controller and Load Balancer physical
devices with virtual to decrease total cost of
ownership
– 2 racks of equipment consolidated to 2u HCI
– Reduced time required to provision labs for classes
each quarter
– Ability to customize networks for class differences
such as: firewall rules, student permissions, threat
types
HOW WE DID IT
Adding VDI increased the security surface area
• The converged infrastructure means virtual desktops run on the
same infrastructure as servers.
Data Center
Perimeter
Internet
EastWest
Haven’t We Learned Anything from a
Perimeter-Centric Focus?
“The Empire doesn't consider a small
one-man fighter to be any threat, or
they'd have a tighter defense. An analysis
of the plans provided by Princess Leia has
demonstrated a weakness in the battle
station. …The shaft leads directly to the
reactor system. A precise hit will start a
chain reaction which should destroy the
station.”
--General Dodanna
A Long Time Ago…In a Galaxy Far Far Away...
14
The M&M Approach to Security
15
“In today’s new threat
landscape, this M&M and
‘trust but verify’ is no longer
an effective way of enforcing
security.”
Forrester Research
In Response to NIST RF 130208119-3119-01I
“Developing a Framework to Improve Critical Infrastructure
Cyber-Security”
Trading Off Context and Isolation
16
Software Defined
Data Center (SDDC)
Any Application
SDDC Platform
Any x86
Any Storage
Any IP network
Data Center Virtualization
SDDC Platform
High Context
Low Isolation
High Isolation
Low Context
No Ubiquitous Enforcement
Traditional Approach
The Compromise Between Desired End
State & Operational Feasibility
17
WAN
…
“X” firewalls
“X” + “1000
workloads
vs
A typical data center has:
Directing all traffic (virtual + physical) through chokepoint
firewalls is inefficient
And a physical firewall per workload is cost
prohibitive
SDDC Virtualization Layer – Delivers Both
Context and Isolation
18
Software Defined
Data Center (SDDC)
Any Application
SDDC Platform
Any x86
Any Storage
Any IP network
Data Center Virtualization
High Context
High Isolation
Ubiquitous Enforcement
SDDC Approach
Secure Host Introspection
Micro-segmentation with NSX
SegmentationIsolation Advanced services
Controlled communication path within a
single network
Advanced services: addition of 3rd
party security, as needed by policy
No communication path between unrelated
networks
19
Move from “Network Centric” to “Class
Centric” Deployments
20
DMZ/Web VLAN
App VLAN
Class-A
Class-B
Services/Management VLAN
DB VLAN
Class-AClass-B
Services Mgmt
Class-A Class-B
Perimeter
firewall
Inside firewall
Perimeter
firewall
DMZ/Web
App
DB
Class-A
App
DMZ/Web
DB
Class-B
Services Mgmt
Services/Management
Group
Traditional Data Center NSX Data Center
CONFIDENTIAL
FY16 House NDAA Report
Cyber Defense Network Segmentation
The committee is aware that the Department of Defense is looking at modifying the way it builds,
maintains, and upgrades data center, including increased use of commercial cloud capabilities and public-
private partnerships. The committee is aware that as the Department increasingly looks at software-
defined networking, it could potentially reduce the mobility of cyber threats across data center and other
networks by increasing the compartmentalization and segmentation between systems, and providing a
mix of security techniques to enable access to those compartments. Such actions have the potential to
lessen the chance of a widespread or catastrophic breach, including breaches caused by insider threats.
The committee encourages the Department to explore ways to use compartmentalization or segmentation
as part of a software-defined networking approach in order to increase the security of its networks.
The Beginning of Policy Shifts….again
Combining Organic Capabilities with Best
of Breed across the Larger Ecosystem
Apply and visualize security
policies for workloads, in
one place.
Automate workflows across
best-of-breed services,
without custom integration.
Provision and monitor uptime
of different services, using one
method.
NSX Network Virtualization Platform
Deploy Apply Automate
Built-In Services
Firewall Data Security (DLP)
Server Activity Monitoring VPN (IPSEC, SSL)
Third-Party Services
Antivirus DLP Firewall
Vulnerability
Management
Intrusion
Prevention
Identity and
Access Mgmt
…and more in progress
Security Policy
Management
External Network
VDS
Guest VM
Partner
Service 1 VM
Slot
2
Slot
4
Traffic
Redirection
Module
Slot
5
Partner
Service 2 VM
High Scale NSX Topology
• High scale multi-tenancy is enabled with
multiple tiers of Edge interconnected via
VxLAN transit uplink
• Two tier Edges allow better scaling with
administrative control based on traffic
generated.
• NSX Edge can scale up to 8 ECMP Edges for
scalable routing
• Support for overlapping IP addresses
between Tenants connected to different
first tier NSX Edges
23
External Network
Tenant 1
Desktop Pool Logical
Switch
App LS DB LS
…
Desktop Pool Logical
Switch
Edge with HA
NAT/LB features
Single Adjacency
to ECMP Edge
ECMP Based
NSX Edge X-Large
(Route Aggregation Layer)
ECMP NSX Edge
VXLAN Uplinks VXLAN Uplinks
VXLAN 5100
Transit
App LS DB LS
… E8E1
• Automation, Automation, Automation
• Brocade Workflow Composer
• Cloud Management Platform - OpenStack on VMware (VIO)
• Plan to integrate physical devices (IoT, Robotics,
Weather Sensors, etc) into virtual cyberlab
• Dynamic routing
• Hardware VTEP to bridge VLAN to VXLAN
• Integration with NSX and Palo Alto Networks Virtual FW
• Leverage Public Cloud - Amazon AWS
Plans for 2017 and beyond
Stackstorm
VMware Integrated OpenStack
VMware Integrated OpenStack (VIO)
VMware SDDC
Standard OpenStack
Nova Neutron Cinder
Keystone HeatHorizon Ceilometer
Glance
• VIO is an “Integrated Product” Approach to OpenStack
• Standard DefCore Compliant OpenStack Distribution (delivered as OVA)
• Deploys & Manages Proven Production Architecture on VMware SDDC
• Fully Supported by VMware
VIO Management Server
(Deploy, configure, patch,
upgrade …OpenStack)
vSphere NSX
vSphere Datastores:
3rd-party / Virtual SAN
The Need for a Comprehensive Security Solution
VMware NSX Platform
NSX Distributed Firewall
VM level zoning without
VLAN/VXLAN
dependencies
Line rate access control
traffic filtering
Distributed enforcement at
Hypervisor level
Palo Alto Networks Next
Generation Security
Next Generation Firewall
Protection against known
and unknown threats
Visibility and safe
application enablement
User, device, and
application aware policies
Sophisticated Security
Challenges
Applications are not linked to
port & protocols
Distributed user and device
population
Modern Malware
AWS Global Infrastructure
VMware Cloud™ on AWS
Powered by VMware Cloud Foundation
28
AWS Global InfrastructureCustomer Datacenter
vSphere vSAN NSX
TECHNICAL PREVIEW
Operational Management Native AWS Services
Amazon
EC2
Amazon
S3
Amazon
RDS
AWS Direct
Connect
AWS IAMAWS IoT
…
…
…
…
vRealize Suite, vSphere Integrated Containers, ISV ecosystem
Availability expected in mid-2017 timeframe
Technical
Preview
vCentervCenter
VMware CloudTM on AWS
VMware vSphere-based service, running on the AWS Cloud
• ESXi on Dedicated
Hardware
• Support for VMs and
Containers
• vSAN on Flash and EBS
Storage
• Replication and DR
Orchestration
• NSX Spanning on-
premises and cloud
• Advanced Networking
& Security Services
Questions
NAVAL POSTGRADUATE SCHOOL
New Threats, New Approaches in Modern Data Centers

More Related Content

What's hot

PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019Dragos, Inc.
 
Cloud Native Security: New Approach for a New Reality
Cloud Native Security: New Approach for a New RealityCloud Native Security: New Approach for a New Reality
Cloud Native Security: New Approach for a New RealityCarlos Andrés García
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
Cloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO SuccessfulCloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO SuccessfulCloudPassage
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the CloudCloudPassage
 
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...Jürgen Ambrosi
 
Trisis in Perspective: Implications for ICS Defenders
Trisis in Perspective: Implications for ICS DefendersTrisis in Perspective: Implications for ICS Defenders
Trisis in Perspective: Implications for ICS DefendersDragos, Inc.
 
Network Forensics - Your Only Choice at 10G
Network Forensics - Your Only Choice at 10GNetwork Forensics - Your Only Choice at 10G
Network Forensics - Your Only Choice at 10GSavvius, Inc
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinZivaro Inc
 
Cisco amp for meraki
Cisco amp for merakiCisco amp for meraki
Cisco amp for merakiCisco Canada
 
Sasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protectionSasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protectionDejan Jeremic
 
TRISIS in Perspective
TRISIS in PerspectiveTRISIS in Perspective
TRISIS in PerspectiveDragos, Inc.
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1PROIDEA
 
How to Respond to Industrial Intrusions
How to Respond to Industrial Intrusions  How to Respond to Industrial Intrusions
How to Respond to Industrial Intrusions Dragos, Inc.
 
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco Canada
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecRobb Boyd
 
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks  Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks Dragos, Inc.
 

What's hot (20)

PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019
 
Cloud Native Security: New Approach for a New Reality
Cloud Native Security: New Approach for a New RealityCloud Native Security: New Approach for a New Reality
Cloud Native Security: New Approach for a New Reality
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
Cloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO SuccessfulCloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO Successful
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
 
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
 
Trisis in Perspective: Implications for ICS Defenders
Trisis in Perspective: Implications for ICS DefendersTrisis in Perspective: Implications for ICS Defenders
Trisis in Perspective: Implications for ICS Defenders
 
Network Forensics - Your Only Choice at 10G
Network Forensics - Your Only Choice at 10GNetwork Forensics - Your Only Choice at 10G
Network Forensics - Your Only Choice at 10G
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same Coin
 
Cisco amp for meraki
Cisco amp for merakiCisco amp for meraki
Cisco amp for meraki
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
Sasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protectionSasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protection
 
TRISIS in Perspective
TRISIS in PerspectiveTRISIS in Perspective
TRISIS in Perspective
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
How to Respond to Industrial Intrusions
How to Respond to Industrial Intrusions  How to Respond to Industrial Intrusions
How to Respond to Industrial Intrusions
 
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
 
Sdn&security
Sdn&securitySdn&security
Sdn&security
 
Security sdn
Security sdnSecurity sdn
Security sdn
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSec
 
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks  Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
 

Viewers also liked

CENIC Conference agenda 2017_v1
CENIC Conference agenda 2017_v1CENIC Conference agenda 2017_v1
CENIC Conference agenda 2017_v1Iben Rodriguez
 
In-Memory Distributed Computing - Porto Tech Hub
In-Memory Distributed Computing - Porto Tech HubIn-Memory Distributed Computing - Porto Tech Hub
In-Memory Distributed Computing - Porto Tech HubChristoph Engelbert
 
Iben from Spirent talks at the SDN World Congress about the importance of and...
Iben from Spirent talks at the SDN World Congress about the importance of and...Iben from Spirent talks at the SDN World Congress about the importance of and...
Iben from Spirent talks at the SDN World Congress about the importance of and...Iben Rodriguez
 
Golang 101 (Concurrency vs Parallelism)
Golang 101 (Concurrency vs Parallelism)Golang 101 (Concurrency vs Parallelism)
Golang 101 (Concurrency vs Parallelism)Pramesti Hatta K.
 
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/LinuxDefconRussia
 
SUSE Expert Days 2017 LENOVO
SUSE Expert Days 2017 LENOVOSUSE Expert Days 2017 LENOVO
SUSE Expert Days 2017 LENOVOSUSE España
 
Let's Learn to Talk to GC Logs in Java 9
Let's Learn to Talk to GC Logs in Java 9Let's Learn to Talk to GC Logs in Java 9
Let's Learn to Talk to GC Logs in Java 9Poonam Bajaj Parhar
 
User defined functions in C programmig
User defined functions in C programmigUser defined functions in C programmig
User defined functions in C programmigAppili Vamsi Krishna
 
Introduction to the Serverless paradigm
Introduction to the Serverless paradigmIntroduction to the Serverless paradigm
Introduction to the Serverless paradigmAlex Casalboni
 
Monitoring, Logging and Tracing on Kubernetes
Monitoring, Logging and Tracing on KubernetesMonitoring, Logging and Tracing on Kubernetes
Monitoring, Logging and Tracing on KubernetesMartin Etmajer
 
Amazon Rekognition - Image Analysis Overview
Amazon Rekognition - Image Analysis OverviewAmazon Rekognition - Image Analysis Overview
Amazon Rekognition - Image Analysis OverviewAlex Casalboni
 
AWS Lambda: Advanced Coding Session
AWS Lambda: Advanced Coding SessionAWS Lambda: Advanced Coding Session
AWS Lambda: Advanced Coding SessionAlex Casalboni
 
Serverless Machine Learning Workshop
Serverless Machine Learning WorkshopServerless Machine Learning Workshop
Serverless Machine Learning WorkshopAlex Casalboni
 
"On-premises" FaaS on Kubernetes
"On-premises" FaaS on Kubernetes"On-premises" FaaS on Kubernetes
"On-premises" FaaS on KubernetesAlex Casalboni
 
Real-time Insights, powered by Reactive Programming
Real-time Insights, powered by Reactive ProgrammingReal-time Insights, powered by Reactive Programming
Real-time Insights, powered by Reactive ProgrammingJay Phelps
 
Distributed systems in practice, in theory (ScaleConf Colombia)
Distributed systems in practice, in theory (ScaleConf Colombia)Distributed systems in practice, in theory (ScaleConf Colombia)
Distributed systems in practice, in theory (ScaleConf Colombia)Aysylu Greenberg
 
Serverless computing and Function-as-a-Service (FaaS)
Serverless computing and Function-as-a-Service (FaaS)Serverless computing and Function-as-a-Service (FaaS)
Serverless computing and Function-as-a-Service (FaaS)Moritz Strube
 

Viewers also liked (20)

CENIC Conference agenda 2017_v1
CENIC Conference agenda 2017_v1CENIC Conference agenda 2017_v1
CENIC Conference agenda 2017_v1
 
Troubleshooting Java HotSpot VM
Troubleshooting Java HotSpot VMTroubleshooting Java HotSpot VM
Troubleshooting Java HotSpot VM
 
In-Memory Distributed Computing - Porto Tech Hub
In-Memory Distributed Computing - Porto Tech HubIn-Memory Distributed Computing - Porto Tech Hub
In-Memory Distributed Computing - Porto Tech Hub
 
Iben from Spirent talks at the SDN World Congress about the importance of and...
Iben from Spirent talks at the SDN World Congress about the importance of and...Iben from Spirent talks at the SDN World Congress about the importance of and...
Iben from Spirent talks at the SDN World Congress about the importance of and...
 
Golang 101 (Concurrency vs Parallelism)
Golang 101 (Concurrency vs Parallelism)Golang 101 (Concurrency vs Parallelism)
Golang 101 (Concurrency vs Parallelism)
 
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
 
menRDC - MEN Railway Data Center
menRDC - MEN Railway Data CentermenRDC - MEN Railway Data Center
menRDC - MEN Railway Data Center
 
SUSE Expert Days 2017 LENOVO
SUSE Expert Days 2017 LENOVOSUSE Expert Days 2017 LENOVO
SUSE Expert Days 2017 LENOVO
 
Let's Learn to Talk to GC Logs in Java 9
Let's Learn to Talk to GC Logs in Java 9Let's Learn to Talk to GC Logs in Java 9
Let's Learn to Talk to GC Logs in Java 9
 
User defined functions in C programmig
User defined functions in C programmigUser defined functions in C programmig
User defined functions in C programmig
 
Java performance tuning
Java performance tuningJava performance tuning
Java performance tuning
 
Introduction to the Serverless paradigm
Introduction to the Serverless paradigmIntroduction to the Serverless paradigm
Introduction to the Serverless paradigm
 
Monitoring, Logging and Tracing on Kubernetes
Monitoring, Logging and Tracing on KubernetesMonitoring, Logging and Tracing on Kubernetes
Monitoring, Logging and Tracing on Kubernetes
 
Amazon Rekognition - Image Analysis Overview
Amazon Rekognition - Image Analysis OverviewAmazon Rekognition - Image Analysis Overview
Amazon Rekognition - Image Analysis Overview
 
AWS Lambda: Advanced Coding Session
AWS Lambda: Advanced Coding SessionAWS Lambda: Advanced Coding Session
AWS Lambda: Advanced Coding Session
 
Serverless Machine Learning Workshop
Serverless Machine Learning WorkshopServerless Machine Learning Workshop
Serverless Machine Learning Workshop
 
"On-premises" FaaS on Kubernetes
"On-premises" FaaS on Kubernetes"On-premises" FaaS on Kubernetes
"On-premises" FaaS on Kubernetes
 
Real-time Insights, powered by Reactive Programming
Real-time Insights, powered by Reactive ProgrammingReal-time Insights, powered by Reactive Programming
Real-time Insights, powered by Reactive Programming
 
Distributed systems in practice, in theory (ScaleConf Colombia)
Distributed systems in practice, in theory (ScaleConf Colombia)Distributed systems in practice, in theory (ScaleConf Colombia)
Distributed systems in practice, in theory (ScaleConf Colombia)
 
Serverless computing and Function-as-a-Service (FaaS)
Serverless computing and Function-as-a-Service (FaaS)Serverless computing and Function-as-a-Service (FaaS)
Serverless computing and Function-as-a-Service (FaaS)
 

Similar to New Threats, New Approaches in Modern Data Centers

VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesAngel Villar Garea
 
Nsx security deep dive
Nsx security deep diveNsx security deep dive
Nsx security deep divesolarisyougood
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...Amazon Web Services
 
Cloud Computing : Top to Bottom
Cloud Computing : Top to BottomCloud Computing : Top to Bottom
Cloud Computing : Top to BottomIstiyak Siddiquee
 
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...David kankam
 
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld
 
VMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSXVMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSXVMworld
 
Reston Virtualization Group 9-18-2014
Reston Virtualization Group 9-18-2014 Reston Virtualization Group 9-18-2014
Reston Virtualization Group 9-18-2014 VMwareJenn
 
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of NetworkingOpenStack Korea Community
 
VMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats NewVMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats NewVMware
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming SecurityPCM
 
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...csandit
 
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSXComment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSXColloqueRISQ
 

Similar to New Threats, New Approaches in Modern Data Centers (20)

nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
Nsx security deep dive
Nsx security deep diveNsx security deep dive
Nsx security deep dive
 
Sdn primer pdf
Sdn primer pdfSdn primer pdf
Sdn primer pdf
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
 
NSX, un salt natural cap a SDN
NSX, un salt natural cap a SDNNSX, un salt natural cap a SDN
NSX, un salt natural cap a SDN
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
Cloud Computing : Top to Bottom
Cloud Computing : Top to BottomCloud Computing : Top to Bottom
Cloud Computing : Top to Bottom
 
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
 
VMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSXVMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSX
 
Síťová virtualizace s VMware
Síťová virtualizace s VMwareSíťová virtualizace s VMware
Síťová virtualizace s VMware
 
Reston Virtualization Group 9-18-2014
Reston Virtualization Group 9-18-2014 Reston Virtualization Group 9-18-2014
Reston Virtualization Group 9-18-2014
 
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
 
VMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats NewVMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats New
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security
 
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
 
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSXComment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
 

More from Iben Rodriguez

Ipv6 test plan for opnfv poc v2.2 spirent-vctlab
Ipv6 test plan for opnfv poc v2.2 spirent-vctlabIpv6 test plan for opnfv poc v2.2 spirent-vctlab
Ipv6 test plan for opnfv poc v2.2 spirent-vctlabIben Rodriguez
 
Re-Engineering Engineering
Re-Engineering EngineeringRe-Engineering Engineering
Re-Engineering EngineeringIben Rodriguez
 
Fine grained monitoring
Fine grained monitoringFine grained monitoring
Fine grained monitoringIben Rodriguez
 

More from Iben Rodriguez (6)

Ipv6 test plan for opnfv poc v2.2 spirent-vctlab
Ipv6 test plan for opnfv poc v2.2 spirent-vctlabIpv6 test plan for opnfv poc v2.2 spirent-vctlab
Ipv6 test plan for opnfv poc v2.2 spirent-vctlab
 
Verigraph
VerigraphVerigraph
Verigraph
 
Re-Engineering Engineering
Re-Engineering EngineeringRe-Engineering Engineering
Re-Engineering Engineering
 
Vmworld 2005-sln241
Vmworld 2005-sln241Vmworld 2005-sln241
Vmworld 2005-sln241
 
Fine grained monitoring
Fine grained monitoringFine grained monitoring
Fine grained monitoring
 
Getput suite
Getput suiteGetput suite
Getput suite
 

Recently uploaded

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 

Recently uploaded (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 

New Threats, New Approaches in Modern Data Centers

  • 2. New Threats, New Approaches in Modern Data Centers
  • 3. Why did we re-architect our Data Center • Understand the architecture and design requirements of multi-tenancy environment • Isolate threats through micro-segmentation and granular network controls • Apply flexible security policies at the VM level
  • 4. Center for Cyberwarfare - CCW The lab is used to conduct research and education to provide the modern warfighter with tactical and operational responses to cyber threats.
  • 5.
  • 6. • Built by CCW with pizza box servers using various adhoc storage systems. • ITACS took over responsibilities of maintaining the cyberlab project in late 2014. • Inadequate resources – not scalable. • Many single points of failure. • Missing adequate licensing for some services. • Not in a data center environment. Legacy lab implementation
  • 7. Why have lab isolation? • Advanced Persistent Threats • Human error – Insider Threat • Protection against coordinated attacks • Provide researchers with sandbox for malware inspection • Offer a clean slate for each class room from quarter to quarter
  • 8. Challenges overcome • Cyberlab 2.0 addresses the following issues: – Single points of failure removed – Replaced AD Controller and Load Balancer physical devices with virtual to decrease total cost of ownership – 2 racks of equipment consolidated to 2u HCI – Reduced time required to provision labs for classes each quarter – Ability to customize networks for class differences such as: firewall rules, student permissions, threat types
  • 10. Adding VDI increased the security surface area • The converged infrastructure means virtual desktops run on the same infrastructure as servers. Data Center Perimeter Internet EastWest
  • 11. Haven’t We Learned Anything from a Perimeter-Centric Focus? “The Empire doesn't consider a small one-man fighter to be any threat, or they'd have a tighter defense. An analysis of the plans provided by Princess Leia has demonstrated a weakness in the battle station. …The shaft leads directly to the reactor system. A precise hit will start a chain reaction which should destroy the station.” --General Dodanna A Long Time Ago…In a Galaxy Far Far Away... 14
  • 12. The M&M Approach to Security 15 “In today’s new threat landscape, this M&M and ‘trust but verify’ is no longer an effective way of enforcing security.” Forrester Research In Response to NIST RF 130208119-3119-01I “Developing a Framework to Improve Critical Infrastructure Cyber-Security”
  • 13. Trading Off Context and Isolation 16 Software Defined Data Center (SDDC) Any Application SDDC Platform Any x86 Any Storage Any IP network Data Center Virtualization SDDC Platform High Context Low Isolation High Isolation Low Context No Ubiquitous Enforcement Traditional Approach
  • 14. The Compromise Between Desired End State & Operational Feasibility 17 WAN … “X” firewalls “X” + “1000 workloads vs A typical data center has: Directing all traffic (virtual + physical) through chokepoint firewalls is inefficient And a physical firewall per workload is cost prohibitive
  • 15. SDDC Virtualization Layer – Delivers Both Context and Isolation 18 Software Defined Data Center (SDDC) Any Application SDDC Platform Any x86 Any Storage Any IP network Data Center Virtualization High Context High Isolation Ubiquitous Enforcement SDDC Approach Secure Host Introspection
  • 16. Micro-segmentation with NSX SegmentationIsolation Advanced services Controlled communication path within a single network Advanced services: addition of 3rd party security, as needed by policy No communication path between unrelated networks 19
  • 17. Move from “Network Centric” to “Class Centric” Deployments 20 DMZ/Web VLAN App VLAN Class-A Class-B Services/Management VLAN DB VLAN Class-AClass-B Services Mgmt Class-A Class-B Perimeter firewall Inside firewall Perimeter firewall DMZ/Web App DB Class-A App DMZ/Web DB Class-B Services Mgmt Services/Management Group Traditional Data Center NSX Data Center CONFIDENTIAL
  • 18. FY16 House NDAA Report Cyber Defense Network Segmentation The committee is aware that the Department of Defense is looking at modifying the way it builds, maintains, and upgrades data center, including increased use of commercial cloud capabilities and public- private partnerships. The committee is aware that as the Department increasingly looks at software- defined networking, it could potentially reduce the mobility of cyber threats across data center and other networks by increasing the compartmentalization and segmentation between systems, and providing a mix of security techniques to enable access to those compartments. Such actions have the potential to lessen the chance of a widespread or catastrophic breach, including breaches caused by insider threats. The committee encourages the Department to explore ways to use compartmentalization or segmentation as part of a software-defined networking approach in order to increase the security of its networks. The Beginning of Policy Shifts….again
  • 19. Combining Organic Capabilities with Best of Breed across the Larger Ecosystem Apply and visualize security policies for workloads, in one place. Automate workflows across best-of-breed services, without custom integration. Provision and monitor uptime of different services, using one method. NSX Network Virtualization Platform Deploy Apply Automate Built-In Services Firewall Data Security (DLP) Server Activity Monitoring VPN (IPSEC, SSL) Third-Party Services Antivirus DLP Firewall Vulnerability Management Intrusion Prevention Identity and Access Mgmt …and more in progress Security Policy Management External Network VDS Guest VM Partner Service 1 VM Slot 2 Slot 4 Traffic Redirection Module Slot 5 Partner Service 2 VM
  • 20. High Scale NSX Topology • High scale multi-tenancy is enabled with multiple tiers of Edge interconnected via VxLAN transit uplink • Two tier Edges allow better scaling with administrative control based on traffic generated. • NSX Edge can scale up to 8 ECMP Edges for scalable routing • Support for overlapping IP addresses between Tenants connected to different first tier NSX Edges 23 External Network Tenant 1 Desktop Pool Logical Switch App LS DB LS … Desktop Pool Logical Switch Edge with HA NAT/LB features Single Adjacency to ECMP Edge ECMP Based NSX Edge X-Large (Route Aggregation Layer) ECMP NSX Edge VXLAN Uplinks VXLAN Uplinks VXLAN 5100 Transit App LS DB LS … E8E1
  • 21. • Automation, Automation, Automation • Brocade Workflow Composer • Cloud Management Platform - OpenStack on VMware (VIO) • Plan to integrate physical devices (IoT, Robotics, Weather Sensors, etc) into virtual cyberlab • Dynamic routing • Hardware VTEP to bridge VLAN to VXLAN • Integration with NSX and Palo Alto Networks Virtual FW • Leverage Public Cloud - Amazon AWS Plans for 2017 and beyond
  • 23. VMware Integrated OpenStack VMware Integrated OpenStack (VIO) VMware SDDC Standard OpenStack Nova Neutron Cinder Keystone HeatHorizon Ceilometer Glance • VIO is an “Integrated Product” Approach to OpenStack • Standard DefCore Compliant OpenStack Distribution (delivered as OVA) • Deploys & Manages Proven Production Architecture on VMware SDDC • Fully Supported by VMware VIO Management Server (Deploy, configure, patch, upgrade …OpenStack) vSphere NSX vSphere Datastores: 3rd-party / Virtual SAN
  • 24. The Need for a Comprehensive Security Solution VMware NSX Platform NSX Distributed Firewall VM level zoning without VLAN/VXLAN dependencies Line rate access control traffic filtering Distributed enforcement at Hypervisor level Palo Alto Networks Next Generation Security Next Generation Firewall Protection against known and unknown threats Visibility and safe application enablement User, device, and application aware policies Sophisticated Security Challenges Applications are not linked to port & protocols Distributed user and device population Modern Malware
  • 25. AWS Global Infrastructure VMware Cloud™ on AWS Powered by VMware Cloud Foundation 28 AWS Global InfrastructureCustomer Datacenter vSphere vSAN NSX TECHNICAL PREVIEW Operational Management Native AWS Services Amazon EC2 Amazon S3 Amazon RDS AWS Direct Connect AWS IAMAWS IoT … … … … vRealize Suite, vSphere Integrated Containers, ISV ecosystem Availability expected in mid-2017 timeframe Technical Preview vCentervCenter VMware CloudTM on AWS VMware vSphere-based service, running on the AWS Cloud • ESXi on Dedicated Hardware • Support for VMs and Containers • vSAN on Flash and EBS Storage • Replication and DR Orchestration • NSX Spanning on- premises and cloud • Advanced Networking & Security Services
  • 26.

Editor's Notes

  1. New Threats, New Approaches in Modern Data Centers Presented at CENIC conference 11:00 am - 12:00 pm, Wednesday, March 22, 2017 – in San Diego, California Edgar Mendoza, IT Specialist, Information Technology and Communications Services (ITACS) Naval Postgraduate School Eldor Magat, Computer Specialist, ITACS, Naval Postgraduate School Mike Monahan, Network Engineer, ITACS, Naval Postgraduate School Iben Rodriguez, Brocade Resident SDN Delivery Consultant, ITACS, Naval Postgraduate School Brian Recore, NSX Systems Engineer, VMware, Inc.
  2. Copied from the program with corrections - https://adobeindd.com/view/publications/b9fbbdf0-60f1-41dc-8654-3d2141b0bf54/nh4h/publication-web-resources/pdf/Conference_Agenda_2017_v1.pdf The standard approach to securing data centers has historically emphasized strong perimeter protection to keep threats on the outside of the network. However, this model is ineffective for handling new types of threats—including advanced persistent threats, insider threats, and coordinated attacks. A better model for data center security is needed: one that assumes threats can be anywhere and probably are everywhere and then, through automation, acts accordingly. Using micro-segmentation, fine-grained network controls enable unit-level trust, and flexible security policies can be applied all the way down to a network interface. In this joint presentation between customer, partner, and VMware, the fundamental tenants of micro-segmentation will be discussed. Presenters will describe how the Naval Postgraduate School has incorporated these principles into the architecture and design of a multi-tenant Cybersecurity Lab environment to deliver security training to national and international government personnel.
  3. from the NPS 2015 Annual Report
  4. https://my.nps.edu/web/ccw Many classes are using this lab with students from all over the world. The Center for Cyber Warfare (CCW) is an interdisciplinary problem solving research center in the Department of Electrical and Computer Engineering (ECE) at the Naval Postgraduate School (NPS) in Monterey, California. The CCW faculty work in collaboration with other universities and innovative commercial companies to deliver basic and applied research solutions to the Navy, U.S. government, DoD, and intelligence communities. Mission Approved by the NPS Research Board on October 5, 2009, the CCW conducts a mix of classified and unclassified research and offers unique educational programs designed to provide the modern warfighter with tactical and operational responses to immediate and anticipated threats in U.S. and allied cyber space.
  5. http://www.popularmechanics.com/flight/drones/news/a17371/record-breaking-drone-swarm/ http://nps.edu/About/News/NPS-Academic-Partners-Take-to-the-Skies-in-First-Ever-UAV-Swarm-Dogfight.html
  6. At one point the room with the servers got too hot and they had opened the windows. Wires were all over the place, cables not labeled. No structured cable management Even with UPS Battery backups there were extended power outages that caused system downtime due to lack of generator power. Lots of space and power used - 2 racks consolidated to 2U Hyper Converged Server Infrastructure with built-in software defined storage.
  7. At one point the room with the servers got too hot and they had opened the windows. Wires were all over the place, cables not labeled. - structured cable management Even with UPS Battery backups there were extended power outages that caused downtime. Now on generator. 2 racks consolidated to 2U Hyper Converged Server Infrastructure with built-in software defined storage. Amazon AWS design for NROTC Cyber Lab NSX – OSPF, DHCP, Firewall, Load Balancers Virtual appliances – Scalability, High Availability Centralized support with power, cooling Improved monitoring, physical, and operational security
  8. SDDC can span across multiple data centers and into hybrid service providers, independent of physical infrastructure
  9. Power NSX Orchestrator http://community.brocade.com/t5/Federal-Insights/CLI-is-Dead/ba-p/91358 Code NSX . com
  10. VMware Cloud on AWS will be powered by VMware Cloud Foundation™, a unified SDDC platform that integrates VMware vSphere, VMware Virtual SAN™ and NSX™ virtualization technologies, and will provide access to the broad range of AWS services, together with the functionality, elasticity, and security customers have come to expect from the AWS Cloud. Integrates VMware’s flagship compute, storage and network virtualization products (vSphere, VSAN and NSX) along with vCenter management, and optimizes it to run on next-generation, elastic, bare-metal AWS infrastructure. The result is a complete, no compromise, turn-key solution, that works seamlessly with both on-premises private clouds and advanced AWS Public Cloud services. VMware SDDC stack running on AWS Compute (vSphere), storage (VSAN), networking (NSX) Direct access to vCenter, including full API/CLI support Delivered as-a-service (VMware lifecycle fully managed) Access to AWS services Consistent operational model enables Hybrid Cloud Full support for existing and new applications Existing management tooling layers on top Hybrid and Cloud-only deployment options Leverage cloud economics, aligning capacity & demand Single bill for VMware software + AWS infrastructure Consume elastically scalable SDDC clusters On-demand or subscription Leverage global AWS footprint