Jeff Moncrief
Consulting Systems Engineer
February 13, 2019
Securing Kubernetes Environments
Stealthwatch Cloud
Stealthwatch Cloud
Visibility, Threat Identification, Network Compliance
Native Cloud Logs Premises Network Logs
Virtual Sensor
NetFlow
IPFIX
Mirror/Span
What about
Containers
and
Kubernetes
?
Kubernetes automates the distribution and
scheduling of application containers across
a cluster in a more efficient way.
Enter…
Stealthwatc
h Cloud
Stealthwatch is deployed as a POD application on
each node.
Creates network telemetry (flows) of all POD to POD
traffic on that Node and reports to Stealthwatch
Cloud
Deployment Architecture
Complete Cluster Traffic Visibility
Stealthwatch Cloud integrates with any Kubernetes
containerized environment, whether in GKE, any public
cloud or on-premise.
The solution deploys as a Pod on a node and shims
into the node-level network communication abstraction
layer.
This provides visibility, baselining and anomaly
detection into container-container & pod-pod
communications.
Deep Visibility in Kubernetes Cluster Activity
Thank you for watching.

Protect Kubernetes Environments with Cisco Stealthwatch Cloud

Editor's Notes

  • #3 Modern networks, especially those that rely on public cloud infrastructure, are by nature dynamic environments, with numerous devices, elastic infrastructure, and extensive automation. To keep up with these dynamic networks, a strong threat detection needs to consume a variety of data directly from the infrastructure and an automated, low-configuration, high-efficacy threat detection engine. Stealthwatch Cloud accomplishes the first part in a few ways. For public clouds that support it, such as Amazon Web Services, Stealthwatch Cloud consumes VPC Flow Logs and other native data sources. This enables easy deployment – in a matter of minutes – and complete, agentless coverage of your cloud attack surface. On the private network, Stealthwatch Cloud relies on NetFlow, mirrored traffic, and other sources of network telemetry. The information comes directly from the network infrastructure, allowing for complete coverage. This metadata is then encrypted and transmitted to the Stealthwatch Cloud. But data isn’t worth much on it’s own. You still need a strong, effective, and easy-to-use threat detection engine that can alert you to only security-relevant events. Stealthwatch Cloud accomplishes this with Dynamic Entity Modeling <click>
  • #5 Visibility offers a solution to your problems: preventing data loss, complying with regulation and investigating security incidents. With Stealthwatch, get complete visibility into all of your public cloud activity. You can see every device on your network by accessing all IP-based traffic. This includes encrypted and sensitive data, as Stealthwatch Cloud reads the traffic, not the data. Gain instant visibility to every entity that touches your network. Additionally, when coupled with Private Network Monitoring or Stealthwatch Enterprise, Stealthwatch provides complete visibility of both the cloud and on-premises network. Understand security data through automatically organized device groups. Stealthwatch Cloud uses proprietary entity monitoring to determine what each entity is. This makes for easy querying and confirming of regular device and entity counts. Understand every type of entity in your network. Examples include domain-controller, printers, pcs, BYOD, etc. Lastly, know what happened in your network for later investigation. Maintain detailed records over time through continuous activity tracking and data retention. Have access to all your traffic from the first moment you activate Stealthwatch Cloud.