SlideShare a Scribd company logo
The Role of Networking in building
Secure Public/Private Clouds



                           Pere Monclus
                           Oct 18th, 2012
                  pmonclus@plumgrid.com
Networking Dilemma




   Prevent Unwanted                   Provide
   Connectivity                       Connectivity
   (default closed)                   (default open)


                 A matter of Policy
        QoS                          ∞ QoS
                        QoS
                                                       2
Why so hard? (part 1)




         Midsize Enterprise Network diagram (Cisco Safe guides)


      WHERE to apply Security Policies is harder than Connectivity

                                                                     3
The approach to Security


 Designing Network Security
 •  Adding Security as a self contained element




 Designing Secure Networks
 •  Incorporate Security from the beginning




                 Network Security is a System !!


                                                   4
Why so hard? (part 2)


  The problem doesn’t start at Network Security …


              Business Needs


               Risk Analysis


             Security Policies


              Security System



                   … often is expected to be solved by a Network Service
                                                                      5
And… what about Cloud?


                   Tenant 1               Tenant 2                    Tenant 3
                   Business Needs          Business Needs             Business Needs


                    Risk Analysis           Risk Analysis              Risk Analysis


                   Security Policies       Security Policies          Security Policies


                   Security System         Security System            Security System


Users / Tenants
                                                                                          Infrastructure
                                                                                           Guarantees
Public / Private
Cloud provider                                                 Superset of
                                       Business Needs
                                                               requirements

                                        Risk Analysis




                                       Security Policies




                                       Security System




                                                                                                           6
Cloud Provider: Tenant Isolation




                                                    Provider
                Tenant   Tenant      Tenant
     Internet                                        Control
                  1        2           3         Infrastructure




                           Cloud Provider




                                              Multitenancy
    Isolation                                 Self Provisioning
                                              Cloud Services
                                                                  7
Tenant: Networking Application Isolation


                                       Inbound/Outbound policies




                       10.0.1.0/24        10.0.2.0/24




                  VM            VM        VM            VM




         Interface attached network security policies
      Services: FW, VPN, IPS, UTM, … (pics!)


          Is this the right model in a virtual world?
                                                                   8
What is Isolation? What SLA are we willing to sign up to?

 •    Subnet separation?
 •    Security rules?
 •    Security services (FW/IPS/UTM/…)
                                                            Tenant
 •                   •  Enforcement points?
      Tenant Inbound/Outbound enforcement?                  owns?
                                 •  Common/Separate?
 •    …
                                 •  New types

                        •  How to merge policies?
 •    Network separation? Physical? Virtual?                  Provider
 •                                                            owns?
      Transit Policies? •  Policy definition vs. Policy Rendering?
 •    Data Leakage?
                        •  Proper workflows
 •    Physical Placement?
 •    Traffic confidentiality?
 •    ...



                                                                         9
Security Life Cycle


  What about?

  •    System Monitoring and Maintenance

  •    Compliance Checks

  •    Incident Response

  •    Forensics / Visibility / Analysis tools



  Who owns that?
  How do we cross from Provider to Tenant and we still
  provide simple operational models?

                                                         10
Network security and OpenStack




                                 11
OpenStack Quantum Model

                                                                    Network
                                                                    Controller
                                 Management Network

                                                                                         Compute
      Network Node(s)                                            Quantum server

      quantum-*-plugin-agent
                                      Compute Node(s)          Cloud Controller         Networking
        quantum-l3-agent
                                                                    Node
       quantum-dhcp-agent
                                      quantum-*-plugin-agent
                                                                                          Storage


                          Virtual Network
                            Data Network
                         Physical Network




                                                                                  * from Quantum Admin guide
                                                                                                        12
OpenStack Network Types




    Virtual    Virtual                Local
    Network    Ports                 Network
                                                            Tenant
               (VMs)                                       Networks

                            Linux               Overlays               Tenant
                           Bridges                                    Networks
                                                           Provider
    Physical   Physical                                    Networks
    Network    Ports              Flat
                                               VLANs
                                 Network
               (Servers)




                                                                                 13
Spoofing/MiM v2.0 (Provider Worries)


 Can I compromise/impersonate a VM/Server/Port?
 •    How to prevent the provisioning of a rogue Server
 •    How to prevent the provisioning of a rogue VM
 •    How to prevent the provisioning of a rogue Port / Taps
 But… if it happens:
 •    How to prevent the ‘connectivity’ of a rogue Server / VM / Port to
      a physical or logical network




 * Not to enter into discussions about securing the Cloud Controller


                                                                           14
Application Policy Management (Tenant Worries)


In a Virtual environment:
•    Policy definition
•    Policy Rendering
•    Policy Enforcement


•    Security Services Offering (Virtual Appliances)




                                                       15
Identity and Location to the rescue




     Understanding the linkage between Physical and Virtual

     Understanding the linkage between Identity and Address

                                                              16
Multisite Clouds




  Physical/Virtual and Identity/Address expand across Datacenters


                                                                17
Possible steps to integrate Security in OpenStack

•    Service Insertion (Choke points at the Operator and Tenant level)
     •  Physical Appliances
     •  Virtual Appliances
     •  Distributed Appliances

•    New policy capabilities
     •  Applied at the VM ifc level (definition-rendering problem)
     •  Identity based

•    Proper articulation of Virtual/Physical bindings

•    Cloud Controller workflows for security

•    Discussion on where to apply/attach global policies

•    What SLAs and Certifications will the Tenants expect?



                                                                         18
Conclusion


 •    No easy answer to Security
 •    Blurring the line between Virtual and Physical
      networks brings many additional challenges and
      OPPORTUNITIES
 •    Centralized control structures are more vulnerable.
      Need proper workflows.
 •    Incorporate Security from early stages, it is difficult to
      bolt it in



                                                                   19
Questions?


                      Pere Monclus
             pmonclus@plumgrid.com
         www.plumgrid.com


                                     20

More Related Content

What's hot

Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012Agora Group
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
Andrew Wong
 
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012
ClubHack
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
Amazon Web Services
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to Cloud
Cisco Security
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGtovmug
 
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the Application
Cisco Security
 
Sharing the Cloud
Sharing the CloudSharing the Cloud
Sharing the Cloud
Glen Roberts, CISSP
 
Safe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsASBIS SK
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust
 
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
IJIR JOURNALS IJIRUSA
 
An Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesAn Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesNiranjana Padmanabhan
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
UNIT4 IT Solutions
 
Resarch paper i cloud computing
Resarch paper   i cloud computingResarch paper   i cloud computing
Resarch paper i cloud computingBharat Gupta
 
Alcatellucentsdn2013
Alcatellucentsdn2013Alcatellucentsdn2013
Alcatellucentsdn2013
deepersnet
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
Neha Dhawan
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Acrodex
 
Network Configuration Example: Deploying Scalable Services on an MX Series Ro...
Network Configuration Example: Deploying Scalable Services on an MX Series Ro...Network Configuration Example: Deploying Scalable Services on an MX Series Ro...
Network Configuration Example: Deploying Scalable Services on an MX Series Ro...
Juniper Networks
 
Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02
abhisheknayak29
 

What's hot (20)

Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to Cloud
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the Application
 
Sharing the Cloud
Sharing the CloudSharing the Cloud
Sharing the Cloud
 
Safe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security Solutions
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
 
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
 
An Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesAn Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud Resources
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 
Resarch paper i cloud computing
Resarch paper   i cloud computingResarch paper   i cloud computing
Resarch paper i cloud computing
 
Alcatellucentsdn2013
Alcatellucentsdn2013Alcatellucentsdn2013
Alcatellucentsdn2013
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
 
Network Configuration Example: Deploying Scalable Services on an MX Series Ro...
Network Configuration Example: Deploying Scalable Services on an MX Series Ro...Network Configuration Example: Deploying Scalable Services on an MX Series Ro...
Network Configuration Example: Deploying Scalable Services on an MX Series Ro...
 
XTM moving security forward
XTM moving security forwardXTM moving security forward
XTM moving security forward
 
Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02
 

Similar to Integrating network virtualization security in OpenStack Deployments.pdf

Cloud Security Topics: Network Intrusion Detection for Amazon EC2
Cloud Security Topics: Network Intrusion Detection for Amazon EC2Cloud Security Topics: Network Intrusion Detection for Amazon EC2
Cloud Security Topics: Network Intrusion Detection for Amazon EC2
Alert Logic
 
Projecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudProjecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudScientia Groups
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
n|u - The Open Security Community
 
System Center 2012: Bringing the Microsoft Private Cloud Down to Earth
System Center 2012: Bringing the Microsoft Private Cloud Down to EarthSystem Center 2012: Bringing the Microsoft Private Cloud Down to Earth
System Center 2012: Bringing the Microsoft Private Cloud Down to Earth
InnoTech
 
Network Management in System Center 2012 SP1 - VMM
Network Management in System Center 2012  SP1 - VMM Network Management in System Center 2012  SP1 - VMM
Network Management in System Center 2012 SP1 - VMM
Microsoft TechNet - Belgium and Luxembourg
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
Internap
 
Fedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slidesFedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slidesTuan Phan
 
Private cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud securityPrivate cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud security
Microsoft TechNet - Belgium and Luxembourg
 
The Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated IndustriesThe Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated Industriesdirkbeth
 
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
Forecast 2012 Panel: Security POC NAB, Terremark, TrapezoidForecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
Forecast 2012 Panel: Security POC NAB, Terremark, TrapezoidOpen Data Center Alliance
 
ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012
ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012
ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012ITCamp
 
Presentación Data Center Cablevisión Day 2010
Presentación Data Center Cablevisión Day 2010Presentación Data Center Cablevisión Day 2010
Presentación Data Center Cablevisión Day 2010Logicalis Latam
 
Layer 7 & Burton Group: New Cloud Security Model Requirements
Layer 7 & Burton Group: New Cloud Security Model RequirementsLayer 7 & Burton Group: New Cloud Security Model Requirements
Layer 7 & Burton Group: New Cloud Security Model Requirements
CA API Management
 
Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1
CloudExpoEurope
 
Layer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public SectorLayer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public Sector
CA API Management
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloudTrend Micro
 
Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011chaucheckpoint
 
Triangle bdpa wo vid
Triangle bdpa wo vidTriangle bdpa wo vid
Triangle bdpa wo vidsantosomar
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in CloudLenin Aboagye
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Symosis Security (Previously C-Level Security)
 

Similar to Integrating network virtualization security in OpenStack Deployments.pdf (20)

Cloud Security Topics: Network Intrusion Detection for Amazon EC2
Cloud Security Topics: Network Intrusion Detection for Amazon EC2Cloud Security Topics: Network Intrusion Detection for Amazon EC2
Cloud Security Topics: Network Intrusion Detection for Amazon EC2
 
Projecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudProjecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the Cloud
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
System Center 2012: Bringing the Microsoft Private Cloud Down to Earth
System Center 2012: Bringing the Microsoft Private Cloud Down to EarthSystem Center 2012: Bringing the Microsoft Private Cloud Down to Earth
System Center 2012: Bringing the Microsoft Private Cloud Down to Earth
 
Network Management in System Center 2012 SP1 - VMM
Network Management in System Center 2012  SP1 - VMM Network Management in System Center 2012  SP1 - VMM
Network Management in System Center 2012 SP1 - VMM
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Fedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slidesFedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slides
 
Private cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud securityPrivate cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud security
 
The Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated IndustriesThe Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated Industries
 
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
Forecast 2012 Panel: Security POC NAB, Terremark, TrapezoidForecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
 
ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012
ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012
ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012
 
Presentación Data Center Cablevisión Day 2010
Presentación Data Center Cablevisión Day 2010Presentación Data Center Cablevisión Day 2010
Presentación Data Center Cablevisión Day 2010
 
Layer 7 & Burton Group: New Cloud Security Model Requirements
Layer 7 & Burton Group: New Cloud Security Model RequirementsLayer 7 & Burton Group: New Cloud Security Model Requirements
Layer 7 & Burton Group: New Cloud Security Model Requirements
 
Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1
 
Layer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public SectorLayer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public Sector
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 
Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011
 
Triangle bdpa wo vid
Triangle bdpa wo vidTriangle bdpa wo vid
Triangle bdpa wo vid
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 

More from OpenStack Foundation

Sponsor Webinar - OpenStack Summit Vancouver 2018
Sponsor Webinar  - OpenStack Summit Vancouver 2018Sponsor Webinar  - OpenStack Summit Vancouver 2018
Sponsor Webinar - OpenStack Summit Vancouver 2018
OpenStack Foundation
 
OpenStack Summits 101: A Guide For Attendees
OpenStack Summits 101: A Guide For AttendeesOpenStack Summits 101: A Guide For Attendees
OpenStack Summits 101: A Guide For Attendees
OpenStack Foundation
 
OpenStack Marketing Plan - Community Presentation
OpenStack Marketing Plan - Community PresentationOpenStack Marketing Plan - Community Presentation
OpenStack Marketing Plan - Community Presentation
OpenStack Foundation
 
OpenStack 5th Birthday - User Group Parties
OpenStack 5th Birthday - User Group PartiesOpenStack 5th Birthday - User Group Parties
OpenStack 5th Birthday - User Group Parties
OpenStack Foundation
 
Liberty release: Preliminary marketing materials & messages
Liberty release: Preliminary marketing materials & messagesLiberty release: Preliminary marketing materials & messages
Liberty release: Preliminary marketing materials & messages
OpenStack Foundation
 
OpenStack Foundation 2H 2015 Marketing Plan
OpenStack Foundation 2H 2015 Marketing PlanOpenStack Foundation 2H 2015 Marketing Plan
OpenStack Foundation 2H 2015 Marketing Plan
OpenStack Foundation
 
OpenStack Summit Tokyo Sponsor Webinar
OpenStack Summit Tokyo Sponsor Webinar OpenStack Summit Tokyo Sponsor Webinar
OpenStack Summit Tokyo Sponsor Webinar
OpenStack Foundation
 
Cinder Updates - Liberty Edition
Cinder Updates - Liberty Edition Cinder Updates - Liberty Edition
Cinder Updates - Liberty Edition
OpenStack Foundation
 
Glance Updates - Liberty Edition
Glance Updates - Liberty EditionGlance Updates - Liberty Edition
Glance Updates - Liberty Edition
OpenStack Foundation
 
Heat Updates - Liberty Edition
Heat Updates - Liberty EditionHeat Updates - Liberty Edition
Heat Updates - Liberty Edition
OpenStack Foundation
 
Neutron Updates - Liberty Edition
Neutron Updates - Liberty Edition Neutron Updates - Liberty Edition
Neutron Updates - Liberty Edition
OpenStack Foundation
 
Nova Updates - Liberty Edition
Nova Updates - Liberty EditionNova Updates - Liberty Edition
Nova Updates - Liberty Edition
OpenStack Foundation
 
Sahara Updates - Liberty Edition
Sahara Updates - Liberty EditionSahara Updates - Liberty Edition
Sahara Updates - Liberty Edition
OpenStack Foundation
 
Searchlight Updates - Liberty Edition
Searchlight Updates - Liberty EditionSearchlight Updates - Liberty Edition
Searchlight Updates - Liberty Edition
OpenStack Foundation
 
Trove Updates - Liberty Edition
Trove Updates - Liberty EditionTrove Updates - Liberty Edition
Trove Updates - Liberty Edition
OpenStack Foundation
 
OpenStack: five years in
OpenStack: five years inOpenStack: five years in
OpenStack: five years in
OpenStack Foundation
 
Swift Updates - Liberty Edition
Swift Updates - Liberty EditionSwift Updates - Liberty Edition
Swift Updates - Liberty Edition
OpenStack Foundation
 
Congress Updates - Liberty Edition
Congress Updates - Liberty EditionCongress Updates - Liberty Edition
Congress Updates - Liberty Edition
OpenStack Foundation
 
Release Cycle Management Updates - Liberty Edition
Release Cycle Management Updates - Liberty EditionRelease Cycle Management Updates - Liberty Edition
Release Cycle Management Updates - Liberty Edition
OpenStack Foundation
 
OpenStack Day CEE 2015: Real-World Use Cases
OpenStack Day CEE 2015: Real-World Use CasesOpenStack Day CEE 2015: Real-World Use Cases
OpenStack Day CEE 2015: Real-World Use Cases
OpenStack Foundation
 

More from OpenStack Foundation (20)

Sponsor Webinar - OpenStack Summit Vancouver 2018
Sponsor Webinar  - OpenStack Summit Vancouver 2018Sponsor Webinar  - OpenStack Summit Vancouver 2018
Sponsor Webinar - OpenStack Summit Vancouver 2018
 
OpenStack Summits 101: A Guide For Attendees
OpenStack Summits 101: A Guide For AttendeesOpenStack Summits 101: A Guide For Attendees
OpenStack Summits 101: A Guide For Attendees
 
OpenStack Marketing Plan - Community Presentation
OpenStack Marketing Plan - Community PresentationOpenStack Marketing Plan - Community Presentation
OpenStack Marketing Plan - Community Presentation
 
OpenStack 5th Birthday - User Group Parties
OpenStack 5th Birthday - User Group PartiesOpenStack 5th Birthday - User Group Parties
OpenStack 5th Birthday - User Group Parties
 
Liberty release: Preliminary marketing materials & messages
Liberty release: Preliminary marketing materials & messagesLiberty release: Preliminary marketing materials & messages
Liberty release: Preliminary marketing materials & messages
 
OpenStack Foundation 2H 2015 Marketing Plan
OpenStack Foundation 2H 2015 Marketing PlanOpenStack Foundation 2H 2015 Marketing Plan
OpenStack Foundation 2H 2015 Marketing Plan
 
OpenStack Summit Tokyo Sponsor Webinar
OpenStack Summit Tokyo Sponsor Webinar OpenStack Summit Tokyo Sponsor Webinar
OpenStack Summit Tokyo Sponsor Webinar
 
Cinder Updates - Liberty Edition
Cinder Updates - Liberty Edition Cinder Updates - Liberty Edition
Cinder Updates - Liberty Edition
 
Glance Updates - Liberty Edition
Glance Updates - Liberty EditionGlance Updates - Liberty Edition
Glance Updates - Liberty Edition
 
Heat Updates - Liberty Edition
Heat Updates - Liberty EditionHeat Updates - Liberty Edition
Heat Updates - Liberty Edition
 
Neutron Updates - Liberty Edition
Neutron Updates - Liberty Edition Neutron Updates - Liberty Edition
Neutron Updates - Liberty Edition
 
Nova Updates - Liberty Edition
Nova Updates - Liberty EditionNova Updates - Liberty Edition
Nova Updates - Liberty Edition
 
Sahara Updates - Liberty Edition
Sahara Updates - Liberty EditionSahara Updates - Liberty Edition
Sahara Updates - Liberty Edition
 
Searchlight Updates - Liberty Edition
Searchlight Updates - Liberty EditionSearchlight Updates - Liberty Edition
Searchlight Updates - Liberty Edition
 
Trove Updates - Liberty Edition
Trove Updates - Liberty EditionTrove Updates - Liberty Edition
Trove Updates - Liberty Edition
 
OpenStack: five years in
OpenStack: five years inOpenStack: five years in
OpenStack: five years in
 
Swift Updates - Liberty Edition
Swift Updates - Liberty EditionSwift Updates - Liberty Edition
Swift Updates - Liberty Edition
 
Congress Updates - Liberty Edition
Congress Updates - Liberty EditionCongress Updates - Liberty Edition
Congress Updates - Liberty Edition
 
Release Cycle Management Updates - Liberty Edition
Release Cycle Management Updates - Liberty EditionRelease Cycle Management Updates - Liberty Edition
Release Cycle Management Updates - Liberty Edition
 
OpenStack Day CEE 2015: Real-World Use Cases
OpenStack Day CEE 2015: Real-World Use CasesOpenStack Day CEE 2015: Real-World Use Cases
OpenStack Day CEE 2015: Real-World Use Cases
 

Integrating network virtualization security in OpenStack Deployments.pdf

  • 1. The Role of Networking in building Secure Public/Private Clouds Pere Monclus Oct 18th, 2012 pmonclus@plumgrid.com
  • 2. Networking Dilemma Prevent Unwanted Provide Connectivity Connectivity (default closed) (default open) A matter of Policy  QoS ∞ QoS QoS 2
  • 3. Why so hard? (part 1) Midsize Enterprise Network diagram (Cisco Safe guides) WHERE to apply Security Policies is harder than Connectivity 3
  • 4. The approach to Security Designing Network Security •  Adding Security as a self contained element Designing Secure Networks •  Incorporate Security from the beginning Network Security is a System !! 4
  • 5. Why so hard? (part 2) The problem doesn’t start at Network Security … Business Needs Risk Analysis Security Policies Security System … often is expected to be solved by a Network Service 5
  • 6. And… what about Cloud? Tenant 1 Tenant 2 Tenant 3 Business Needs Business Needs Business Needs Risk Analysis Risk Analysis Risk Analysis Security Policies Security Policies Security Policies Security System Security System Security System Users / Tenants Infrastructure Guarantees Public / Private Cloud provider Superset of Business Needs requirements Risk Analysis Security Policies Security System 6
  • 7. Cloud Provider: Tenant Isolation Provider Tenant Tenant Tenant Internet Control 1 2 3 Infrastructure Cloud Provider Multitenancy Isolation Self Provisioning Cloud Services 7
  • 8. Tenant: Networking Application Isolation Inbound/Outbound policies 10.0.1.0/24 10.0.2.0/24 VM VM VM VM Interface attached network security policies Services: FW, VPN, IPS, UTM, … (pics!) Is this the right model in a virtual world? 8
  • 9. What is Isolation? What SLA are we willing to sign up to? •  Subnet separation? •  Security rules? •  Security services (FW/IPS/UTM/…) Tenant •  •  Enforcement points? Tenant Inbound/Outbound enforcement? owns? •  Common/Separate? •  … •  New types •  How to merge policies? •  Network separation? Physical? Virtual? Provider •  owns? Transit Policies? •  Policy definition vs. Policy Rendering? •  Data Leakage? •  Proper workflows •  Physical Placement? •  Traffic confidentiality? •  ... 9
  • 10. Security Life Cycle What about? •  System Monitoring and Maintenance •  Compliance Checks •  Incident Response •  Forensics / Visibility / Analysis tools Who owns that? How do we cross from Provider to Tenant and we still provide simple operational models? 10
  • 11. Network security and OpenStack 11
  • 12. OpenStack Quantum Model Network Controller Management Network Compute Network Node(s) Quantum server quantum-*-plugin-agent Compute Node(s) Cloud Controller Networking quantum-l3-agent Node quantum-dhcp-agent quantum-*-plugin-agent Storage Virtual Network Data Network Physical Network * from Quantum Admin guide 12
  • 13. OpenStack Network Types Virtual Virtual Local Network Ports Network Tenant (VMs) Networks Linux Overlays Tenant Bridges Networks Provider Physical Physical Networks Network Ports Flat VLANs Network (Servers) 13
  • 14. Spoofing/MiM v2.0 (Provider Worries) Can I compromise/impersonate a VM/Server/Port? •  How to prevent the provisioning of a rogue Server •  How to prevent the provisioning of a rogue VM •  How to prevent the provisioning of a rogue Port / Taps But… if it happens: •  How to prevent the ‘connectivity’ of a rogue Server / VM / Port to a physical or logical network * Not to enter into discussions about securing the Cloud Controller 14
  • 15. Application Policy Management (Tenant Worries) In a Virtual environment: •  Policy definition •  Policy Rendering •  Policy Enforcement •  Security Services Offering (Virtual Appliances) 15
  • 16. Identity and Location to the rescue Understanding the linkage between Physical and Virtual Understanding the linkage between Identity and Address 16
  • 17. Multisite Clouds Physical/Virtual and Identity/Address expand across Datacenters 17
  • 18. Possible steps to integrate Security in OpenStack •  Service Insertion (Choke points at the Operator and Tenant level) •  Physical Appliances •  Virtual Appliances •  Distributed Appliances •  New policy capabilities •  Applied at the VM ifc level (definition-rendering problem) •  Identity based •  Proper articulation of Virtual/Physical bindings •  Cloud Controller workflows for security •  Discussion on where to apply/attach global policies •  What SLAs and Certifications will the Tenants expect? 18
  • 19. Conclusion •  No easy answer to Security •  Blurring the line between Virtual and Physical networks brings many additional challenges and OPPORTUNITIES •  Centralized control structures are more vulnerable. Need proper workflows. •  Incorporate Security from early stages, it is difficult to bolt it in 19
  • 20. Questions? Pere Monclus pmonclus@plumgrid.com www.plumgrid.com 20