Managing Cloud Security: Intrusion Detection Services in a Public Cloud

1,577 views

Published on

RightScale Conference Santa Clara 2011 - With the rapid growth of online commerce, the challenge to secure and monitor internal and customer-facing websites, card processing systems and other critical infrastructure has never been greater. Deploying full-featured intrusion detection in a public cloud has been challenging – the network models and multi-tenancy of public clouds do not make deep network services easy to deploy. Ed Laczynski, VP of Cloud Strategy and Architecture at Datapipe, will demonstrate a working IDS solution in a public cloud.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,577
On SlideShare
0
From Embeds
0
Number of Embeds
172
Actions
Shares
0
Downloads
64
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Managing Cloud Security: Intrusion Detection Services in a Public Cloud

  1. 1. Managing Cloud Security:Intrusion Detection Services in aPublic Cloud
  2. 2. Datapipe Cloud Services Stack 2
  3. 3. Comprehensive Security IDS 2 Factor Authentication “Strong security controls are a Vulnerability Scanning requirement for many mission-critical IT Integrity Monitoring workloads. Customers demand that service providers Configuration Assessment (Tripwire) address security as they move Firewall IT infrastructure to fully elastic public cloud environments” Antivirus Web Application Firewall - Joel Friedman, Datapipe CSO TDE – Transparent Database Encryption 3
  4. 4. Broad Cloud Adoption: Inhibitors 4
  5. 5. Public Cloud Security ComplexitySecurity solutions must be built specifically for public cloud elastic scaling utility virtualized pricing computing PUBLIC CLOUD SECURITY REQUIREMENTS managed management operations automation third-party self-service ownership provisioning Page 5 5
  6. 6. Alert Logic for Amazon EC2 Enabling: IDS for LM for VA for • Traffic monitoring via Cloud Cloud Cloud software-based network taps • Log collection via a software agents • Virtual appliances based data collection Virtual Appliances & Host Agents • Host agents that continuously track the state of monitored instances • Automated software and configuration Management API deployment via internal management APIs • Multi-tenant aware provisioning API for integration with service provider Provisioning API Provides: • Auto-scaling by tracking IP addresses of protected hosts • Load balancing & fail over between appliances • Transport-level data encryption • Centralized resource authorization via certificates for Amazon Web Services Page 6
  7. 7. Datapipe IDS for EC2: Setup Process API TM LM SOC Integration UI CMSDeploy certificates + + +Install softwarepackages andvirtual appliances VPN Transport
  8. 8. Components Customer EC2 Environment Collection/Cloud Management System Security Portal Incident 8
  9. 9. Attack Scenario Attacker (me) VPN Transport 9
  10. 10. Sample Footer Here10
  11. 11. 11

×