SlideShare a Scribd company logo
1
Monitoring and Securing a Geo-Dispersed Data
Center
Doug Babb, Chief Architect – HEDC, SI Inc. contractor
Frank Unpingco, Cybersecurity Subject Matter Expert – HEDC, SI Inc. contractor
Nate Benson, Cloud Hosting Subject Matter Expert – HEDC, SI Inc. contractor
October 25th, 2018
2
America’s Best –
Ready to Fly, Fight, Win Together
Disclaimer:
This session does not
represent a product
endorsement by the United
States Air Force, Hill Air
Force Base or any other
component of the
Department of Defense.
3
Hill Enterprise Data Center
(HEDC) 

- Information System Hosting Service



- Private Cloud Infrastructure supporting Engineered
PaaS



-Business Agility 



-Time-to-Value



-Positive Outcomes 











4
HEDC Information System Hosting Service
Engineered Platform-as-a-Service
Hosted Information System A
Hosted Information System
Support Services:
• Backup and Recovery Services
• File Services and Dataset Archival
(SaaS)
• Log Aggregation and Analysis
• SecOps, Compliance, STIG’ing
• Change Management Support
Facilities Infrastructure: • Base Power & Capital Assets
Hosted Information System B Hosted Information System C
Hosted Platform (PaaS)
Automation and Service Catalog
Virtualization – Software Defined Infrastructure
Compute, Storage, Network Infrastructure Hardware
Base Facilities Infrastructure: • Base Electrical Power and Comms Access
• Capital Infrastructure
HEDC Engineers
and Operational
Personnel
Base Civil Eng.
IS App Admin
• Database Administration
• Application Tier
Administration
• ERP Application Support
• BI and Analytics
5
HEDC Private Cloud – Geo-Dispersed Infrastructure
HEDC Engineered PaaS Deployed to Portable Operating Data Centers (PODs) and
Commercial Cloud
GovCloud West
GovCloud East
6
HEDC Private Cloud – Geo-Dispersed Infrastructure
HEDC Engineered PaaS Deployed to Commercial Cloud Service Providers (CSPs)
& Secure Anywhere
7
HEDC Logging Use-Case
HEDC – Log Aggregation and Analysis Service
1. Logs from all component layers of the Engineered PaaS gathered and aggregated for
correlation
2. Simple instrumentation method for a wide-variety of infrastructure components and a
diverse collection of hosted information systems
3. Gather and aggregate logs for each unique hosted information system without
inappropriately exposing information that pertains to the underlying PaaS infrastructure to
tenants
4. Self-help/self-service for information system owners and application administrators to
access and analyze logs specific to their information system.
8
HEDC Logging Use-Case – continued
HEDC – Log Aggregation and Analysis Service
5. Co-existence with other systems of record and stand-alone services leveraging these
systems/services by correlating their content with PaaS content and applying a consistent
machine learning toolset to the correlated content
6. Provide log aggregation and analysis service across all Information Systems and
supporting infrastructure regardless of geographic location; provide cross-boundary
forensics capability
7. Support continuous compliance monitoring and compliance automation for Risk
Management Framework (RMF) Compliance and for Command Cyber Readiness
Inspection (CCRI)
8. Provide a mitigation backstop for legacy Information Systems that do not comply with the
requirements of NIST SP 800-53 Audit and Accountability Controls
9
ECE Deployment Example – Tenant Information System Deployments
10
ECE Deployment Example – PaaS Infrastructure Deployment
11
Nodes (X)Logstash
HEDC Log Aggregation and Analysis Service Architecture
Beats
Load Balancer
Elastic Cloud
Enterprise
X-pack
Stacks (X)
Big-IP VE (X)
Info Sys A Info Sys B Info Sys C Info Sys D HEDC Infrastructure
Syslog
Machine
Learning
Physical Infrastructure
Hosted Information
System Support
Services
Virtual Infrastructure
A01 D03D02D01C03C02C01B03B02B01A03A02
Information System A Information System B Information System C Information System D
Active for Traffic Group 1, Standby for Traffic Group 2 Active for Traffic Group 2, Standby for Traffic Group 1
vips
12
Translate Filter
w/Memcache
Plugin
FileBeats, Logstash, and Elastic Cloud Enterprise
Logstash Enrichment Layer
Logstash
Elastic Cloud
Enterprise
Information System A HEDC Infrastructure
Route
A01 A03A02
Information System A
Scalable Enrichment
Layer
ECE Deployment
Layer
13
Translate Filter
w/Memcache
Plugin
FileBeats, Logstash, and Elastic Cloud Enterprise
Logstash Enrichment Layer
Logstash
Elastic Cloud
Enterprise
Information System A HEDC Infrastructure
Route
A01 A03A02
Information System A
Scalable Enrichment
Layer
ECE Deployment
Layer
14
Information System Lookup System
Example of Customer/Information System Data Records Used to Enrich Logs Via
Lookups (NOTE: Records are Simplified, Truncated & Fictionalized)
INFO_SYS_UID CUST_UID ITIPS_UID EMASS_UID INFO_SYS_NAME CUST_NAME
X00A 001 PD-4757-G7XY 9583-YQBM-47 Information System A KWYF
X00B 003 AV-8975-P9UX 6197-XHQQ-20 Information System B VZVA
X00C 002 XF-2364-S4DT 8354-NABX-82 Information System C ECSZ
X00D 004 FT-7207-L0ZB 1551-ACTP-77 Information System D HNAV
X00E 003 CZ-9851-B0ML 2913-lHBB-46 Information System E VZVA
X00F 001 GJ-7422-J0FG 4730-BMBP-77 Information System F KWYF
15
Logstash Enrichment Example -
Pseudo Code for Column/Key-Value Lookup:
/* Use Translate Filter to support a lookup request to compare unique customer ID and unique information system ID to provide log routing to the appropriate
ECE deployments.
For example, Information System E supports customer VZVA and has a Java application element running on a VM.
All VM's for Information System E follow a standard that contains the unique information system ID as well as VZVA’s unique customer ID as part of its
hostname:

X00E == Information System E UID
0003 == Customer VZVA UID
The Java application VM has a hostname like X00E.0003.host-001 and all logs from this VM are delivered to Logstash via FileBeat where a Logstash Filter will
perform column/key-value pair lookup from an external data source and will route the logs to both the Information System E ECE instance and the
Infrastructure ECE instance.

In the Logstash configuration we codify this with pseudo logic: */

(info_sys_uid, cust_uid) = getInfoSystem(beat_host_name)
es_cluster_name = getCluster(info_sys_uid) # does lookup
if info_sys in info_sys_map {
elasticsearch_write(es_cluster_name, app_index)
}
16
Role-Based Access Control - Kibana in Tenant Information System C Deployment
17
ECE Role-Based Access Control – Kibana in PaaS Infrastructure Deployment
18
“What we need is no bullshit security
compliance! We need to gather,
correlate, and analyze everything!
We need to automate compliance!
No more paper compliance!”
From a frustrated general officer who is certainly not going to admit to saying it
19
Nodes (X)Logstash
Supporting Systems of Record with HEDC Log Aggregation and
Analysis Service Architecture
Load Balancer
Elastic Cloud
Enterprise
X-pack
Stacks (X)
Big-IP VE (X)
Info Sys A Info Sys B Info Sys C Info Sys D HEDC Infrastructure
Machine
Learning
vips
ACAS ARAD BCM SCCM TA
20
HEDC Private Cloud – Geo-Dispersed Infrastructure
Future of Log Aggregation and Analysis Service?
GovCloud West
GovCloud East
ECE v2.1
Cross Cluster Search
21
Thank You

More Related Content

What's hot

Get full visibility and find hidden security issues
Get full visibility and find hidden security issuesGet full visibility and find hidden security issues
Get full visibility and find hidden security issues
Elasticsearch
 
Kubernetes Jakarta Meetup 010 - Service Mesh Observability with Kiali
Kubernetes Jakarta Meetup 010 - Service Mesh Observability with KialiKubernetes Jakarta Meetup 010 - Service Mesh Observability with Kiali
Kubernetes Jakarta Meetup 010 - Service Mesh Observability with Kiali
Yusuf Hadiwinata Sutandar
 
Get full visibility and find hidden security issues
Get full visibility and find hidden security issuesGet full visibility and find hidden security issues
Get full visibility and find hidden security issues
Elasticsearch
 
Transformational Search Performance with EnergyIQ
Transformational Search Performance with EnergyIQ Transformational Search Performance with EnergyIQ
Transformational Search Performance with EnergyIQ
Elasticsearch
 
Elastic community Abidjan #225 meetup 08 May 2021
Elastic community Abidjan #225 meetup 08 May 2021Elastic community Abidjan #225 meetup 08 May 2021
Elastic community Abidjan #225 meetup 08 May 2021
Yassine, LASRI
 
Webinar elastic stack {on telecom} english webinar part (1)
Webinar elastic stack {on telecom} english webinar part (1)Webinar elastic stack {on telecom} english webinar part (1)
Webinar elastic stack {on telecom} english webinar part (1)
Yassine, LASRI
 
Big Data security: Facing the challenge by Carlos Gómez at Big Data Spain 2017
Big Data security: Facing the challenge by Carlos Gómez at Big Data Spain 2017Big Data security: Facing the challenge by Carlos Gómez at Big Data Spain 2017
Big Data security: Facing the challenge by Carlos Gómez at Big Data Spain 2017
Big Data Spain
 
Enterprise data management for microsoft hd insight
Enterprise data management for microsoft hd insightEnterprise data management for microsoft hd insight
Enterprise data management for microsoft hd insight
Jana Lass
 
End-to-End Security Analytics with the Elastic Stack
End-to-End Security Analytics with the Elastic StackEnd-to-End Security Analytics with the Elastic Stack
End-to-End Security Analytics with the Elastic Stack
Elasticsearch
 
Will County Sheriff’s Office: Solving Crime with Data
Will County Sheriff’s Office: Solving Crime with DataWill County Sheriff’s Office: Solving Crime with Data
Will County Sheriff’s Office: Solving Crime with Data
Elasticsearch
 
IoT meets AI in the Clouds
IoT meets AI in the CloudsIoT meets AI in the Clouds
IoT meets AI in the Clouds
Dr. Mirko Kämpf
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
Elasticsearch
 
Elastic and Google: Observability for multicloud and hybrid environments
Elastic and Google: Observability for multicloud and hybrid environmentsElastic and Google: Observability for multicloud and hybrid environments
Elastic and Google: Observability for multicloud and hybrid environments
Elasticsearch
 
Combining Logs, Metrics, and Traces for Unified Observability
Combining Logs, Metrics, and Traces for Unified ObservabilityCombining Logs, Metrics, and Traces for Unified Observability
Combining Logs, Metrics, and Traces for Unified Observability
Elasticsearch
 
Keynote: Elastic Security evolution and vision
Keynote: Elastic Security evolution and visionKeynote: Elastic Security evolution and vision
Keynote: Elastic Security evolution and vision
Elasticsearch
 
CI/CD for a Data Platform
CI/CD for a Data PlatformCI/CD for a Data Platform
CI/CD for a Data Platform
Codit
 
Blockchain and Apache NiFi
Blockchain and Apache NiFiBlockchain and Apache NiFi
Blockchain and Apache NiFi
Timothy Spann
 
Managing the Dewey Decimal System
Managing the Dewey Decimal SystemManaging the Dewey Decimal System
Managing the Dewey Decimal System
DataWorks Summit
 
The Life of an Internet of Things Electron
The Life of an Internet of Things ElectronThe Life of an Internet of Things Electron
The Life of an Internet of Things Electron
DataWorks Summit/Hadoop Summit
 
Talend introduction v1
Talend introduction v1Talend introduction v1
Talend introduction v1
Softnix Technology
 

What's hot (20)

Get full visibility and find hidden security issues
Get full visibility and find hidden security issuesGet full visibility and find hidden security issues
Get full visibility and find hidden security issues
 
Kubernetes Jakarta Meetup 010 - Service Mesh Observability with Kiali
Kubernetes Jakarta Meetup 010 - Service Mesh Observability with KialiKubernetes Jakarta Meetup 010 - Service Mesh Observability with Kiali
Kubernetes Jakarta Meetup 010 - Service Mesh Observability with Kiali
 
Get full visibility and find hidden security issues
Get full visibility and find hidden security issuesGet full visibility and find hidden security issues
Get full visibility and find hidden security issues
 
Transformational Search Performance with EnergyIQ
Transformational Search Performance with EnergyIQ Transformational Search Performance with EnergyIQ
Transformational Search Performance with EnergyIQ
 
Elastic community Abidjan #225 meetup 08 May 2021
Elastic community Abidjan #225 meetup 08 May 2021Elastic community Abidjan #225 meetup 08 May 2021
Elastic community Abidjan #225 meetup 08 May 2021
 
Webinar elastic stack {on telecom} english webinar part (1)
Webinar elastic stack {on telecom} english webinar part (1)Webinar elastic stack {on telecom} english webinar part (1)
Webinar elastic stack {on telecom} english webinar part (1)
 
Big Data security: Facing the challenge by Carlos Gómez at Big Data Spain 2017
Big Data security: Facing the challenge by Carlos Gómez at Big Data Spain 2017Big Data security: Facing the challenge by Carlos Gómez at Big Data Spain 2017
Big Data security: Facing the challenge by Carlos Gómez at Big Data Spain 2017
 
Enterprise data management for microsoft hd insight
Enterprise data management for microsoft hd insightEnterprise data management for microsoft hd insight
Enterprise data management for microsoft hd insight
 
End-to-End Security Analytics with the Elastic Stack
End-to-End Security Analytics with the Elastic StackEnd-to-End Security Analytics with the Elastic Stack
End-to-End Security Analytics with the Elastic Stack
 
Will County Sheriff’s Office: Solving Crime with Data
Will County Sheriff’s Office: Solving Crime with DataWill County Sheriff’s Office: Solving Crime with Data
Will County Sheriff’s Office: Solving Crime with Data
 
IoT meets AI in the Clouds
IoT meets AI in the CloudsIoT meets AI in the Clouds
IoT meets AI in the Clouds
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
Elastic and Google: Observability for multicloud and hybrid environments
Elastic and Google: Observability for multicloud and hybrid environmentsElastic and Google: Observability for multicloud and hybrid environments
Elastic and Google: Observability for multicloud and hybrid environments
 
Combining Logs, Metrics, and Traces for Unified Observability
Combining Logs, Metrics, and Traces for Unified ObservabilityCombining Logs, Metrics, and Traces for Unified Observability
Combining Logs, Metrics, and Traces for Unified Observability
 
Keynote: Elastic Security evolution and vision
Keynote: Elastic Security evolution and visionKeynote: Elastic Security evolution and vision
Keynote: Elastic Security evolution and vision
 
CI/CD for a Data Platform
CI/CD for a Data PlatformCI/CD for a Data Platform
CI/CD for a Data Platform
 
Blockchain and Apache NiFi
Blockchain and Apache NiFiBlockchain and Apache NiFi
Blockchain and Apache NiFi
 
Managing the Dewey Decimal System
Managing the Dewey Decimal SystemManaging the Dewey Decimal System
Managing the Dewey Decimal System
 
The Life of an Internet of Things Electron
The Life of an Internet of Things ElectronThe Life of an Internet of Things Electron
The Life of an Internet of Things Electron
 
Talend introduction v1
Talend introduction v1Talend introduction v1
Talend introduction v1
 

Similar to Monitoring and Securing a Geo-Dispersed Data Center at Hill AFB

GemFire In Memory Data Grid
GemFire In Memory Data GridGemFire In Memory Data Grid
GemFire In Memory Data GridDmitry Buzdin
 
Empower Your Security Practitioners with Elastic SIEM
Empower Your Security Practitioners with Elastic SIEMEmpower Your Security Practitioners with Elastic SIEM
Empower Your Security Practitioners with Elastic SIEM
Elasticsearch
 
FOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptxFOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptx
ssuser20fcbe
 
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Kevin Mao
 
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsIncredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Robb Boyd
 
Enhanced linkeddata architecture for persistent sharing environments elaps...
Enhanced linkeddata architecture for persistent sharing environments    elaps...Enhanced linkeddata architecture for persistent sharing environments    elaps...
Enhanced linkeddata architecture for persistent sharing environments elaps...
David L. Woolfenden
 
CIP for PCI 4.0 Solution Guide for ArcSight Logger
CIP for PCI 4.0 Solution Guide for ArcSight LoggerCIP for PCI 4.0 Solution Guide for ArcSight Logger
CIP for PCI 4.0 Solution Guide for ArcSight Logger
protect724rkeer
 
Distributed Data Processing for Real-time Applications
Distributed Data Processing for Real-time ApplicationsDistributed Data Processing for Real-time Applications
Distributed Data Processing for Real-time Applications
ScyllaDB
 
Trusted Reliability & Performance with the AppExchange Platform
Trusted Reliability & Performance with the AppExchange PlatformTrusted Reliability & Performance with the AppExchange Platform
Trusted Reliability & Performance with the AppExchange Platformdreamforce2006
 
TechEd NZ 2014: Intelligent Systems Service - Concept, Code and Demo
TechEd NZ 2014: Intelligent Systems Service - Concept, Code and DemoTechEd NZ 2014: Intelligent Systems Service - Concept, Code and Demo
TechEd NZ 2014: Intelligent Systems Service - Concept, Code and Demo
Intergen
 
Track 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptx
Track 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptxTrack 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptx
Track 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptxAmazon Web Services
 
Data Mesh Part 4 Monolith to Mesh
Data Mesh Part 4 Monolith to MeshData Mesh Part 4 Monolith to Mesh
Data Mesh Part 4 Monolith to Mesh
Jeffrey T. Pollock
 
Network Monitoring Standard Content Guide for ESM 6.8c
Network Monitoring Standard Content Guide for ESM 6.8cNetwork Monitoring Standard Content Guide for ESM 6.8c
Network Monitoring Standard Content Guide for ESM 6.8c
Protect724migration
 
Introduction to Persistent Identifiers| www.eudat.eu |
Introduction to Persistent Identifiers| www.eudat.eu | Introduction to Persistent Identifiers| www.eudat.eu |
Introduction to Persistent Identifiers| www.eudat.eu |
EUDAT
 
Azure data analytics platform - A reference architecture
Azure data analytics platform - A reference architecture Azure data analytics platform - A reference architecture
Azure data analytics platform - A reference architecture
Rajesh Kumar
 
Segue Capabilities Briefing Winter 2010
Segue Capabilities Briefing Winter 2010Segue Capabilities Briefing Winter 2010
Segue Capabilities Briefing Winter 2010DavidHart
 
CYBER SECURITY.pdf
CYBER SECURITY.pdfCYBER SECURITY.pdf
CYBER SECURITY.pdf
PreetP4
 
CIP IT Governance 5.0 Solution Guide for ArcSight Logger
CIP IT Governance 5.0 Solution Guide for ArcSight LoggerCIP IT Governance 5.0 Solution Guide for ArcSight Logger
CIP IT Governance 5.0 Solution Guide for ArcSight Logger
protect724rkeer
 
(ARC346) Scaling To 25 Billion Daily Requests Within 3 Months On AWS
(ARC346) Scaling To 25 Billion Daily Requests Within 3 Months On AWS(ARC346) Scaling To 25 Billion Daily Requests Within 3 Months On AWS
(ARC346) Scaling To 25 Billion Daily Requests Within 3 Months On AWS
Amazon Web Services
 

Similar to Monitoring and Securing a Geo-Dispersed Data Center at Hill AFB (20)

GemFire In-Memory Data Grid
GemFire In-Memory Data GridGemFire In-Memory Data Grid
GemFire In-Memory Data Grid
 
GemFire In Memory Data Grid
GemFire In Memory Data GridGemFire In Memory Data Grid
GemFire In Memory Data Grid
 
Empower Your Security Practitioners with Elastic SIEM
Empower Your Security Practitioners with Elastic SIEMEmpower Your Security Practitioners with Elastic SIEM
Empower Your Security Practitioners with Elastic SIEM
 
FOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptxFOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptx
 
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
 
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsIncredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
 
Enhanced linkeddata architecture for persistent sharing environments elaps...
Enhanced linkeddata architecture for persistent sharing environments    elaps...Enhanced linkeddata architecture for persistent sharing environments    elaps...
Enhanced linkeddata architecture for persistent sharing environments elaps...
 
CIP for PCI 4.0 Solution Guide for ArcSight Logger
CIP for PCI 4.0 Solution Guide for ArcSight LoggerCIP for PCI 4.0 Solution Guide for ArcSight Logger
CIP for PCI 4.0 Solution Guide for ArcSight Logger
 
Distributed Data Processing for Real-time Applications
Distributed Data Processing for Real-time ApplicationsDistributed Data Processing for Real-time Applications
Distributed Data Processing for Real-time Applications
 
Trusted Reliability & Performance with the AppExchange Platform
Trusted Reliability & Performance with the AppExchange PlatformTrusted Reliability & Performance with the AppExchange Platform
Trusted Reliability & Performance with the AppExchange Platform
 
TechEd NZ 2014: Intelligent Systems Service - Concept, Code and Demo
TechEd NZ 2014: Intelligent Systems Service - Concept, Code and DemoTechEd NZ 2014: Intelligent Systems Service - Concept, Code and Demo
TechEd NZ 2014: Intelligent Systems Service - Concept, Code and Demo
 
Track 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptx
Track 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptxTrack 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptx
Track 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptx
 
Data Mesh Part 4 Monolith to Mesh
Data Mesh Part 4 Monolith to MeshData Mesh Part 4 Monolith to Mesh
Data Mesh Part 4 Monolith to Mesh
 
Network Monitoring Standard Content Guide for ESM 6.8c
Network Monitoring Standard Content Guide for ESM 6.8cNetwork Monitoring Standard Content Guide for ESM 6.8c
Network Monitoring Standard Content Guide for ESM 6.8c
 
Introduction to Persistent Identifiers| www.eudat.eu |
Introduction to Persistent Identifiers| www.eudat.eu | Introduction to Persistent Identifiers| www.eudat.eu |
Introduction to Persistent Identifiers| www.eudat.eu |
 
Azure data analytics platform - A reference architecture
Azure data analytics platform - A reference architecture Azure data analytics platform - A reference architecture
Azure data analytics platform - A reference architecture
 
Segue Capabilities Briefing Winter 2010
Segue Capabilities Briefing Winter 2010Segue Capabilities Briefing Winter 2010
Segue Capabilities Briefing Winter 2010
 
CYBER SECURITY.pdf
CYBER SECURITY.pdfCYBER SECURITY.pdf
CYBER SECURITY.pdf
 
CIP IT Governance 5.0 Solution Guide for ArcSight Logger
CIP IT Governance 5.0 Solution Guide for ArcSight LoggerCIP IT Governance 5.0 Solution Guide for ArcSight Logger
CIP IT Governance 5.0 Solution Guide for ArcSight Logger
 
(ARC346) Scaling To 25 Billion Daily Requests Within 3 Months On AWS
(ARC346) Scaling To 25 Billion Daily Requests Within 3 Months On AWS(ARC346) Scaling To 25 Billion Daily Requests Within 3 Months On AWS
(ARC346) Scaling To 25 Billion Daily Requests Within 3 Months On AWS
 

More from Elasticsearch

An introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolboxAn introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolbox
Elasticsearch
 
From MSP to MSSP using Elastic
From MSP to MSSP using ElasticFrom MSP to MSSP using Elastic
From MSP to MSSP using Elastic
Elasticsearch
 
Cómo crear excelentes experiencias de búsqueda en sitios web
Cómo crear excelentes experiencias de búsqueda en sitios webCómo crear excelentes experiencias de búsqueda en sitios web
Cómo crear excelentes experiencias de búsqueda en sitios web
Elasticsearch
 
Te damos la bienvenida a una nueva forma de realizar búsquedas
Te damos la bienvenida a una nueva forma de realizar búsquedas Te damos la bienvenida a una nueva forma de realizar búsquedas
Te damos la bienvenida a una nueva forma de realizar búsquedas
Elasticsearch
 
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic CloudTirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
Elasticsearch
 
Comment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitablesComment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitables
Elasticsearch
 
Plongez au cœur de la recherche dans tous ses états.
Plongez au cœur de la recherche dans tous ses états.Plongez au cœur de la recherche dans tous ses états.
Plongez au cœur de la recherche dans tous ses états.
Elasticsearch
 
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
Elasticsearch
 
An introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolboxAn introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolbox
Elasticsearch
 
Welcome to a new state of find
Welcome to a new state of findWelcome to a new state of find
Welcome to a new state of find
Elasticsearch
 
Building great website search experiences
Building great website search experiencesBuilding great website search experiences
Building great website search experiences
Elasticsearch
 
Keynote: Harnessing the power of Elasticsearch for simplified search
Keynote: Harnessing the power of Elasticsearch for simplified searchKeynote: Harnessing the power of Elasticsearch for simplified search
Keynote: Harnessing the power of Elasticsearch for simplified search
Elasticsearch
 
Cómo transformar los datos en análisis con los que tomar decisiones
Cómo transformar los datos en análisis con los que tomar decisionesCómo transformar los datos en análisis con los que tomar decisiones
Cómo transformar los datos en análisis con los que tomar decisiones
Elasticsearch
 
Explore relève les défis Big Data avec Elastic Cloud
Explore relève les défis Big Data avec Elastic Cloud Explore relève les défis Big Data avec Elastic Cloud
Explore relève les défis Big Data avec Elastic Cloud
Elasticsearch
 
Comment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitablesComment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitables
Elasticsearch
 
Transforming data into actionable insights
Transforming data into actionable insightsTransforming data into actionable insights
Transforming data into actionable insights
Elasticsearch
 
Opening Keynote: Why Elastic?
Opening Keynote: Why Elastic?Opening Keynote: Why Elastic?
Opening Keynote: Why Elastic?
Elasticsearch
 
Empowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside GovernmentEmpowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside Government
Elasticsearch
 
The opportunities and challenges of data for public good
The opportunities and challenges of data for public goodThe opportunities and challenges of data for public good
The opportunities and challenges of data for public good
Elasticsearch
 
Enterprise search and unstructured data with CGI and Elastic
Enterprise search and unstructured data with CGI and ElasticEnterprise search and unstructured data with CGI and Elastic
Enterprise search and unstructured data with CGI and Elastic
Elasticsearch
 

More from Elasticsearch (20)

An introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolboxAn introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolbox
 
From MSP to MSSP using Elastic
From MSP to MSSP using ElasticFrom MSP to MSSP using Elastic
From MSP to MSSP using Elastic
 
Cómo crear excelentes experiencias de búsqueda en sitios web
Cómo crear excelentes experiencias de búsqueda en sitios webCómo crear excelentes experiencias de búsqueda en sitios web
Cómo crear excelentes experiencias de búsqueda en sitios web
 
Te damos la bienvenida a una nueva forma de realizar búsquedas
Te damos la bienvenida a una nueva forma de realizar búsquedas Te damos la bienvenida a una nueva forma de realizar búsquedas
Te damos la bienvenida a una nueva forma de realizar búsquedas
 
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic CloudTirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
 
Comment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitablesComment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitables
 
Plongez au cœur de la recherche dans tous ses états.
Plongez au cœur de la recherche dans tous ses états.Plongez au cœur de la recherche dans tous ses états.
Plongez au cœur de la recherche dans tous ses états.
 
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
 
An introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolboxAn introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolbox
 
Welcome to a new state of find
Welcome to a new state of findWelcome to a new state of find
Welcome to a new state of find
 
Building great website search experiences
Building great website search experiencesBuilding great website search experiences
Building great website search experiences
 
Keynote: Harnessing the power of Elasticsearch for simplified search
Keynote: Harnessing the power of Elasticsearch for simplified searchKeynote: Harnessing the power of Elasticsearch for simplified search
Keynote: Harnessing the power of Elasticsearch for simplified search
 
Cómo transformar los datos en análisis con los que tomar decisiones
Cómo transformar los datos en análisis con los que tomar decisionesCómo transformar los datos en análisis con los que tomar decisiones
Cómo transformar los datos en análisis con los que tomar decisiones
 
Explore relève les défis Big Data avec Elastic Cloud
Explore relève les défis Big Data avec Elastic Cloud Explore relève les défis Big Data avec Elastic Cloud
Explore relève les défis Big Data avec Elastic Cloud
 
Comment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitablesComment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitables
 
Transforming data into actionable insights
Transforming data into actionable insightsTransforming data into actionable insights
Transforming data into actionable insights
 
Opening Keynote: Why Elastic?
Opening Keynote: Why Elastic?Opening Keynote: Why Elastic?
Opening Keynote: Why Elastic?
 
Empowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside GovernmentEmpowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside Government
 
The opportunities and challenges of data for public good
The opportunities and challenges of data for public goodThe opportunities and challenges of data for public good
The opportunities and challenges of data for public good
 
Enterprise search and unstructured data with CGI and Elastic
Enterprise search and unstructured data with CGI and ElasticEnterprise search and unstructured data with CGI and Elastic
Enterprise search and unstructured data with CGI and Elastic
 

Recently uploaded

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 

Monitoring and Securing a Geo-Dispersed Data Center at Hill AFB

  • 1. 1 Monitoring and Securing a Geo-Dispersed Data Center Doug Babb, Chief Architect – HEDC, SI Inc. contractor Frank Unpingco, Cybersecurity Subject Matter Expert – HEDC, SI Inc. contractor Nate Benson, Cloud Hosting Subject Matter Expert – HEDC, SI Inc. contractor October 25th, 2018
  • 2. 2 America’s Best – Ready to Fly, Fight, Win Together Disclaimer: This session does not represent a product endorsement by the United States Air Force, Hill Air Force Base or any other component of the Department of Defense.
  • 3. 3 Hill Enterprise Data Center (HEDC) 
 - Information System Hosting Service
 
 - Private Cloud Infrastructure supporting Engineered PaaS
 
 -Business Agility 
 
 -Time-to-Value
 
 -Positive Outcomes 
 
 
 
 
 

  • 4. 4 HEDC Information System Hosting Service Engineered Platform-as-a-Service Hosted Information System A Hosted Information System Support Services: • Backup and Recovery Services • File Services and Dataset Archival (SaaS) • Log Aggregation and Analysis • SecOps, Compliance, STIG’ing • Change Management Support Facilities Infrastructure: • Base Power & Capital Assets Hosted Information System B Hosted Information System C Hosted Platform (PaaS) Automation and Service Catalog Virtualization – Software Defined Infrastructure Compute, Storage, Network Infrastructure Hardware Base Facilities Infrastructure: • Base Electrical Power and Comms Access • Capital Infrastructure HEDC Engineers and Operational Personnel Base Civil Eng. IS App Admin • Database Administration • Application Tier Administration • ERP Application Support • BI and Analytics
  • 5. 5 HEDC Private Cloud – Geo-Dispersed Infrastructure HEDC Engineered PaaS Deployed to Portable Operating Data Centers (PODs) and Commercial Cloud GovCloud West GovCloud East
  • 6. 6 HEDC Private Cloud – Geo-Dispersed Infrastructure HEDC Engineered PaaS Deployed to Commercial Cloud Service Providers (CSPs) & Secure Anywhere
  • 7. 7 HEDC Logging Use-Case HEDC – Log Aggregation and Analysis Service 1. Logs from all component layers of the Engineered PaaS gathered and aggregated for correlation 2. Simple instrumentation method for a wide-variety of infrastructure components and a diverse collection of hosted information systems 3. Gather and aggregate logs for each unique hosted information system without inappropriately exposing information that pertains to the underlying PaaS infrastructure to tenants 4. Self-help/self-service for information system owners and application administrators to access and analyze logs specific to their information system.
  • 8. 8 HEDC Logging Use-Case – continued HEDC – Log Aggregation and Analysis Service 5. Co-existence with other systems of record and stand-alone services leveraging these systems/services by correlating their content with PaaS content and applying a consistent machine learning toolset to the correlated content 6. Provide log aggregation and analysis service across all Information Systems and supporting infrastructure regardless of geographic location; provide cross-boundary forensics capability 7. Support continuous compliance monitoring and compliance automation for Risk Management Framework (RMF) Compliance and for Command Cyber Readiness Inspection (CCRI) 8. Provide a mitigation backstop for legacy Information Systems that do not comply with the requirements of NIST SP 800-53 Audit and Accountability Controls
  • 9. 9 ECE Deployment Example – Tenant Information System Deployments
  • 10. 10 ECE Deployment Example – PaaS Infrastructure Deployment
  • 11. 11 Nodes (X)Logstash HEDC Log Aggregation and Analysis Service Architecture Beats Load Balancer Elastic Cloud Enterprise X-pack Stacks (X) Big-IP VE (X) Info Sys A Info Sys B Info Sys C Info Sys D HEDC Infrastructure Syslog Machine Learning Physical Infrastructure Hosted Information System Support Services Virtual Infrastructure A01 D03D02D01C03C02C01B03B02B01A03A02 Information System A Information System B Information System C Information System D Active for Traffic Group 1, Standby for Traffic Group 2 Active for Traffic Group 2, Standby for Traffic Group 1 vips
  • 12. 12 Translate Filter w/Memcache Plugin FileBeats, Logstash, and Elastic Cloud Enterprise Logstash Enrichment Layer Logstash Elastic Cloud Enterprise Information System A HEDC Infrastructure Route A01 A03A02 Information System A Scalable Enrichment Layer ECE Deployment Layer
  • 13. 13 Translate Filter w/Memcache Plugin FileBeats, Logstash, and Elastic Cloud Enterprise Logstash Enrichment Layer Logstash Elastic Cloud Enterprise Information System A HEDC Infrastructure Route A01 A03A02 Information System A Scalable Enrichment Layer ECE Deployment Layer
  • 14. 14 Information System Lookup System Example of Customer/Information System Data Records Used to Enrich Logs Via Lookups (NOTE: Records are Simplified, Truncated & Fictionalized) INFO_SYS_UID CUST_UID ITIPS_UID EMASS_UID INFO_SYS_NAME CUST_NAME X00A 001 PD-4757-G7XY 9583-YQBM-47 Information System A KWYF X00B 003 AV-8975-P9UX 6197-XHQQ-20 Information System B VZVA X00C 002 XF-2364-S4DT 8354-NABX-82 Information System C ECSZ X00D 004 FT-7207-L0ZB 1551-ACTP-77 Information System D HNAV X00E 003 CZ-9851-B0ML 2913-lHBB-46 Information System E VZVA X00F 001 GJ-7422-J0FG 4730-BMBP-77 Information System F KWYF
  • 15. 15 Logstash Enrichment Example - Pseudo Code for Column/Key-Value Lookup: /* Use Translate Filter to support a lookup request to compare unique customer ID and unique information system ID to provide log routing to the appropriate ECE deployments. For example, Information System E supports customer VZVA and has a Java application element running on a VM. All VM's for Information System E follow a standard that contains the unique information system ID as well as VZVA’s unique customer ID as part of its hostname:
 X00E == Information System E UID 0003 == Customer VZVA UID The Java application VM has a hostname like X00E.0003.host-001 and all logs from this VM are delivered to Logstash via FileBeat where a Logstash Filter will perform column/key-value pair lookup from an external data source and will route the logs to both the Information System E ECE instance and the Infrastructure ECE instance.
 In the Logstash configuration we codify this with pseudo logic: */
 (info_sys_uid, cust_uid) = getInfoSystem(beat_host_name) es_cluster_name = getCluster(info_sys_uid) # does lookup if info_sys in info_sys_map { elasticsearch_write(es_cluster_name, app_index) }
  • 16. 16 Role-Based Access Control - Kibana in Tenant Information System C Deployment
  • 17. 17 ECE Role-Based Access Control – Kibana in PaaS Infrastructure Deployment
  • 18. 18 “What we need is no bullshit security compliance! We need to gather, correlate, and analyze everything! We need to automate compliance! No more paper compliance!” From a frustrated general officer who is certainly not going to admit to saying it
  • 19. 19 Nodes (X)Logstash Supporting Systems of Record with HEDC Log Aggregation and Analysis Service Architecture Load Balancer Elastic Cloud Enterprise X-pack Stacks (X) Big-IP VE (X) Info Sys A Info Sys B Info Sys C Info Sys D HEDC Infrastructure Machine Learning vips ACAS ARAD BCM SCCM TA
  • 20. 20 HEDC Private Cloud – Geo-Dispersed Infrastructure Future of Log Aggregation and Analysis Service? GovCloud West GovCloud East ECE v2.1 Cross Cluster Search