SlideShare a Scribd company logo
1©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
Amit Schnitzer| Cloud Security Solution Expert, Checkpoint
Dr. Alexander Zimmermann | Cloud Architect, Accenture
MIGRATING YOUR DATACENTERS TO
AWS WITH AUTOMATED SECURITY
2©2018 Check Point Software Technologies Ltd.
CLOUD IS THE NEW NORM
3©2018 Check Point Software Technologies Ltd.
Companies want their cloud environments to be
Efficient Scalable Agile
And Secure!
4©2018 Check Point Software Technologies Ltd.
Legacy security architecture doesn’t work anymore
• Cloud applications are everywhere
perimeter security is not enough – we need
security inside the cloud
• Cloud applications are elastic
legacy security is static
• DevOps wants agile environment
security is a showstopper
5©2018 Check Point Software Technologies Ltd.
European power utility company
“In 5 years from now all our services and
application will be running on the cloud”
Client Facts
• Worldwide ~100.000 employees in 100+ locations
• Revenue: ~25 Bn EUR
• Migration drivers:
̶ Improve performance and availability of IT services
̶ Enhance cost control by standardization
̶ Reduce Time-To-Market
6©2018 Check Point Software Technologies Ltd.
CLIENT USE CASE
7©2018 Check Point Software Technologies Ltd.
Design principle: centralized multi-account approach
Application
Accounts
Application
Accounts
• Reducing the Blast Radius: Leveraging multiple AWS accounts to
reduce the blast radius by deploying only applications into one
account per region that belong together
• At least three account types: Next to the Billing Account at least one
account is to be used for the application and one for security isolation
 Main account is owned for example by the application team
 Another account is owned by the security team and is used for
audit and control access  control network connectivity to
Internet and premise data center
• AWS account size: The account segregation is chosen based on things
that are clearly separate. It can be either
 Single application per account, or
 Group of applications based on shared resources, similarity of
policies, or routing tables required to protect the account
Billing Account
Central Security
Account(s)
Datacenter
Application
Account(s)
Multiple AWS
accounts to
manage security
and reduce the
blast radius
8©2018 Check Point Software Technologies Ltd.
• Centralized DMZ Account: Controlling access
towards AWS platform by limiting access points
to one account
̶ Accounts that require access from the Public
Internet use a centralized DMZ Account for
ingress internet traffic
̶ The DMZ contains centrally administered
Check Point CloudGuard firewalls for
firewalling, URL filtering, and NAT
̶ DMZ VPC for productive workloads will be set
up high available
• Private accounts (Prod | QA | Dev): Private
application accounts have no Internet Gateway
and no VPC Peering to the DMZ  no access
from the Public Internet
Centralized DMZ account
DMZ Account
DMZ VPC for
Production (HA)
DMZ VPC for Dev
and QA (non HA)
Public
Production
Account
Public Internet
Public
QA
Account
Public
Developing
Account
Private
[Prod | QA | Dev]
Account
VPC PeeringInternet GatewayLegend:
9©2018 Check Point Software Technologies Ltd.
Application
Accounts
Application
Accounts
Transit
Account
On-Premise
Datacenter
Application
Accounts
MPLS
(AWS Direct
Connect)
Checkpoint
CloudGuard
VMs
Centralized Transit account
Public Internet
• The centralized Transit account is the only
possibility for applications to communicate to on
premise resources
• There is no way to bypass this account as it is the
only account where the MPLS terminate
• In the Transit account two Check Point
CloudGuard firewalls are in use
• Application accounts connect to the Transit
account via VPN connection utilizing AWS’ native
service “Virtual Private Gateway”
VPN Internet Gateway Virtual Private GatewayLegend:
10©2018 Check Point Software Technologies Ltd.
Application
Accounts
Application
Accounts
Transit
Account
On-Premise
Datacenter
Application
Accounts
Public Internet
MPLS
(AWS Direct
Connect)
VMs
Shared Services
Account
VPC Peering
Centralized Shared Services account
VPN Internet Gateway Virtual Private Gateway
• Although the Transit VPC can be classified as a
shared service, AWS recommends to use a
separate account – the Shared Services account
• This segregation i. a. improves network
connectivity and reduces network-transfer costs
• The objective of this account is to provide lower-
latency access to replicated services and proxy-
controlled access to on-premises resources
• Shared Services are offered to Application
accounts via VPC Peering, that enables you to
route traffic between each other as if they are
within the same network.
Legend:
Checkpoint
CloudGuard
Checkpoint
Management
11©2018 Check Point Software Technologies Ltd.
Application accounts
Availability Zone BAvailability Zone A
Application Tier
(Private Subnet)
Database Tier
(Private Subnet)
Presentation Tier
(“Public” or Private Subnet)
Application Tier
(Private Subnet)
Database Tier
(Private Subnet)
Presentation Tier
(“Public” or Private Subnet)
• To isolate various tiers of infrastructure, a three-
tier-architecture is used - public-facing web
applications in a Public Subnet and application
and database server hosted in Private Subnets.
• In standard configured Application accounts a
three-tier-architecture is always deployed in two
Availability Zones to offer High Availability by
design
Legend: VPC Router Virtual Private Gateway Internet Gateway [Public Accounts only]
13©2018 Check Point Software Technologies Ltd.
SECURITY BLUEPRINT FOR CLOUD ERA
16©2018 Check Point Software Technologies Ltd.
Spoke 1 Spoke 2 Spoke 3 Spoke N…
Check Point’s cloud security blueprint
17©2018 Check Point Software Technologies Ltd.
Spoke 1 Spoke 2 Spoke 3 Spoke N…
Check Point’s cloud security blueprint
18©2018 Check Point Software Technologies Ltd.
Northbound
Hub
Southbound Hub
Spoke 1 Spoke 2 Spoke 3 Spoke N…
Check Point’s cloud security blueprint
19©2018 Check Point Software Technologies Ltd.
Northbound
Hub
Southbound Hub
Spoke 1 Spoke 2 Spoke 3 Spoke N…
Check Point’s cloud security blueprint
20©2018 Check Point Software Technologies Ltd.
Northbound
Hub
Southbound Hub
Spoke 1 Spoke 2 Spoke 3 Spoke N…
Check Point’s cloud security blueprint
21©2018 Check Point Software Technologies Ltd.
Northbound
Hub
Southbound Hub
Spoke 1 Spoke 2 Spoke 3 Spoke N…
VPN
Check Point’s cloud security blueprint
22©2018 Check Point Software Technologies Ltd.
Putting all together…
DMZ
ServiceTransit
PROD
Workload
QA
Private QA Private Prod
Public QA
Public Prod
Internet gateway
VPC Peering
VPN gateway
VPN connection
Customer Gateway
Load Balancer
Direct Connect
Checkpoint
CloudGuard
Internet Egress
Internet Ingress
VPN Connection
Transit
VPC Peering SSC
Legend
On-Premise
Datacenter
Public Dev
Private Dev
23©2018 Check Point Software Technologies Ltd.
Live Demo
24©2018 Check Point Software Technologies Ltd.
Security Architecture that enables innovation
• Agile – new spokes created by DevOps will
automatically get protected
• Automatic – security architecture deployment
• Via AWS CloudFormation
• Via Azure solution templates
• In Control – Security admin gains full visibility for
east-west and north-south traffic
25©2018 Check Point Software Technologies Ltd.
Security architecture for Multi-Cloud environment
ACI
Unified management
• Securely connecting the clouds
with VPN
• Single access rule within a
unified policy which allows
seamless secure connectivity
across cloud environments
26©2018 Check Point Software Technologies Ltd.
This also works across cloud platforms
27©2018 Check Point Software Technologies Ltd.
Security Blueprint
Check Point CloudGuard Security architecture
• Empowers Innovation
• Enables fast & robust scalability
• Bringing clouds together securely
28©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
Amit Schnitzer| Cloud Security Solution Expert, Checkpoint
amitsc@checkpoint.com
Dr. Alexander Zimmermann | Cloud Architect, Accenture
Alexander.zimmermann@accenture.com
THANK YOU !
29©2018 Check Point Software Technologies Ltd.
CloudGuard at the glance
Cloud Security
Operation
Cloud Security
Blueprint
Cloud Cyber
Attacks
30©2018 Check Point Software Technologies Ltd.
Everybody is moving to the cloud
Companies cloud strategy
• Public cloud first
• Hybrid Cloud
• Multi-Clouds
31©2018 Check Point Software Technologies Ltd.
Security in the cloud
• Best effective protection from
modern attacks – regular access
control is not enough
• Adaptive security operation that
enables cloud innovation which
scales on demand
• Cloud security architecture that is
unified, efficient, agile, elastic and
robust

More Related Content

What's hot

Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?
Check Point Software Technologies
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
Moti Sagey מוטי שגיא
 
Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness
Moti Sagey מוטי שגיא
 
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- DetailedCheck Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
Moti Sagey מוטי שגיא
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
AlgoSec
 
Check Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast AgentCheck Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast Agent
MarketingArrowECS_CZ
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
Nattira Panbun
 
SACON - Devops-container (Richard Bussiere)
SACON - Devops-container (Richard Bussiere)SACON - Devops-container (Richard Bussiere)
SACON - Devops-container (Richard Bussiere)
Priyanka Aash
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
lior mazor
 
Security architecture proposal template
Security architecture proposal templateSecurity architecture proposal template
Security architecture proposal template
Moti Sagey מוטי שגיא
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey מוטי שגיא
 
BlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow upBlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat Security Conference
 
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
Cloud Native Day Tel Aviv
 
Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement
Moti Sagey מוטי שגיא
 
NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
Moti Sagey מוטי שגיא
 
Check point Infinity Overview
Check point Infinity OverviewCheck point Infinity Overview
Check point Infinity Overview
Moti Sagey מוטי שגיא
 
Ecosystem
EcosystemEcosystem
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
centralohioissa
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
VMUG IT
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
DevOps.com
 

What's hot (20)

Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness
 
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- DetailedCheck Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
Check Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast AgentCheck Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast Agent
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
 
SACON - Devops-container (Richard Bussiere)
SACON - Devops-container (Richard Bussiere)SACON - Devops-container (Richard Bussiere)
SACON - Devops-container (Richard Bussiere)
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
 
Security architecture proposal template
Security architecture proposal templateSecurity architecture proposal template
Security architecture proposal template
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal
 
BlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow upBlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow up
 
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
 
Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement
 
NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
 
Check point Infinity Overview
Check point Infinity OverviewCheck point Infinity Overview
Check point Infinity Overview
 
Ecosystem
EcosystemEcosystem
Ecosystem
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
 

Similar to Check Point and Accenture Webinar

Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013
Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013
Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013
Amazon Web Services
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud Adoption
MarketingArrowECS_CZ
 
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellersCloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Amazon Web Services
 
Cloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace SoftwareCloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace Software
Amazon Web Services
 
Smart Integration to the Cloud - Kellton Tech Webinar
Smart Integration to the Cloud - Kellton Tech WebinarSmart Integration to the Cloud - Kellton Tech Webinar
Smart Integration to the Cloud - Kellton Tech Webinar
Kellton Tech Solutions Ltd
 
Scaling Your SaaS with Analytics-Driven Insights and Wavefront Integrations f...
Scaling Your SaaS with Analytics-Driven Insights and Wavefront Integrations f...Scaling Your SaaS with Analytics-Driven Insights and Wavefront Integrations f...
Scaling Your SaaS with Analytics-Driven Insights and Wavefront Integrations f...
Amazon Web Services
 
Maximize the Capabilities of Oracle® Golden Gate: Replicate Data Bi-Direction...
Maximize the Capabilities of Oracle® Golden Gate: Replicate Data Bi-Direction...Maximize the Capabilities of Oracle® Golden Gate: Replicate Data Bi-Direction...
Maximize the Capabilities of Oracle® Golden Gate: Replicate Data Bi-Direction...
Equinix
 
ENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated Industries
Amazon Web Services
 
CNCF On-Demand Webinar_ LitmusChaos Project Updates.pdf
CNCF On-Demand Webinar_ LitmusChaos Project Updates.pdfCNCF On-Demand Webinar_ LitmusChaos Project Updates.pdf
CNCF On-Demand Webinar_ LitmusChaos Project Updates.pdf
LibbySchulze
 
Is Citrix Cloud Enterprise Ready? Best Practices to Get the Most Out of Citri...
Is Citrix Cloud Enterprise Ready? Best Practices to Get the Most Out of Citri...Is Citrix Cloud Enterprise Ready? Best Practices to Get the Most Out of Citri...
Is Citrix Cloud Enterprise Ready? Best Practices to Get the Most Out of Citri...
eG Innovations
 
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDBMongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB
 
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
 Webinar Fondazione CRUI e VMware: VMware vRealize Suite Webinar Fondazione CRUI e VMware: VMware vRealize Suite
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
Jürgen Ambrosi
 
Javier Hijas & Ori Kuyumgiski - Security at the speed of DevOps [rooted2018]
Javier Hijas & Ori Kuyumgiski	- Security at the speed of DevOps [rooted2018]Javier Hijas & Ori Kuyumgiski	- Security at the speed of DevOps [rooted2018]
Javier Hijas & Ori Kuyumgiski - Security at the speed of DevOps [rooted2018]
RootedCON
 
One And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptxOne And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptx
Avi Networks
 
Securely Connecting Your Customers to Their Cloud-Hosted App – In Minutes
Securely Connecting Your Customers to Their Cloud-Hosted App – In MinutesSecurely Connecting Your Customers to Their Cloud-Hosted App – In Minutes
Securely Connecting Your Customers to Their Cloud-Hosted App – In Minutes
Khash Nakhostin
 
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...Daniel Berg
 
Creating your Hybrid Cloud with AWS -Technical 201
Creating your Hybrid Cloud with AWS -Technical 201Creating your Hybrid Cloud with AWS -Technical 201
Creating your Hybrid Cloud with AWS -Technical 201
Amazon Web Services
 
Does Using Citrix Cloud Make Performance Monitoring Easier?
Does Using Citrix Cloud Make Performance Monitoring Easier?Does Using Citrix Cloud Make Performance Monitoring Easier?
Does Using Citrix Cloud Make Performance Monitoring Easier?
eG Innovations
 
Cloud Migration Services | Mindtree
Cloud Migration Services | MindtreeCloud Migration Services | Mindtree
Cloud Migration Services | Mindtree
AnikeyRoy
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
Cristian Garcia G.
 

Similar to Check Point and Accenture Webinar (20)

Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013
Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013
Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud Adoption
 
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellersCloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
 
Cloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace SoftwareCloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace Software
 
Smart Integration to the Cloud - Kellton Tech Webinar
Smart Integration to the Cloud - Kellton Tech WebinarSmart Integration to the Cloud - Kellton Tech Webinar
Smart Integration to the Cloud - Kellton Tech Webinar
 
Scaling Your SaaS with Analytics-Driven Insights and Wavefront Integrations f...
Scaling Your SaaS with Analytics-Driven Insights and Wavefront Integrations f...Scaling Your SaaS with Analytics-Driven Insights and Wavefront Integrations f...
Scaling Your SaaS with Analytics-Driven Insights and Wavefront Integrations f...
 
Maximize the Capabilities of Oracle® Golden Gate: Replicate Data Bi-Direction...
Maximize the Capabilities of Oracle® Golden Gate: Replicate Data Bi-Direction...Maximize the Capabilities of Oracle® Golden Gate: Replicate Data Bi-Direction...
Maximize the Capabilities of Oracle® Golden Gate: Replicate Data Bi-Direction...
 
ENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated Industries
 
CNCF On-Demand Webinar_ LitmusChaos Project Updates.pdf
CNCF On-Demand Webinar_ LitmusChaos Project Updates.pdfCNCF On-Demand Webinar_ LitmusChaos Project Updates.pdf
CNCF On-Demand Webinar_ LitmusChaos Project Updates.pdf
 
Is Citrix Cloud Enterprise Ready? Best Practices to Get the Most Out of Citri...
Is Citrix Cloud Enterprise Ready? Best Practices to Get the Most Out of Citri...Is Citrix Cloud Enterprise Ready? Best Practices to Get the Most Out of Citri...
Is Citrix Cloud Enterprise Ready? Best Practices to Get the Most Out of Citri...
 
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDBMongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
 
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
 Webinar Fondazione CRUI e VMware: VMware vRealize Suite Webinar Fondazione CRUI e VMware: VMware vRealize Suite
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
 
Javier Hijas & Ori Kuyumgiski - Security at the speed of DevOps [rooted2018]
Javier Hijas & Ori Kuyumgiski	- Security at the speed of DevOps [rooted2018]Javier Hijas & Ori Kuyumgiski	- Security at the speed of DevOps [rooted2018]
Javier Hijas & Ori Kuyumgiski - Security at the speed of DevOps [rooted2018]
 
One And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptxOne And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptx
 
Securely Connecting Your Customers to Their Cloud-Hosted App – In Minutes
Securely Connecting Your Customers to Their Cloud-Hosted App – In MinutesSecurely Connecting Your Customers to Their Cloud-Hosted App – In Minutes
Securely Connecting Your Customers to Their Cloud-Hosted App – In Minutes
 
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...
 
Creating your Hybrid Cloud with AWS -Technical 201
Creating your Hybrid Cloud with AWS -Technical 201Creating your Hybrid Cloud with AWS -Technical 201
Creating your Hybrid Cloud with AWS -Technical 201
 
Does Using Citrix Cloud Make Performance Monitoring Easier?
Does Using Citrix Cloud Make Performance Monitoring Easier?Does Using Citrix Cloud Make Performance Monitoring Easier?
Does Using Citrix Cloud Make Performance Monitoring Easier?
 
Cloud Migration Services | Mindtree
Cloud Migration Services | MindtreeCloud Migration Services | Mindtree
Cloud Migration Services | Mindtree
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 

Check Point and Accenture Webinar

  • 1. 1©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. Amit Schnitzer| Cloud Security Solution Expert, Checkpoint Dr. Alexander Zimmermann | Cloud Architect, Accenture MIGRATING YOUR DATACENTERS TO AWS WITH AUTOMATED SECURITY
  • 2. 2©2018 Check Point Software Technologies Ltd. CLOUD IS THE NEW NORM
  • 3. 3©2018 Check Point Software Technologies Ltd. Companies want their cloud environments to be Efficient Scalable Agile And Secure!
  • 4. 4©2018 Check Point Software Technologies Ltd. Legacy security architecture doesn’t work anymore • Cloud applications are everywhere perimeter security is not enough – we need security inside the cloud • Cloud applications are elastic legacy security is static • DevOps wants agile environment security is a showstopper
  • 5. 5©2018 Check Point Software Technologies Ltd. European power utility company “In 5 years from now all our services and application will be running on the cloud” Client Facts • Worldwide ~100.000 employees in 100+ locations • Revenue: ~25 Bn EUR • Migration drivers: ̶ Improve performance and availability of IT services ̶ Enhance cost control by standardization ̶ Reduce Time-To-Market
  • 6. 6©2018 Check Point Software Technologies Ltd. CLIENT USE CASE
  • 7. 7©2018 Check Point Software Technologies Ltd. Design principle: centralized multi-account approach Application Accounts Application Accounts • Reducing the Blast Radius: Leveraging multiple AWS accounts to reduce the blast radius by deploying only applications into one account per region that belong together • At least three account types: Next to the Billing Account at least one account is to be used for the application and one for security isolation  Main account is owned for example by the application team  Another account is owned by the security team and is used for audit and control access  control network connectivity to Internet and premise data center • AWS account size: The account segregation is chosen based on things that are clearly separate. It can be either  Single application per account, or  Group of applications based on shared resources, similarity of policies, or routing tables required to protect the account Billing Account Central Security Account(s) Datacenter Application Account(s) Multiple AWS accounts to manage security and reduce the blast radius
  • 8. 8©2018 Check Point Software Technologies Ltd. • Centralized DMZ Account: Controlling access towards AWS platform by limiting access points to one account ̶ Accounts that require access from the Public Internet use a centralized DMZ Account for ingress internet traffic ̶ The DMZ contains centrally administered Check Point CloudGuard firewalls for firewalling, URL filtering, and NAT ̶ DMZ VPC for productive workloads will be set up high available • Private accounts (Prod | QA | Dev): Private application accounts have no Internet Gateway and no VPC Peering to the DMZ  no access from the Public Internet Centralized DMZ account DMZ Account DMZ VPC for Production (HA) DMZ VPC for Dev and QA (non HA) Public Production Account Public Internet Public QA Account Public Developing Account Private [Prod | QA | Dev] Account VPC PeeringInternet GatewayLegend:
  • 9. 9©2018 Check Point Software Technologies Ltd. Application Accounts Application Accounts Transit Account On-Premise Datacenter Application Accounts MPLS (AWS Direct Connect) Checkpoint CloudGuard VMs Centralized Transit account Public Internet • The centralized Transit account is the only possibility for applications to communicate to on premise resources • There is no way to bypass this account as it is the only account where the MPLS terminate • In the Transit account two Check Point CloudGuard firewalls are in use • Application accounts connect to the Transit account via VPN connection utilizing AWS’ native service “Virtual Private Gateway” VPN Internet Gateway Virtual Private GatewayLegend:
  • 10. 10©2018 Check Point Software Technologies Ltd. Application Accounts Application Accounts Transit Account On-Premise Datacenter Application Accounts Public Internet MPLS (AWS Direct Connect) VMs Shared Services Account VPC Peering Centralized Shared Services account VPN Internet Gateway Virtual Private Gateway • Although the Transit VPC can be classified as a shared service, AWS recommends to use a separate account – the Shared Services account • This segregation i. a. improves network connectivity and reduces network-transfer costs • The objective of this account is to provide lower- latency access to replicated services and proxy- controlled access to on-premises resources • Shared Services are offered to Application accounts via VPC Peering, that enables you to route traffic between each other as if they are within the same network. Legend: Checkpoint CloudGuard Checkpoint Management
  • 11. 11©2018 Check Point Software Technologies Ltd. Application accounts Availability Zone BAvailability Zone A Application Tier (Private Subnet) Database Tier (Private Subnet) Presentation Tier (“Public” or Private Subnet) Application Tier (Private Subnet) Database Tier (Private Subnet) Presentation Tier (“Public” or Private Subnet) • To isolate various tiers of infrastructure, a three- tier-architecture is used - public-facing web applications in a Public Subnet and application and database server hosted in Private Subnets. • In standard configured Application accounts a three-tier-architecture is always deployed in two Availability Zones to offer High Availability by design Legend: VPC Router Virtual Private Gateway Internet Gateway [Public Accounts only]
  • 12. 13©2018 Check Point Software Technologies Ltd. SECURITY BLUEPRINT FOR CLOUD ERA
  • 13. 16©2018 Check Point Software Technologies Ltd. Spoke 1 Spoke 2 Spoke 3 Spoke N… Check Point’s cloud security blueprint
  • 14. 17©2018 Check Point Software Technologies Ltd. Spoke 1 Spoke 2 Spoke 3 Spoke N… Check Point’s cloud security blueprint
  • 15. 18©2018 Check Point Software Technologies Ltd. Northbound Hub Southbound Hub Spoke 1 Spoke 2 Spoke 3 Spoke N… Check Point’s cloud security blueprint
  • 16. 19©2018 Check Point Software Technologies Ltd. Northbound Hub Southbound Hub Spoke 1 Spoke 2 Spoke 3 Spoke N… Check Point’s cloud security blueprint
  • 17. 20©2018 Check Point Software Technologies Ltd. Northbound Hub Southbound Hub Spoke 1 Spoke 2 Spoke 3 Spoke N… Check Point’s cloud security blueprint
  • 18. 21©2018 Check Point Software Technologies Ltd. Northbound Hub Southbound Hub Spoke 1 Spoke 2 Spoke 3 Spoke N… VPN Check Point’s cloud security blueprint
  • 19. 22©2018 Check Point Software Technologies Ltd. Putting all together… DMZ ServiceTransit PROD Workload QA Private QA Private Prod Public QA Public Prod Internet gateway VPC Peering VPN gateway VPN connection Customer Gateway Load Balancer Direct Connect Checkpoint CloudGuard Internet Egress Internet Ingress VPN Connection Transit VPC Peering SSC Legend On-Premise Datacenter Public Dev Private Dev
  • 20. 23©2018 Check Point Software Technologies Ltd. Live Demo
  • 21. 24©2018 Check Point Software Technologies Ltd. Security Architecture that enables innovation • Agile – new spokes created by DevOps will automatically get protected • Automatic – security architecture deployment • Via AWS CloudFormation • Via Azure solution templates • In Control – Security admin gains full visibility for east-west and north-south traffic
  • 22. 25©2018 Check Point Software Technologies Ltd. Security architecture for Multi-Cloud environment ACI Unified management • Securely connecting the clouds with VPN • Single access rule within a unified policy which allows seamless secure connectivity across cloud environments
  • 23. 26©2018 Check Point Software Technologies Ltd. This also works across cloud platforms
  • 24. 27©2018 Check Point Software Technologies Ltd. Security Blueprint Check Point CloudGuard Security architecture • Empowers Innovation • Enables fast & robust scalability • Bringing clouds together securely
  • 25. 28©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. Amit Schnitzer| Cloud Security Solution Expert, Checkpoint amitsc@checkpoint.com Dr. Alexander Zimmermann | Cloud Architect, Accenture Alexander.zimmermann@accenture.com THANK YOU !
  • 26. 29©2018 Check Point Software Technologies Ltd. CloudGuard at the glance Cloud Security Operation Cloud Security Blueprint Cloud Cyber Attacks
  • 27. 30©2018 Check Point Software Technologies Ltd. Everybody is moving to the cloud Companies cloud strategy • Public cloud first • Hybrid Cloud • Multi-Clouds
  • 28. 31©2018 Check Point Software Technologies Ltd. Security in the cloud • Best effective protection from modern attacks – regular access control is not enough • Adaptive security operation that enables cloud innovation which scales on demand • Cloud security architecture that is unified, efficient, agile, elastic and robust