migrating and managing security policies in a segmented data center

53
MIGRATING & MANAGING SECURITY POLICIES IN A SEGMENTED DATA CENTER AVISHAI WOOL, CTO

Upload: algosec

Post on 22-Jan-2018

162 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Migrating and Managing Security Policies in a Segmented Data Center

MIGRATING & MANAGING SECURITY POLICIES IN A SEGMENTED DATA CENTER

AVISHAI WOOL, CTO

Page 2: Migrating and Managing Security Policies in a Segmented Data Center

TOPICS COVERED

Defining and enforce security policies for East-West traffic

Managing micro-segmented data center alongside traditional devices

01

02

03

Migrating applications to a micro-segmented data center

Identify risk and manage compliance04

Q&A and Summary05

2

Page 3: Migrating and Managing Security Policies in a Segmented Data Center

THE BASICS

3

Page 4: Migrating and Managing Security Policies in a Segmented Data Center

LEGACY DATA CENTER ARCHITECTURE

Users Servers

Outside World,

Business partners,

Perimeter

Firewall

East-West traffic North-South traffic

4

Page 5: Migrating and Managing Security Policies in a Segmented Data Center

WHY THIS IS RISKY

• No filtering capabilities controlling east-west traffic

• Allows unrestricted traffic:• Between internal users’ desktops/laptops and servers

• Between servers in different segments

• Once attackers gain a foothold – free lateral movement

5

Page 6: Migrating and Managing Security Policies in a Segmented Data Center

SEGMENTED DATA CENTER ARCHITECTURE

Users

Zone

Server

Zone 2 Outside World,

Business partners,

Perimeter

FirewallServer

Zone 1

6

Page 7: Migrating and Managing Security Policies in a Segmented Data Center

SEGMENTED = MORE SECURE

• Introduce filtering choke-points between zones

• Allows control of east-west traffic

• Lets organizations restrict lateral movement between zones

• How can we make this a reality?

7

Page 8: Migrating and Managing Security Policies in a Segmented Data Center

Which Platform Do You Use To Manage Your Private Cloud / Virtualized Data Center?• Vmware NSX• Cisco ACI• Microsoft Hyper-V• Other• We Don't Have A Virtualized Data Center

POLL

Please vote using the “votes from audience” tab in your BrightTALK panel

8

Page 9: Migrating and Managing Security Policies in a Segmented Data Center

SEGMENTATION CHALLENGES

9

Page 10: Migrating and Managing Security Policies in a Segmented Data Center

CHALLENGE #1: INTRODUCING CHOKE POINTS

• In the traditional data center: a major effort• Hardware, cabling, reconfigure switching and routing

• In a virtualized, software-defined, data center:• Built-in firewalls as part of the infrastructure

• No extra hardware needed

• Software-Defined Networking ✓

10

Page 11: Migrating and Managing Security Policies in a Segmented Data Center

CHALLENGE #2: ZONING

• How many zones to define?

• Which subnets should reside in each zone?

11

Page 12: Migrating and Managing Security Policies in a Segmented Data Center

A ZONING TRADE-OFF

• Traffic inside each zone remains unrestricted• For better security, define many small zones

• “Micro-segmentation”

• But: need policy (rules) between every pair of zones • “Allow service X from zone 1 to zone 2”

• N zones ==> N*N traffic directions

• For better manageability, define a few large zones

12

Page 13: Migrating and Managing Security Policies in a Segmented Data Center

CHALLENGE #3: FILTERING POLICY BETWEEN ZONES

• Traffic inside each zone is unfiltered: allowed

• … traffic between zones must be explicitly allowed by policy

• Goal: write policy to allow legitimate zone-crossing traffic

• Challenge: discover and characterize this traffic

• Did you know: VMware NSX’s default policy is “allow all” • Works around the challenge• … But is completely insecure

13

Page 14: Migrating and Managing Security Policies in a Segmented Data Center

APPLICATION-AWARE SEGMENTATION

14

Page 15: Migrating and Managing Security Policies in a Segmented Data Center

THE BUSINESS-APPLICATION PERSPECTIVE

• East-West traffic is generated by business applications

• Each business application has:• Servers supporting it

• Clients accessing it

• Business application connectivity requirements:• Server-to-server traffic flows

• Client-to-server traffic flows

15

Page 16: Migrating and Managing Security Policies in a Segmented Data Center

SEGMENTATION FOR BUSINESS APPLICATIONS

• Human-accessible systems: in a separate zone from servers:• Desktops / Laptops / Smartphones

• Servers belonging to an application, that communicate with each other:• in same zone

• Infrastructure servers, that support multiple applications: • in a dedicated zone

16

Page 17: Migrating and Managing Security Policies in a Segmented Data Center

PLANNING NETWORK SEGMENTATION: BLUEPRINT

• Discover business applications’ connectivity requirements

• Select number of zones, and their characterization

• Based on applications’ flows, assign subnets to zones

• Write filtering policy (rules) allowing zone-crossing flows• Avoid breaking business applications’ connectivity

17

Page 18: Migrating and Managing Security Policies in a Segmented Data Center

DISCOVERY

18

Page 19: Migrating and Managing Security Policies in a Segmented Data Center

IS YOUR ORGANIZATION WELL-DISCIPLINED?

If:

• All applications are documented

• Applications’ connectivity requirements are documented

• Documentation is machine readable

Then “discovery” is easy!

• What if documentation is missing / outdated ?

✓✓✓

19

Page 20: Migrating and Managing Security Policies in a Segmented Data Center

DISCOVERY FROM TRAFFIC

20

Page 21: Migrating and Managing Security Policies in a Segmented Data Center

DISCOVERY RESULTS: ANALYTICS ON SNIFFED TRAFFIC

2121

Page 22: Migrating and Managing Security Policies in a Segmented Data Center

ZONE-CROSSING TRAFFIC: HIGH LEVEL POLICY

22

Page 23: Migrating and Managing Security Policies in a Segmented Data Center

DOCUMENT: THE CONNECTIVITY MATRIX

Allowed traffic between every pair of zones

2323

Page 24: Migrating and Managing Security Policies in a Segmented Data Center

ZOOM IN: FROM/TO THE PEER DMZ

24

Page 25: Migrating and Managing Security Policies in a Segmented Data Center

DEMONSTRATION OF MICRO-SEGMENTATION WITH ALGOSEC

25

Page 26: Migrating and Managing Security Policies in a Segmented Data Center

IMPORT INTO BUSINESSFLOW

2626

Page 27: Migrating and Managing Security Policies in a Segmented Data Center

2727

Page 28: Migrating and Managing Security Policies in a Segmented Data Center

2828

Page 29: Migrating and Managing Security Policies in a Segmented Data Center

29

Page 30: Migrating and Managing Security Policies in a Segmented Data Center

30

Page 31: Migrating and Managing Security Policies in a Segmented Data Center

31

Page 32: Migrating and Managing Security Policies in a Segmented Data Center

VISIBILITY

32

Page 33: Migrating and Managing Security Policies in a Segmented Data Center

33

Page 34: Migrating and Managing Security Policies in a Segmented Data Center

34

Page 35: Migrating and Managing Security Policies in a Segmented Data Center

Enforcing Micro Segmentation

35

Page 36: Migrating and Managing Security Policies in a Segmented Data Center

36

Page 37: Migrating and Managing Security Policies in a Segmented Data Center

3737

Page 38: Migrating and Managing Security Policies in a Segmented Data Center

MAINTENANCE OF THE SEGMENTATION

38

Page 39: Migrating and Managing Security Policies in a Segmented Data Center

MAINTENANCE OF THE SEGMENTATION

• Zoning remains stable over time

• … but application connectivity requirements evolve

• … so filtering policies need to change over time

• Need application-aware and segmentation-aware change management processes

• Need visibility that filtering policies comply with zoning

39

Page 40: Migrating and Managing Security Policies in a Segmented Data Center

40

Page 41: Migrating and Managing Security Policies in a Segmented Data Center

CONNECTIVITY SPREADSHEET

41

Page 42: Migrating and Managing Security Policies in a Segmented Data Center

4242

Page 43: Migrating and Managing Security Policies in a Segmented Data Center

SEGMENTATION-AWARE CHANGE PROCESS

43

Page 44: Migrating and Managing Security Policies in a Segmented Data Center

NORTH-SOUTH TRAFFIC

• Hybrid network: • Software-defined data center

• traditional networking outside data center

• Application connectivity is also north-south

• Goal: Single change workflow for all filtering technologies

44

Page 45: Migrating and Managing Security Policies in a Segmented Data Center

• Identical for North-South and East-West• Indifferent to network technology• Abstracts away filtering device details

45

Page 46: Migrating and Managing Security Policies in a Segmented Data Center

• Outside data center (traditional)

46

Page 47: Migrating and Managing Security Policies in a Segmented Data Center

• Inside data center (virtualized)

47

Page 48: Migrating and Managing Security Policies in a Segmented Data Center

48

Page 49: Migrating and Managing Security Policies in a Segmented Data Center

• AlgoSec Standard risks +• User-defined risks +• Connectivity spreadsheet violations

• What-if risk check, before changes are implemented

49

Page 50: Migrating and Managing Security Policies in a Segmented Data Center

What are your plans for filtering east-west traffic?• Already implemented• Planning to implement over the next 6 months• Planning to implement over the next 6-12

months• No plans

POLL

Please vote using the “votes from audience” tab in your BrightTALK panel

50

Page 51: Migrating and Managing Security Policies in a Segmented Data Center

SUMMARY

Plan

• Discover business applications’ connectivity requirements

• Design zoning, write policy for zone-crossing flows

• Document in connectivity matrix

Maintain

• Visibility, automated comparison to connectivity matrix

• Segmentation-aware change process

51

Page 52: Migrating and Managing Security Policies in a Segmented Data Center

MORE RESOURCES

www.algosec.com/resources

WHITEPAPERS

Prof Wool CoursesDATASHEET

52