SlideShare a Scribd company logo
1 of 36
Download to read offline
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
David Guretz, System Engineer, Palo Alto Networks
April 19, 2016
Five Steps to a Secure Hybrid
Architecture in AWS
2015 Data Loss Incidents
Source: http://www.idtheftcenter.org/images/breach/DataBreachReports_2015.pdf
781Data breaches reported in 2015
169MRecords compromised
The Common Thread in Data Loss Incidents
SPEAR
PHISHING
EMAIL
EXPLOIT KIT
or
INFECT
USER
MOVE ACROSS
THE NETWORK
INFECT THE
DATA CENTER
ADVERSARY
COMMANDS
STEAL
DATA
Same lifecycle is followed across both physical or virtualized network
Additional Cloud Security Challenges
Limited visibility Outdated, inconsistent threat
prevention technology
Cumbersome
processes
Security: A Shared Responsibility
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge Locations
Encryption Key
Management
Client & Server
Encryption
Network Traffic
Protection
Platform, Applications, Identity & Access Management
Operating System, Network & Firewall Configuration
Customer content
Customers are
responsible for their
security IN the Cloud
AWS looks after the
security OF the
platform
Security Groups, WAF or Next-gen Firewall?
• Native AWS security includes Security Groups and Web Application Firewall
• Security Groups and ACLs
• Port-based filtering only
• No visibility traffic at the application level
• Unable to prevent threats
• Cannot control file movement
• Web Application Firewalls
• Customized for each application/environment
• Focused narrowly on public facing web applications on HTTP/HTTPs
• No visibility, control, or protection for non-HTTP/HTTPs applications
CVE-2014-4061
vulnerability
root
user
Application
Server
SQL Server
172.16.1.10
source IP
172.16.2.10
destination IP
TCP/1433
destination port
MSSQL-DB
protocol
Context – Moving Beyond Layer 4
11344 KB
DoS Vuln
CVE-2014-4061
vulnerability
Remote Exec
web-browsing
application
.exe
file type
root
user
shipment.exe
file name
unknown
URL category
North Korea
destination country
172.16.1.10
source IP
64.81.2.23
destination IP
TCP/443
destination port
SSL
protocol
HTTP
protocol
Context – Outbound from AWS
344 KB
Application
Server
Protecting Your AWS
Deployment
Palo Alto Networks VM-Series for AWS
 Gathers potential threats from network
and endpoints
 Analyses and correlates threat
intelligence
 Disseminates threat intelligence to
network and endpoints
Threat Intelligence Cloud
 Identify and Inspect all traffic
 Blocks known threats
 Sends unknown to cloud
 Extensible to mobile & virtual networks
Next-Generation Firewall
 Inspects all processes and files
 Prevents both known & unknown exploits
 Integrates with cloud to prevent known &
unknown malware
Advanced Endpoint Protection
VM-Series for AWS
• Visibility into, and control over applications, not ports
• Segment applications to prevent malware propagation
• Prevent known and unknown threats
• Centrally manage system configuration, streamline policy updates
AZ1b
Application Visibility
Application Visibility
Segmentation for Data Center Applications
• Applications and data isolated by policy (whitelisting)
• Users granted access based on need
• Traffic is protected from malware
Credit Card
Zone
Customer Support
Zone
Customer
service
Finance
Subnet1 Subnet2
Subnet3
Segmentation in AWS
• VMs and data (VPCs) protected by
whitelist policy
• VPC-to-VPC traffic is protected from
malware
• Subnet to subnet traffic is also
controlled and protected
• Users granted access based on
need/credentials
AZ2c
DB VPC
DB1
DB2
AZ1b
Web VPC
Web
1
Web2
Subnet1
Subnet2
Subnet1
Subnet2
Attack Lifecycle Prevention
AZ1b
Web
1
DB1
Subnet1
Subnet2
Leverage Exploit
Next-Generation
Firewall
Threat Prevention
(Block Known Threats)
Execute Malware
WildFire
(Block Unknown Threats)
Threat Prevention
(Anti-Malware)
Threat Prevention
(Prevent C&C)
Control Channel
Threat Prevention
(Block Lateral Movement)
Threat Prevention
(Prevent C&C)
Steal Data
File Blocking & Data
Filtering
• Centrally manage configuration and policy
across enterprise and cloud
• Aggregate traffic logs for visibility, forensics and
reporting
• Streamline policy updates with APIs and
dynamic monitoring of Amazon VPC
Streamline Management and Policy Updates
APIs
Application
Network
Security
AZ1b
Web
1
DB1
Subnet1
Subnet2
AWS Hybrid Cloud Security
with the VM-Series
Combines best of both worlds
• Private data center for static, older workloads
• Public cloud for newer apps, agility, scalability
Hybrid Cloud Topology
IPSec VPNDC-FW1
DC-FW2
AZ1cAZ1b
Web1-01
Web1-02
Web2-01
Web2-02
• Subnet and route tables should be
established in AWS first
• Each subnet gets a unique route
table
• External subnet routes to the IGW
• Internal subnet and route table
should exclude IGW
• Eliminates internal subnet to
Internet routing – even if firewall
is misconfigured
Step 1: Getting the Subnets Right
Step 2: Deploy the VM-Series for AWS
• Two licensing options enabled via AWS Marketplace
• Consumption-based licensing in AWS marketplace: Fixed
bundles purchased for annual or hourly time periods
• Bring Your Own License (BYOL): Pick and choose licenses,
subscriptions and support to best suite our needs
• Instances: Small c3 to c4.4xlarge. Confirm latest list in
AWS Marketplace
• Elastic Network Interfaces (ENI): Up to 8 ENIs with
the first ENI always dedicated to management
• Interface Modes: L3 only due to the AWS infrastructure requirements. TAP, L2, and
virtual wire interface modes are not supported
• CPU, Memory and Storage: All Instance types support 2, 4, or 8 vCPUs, and they all
require at least 4 GB of dedicated memory and 40 GB of EBS-optimized volume
storage
• VM-Series for AWS acts as a VPN
termination point
• Fully supports IPSec VPN standards
Step 3: Establishing the IPSec VPN Connection
Challenge
With two or more subnets, firewall
can intentionally or accidentally
be bypassed
Step 4: Ensuring Traffic Flows Through the Firewall
AZ1b
DB1
Web1
Challenge
With two or more subnets, firewall
can intentionally or accidentally
be bypassed
Step 4: Ensuring Traffic Flows Through the Firewall
Solution
Force all traffic to the firewall by
adding a self referencing security
group
AZ1b
DB1
Web1
AZ1b
DB1
Web1
AWS Configuration to Force Traffic Through Firewall
Self referencing security groups
Validating the Configuration
Web to DB connection via the
VR and firewall succeeds
ubuntu@web1:~$ netstat -rn
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
0.0.0.0 10.4.3.101 0.0.0.0 UG 0 0 0 eth0
10.4.3.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
ubuntu@web1:~$ ping -c 3 db1
PING db1 (10.4.5.201) 56(84) bytes of data.
64 bytes from db1 (10.4.5.201): icmp_seq=1 ttl=63 time=0.891 ms
64 bytes from db1 (10.4.5.201): icmp_seq=2 ttl=63 time=0.916 ms
64 bytes from db1 (10.4.5.201): icmp_seq=3 ttl=63 time=1.04 ms
--- db1 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2002ms
rtt min/avg/max/mdev = 0.891/0.951/1.047/0.072 ms
Validating the Configuration
Attempted bypass by altering
default route is dropped
ubuntu@web1:~$ sudo route add default gw 10.4.3.1
ubuntu@web1:~$ sudo route del default gw 10.4.3.101
ubuntu@web1:~$ netstat -rn
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
0.0.0.0 10.4.3.1 0.0.0.0 UG 0 0 0 eth0
10.4.3.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
ubuntu@web1:~$ ping -c 3 db1
PING db1 (10.4.5.201) 56(84) bytes of data.
--- db1 ping statistics ---
3 packets transmitted, 0 received, 100% packet loss, time 1999ms
Web to DB connection via the
VR and firewall succeeds
ubuntu@web1:~$ netstat -rn
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
0.0.0.0 10.4.3.101 0.0.0.0 UG 0 0 0 eth0
10.4.3.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
ubuntu@web1:~$ ping -c 3 db1
PING db1 (10.4.5.201) 56(84) bytes of data.
64 bytes from db1 (10.4.5.201): icmp_seq=1 ttl=63 time=0.891 ms
64 bytes from db1 (10.4.5.201): icmp_seq=2 ttl=63 time=0.916 ms
64 bytes from db1 (10.4.5.201): icmp_seq=3 ttl=63 time=1.04 ms
--- db1 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2002ms
rtt min/avg/max/mdev = 0.891/0.951/1.047/0.072 ms
Step 4: Scaling with ECMP
• ECMP weighted round robin in private data center
• Distributes the load across multiple VM-Series instances
AZ1cAZ1b
Web1-01
Web1-02
Web2-01
Web2-02
DC-FW1
DC-FW2
Web0-01
Web0-01
Scaling with On-Premises Load Balancer
• Traffic load is shared across both private and
public cloud
• Static routes on firewall across multiple VPN
tunnels adds redundancy
• Single load balancer configuration minimizes
management effort
AZ1c
DC-FW1
AZ1b
Web1-01
Web1-02
Web2-01
Web2-02
DC-FW2
Web0-01
Scaling with Elastic Load Balancing
• Elastic Load Balancing supported natively
for security scaling
• Citrix NetScaler – documented in tech
pubs
• NGINX also proven to work
AZ1cAZ1b
Web2-01
Web2-02
Web1-01
Web1-02
Web1-03
Web2-03
DC-FW1
DC-FW2
Web0-01
Web0-01
Step 5: Security Automation
AWS CloudFormation Templates (CFT)
• Scripted to deploy AWS resources
• Ranges from basic install of the VM-Series to a fully configured
environment
• Check out the Hybrid Deployment Guidelines Whitepaper for a
two tiered CFT example
z
AZ1b
Web1
DB1
Automating Firewall Deployments
PAN-OS configuration
Security policies
BYOL licenses
Software updates
Dynamic content
Attach to Panorama
Device Group
vm-series-bootstrap-aws-s3-
bucket=<bucketname>
Amazon
S3 bucket
Automate Security Policy Updates
Automate Security Policy Updates
Hybrid: extend your data
center into AWS
Segmentation: Separate
applications and data for security
and compliance
Additional Deployments Scenarios
Gateway: Protection from
Internet borne threats
GlobalProtect: Policy
consistency for the
cloud, the network, and
your devices
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Thank you

More Related Content

What's hot

Creating your virtual data center - Toronto
Creating your virtual data center - TorontoCreating your virtual data center - Toronto
Creating your virtual data center - TorontoAmazon Web Services
 
The Enterprise Grade SQL Server Deployments in AWS
The Enterprise Grade SQL Server Deployments in AWSThe Enterprise Grade SQL Server Deployments in AWS
The Enterprise Grade SQL Server Deployments in AWSAmazon Web Services
 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security SuperheroAmazon Web Services
 
AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)
AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)
AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)Amazon Web Services
 
AWS re:Invent 2016: Amazon EC2 Foundations (CMP203)
AWS re:Invent 2016: Amazon EC2 Foundations (CMP203)AWS re:Invent 2016: Amazon EC2 Foundations (CMP203)
AWS re:Invent 2016: Amazon EC2 Foundations (CMP203)Amazon Web Services
 
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...Amazon Web Services
 
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...Amazon Web Services
 
ENT307 VMware and AWS Together - VMware Cloud on AWS
ENT307 VMware and AWS Together - VMware Cloud on AWSENT307 VMware and AWS Together - VMware Cloud on AWS
ENT307 VMware and AWS Together - VMware Cloud on AWSAmazon Web Services
 
Creating Your Virtual Data Center
Creating Your Virtual Data Center Creating Your Virtual Data Center
Creating Your Virtual Data Center Amazon Web Services
 
AWS re:Invent 2016: Hybrid Architecture Design: Connecting Your On-Premises W...
AWS re:Invent 2016: Hybrid Architecture Design: Connecting Your On-Premises W...AWS re:Invent 2016: Hybrid Architecture Design: Connecting Your On-Premises W...
AWS re:Invent 2016: Hybrid Architecture Design: Connecting Your On-Premises W...Amazon Web Services
 
Hackproof Your Cloud: Responding to 2016 Threats
Hackproof Your Cloud: Responding to 2016 ThreatsHackproof Your Cloud: Responding to 2016 Threats
Hackproof Your Cloud: Responding to 2016 ThreatsAmazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
Incident Response in the Cloud | AWS Public Sector Summit 2017
Incident Response in the Cloud | AWS Public Sector Summit 2017Incident Response in the Cloud | AWS Public Sector Summit 2017
Incident Response in the Cloud | AWS Public Sector Summit 2017Amazon Web Services
 
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...Amazon Web Services
 
Cloud-Native DDoS Mitigation - AWS Online Tech Talks
Cloud-Native DDoS Mitigation - AWS Online Tech TalksCloud-Native DDoS Mitigation - AWS Online Tech Talks
Cloud-Native DDoS Mitigation - AWS Online Tech TalksAmazon Web Services
 
AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...
AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...
AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...Amazon Web Services
 
AWS re:Invent 2016: NextGen Networking: New Capabilities for Amazon’s Virtual...
AWS re:Invent 2016: NextGen Networking: New Capabilities for Amazon’s Virtual...AWS re:Invent 2016: NextGen Networking: New Capabilities for Amazon’s Virtual...
AWS re:Invent 2016: NextGen Networking: New Capabilities for Amazon’s Virtual...Amazon Web Services
 
Setup Preconfigured Protections on AWS WAF - November 2016 Webinar Series
Setup Preconfigured Protections on AWS WAF - November 2016 Webinar SeriesSetup Preconfigured Protections on AWS WAF - November 2016 Webinar Series
Setup Preconfigured Protections on AWS WAF - November 2016 Webinar SeriesAmazon Web Services
 
Aws Architecture Fundamentals
Aws Architecture FundamentalsAws Architecture Fundamentals
Aws Architecture Fundamentals2nd Watch
 

What's hot (20)

Creating your virtual data center - Toronto
Creating your virtual data center - TorontoCreating your virtual data center - Toronto
Creating your virtual data center - Toronto
 
The Enterprise Grade SQL Server Deployments in AWS
The Enterprise Grade SQL Server Deployments in AWSThe Enterprise Grade SQL Server Deployments in AWS
The Enterprise Grade SQL Server Deployments in AWS
 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero
 
AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)
AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)
AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)
 
AWS re:Invent 2016: Amazon EC2 Foundations (CMP203)
AWS re:Invent 2016: Amazon EC2 Foundations (CMP203)AWS re:Invent 2016: Amazon EC2 Foundations (CMP203)
AWS re:Invent 2016: Amazon EC2 Foundations (CMP203)
 
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
 
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
 
ENT307 VMware and AWS Together - VMware Cloud on AWS
ENT307 VMware and AWS Together - VMware Cloud on AWSENT307 VMware and AWS Together - VMware Cloud on AWS
ENT307 VMware and AWS Together - VMware Cloud on AWS
 
Creating Your Virtual Data Center
Creating Your Virtual Data Center Creating Your Virtual Data Center
Creating Your Virtual Data Center
 
AWS re:Invent 2016: Hybrid Architecture Design: Connecting Your On-Premises W...
AWS re:Invent 2016: Hybrid Architecture Design: Connecting Your On-Premises W...AWS re:Invent 2016: Hybrid Architecture Design: Connecting Your On-Premises W...
AWS re:Invent 2016: Hybrid Architecture Design: Connecting Your On-Premises W...
 
Hackproof Your Cloud: Responding to 2016 Threats
Hackproof Your Cloud: Responding to 2016 ThreatsHackproof Your Cloud: Responding to 2016 Threats
Hackproof Your Cloud: Responding to 2016 Threats
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Incident Response in the Cloud | AWS Public Sector Summit 2017
Incident Response in the Cloud | AWS Public Sector Summit 2017Incident Response in the Cloud | AWS Public Sector Summit 2017
Incident Response in the Cloud | AWS Public Sector Summit 2017
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
 
Cloud-Native DDoS Mitigation - AWS Online Tech Talks
Cloud-Native DDoS Mitigation - AWS Online Tech TalksCloud-Native DDoS Mitigation - AWS Online Tech Talks
Cloud-Native DDoS Mitigation - AWS Online Tech Talks
 
AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...
AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...
AWS re:Invent 2016: Creating Your Virtual Data Center: VPC Fundamentals and C...
 
AWS re:Invent 2016: NextGen Networking: New Capabilities for Amazon’s Virtual...
AWS re:Invent 2016: NextGen Networking: New Capabilities for Amazon’s Virtual...AWS re:Invent 2016: NextGen Networking: New Capabilities for Amazon’s Virtual...
AWS re:Invent 2016: NextGen Networking: New Capabilities for Amazon’s Virtual...
 
Setup Preconfigured Protections on AWS WAF - November 2016 Webinar Series
Setup Preconfigured Protections on AWS WAF - November 2016 Webinar SeriesSetup Preconfigured Protections on AWS WAF - November 2016 Webinar Series
Setup Preconfigured Protections on AWS WAF - November 2016 Webinar Series
 
Aws Architecture Fundamentals
Aws Architecture FundamentalsAws Architecture Fundamentals
Aws Architecture Fundamentals
 

Viewers also liked

Jorge reynolds pombo
Jorge reynolds pomboJorge reynolds pombo
Jorge reynolds pomboStephaniaVD
 
Cloud Computing in Africa
Cloud Computing in AfricaCloud Computing in Africa
Cloud Computing in Africatechzimslides
 
A modular architecture for hybrid planning with theories cp2014
A modular architecture for hybrid planning with theories cp2014A modular architecture for hybrid planning with theories cp2014
A modular architecture for hybrid planning with theories cp2014Pierre Schaus
 
FROM ON-PREMISE TO THE HYBRID CLOUD WITH MICROSOFT AZURE
FROM ON-PREMISE TO THE HYBRID CLOUD WITH MICROSOFT AZUREFROM ON-PREMISE TO THE HYBRID CLOUD WITH MICROSOFT AZURE
FROM ON-PREMISE TO THE HYBRID CLOUD WITH MICROSOFT AZUREDotNetCampus
 
From on premise to the hybrid cloud with microsoft azure
From on premise to the hybrid cloud with microsoft azureFrom on premise to the hybrid cloud with microsoft azure
From on premise to the hybrid cloud with microsoft azureDotNetCampus
 
Pla de funcionament del menjador
Pla de funcionament del menjadorPla de funcionament del menjador
Pla de funcionament del menjadoralbabautistaq
 
Thuiszorg brasamie.ppt af
Thuiszorg brasamie.ppt afThuiszorg brasamie.ppt af
Thuiszorg brasamie.ppt afPressilia
 
La historia del internet
La historia del internetLa historia del internet
La historia del internetbere0612
 
March 14 Presentation to the new MS Bio students
March 14 Presentation to the new MS Bio studentsMarch 14 Presentation to the new MS Bio students
March 14 Presentation to the new MS Bio studentsAna Maria Slingluff-Barral
 
Moros i Cristians Dénia 2014 Majorals Sant Roc
Moros i Cristians Dénia 2014 Majorals Sant RocMoros i Cristians Dénia 2014 Majorals Sant Roc
Moros i Cristians Dénia 2014 Majorals Sant RocMajorals Sant Roc
 
PGD/ESPM | Amada Fortes da Maia | 2010
PGD/ESPM | Amada Fortes da Maia | 2010PGD/ESPM | Amada Fortes da Maia | 2010
PGD/ESPM | Amada Fortes da Maia | 2010Maia Amanda
 
Presentación plegables y costos inscripción 17o congreso nacional de educació...
Presentación plegables y costos inscripción 17o congreso nacional de educació...Presentación plegables y costos inscripción 17o congreso nacional de educació...
Presentación plegables y costos inscripción 17o congreso nacional de educació...karlkorner
 
RightScale Webinar: The Five Critical Steps to Develop a Cloud Strategy
RightScale Webinar: The Five Critical Steps to Develop a Cloud StrategyRightScale Webinar: The Five Critical Steps to Develop a Cloud Strategy
RightScale Webinar: The Five Critical Steps to Develop a Cloud StrategyRightScale
 

Viewers also liked (20)

Jorge reynolds pombo
Jorge reynolds pomboJorge reynolds pombo
Jorge reynolds pombo
 
Cloud Computing in Africa
Cloud Computing in AfricaCloud Computing in Africa
Cloud Computing in Africa
 
Practical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud ComputingPractical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud Computing
 
A modular architecture for hybrid planning with theories cp2014
A modular architecture for hybrid planning with theories cp2014A modular architecture for hybrid planning with theories cp2014
A modular architecture for hybrid planning with theories cp2014
 
FROM ON-PREMISE TO THE HYBRID CLOUD WITH MICROSOFT AZURE
FROM ON-PREMISE TO THE HYBRID CLOUD WITH MICROSOFT AZUREFROM ON-PREMISE TO THE HYBRID CLOUD WITH MICROSOFT AZURE
FROM ON-PREMISE TO THE HYBRID CLOUD WITH MICROSOFT AZURE
 
From on premise to the hybrid cloud with microsoft azure
From on premise to the hybrid cloud with microsoft azureFrom on premise to the hybrid cloud with microsoft azure
From on premise to the hybrid cloud with microsoft azure
 
Pla de funcionament del menjador
Pla de funcionament del menjadorPla de funcionament del menjador
Pla de funcionament del menjador
 
Daily 20 maggio
Daily 20 maggioDaily 20 maggio
Daily 20 maggio
 
Presentación @ingenia_pro esp
Presentación @ingenia_pro esp Presentación @ingenia_pro esp
Presentación @ingenia_pro esp
 
MultiSafepay
MultiSafepayMultiSafepay
MultiSafepay
 
La posada del silencio nº 1, curso vi
La posada del silencio nº 1, curso viLa posada del silencio nº 1, curso vi
La posada del silencio nº 1, curso vi
 
Thuiszorg brasamie.ppt af
Thuiszorg brasamie.ppt afThuiszorg brasamie.ppt af
Thuiszorg brasamie.ppt af
 
La historia del internet
La historia del internetLa historia del internet
La historia del internet
 
March 14 Presentation to the new MS Bio students
March 14 Presentation to the new MS Bio studentsMarch 14 Presentation to the new MS Bio students
March 14 Presentation to the new MS Bio students
 
AUTOCREDITO
AUTOCREDITO AUTOCREDITO
AUTOCREDITO
 
Moros i Cristians Dénia 2014 Majorals Sant Roc
Moros i Cristians Dénia 2014 Majorals Sant RocMoros i Cristians Dénia 2014 Majorals Sant Roc
Moros i Cristians Dénia 2014 Majorals Sant Roc
 
Trabajo módulo3 jorge_montalvo
Trabajo módulo3 jorge_montalvoTrabajo módulo3 jorge_montalvo
Trabajo módulo3 jorge_montalvo
 
PGD/ESPM | Amada Fortes da Maia | 2010
PGD/ESPM | Amada Fortes da Maia | 2010PGD/ESPM | Amada Fortes da Maia | 2010
PGD/ESPM | Amada Fortes da Maia | 2010
 
Presentación plegables y costos inscripción 17o congreso nacional de educació...
Presentación plegables y costos inscripción 17o congreso nacional de educació...Presentación plegables y costos inscripción 17o congreso nacional de educació...
Presentación plegables y costos inscripción 17o congreso nacional de educació...
 
RightScale Webinar: The Five Critical Steps to Develop a Cloud Strategy
RightScale Webinar: The Five Critical Steps to Develop a Cloud StrategyRightScale Webinar: The Five Critical Steps to Develop a Cloud Strategy
RightScale Webinar: The Five Critical Steps to Develop a Cloud Strategy
 

Similar to Five Steps to Creating a Secure Hybrid Cloud Architecture

MongoDB World 2018: Enterprise Security in the Cloud
MongoDB World 2018: Enterprise Security in the CloudMongoDB World 2018: Enterprise Security in the Cloud
MongoDB World 2018: Enterprise Security in the CloudMongoDB
 
MongoDB World 2018: Enterprise Cloud Security
MongoDB World 2018: Enterprise Cloud SecurityMongoDB World 2018: Enterprise Cloud Security
MongoDB World 2018: Enterprise Cloud SecurityMongoDB
 
Simplifying the secure data center
Simplifying the secure data centerSimplifying the secure data center
Simplifying the secure data centerCisco Canada
 
Arquitetura Hibrida - Integrando seu Data Center com a Nuvem da AWS
Arquitetura Hibrida - Integrando seu Data Center com a Nuvem da AWSArquitetura Hibrida - Integrando seu Data Center com a Nuvem da AWS
Arquitetura Hibrida - Integrando seu Data Center com a Nuvem da AWSAmazon Web Services LATAM
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...Amazon Web Services
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)Mike Svoboda
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network EvolutionCisco Canada
 
Global Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network SecurityGlobal Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network SecurityScott Hoag
 
Hybridní cloud s F5 v prostředí kontejnerů
Hybridní cloud s F5 v prostředí kontejnerůHybridní cloud s F5 v prostředí kontejnerů
Hybridní cloud s F5 v prostředí kontejnerůMarketingArrowECS_CZ
 
Introduction to AWS VPC, Guidelines, and Best Practices
Introduction to AWS VPC, Guidelines, and Best PracticesIntroduction to AWS VPC, Guidelines, and Best Practices
Introduction to AWS VPC, Guidelines, and Best PracticesGary Silverman
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1Lancope, Inc.
 
Brkcrt 2214
Brkcrt 2214Brkcrt 2214
Brkcrt 2214Mac An
 
Building a Cloud Native Service - Docker Meetup Santa Clara (July 20, 2017)
Building a Cloud Native Service - Docker Meetup Santa Clara (July 20, 2017)Building a Cloud Native Service - Docker Meetup Santa Clara (July 20, 2017)
Building a Cloud Native Service - Docker Meetup Santa Clara (July 20, 2017)Yong Tang
 
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Web Services
 
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della SicurezzaNSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della SicurezzaVMUG IT
 
Return on Ignite 2019: Azure, .NET, A.I. & Data
Return on Ignite 2019: Azure, .NET, A.I. & DataReturn on Ignite 2019: Azure, .NET, A.I. & Data
Return on Ignite 2019: Azure, .NET, A.I. & DataMSDEVMTL
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SAMeh Zaghloul
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks
 
Design and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANsDesign and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANsFab Fusaro
 
Azure Networking: Innovative Features and Multi-VNet Topologies
Azure Networking: Innovative Features and Multi-VNet TopologiesAzure Networking: Innovative Features and Multi-VNet Topologies
Azure Networking: Innovative Features and Multi-VNet TopologiesMarius Zaharia
 

Similar to Five Steps to Creating a Secure Hybrid Cloud Architecture (20)

MongoDB World 2018: Enterprise Security in the Cloud
MongoDB World 2018: Enterprise Security in the CloudMongoDB World 2018: Enterprise Security in the Cloud
MongoDB World 2018: Enterprise Security in the Cloud
 
MongoDB World 2018: Enterprise Cloud Security
MongoDB World 2018: Enterprise Cloud SecurityMongoDB World 2018: Enterprise Cloud Security
MongoDB World 2018: Enterprise Cloud Security
 
Simplifying the secure data center
Simplifying the secure data centerSimplifying the secure data center
Simplifying the secure data center
 
Arquitetura Hibrida - Integrando seu Data Center com a Nuvem da AWS
Arquitetura Hibrida - Integrando seu Data Center com a Nuvem da AWSArquitetura Hibrida - Integrando seu Data Center com a Nuvem da AWS
Arquitetura Hibrida - Integrando seu Data Center com a Nuvem da AWS
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network Evolution
 
Global Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network SecurityGlobal Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network Security
 
Hybridní cloud s F5 v prostředí kontejnerů
Hybridní cloud s F5 v prostředí kontejnerůHybridní cloud s F5 v prostředí kontejnerů
Hybridní cloud s F5 v prostředí kontejnerů
 
Introduction to AWS VPC, Guidelines, and Best Practices
Introduction to AWS VPC, Guidelines, and Best PracticesIntroduction to AWS VPC, Guidelines, and Best Practices
Introduction to AWS VPC, Guidelines, and Best Practices
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1
 
Brkcrt 2214
Brkcrt 2214Brkcrt 2214
Brkcrt 2214
 
Building a Cloud Native Service - Docker Meetup Santa Clara (July 20, 2017)
Building a Cloud Native Service - Docker Meetup Santa Clara (July 20, 2017)Building a Cloud Native Service - Docker Meetup Santa Clara (July 20, 2017)
Building a Cloud Native Service - Docker Meetup Santa Clara (July 20, 2017)
 
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
 
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della SicurezzaNSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
 
Return on Ignite 2019: Azure, .NET, A.I. & Data
Return on Ignite 2019: Azure, .NET, A.I. & DataReturn on Ignite 2019: Azure, .NET, A.I. & Data
Return on Ignite 2019: Azure, .NET, A.I. & Data
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
Design and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANsDesign and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANs
 
Azure Networking: Innovative Features and Multi-VNet Topologies
Azure Networking: Innovative Features and Multi-VNet TopologiesAzure Networking: Innovative Features and Multi-VNet Topologies
Azure Networking: Innovative Features and Multi-VNet Topologies
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Five Steps to Creating a Secure Hybrid Cloud Architecture

  • 1. © 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. David Guretz, System Engineer, Palo Alto Networks April 19, 2016 Five Steps to a Secure Hybrid Architecture in AWS
  • 2. 2015 Data Loss Incidents Source: http://www.idtheftcenter.org/images/breach/DataBreachReports_2015.pdf 781Data breaches reported in 2015 169MRecords compromised
  • 3. The Common Thread in Data Loss Incidents SPEAR PHISHING EMAIL EXPLOIT KIT or INFECT USER MOVE ACROSS THE NETWORK INFECT THE DATA CENTER ADVERSARY COMMANDS STEAL DATA Same lifecycle is followed across both physical or virtualized network
  • 4. Additional Cloud Security Challenges Limited visibility Outdated, inconsistent threat prevention technology Cumbersome processes
  • 5. Security: A Shared Responsibility AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Encryption Key Management Client & Server Encryption Network Traffic Protection Platform, Applications, Identity & Access Management Operating System, Network & Firewall Configuration Customer content Customers are responsible for their security IN the Cloud AWS looks after the security OF the platform
  • 6. Security Groups, WAF or Next-gen Firewall? • Native AWS security includes Security Groups and Web Application Firewall • Security Groups and ACLs • Port-based filtering only • No visibility traffic at the application level • Unable to prevent threats • Cannot control file movement • Web Application Firewalls • Customized for each application/environment • Focused narrowly on public facing web applications on HTTP/HTTPs • No visibility, control, or protection for non-HTTP/HTTPs applications
  • 7. CVE-2014-4061 vulnerability root user Application Server SQL Server 172.16.1.10 source IP 172.16.2.10 destination IP TCP/1433 destination port MSSQL-DB protocol Context – Moving Beyond Layer 4 11344 KB DoS Vuln CVE-2014-4061 vulnerability Remote Exec
  • 8. web-browsing application .exe file type root user shipment.exe file name unknown URL category North Korea destination country 172.16.1.10 source IP 64.81.2.23 destination IP TCP/443 destination port SSL protocol HTTP protocol Context – Outbound from AWS 344 KB Application Server
  • 10. Palo Alto Networks VM-Series for AWS  Gathers potential threats from network and endpoints  Analyses and correlates threat intelligence  Disseminates threat intelligence to network and endpoints Threat Intelligence Cloud  Identify and Inspect all traffic  Blocks known threats  Sends unknown to cloud  Extensible to mobile & virtual networks Next-Generation Firewall  Inspects all processes and files  Prevents both known & unknown exploits  Integrates with cloud to prevent known & unknown malware Advanced Endpoint Protection
  • 11. VM-Series for AWS • Visibility into, and control over applications, not ports • Segment applications to prevent malware propagation • Prevent known and unknown threats • Centrally manage system configuration, streamline policy updates AZ1b
  • 14. Segmentation for Data Center Applications • Applications and data isolated by policy (whitelisting) • Users granted access based on need • Traffic is protected from malware Credit Card Zone Customer Support Zone Customer service Finance Subnet1 Subnet2 Subnet3
  • 15. Segmentation in AWS • VMs and data (VPCs) protected by whitelist policy • VPC-to-VPC traffic is protected from malware • Subnet to subnet traffic is also controlled and protected • Users granted access based on need/credentials AZ2c DB VPC DB1 DB2 AZ1b Web VPC Web 1 Web2 Subnet1 Subnet2 Subnet1 Subnet2
  • 16. Attack Lifecycle Prevention AZ1b Web 1 DB1 Subnet1 Subnet2 Leverage Exploit Next-Generation Firewall Threat Prevention (Block Known Threats) Execute Malware WildFire (Block Unknown Threats) Threat Prevention (Anti-Malware) Threat Prevention (Prevent C&C) Control Channel Threat Prevention (Block Lateral Movement) Threat Prevention (Prevent C&C) Steal Data File Blocking & Data Filtering
  • 17. • Centrally manage configuration and policy across enterprise and cloud • Aggregate traffic logs for visibility, forensics and reporting • Streamline policy updates with APIs and dynamic monitoring of Amazon VPC Streamline Management and Policy Updates APIs Application Network Security AZ1b Web 1 DB1 Subnet1 Subnet2
  • 18. AWS Hybrid Cloud Security with the VM-Series
  • 19. Combines best of both worlds • Private data center for static, older workloads • Public cloud for newer apps, agility, scalability Hybrid Cloud Topology IPSec VPNDC-FW1 DC-FW2 AZ1cAZ1b Web1-01 Web1-02 Web2-01 Web2-02
  • 20. • Subnet and route tables should be established in AWS first • Each subnet gets a unique route table • External subnet routes to the IGW • Internal subnet and route table should exclude IGW • Eliminates internal subnet to Internet routing – even if firewall is misconfigured Step 1: Getting the Subnets Right
  • 21. Step 2: Deploy the VM-Series for AWS • Two licensing options enabled via AWS Marketplace • Consumption-based licensing in AWS marketplace: Fixed bundles purchased for annual or hourly time periods • Bring Your Own License (BYOL): Pick and choose licenses, subscriptions and support to best suite our needs • Instances: Small c3 to c4.4xlarge. Confirm latest list in AWS Marketplace • Elastic Network Interfaces (ENI): Up to 8 ENIs with the first ENI always dedicated to management • Interface Modes: L3 only due to the AWS infrastructure requirements. TAP, L2, and virtual wire interface modes are not supported • CPU, Memory and Storage: All Instance types support 2, 4, or 8 vCPUs, and they all require at least 4 GB of dedicated memory and 40 GB of EBS-optimized volume storage
  • 22. • VM-Series for AWS acts as a VPN termination point • Fully supports IPSec VPN standards Step 3: Establishing the IPSec VPN Connection
  • 23. Challenge With two or more subnets, firewall can intentionally or accidentally be bypassed Step 4: Ensuring Traffic Flows Through the Firewall AZ1b DB1 Web1
  • 24. Challenge With two or more subnets, firewall can intentionally or accidentally be bypassed Step 4: Ensuring Traffic Flows Through the Firewall Solution Force all traffic to the firewall by adding a self referencing security group AZ1b DB1 Web1 AZ1b DB1 Web1
  • 25. AWS Configuration to Force Traffic Through Firewall Self referencing security groups
  • 26. Validating the Configuration Web to DB connection via the VR and firewall succeeds ubuntu@web1:~$ netstat -rn Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface 0.0.0.0 10.4.3.101 0.0.0.0 UG 0 0 0 eth0 10.4.3.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 ubuntu@web1:~$ ping -c 3 db1 PING db1 (10.4.5.201) 56(84) bytes of data. 64 bytes from db1 (10.4.5.201): icmp_seq=1 ttl=63 time=0.891 ms 64 bytes from db1 (10.4.5.201): icmp_seq=2 ttl=63 time=0.916 ms 64 bytes from db1 (10.4.5.201): icmp_seq=3 ttl=63 time=1.04 ms --- db1 ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 2002ms rtt min/avg/max/mdev = 0.891/0.951/1.047/0.072 ms
  • 27. Validating the Configuration Attempted bypass by altering default route is dropped ubuntu@web1:~$ sudo route add default gw 10.4.3.1 ubuntu@web1:~$ sudo route del default gw 10.4.3.101 ubuntu@web1:~$ netstat -rn Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface 0.0.0.0 10.4.3.1 0.0.0.0 UG 0 0 0 eth0 10.4.3.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 ubuntu@web1:~$ ping -c 3 db1 PING db1 (10.4.5.201) 56(84) bytes of data. --- db1 ping statistics --- 3 packets transmitted, 0 received, 100% packet loss, time 1999ms Web to DB connection via the VR and firewall succeeds ubuntu@web1:~$ netstat -rn Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface 0.0.0.0 10.4.3.101 0.0.0.0 UG 0 0 0 eth0 10.4.3.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 ubuntu@web1:~$ ping -c 3 db1 PING db1 (10.4.5.201) 56(84) bytes of data. 64 bytes from db1 (10.4.5.201): icmp_seq=1 ttl=63 time=0.891 ms 64 bytes from db1 (10.4.5.201): icmp_seq=2 ttl=63 time=0.916 ms 64 bytes from db1 (10.4.5.201): icmp_seq=3 ttl=63 time=1.04 ms --- db1 ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 2002ms rtt min/avg/max/mdev = 0.891/0.951/1.047/0.072 ms
  • 28. Step 4: Scaling with ECMP • ECMP weighted round robin in private data center • Distributes the load across multiple VM-Series instances AZ1cAZ1b Web1-01 Web1-02 Web2-01 Web2-02 DC-FW1 DC-FW2 Web0-01 Web0-01
  • 29. Scaling with On-Premises Load Balancer • Traffic load is shared across both private and public cloud • Static routes on firewall across multiple VPN tunnels adds redundancy • Single load balancer configuration minimizes management effort AZ1c DC-FW1 AZ1b Web1-01 Web1-02 Web2-01 Web2-02 DC-FW2 Web0-01
  • 30. Scaling with Elastic Load Balancing • Elastic Load Balancing supported natively for security scaling • Citrix NetScaler – documented in tech pubs • NGINX also proven to work AZ1cAZ1b Web2-01 Web2-02 Web1-01 Web1-02 Web1-03 Web2-03 DC-FW1 DC-FW2 Web0-01 Web0-01
  • 31. Step 5: Security Automation AWS CloudFormation Templates (CFT) • Scripted to deploy AWS resources • Ranges from basic install of the VM-Series to a fully configured environment • Check out the Hybrid Deployment Guidelines Whitepaper for a two tiered CFT example z AZ1b Web1 DB1
  • 32. Automating Firewall Deployments PAN-OS configuration Security policies BYOL licenses Software updates Dynamic content Attach to Panorama Device Group vm-series-bootstrap-aws-s3- bucket=<bucketname> Amazon S3 bucket
  • 35. Hybrid: extend your data center into AWS Segmentation: Separate applications and data for security and compliance Additional Deployments Scenarios Gateway: Protection from Internet borne threats GlobalProtect: Policy consistency for the cloud, the network, and your devices
  • 36. © 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Thank you