Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers

Similar documents
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Segmentation. Threat Defense. Visibility

Data Center Security. Fuat KILIÇ Consulting Systems

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

SDN Security BRKSEC Alok Mittal Security Business Group, Cisco

Get Your Datacenter SDN Ready. Ahmad Chehime Cisco ACI Strategic Product Sales Specialist SPSS Emerging Region

Title DC Automation: It s a MARVEL!

Cisco CloudCenter Solution with Cisco ACI: Common Use Cases

Cisco Cloud Application Centric Infrastructure

The Next Opportunity in the Data Centre

Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC)

SECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011

Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales

Agile Security Solutions

Key Security Measures to Enable Next-Generation Data Center Transformation

Cisco SDN 解决方案 ACI 的基本概念

Intuit Application Centric ACI Deployment Case Study

SYMANTEC DATA CENTER SECURITY

Cisco Virtual Networking Solution Nexus 1000v and Virtual Services. Abhishek Mande Engineer

Network Virtualization Business Case

Cisco Unified Data Center Strategy

The threat landscape is constantly

Securing the Software-Defined Data Center

Cloud Native Security. OpenShift Commons Briefing

F5 Synthesis Information Session. April, 2014

Cisco Firepower NGFW. Anticipate, block, and respond to threats

The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec

The Need In today s fast-paced world, the growing demand to support a variety of applications across the data center and help ensure the compliance an

Cisco Cloud Architecture with Microsoft Cloud Platform Peter Lackey Technical Solutions Architect PSOSPG-1002

Service Insertion with ACI using F5 iworkflow

Service Provider Security Architecture

Hybrid Cloud Solutions

2018 Cisco and/or its affiliates. All rights reserved.

Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack

Osynlig infrastruktur i datacentret med inbyggd säkerhet och resursoptimering.

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Passit4Sure (50Q) Cisco Advanced Security Architecture for System Engineers

Building Private Cloud Infrastructure

Cisco Enterprise Cloud Suite Overview Cisco and/or its affiliates. All rights reserved.

VM-SERIES FOR VMWARE VM VM

AWS Reference Design Document

A Unified Threat Defense: The Need for Security Convergence

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Cisco Next Generation Firewall and IPS. Dragan Novakovic Security Consulting Systems Engineer

5 STEPS TO BUILDING ADVANCED SECURITY IN SOFTWARE- DEFINED DATA CENTERS

The Internet of Everything is changing Everything

1V0-642.exam.30q.

WHITE PAPER OCTOBER VMWARE NSX WITH CHECK POINT vsec. Enhancing Micro-Segmentation Security

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Advanced threats. "Software defined" everything. Internet of Things. SDDC/Cloud. HTTP is the new TCP. Mobile. F5 Networks, Inc 2

Data Center and Cloud Automation

Cisco Tetration Analytics

Next generation branch with SD-WAN and NFV

Resilient WAN and Security for Distributed Networks with Cisco Meraki MX

Orchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud

A10 HARMONY CONTROLLER

Virtual Security Gateway Overview

Cisco HyperFlex and the F5 BIG-IP Platform Accelerate Infrastructure and Application Deployments

Cisco ONE Software BRKRST Dan Lohmeyer Senior Director, Software Strategy and Operations

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

Stopping Advanced Persistent Threats In Cloud and DataCenters

Securing Your Amazon Web Services Virtual Networks

Cisco ONE Enterprise Cloud Suite

NGFWv & ASAv in Public Cloud (AWS & Azure)

Cisco Network Admission Control (NAC) Solution

Oracle IaaS, a modern felhő infrastruktúra

Automate Application Deployment with F5 Local Traffic Manager and Cisco Application Centric Infrastructure

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

The Software Driven Datacenter

Simplify and automate your network with Cisco DNA

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video

Cisco Application Centric Infrastructure Roadshow. Wednesday, 2. April 14

21CTL Disaster Recovery, Workload Mobility and Infrastructure as a Service Proposal. By Adeyemi Ademola E. Cloud Engineer

Security for the Cloud Era

The Why, What, and How of Cisco Tetration

Network Automation and Branch Agility The Network Helps Enable Digital Business. Rajinder Singh Product Sales Specialist June 2016

Securing Cisco s Network

Rethinking Security CLOUDSEC2016. Ian Farquhar Distinguished Sales Engineer Field Lead for the Gigamon Security Virtual Team

Cisco UCS Director and ACI Advanced Deployment Lab

Cisco Cloud Services Router 1000V with Cisco IOS XE Software Release 3.13

Security for shared infrastructure in Cisco ONE Enterprise Cloud Suite BRKPCA-2040

Cisco SD-WAN and DNA-C

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Module Day Topic. 1 Definition of Cloud Computing and its Basics

CloudVision Macro-Segmentation Service

Cisco Virtual Security Gateway (VSG) Mohammad Salaheldin

What s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics

The Cisco HyperFlex Dynamic Data Fabric Advantage

PROTECT WORKLOADS IN THE HYBRID CLOUD

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Orchestration: Accelerate Deployments and Reduce Operational Risk. Nathan Pearce, Product Development SA Programmability & Orchestration Team

F5 Demystifying Network Service Orchestration and Insertion in Application Centric and Programmable Network Architectures

Cisco Security Manager 4.1: Integrated Security Management for Cisco Firewalls, IPS, and VPN Solutions

Borderless Networks. Tom Schepers, Director Systems Engineering

Cisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018

CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING

Design Guide for Cisco ACI with Avi Vantage

Data Center 3.0: Transforming the Data Center via the Network

How to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud

Transcription:

Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers Speaker: Mun Hossain Director of Product Management - Security Business Group Cisco Twitter: @CiscoDCSecurity

2

Any Device to Any Cloud PUBLIC CLOUD HYBRID CLOUD PRIVATE CLOUD 3

Enterprise Response Antivirus (Host-Based) IDS/IPS (Network Perimeter) Reputation (Global) and Sandboxing Intelligence and Analytics (Cloud) Worms and Viruses Spyware and Rootkits APTs and Cyberware Increased Attack Surface Threats 2000 2005 2010 Tomorrow 4

The Advanced Attack Lifecycle PLAN EXPLOIT / ATTACK INFECT / SPREAD STEAL / DISRUPT HACKER Attacker determines possible entry points, formulates a plan of attack Attacker exploits vulnerabilities and delivers its weapon Malware moves laterally through the internal network in search of additional resources and data Attacker takes action on its objectives and exfiltrates data or disrupts systems 5

Your Biggest Security Challenges Maintain Security and Compliance as business models change (Agility) Stay ahead of the threat landscape Reduce complexity and fragmentation of security solutions 6

Today s Security is Complex and Fragmented WWW CSR ASR SP-1 WWW Global Orchestration WWW CSR SP-2 Multiple Management Paradigms Multiple Identity Stores Isolated Threat Intelligence Inconsistent Enforcement 7

Implications for Security Process and Technology BEFORE See it, Control it DURING Intelligent & Context Aware AFTER Retrospective Security Defending Attacks Discovering/Catching Attacks Remediating Attacks Network Endpoint Mobile Virtual Cloud 8

Security Functions Mapped to Security Process BEFORE See it, Control it DURING Intelligent & Context Aware AFTER Retrospective Security Defending Attacks Discovering/Catching Attacks Remediating Attacks FIREWALL IPS MALWARE PROTECTION VPN WWW WEB NETWORK ANALYSIS CONTEXT EMAIL 9

Security Functions in the Data Center Traditional Firewall Functions VPN Functions Context Aware Functions IPS Functions Web Functions WWW 10

Key Trends for Security in the Data Center Scale: Need for policy enforcement for high speed networks Resiliency: High availability is imperative for applications Expanded Deployment Options: Policy enforcement on inter-dc traffic Segmentation: Policy between specific groups, users, or applications Contextual Analysis: Global and local threat correlation Virtualization: Security for east-west traffic in multi-hypervisor environments 11

Key Trends for Security in the Data Center Scale: Need for policy enforcement for high speed networks Resiliency: High availability is imperative for applications Expanded Deployment Options: Policy enforcement on inter-dc traffic Segmentation: Policy between specific groups, users, or applications Contextual Analysis: Global and local threat correlation Virtualization: Security for east-west traffic in multi-hypervisor environments 12

TOTAL THROUGHPUT CONCURRENT CONNECTIONS CONNECTIONS / SEC Data Center Scale POWER & SPACE 2013 Cisco and/or its affiliates. All rights reserved. 13

Key Trends for Security in the Data Center Scale: Need for policy enforcement for high speed networks Resiliency: High availability is imperative for applications Expanded Deployment Options: Policy enforcement on inter-dc traffic Segmentation: Policy between specific groups, users, or applications Contextual Analysis: Global and local threat correlation Virtualization: Security for east-west traffic in multi-hypervisor environments 14

Network Integrated Clustering & Resiliency Integration with DC Switches Technology Integration with VSS, vpc and Fabric Path Benefit Ease of Deployment Solves Asymmetric Traffic Clustered Security Services Using N+1 HA Consistent Scaling Factor Pay as You Grow FW, VPN, IPS Services Linear, Predictable Performance Increase Only Buy What You Need Compliance and Security 15

Key Trends for Security in the Data Center Scale: Need for policy enforcement for high speed networks Resiliency: High availability is imperative for applications Expanded Deployment Options: Policy enforcement on inter-dc traffic Segmentation: Policy between specific groups, users, or applications Contextual Analysis: Global and local threat correlation Virtualization: Security for east-west traffic in multi-hypervisor environments 16

Symmetric Traffic Patterns in the Data Center Inside Network Outside Network Client Server Security Services Cluster 17

Symmetric Traffic Patterns in the Data Center Inside Network Outside Network Client Server Security Services Cluster 18

Symmetric Traffic Patterns in the Data Center Inside Network Outside Network Client Server Security Services Cluster 19

Asymmetric Traffic Patterns in the Data Center Owner Inside Network Outside Network Client Director Server Forwarder Security Services Cluster 20

Asymmetric Traffic Patterns in the Data Center Owner Inside Network Outside Network Client Director Server Forwarder Security Services Cluster 21

EXPANDING SECURITY BETWEEN DATA CENTERS Use Cases Disaster Recovery Power outage, catastrophic failure Follow the sun operations Optimization of resources Dynamic Load Distribution Dealing with traffic bursts

EXPANDING SECURITY BETWEEN DATA CENTERS Infrastructure Demands Traditional Approach Optimized Approach Simplicity Over- provisioned HW Workload mobility Low Latency High Scale High Availability Manual traffic engineering Static, external stateless LB Siloed HA at different sites no sharing of info Optimize traffic flows to minimize latency Security state maintained with application mobility via CCL Persistent security HA across DC

Key Trends for Security in the Data Center Scale: Need for policy enforcement for high speed networks Resiliency: High availability is imperative for applications Expanded Deployment Options: Policy enforcement on inter-dc traffic Segmentation: Policy between specific groups, users, or applications Contextual Analysis: Global and local threat correlation Virtualization: Security for east-west traffic in multi-hypervisor environments 24

Unified Context & Network Control TrustSec +ASA TrustSec Overview TrustSec lets you define policy in meaningful business terms Context Classification Business Policy TAG Security Group Tag Destination Source Exec PC Prod HRMS HR Database HR Database Prod HRMS Storage Exec BYOD X X X X X X Distributed Enforcement throughout Network Switch Router DC FW DC Switch 25

Key Trends for Security in the Data Center Scale: Need for policy enforcement for high speed networks Resiliency: High availability is imperative for applications Expanded Deployment Options: Policy enforcement on inter-dc traffic Segmentation: Policy between specific groups, users, or applications Contextual Analysis: Global and local threat correlation Virtualization: Security for east-west traffic in multi-hypervisor environments 26

Turning Big Data into Threat Intelligence SECURITY SENSOR BASE Broadest range of threat & vulnerability data sources THREAT ANALYTICS Global and local correlation through analytics and human intelligence INTELLIGENCE DELIVERED Contextual Policy with Distributed Enforcement 100TB Context for Data Common Filtration Security Intelligence Policy 150M Faster Heuristics Deployed Threat Engines Detection Endpoints Global Real 13B Time & Local Appliance Data Web Updates Correlation Requests 14M Self- Remediate Learning Deployed Dynamically Algorithms Access Gateways 93B Threat Trust Prevention Daily Modeling Email By Messages Network 1.6M Perimeter Deployed Human & Cloud Research Delivered Security Devices 27

Key Trends for Security in the Data Center Scale: Need for policy enforcement for high speed networks Resiliency: High availability is imperative for applications Expanded Deployment Options: Policy enforcement on inter-dc traffic Segmentation: Policy between specific groups, users, or applications Contextual Analysis: Global and local threat correlation Virtualization: Security for east-west traffic in multi-hypervisor environments 28

TRAFFIC TRENDS IN DATA CENTER 76 % 17 % 7% East West Traffic North South Traffic Inter-DC Traffic Source: Cisco Global Cloud Index 2012 by destination

TRADITIONAL APPROACH TO TRAFFIC TRENDS DC Core DC Aggregation DC Access Infrastructure Traditional Demands Policy for North-South Approach traffic enforced by firewalls Insert East-West Services Need for Scale Diverse Users/Devices Rapid Provisioning Traffic Hairpinning Over-provision HW Inspection of inter-vm Rules East-West traffic Explosion requires complex traffic steering Manual & Fragmented VM VM VM VM VM VM VM VM

APPLICATION TRENDS IN DATA CENTER DYNAMIC WORKLOADS Dynamic Instantiation/Removal Decommission Instantiate Migrate existing new VM HETERGENEOUS IMPLEMENTATION Physical & Virtual DISTRIBUTED DEPLOYMENTS On-Demand Scaling INFRASTRUCTURE INDEPENDENT Transparent to Underlying Network CLOUD-AWARE Migration across public/private clouds

APPLICATION TRENDS IN DATA CENTER DYNAMIC WORKLOADS Dynamic Instantiation/Removal Applications on both physical & virtual HETERGENEOUS IMPLEMENTATION Physical & Virtual DISTRIBUTED DEPLOYMENTS On-Demand Scaling INFRASTRUCTURE INDEPENDENT Transparent to Underlying Network CLOUD-AWARE Migration across public/private clouds The adoption rate of server virtualization will reach 21.3% of total servers in 2016.

APPLICATION TRENDS IN DATA CENTER DYNAMIC WORKLOADS Dynamic Instantiation/Removal New Applications, Devices & Users HETERGENEOUS IMPLEMENTATION Physical & Virtual DISTRIBUTED DEPLOYMENTS On-Demand Scaling INFRASTRUCTURE INDEPENDENT Transparent to Underlying Network CLOUD-AWARE Migration across public/private clouds

APPLICATION TRENDS IN DATA CENTER DYNAMIC WORKLOADS Dynamic Instantiation/Removal oversubscribed underutilized Dynamically Shared Resource Pools HETERGENEOUS IMPLEMENTATION Physical & Virtual Silioed Resources DISTRIBUTED DEPLOYMENTS On-Demand Scaling INFRASTRUCTURE INDEPENDENT Transparent to Underlying Network optimized CLOUD-AWARE Migration across public/private clouds Shared Resource Pools

APPLICATION TRENDS IN DATA CENTER DYNAMIC WORKLOADS Dynamic Instantiation/Removal Secure Multi-tenant aware HETERGENEOUS IMPLEMENTATION Physical & Virtual DISTRIBUTED DEPLOYMENTS On-Demand Scaling INFRASTRUCTURE INDEPENDENT CLOUD-AWARE Transparent to Underlying Network Migration across public/private clouds Inter-DC By 2016, 66% of all workloads will be processed in the cloud CISCO GLOBAL CLOUD INDEX

KEY REQUIREMENTS TO ADDRESS DC TRENDS Simplified Provisioning Dynamic workloads Centralized Management Physical/Virtual agnostic Dynamic Scaling Dynamic On-Demand Physical + Virtual Location independent Centralized Management Centralized policy for network & security Rapid instantiation based on resource availability Automated Policy Management Dynamic ACL insertion / removal Open Architecture Hypervisor agnostic vswitch compatible Programmable API Multi-tenant aware Application aware 36

APPLICATION CENTRIC INFRASTRUCTURE ENABLING APPLICATION VELOCITY Nexus 9500 APIC Nexus 9300 and 9500 Physical Networking Hypervisors and Virtual Networking Compute L4 L7 Services Storage Multi DC WAN and Cloud Nexus 7K ASA Nexus 2K Integrated WAN Edge 37

CISCO S APPLICATION CENTRIC INFRASTRUCTURE SECURITY SOLUTION Transparent Integration of Security into Cisco s Application Centric Infrastructure Centralized Infrastructure with Automated Security Policy Management Elastic Scalability across Virtual and Physical Environments 38

ACI SECURITY SOLUTION STARTS WITH CISCO ASA VIRTUAL ASA PHYSICAL ASAv Full ASA Feature Set Hypervisor Independent Virtual Switch Agnostic Dynamic Scalability ASA 5585-X 16 Way Clustering with State Synchronization Scalable to 640Gbps 39

Application Centric Infrastructure Security Solution AUTOMATED PROVISIONING ASA WEB APP LB ASA LB LB APP APP APP DB Extensible Scripting Model CONNECTIVIT Y POLICY SLA QoS APIC SECURITY POLICIES Security Load Balancing QOS APPLICATIO N L4..7 SERVICES STORAGE AND COMPUTE APP PROFILE ASA HYPERVISOR HYPERVISOR HYPERVISOR ASA ASAv ASAv APP ASAv APP

Application Centric Infrastructure Security Solution DYNAMIC SCALING ASAv enforcing policy between App Tier & Web Tier ASAv enforcing policy between Apps inter-vm ASAv enforcing policy across web resource pool

Application Centric Infrastructure Security Solution AUTOMATED POLICY LIFECYCLE MANAGEMENT Marketing Connection accesses to App1 ACL for Firewall connection ACLs App Decommissioned 12 in Data Center Dynamically Connection Removed to App 12 Clients from Marketing Endpoint Group App Tier in DC permit tcp host 192.168.1.100 host 10.1.1.1 eq 80 permit tcp host 192.168.1.100 host 10.1.1.1 eq 443 permit tcp host 192.168.1.100 host 172.16.1.1 eq 80 permit tcp host 192.168.1.100 host 172.16.1.1 eq 443 permit tcp host 192.168.1.101 host 10.1.1.1 eq 80 permit tcp host 192.168.1.101 host 10.1.1.1 eq 443 permit tcp host 192.168.1.101 host 172.16.1.1 eq 80 permit tcp host 192.168.1.101 host 172.16.1.1 eq 443 192.168.1.0/24 (client 192.168.1.100) HTTP/HTTPS Servers (10.1.1.1, 172.16.1.1)

EVOLUTION OF VPN IN THE DATA CENTER Deployment Traditional Agility using HW VPN based in VPN ASAv SSL to Public Cloud Operational Impact MED IPSec to Data Center SSL to Private Cloud Deployment Complexity $$ IPSec to Teleworker IPSec to Remote Office Deployment Cost Wk Enterprises should expect an average yearly increase of ~20% in SSL traffic NSS Clientless SSL to Handheld Deployment Time

Application Centric Infrastructure Security Solution OPEN ARCHITECTURE Hypervisor Support Orchestration Frameworks Management System CSM PNSC READ / WRITE SOUTHBOUND API MULTI-TENANT AND APPLICATION AWARE PUBLISHED DEVICE MGMT PACKAGE FOR ACI STANDARDS COMPLIANT MONITORING FEATURES Built on top of Industry Leading Data Center Security Platform

CISCO SECURITY INTEGRATED INTO ACI PROVISIONING Simplified Service Chaining Dynamic Policy Management Rapid Instantiation PERFORMANCE On Demand Scalability Increased Clustering Size Multi-Site Clustering PROTECTION Integrated Security and Consistent Policy Enforcement (Physical & Virtual) Active Monitoring & Comprehensive Diagnostics for Threat Mitigation 45

The Network and Security: Synergies Drive Value Scales Enforcement Consistent, End-to-end Security Policy Enforcement Mobility and BYOD Accelerator / Enabler Network Accelerates Detection Security Aggregates Unique Context Data Center Service Clustering Delivers Unmatched Scale Automated Network Re-direction Rich Data Sets Accelerate Threat Detection 46

Twitter: @CiscoDCSecurity