implicit deny: building transparent pervasive data center...

14
© 2015 VMware Inc. All rights reserved. Implicit Deny: Building Transparent Pervasive Data Center Security Osama I. Al-Dosary ([email protected]) Business Solutions Executive, MENA Cloud Networking and Security

Upload: others

Post on 25-May-2020

14 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Implicit Deny: Building Transparent Pervasive Data Center ...cdn-cms.f-static.com/uploads/164655/normal_59086e0fedd17.pdf · Security via Intelligent Grouping . Operating System

© 2015 VMware Inc. All rights reserved.

Implicit Deny: Building Transparent Pervasive Data Center Security

Osama I. Al-Dosary ([email protected]) Business Solutions Executive, MENA Cloud Networking and Security

Page 2: Implicit Deny: Building Transparent Pervasive Data Center ...cdn-cms.f-static.com/uploads/164655/normal_59086e0fedd17.pdf · Security via Intelligent Grouping . Operating System

Data Center Security Challenge

Page 3: Implicit Deny: Building Transparent Pervasive Data Center ...cdn-cms.f-static.com/uploads/164655/normal_59086e0fedd17.pdf · Security via Intelligent Grouping . Operating System

Modern Attack: Targeted, Interactive, Stealthy

Stop Infiltration 80% of the investment

is focused on preventing intrusion

The attack surface is

simply too wide

Stop Exfiltration 20% of the investment is focused on

addressing propagation, extraction and exfiltration.

Organizations lack the visibility and control

inside their data center

Intrusion Propagation Extraction Exfiltration

Page 4: Implicit Deny: Building Transparent Pervasive Data Center ...cdn-cms.f-static.com/uploads/164655/normal_59086e0fedd17.pdf · Security via Intelligent Grouping . Operating System

The Problem: Perimeter Centric Security

IT Spend Security Spend Security Breaches

Today’s security model focuses on perimeter defense. Provides no protection inside the security zone/subnet.

But continued security breaches show this model is not enough

Page 5: Implicit Deny: Building Transparent Pervasive Data Center ...cdn-cms.f-static.com/uploads/164655/normal_59086e0fedd17.pdf · Security via Intelligent Grouping . Operating System

Solution: Virtual Networking and Security Transparent, pervasive and logical security backplane

Page 6: Implicit Deny: Building Transparent Pervasive Data Center ...cdn-cms.f-static.com/uploads/164655/normal_59086e0fedd17.pdf · Security via Intelligent Grouping . Operating System

Logical Networking through Software Constructs

Web Tier

App Tier

DB Tier

All

Sof

twar

e C

onst

ruct

Physical Network

Precision Insertion of Network and Security

services {INSERT ANYWHERE}

Page 7: Implicit Deny: Building Transparent Pervasive Data Center ...cdn-cms.f-static.com/uploads/164655/normal_59086e0fedd17.pdf · Security via Intelligent Grouping . Operating System

Security via Intelligent Grouping Operating System

Machine Name

Application Tier

Services

Security Posture

Regulatory Requirements

• Create custom logical groups that match security requirements, beyond physical location

• Attached policies to logical groups

• Policies can be dynamically generated as threats detected

Page 8: Implicit Deny: Building Transparent Pervasive Data Center ...cdn-cms.f-static.com/uploads/164655/normal_59086e0fedd17.pdf · Security via Intelligent Grouping . Operating System

Logical Distributed Data Center Networking Logical policies are distributed, created once, exists everywhere

Policy moves with VM anywhere even to other DC or to Public Cloud (Amazon, Rackspace, Azure, Google Cloud, Savvis, etc.)

Page 9: Implicit Deny: Building Transparent Pervasive Data Center ...cdn-cms.f-static.com/uploads/164655/normal_59086e0fedd17.pdf · Security via Intelligent Grouping . Operating System

Virtual Networking and Security Results

Page 10: Implicit Deny: Building Transparent Pervasive Data Center ...cdn-cms.f-static.com/uploads/164655/normal_59086e0fedd17.pdf · Security via Intelligent Grouping . Operating System

Micro Segmentation L3 Perimeter Only Security Pervasive Security

Page 11: Implicit Deny: Building Transparent Pervasive Data Center ...cdn-cms.f-static.com/uploads/164655/normal_59086e0fedd17.pdf · Security via Intelligent Grouping . Operating System

Applying Logical and Intelligent Security

DMZ/Web VLAN

App VLAN

HR

Finance

Services/Mgmt VLAN

DB VLAN

HR Finance

Services Mgmt

Finance HR

Outer firewall

Inner firewall DMZ/Web

App

DB

HR Group

App

DMZ/Web

DB

Finance Group

Services Mgmt

Services/Management Group

Traditional Data Center Network Virtualized Data Center

Each VM can now be its own perimeter Policies align with logical groups

Control communication within a single VLAN Simplifying network security

Outer firewall

Page 12: Implicit Deny: Building Transparent Pervasive Data Center ...cdn-cms.f-static.com/uploads/164655/normal_59086e0fedd17.pdf · Security via Intelligent Grouping . Operating System

Isolation and Controlled Dynamic Service Insertion Isolation

No communication path between unrelated

networks

Segmentation

Controlled communication path within a single

network

Advanced services

Advanced services: addition of 3rd party

security, as needed by policy

Page 13: Implicit Deny: Building Transparent Pervasive Data Center ...cdn-cms.f-static.com/uploads/164655/normal_59086e0fedd17.pdf · Security via Intelligent Grouping . Operating System

Growing Adoption A rapid journey of customer adoption across industries

2000+ Customers 100% YoY growth Consistent year-to-year

Page 14: Implicit Deny: Building Transparent Pervasive Data Center ...cdn-cms.f-static.com/uploads/164655/normal_59086e0fedd17.pdf · Security via Intelligent Grouping . Operating System

Thank You