SlideShare a Scribd company logo
SECURITY AUTOMATION IN VIRTUAL AND CLOUD ENVIRONMENTS Richard Park Senior Product Manager rpark@sourcefire.com @richardpark31
About Me Virtualization Cloud
Security Automation In Virtual & Cloud Environments
“ The ‘fortress mentality’ is outdated – and is no longer realistic or practical… Automation will quickly become a ‘must-have’ component in the overall security strategy of every IT organization. There is simply no other way to detect threats swiftly enough, let alone to contain the damage and recover from it. ” - Accenture Technology Vision 2011
Presentation Outline 1 2 Virtualization Security Challenges vShield Vision and Overview 4 3 Achieving the Security Automation VIsion Security Integration Use Cases
Dealing With Enterprise Silos Networking Security Server Ops
Today’s security is often static...
But we don’t live in a static world!
New PCI Virtualization Guidelines www.sourcefire.com/pcivirt
[object Object],>60% penetration ,[object Object]
Custom Java Apps
SharePoint
Exchange
SQL
Oracle
The Easy Apps(infrastructure, file, print)30% penetration Inflection Point for Virtualization
vShield Vision for Security vShield is security middleware between disparate devices. Security products work together to adjust to changes in the environment.
vShield as security middleware is a realistic vision for virtual environments vShield Is NOT A Silver Bullet ≠ vShield
“Code is law.” Lawrence Lessig
vShieldOverview
Our Focus Today Policy Violations Application 1 3rd Party Vendor X FW rule changes vShield App/Edge X VMware vSphere
Example of REST API GET command GET https://10.1.1.1/api/2.0/app/firewall/datacenter01/config ----> (username, password) <----------------------------- vShield XML Ruleset
REST API POST Command POST https://10.1.1.1/api/2.0/app/firewall/datacenter01/config----> <------------------------------------ Ruleset Acknowledgement
https://10.1.1.1/api/1.0/network/network-244/snat/rules https://10.1.1.1/api/1.0/network/network-244/loadbalancer/action/start https://10.1.1.1/api/1.0/zones/syslogServers Examples of vShield REST Commands
vShield and Private Cloud Provisioning Provision Secure Maintain Security Request User-Initiated Automated Automated Automated User requests virtual infrastructure via Web portal vCenter, vCloudAPIs are used to provision VM(s) vShield APIs are used to provision VM firewall rulesets Third party security products use vShield & vCenter APIs to update security configuration
Use Case: Virtual Server Deployment Virtual Server Portal Step 1: User requests a VM from a Web portal Your Contact Information VM Configuration Your Org Information, Cost Code, etc. 2 CPU CPU Region 2 GB Memory Server Type 40 GB Lease timeframe Disk Storage More…
Use Case: Virtual Server Deployment Step 2: vCloud Director provisions the VM
Step 3: Apply security group and firewall ruleset Use Case: Virtual Server Deployment
Step 4: Third party products update configuration Use Case: Virtual Server Deployment 443 vShield API Third Party Security Vendor
Step 4 (optional): VM Quarantine can be used Use Case: Virtual Server Deployment vShield API Third Party Security Vendor
vShield and Multitenant Clouds Step 3 Maintain Security Step 2 Secure Cloud Step 1 Provision Cloud minutes Weeks? Months?
vShield and Multitenant Clouds Step 3 Maintain Security Step 2 Secure Cloud Step 1 Provision Cloud Tenant requests a datacenter vCloud Director provisions a resource pool and a port group vShield Edge is deployed on port group with appropriate firewall, NAT, and load balancing configuration Automated IT-Initiated Automated Update firewall configuration as required
Use Case: Public Cloud Deployment Step 1: Tenant requests datacenter Resource pool and port group are provisioned Port Group Resource Pool CPU Memory Storage Network VMware vSphere + vCenter
Use Case: Public Cloud Deployment Step 2: vShield Edge is deployed SHARED SERVICES Physical Datacenter Virtual Datacenter Tenant A NAT NAT VMware vSphere + vCenter
Step 3: Update firewall configuration as required Virtual Datacenter Tenant A Use Case: Public Cloud Deployment VMware vSphere + vCenter
Change control exists for a reason!
Virtual Environments are Dynamic Source: Christofer Hoff, Virtualization & the End of Network Security
Operation Shady RAT “ There are only two types of Fortune 2000 companies – those that know they’ve been compromised, and those that don’t know. ” - Dmitri Alperovitch, McAfee Threat Research
“ In the past, IT has architected everything around the idea of ‘100 percent security’… there is no such thing as watertight IT security. This fortress mentality must now give way to a realistic and practical approach… the speed and frequency of attacks dictate that human responses must make way for automated capabilities. ” - Accenture Technology Vision 2011
” “ Never send a man to do a machine’s job. Agent Smith
“ Applications are like fish and data is like wine. Only one gets better with age. ” James Governor, RedMonk
vCenter Integration Becomes Crucial VM and Host Inventory Migration & Snapshot History VM Online/Offline Status

More Related Content

What's hot

Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Skybox Security
 
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security ChallengesInfosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Skybox Security
 
Equifax Breach Postmortem
Equifax Breach PostmortemEquifax Breach Postmortem
Equifax Breach Postmortem
Adrian Sanabria
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
Cisco Security
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
Qualys
 
Msft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksMsft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacks
Akram Qureshi
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security Issues
HTS Hosting
 
Cloud Native Security: New Approach for a New Reality
Cloud Native Security: New Approach for a New RealityCloud Native Security: New Approach for a New Reality
Cloud Native Security: New Approach for a New Reality
Carlos Andrés García
 
Cloud Security - Kloudlearn
Cloud Security - KloudlearnCloud Security - Kloudlearn
Cloud Security - Kloudlearn
KloudLearn
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cisco Security
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
MarketingArrowECS_CZ
 
Cloud Security Myths Vs Facts
Cloud Security Myths Vs FactsCloud Security Myths Vs Facts
Cloud Security Myths Vs Facts
OPAQ
 
Microsoft threat protection + wdatp+ aatp overview
Microsoft threat protection + wdatp+ aatp  overviewMicrosoft threat protection + wdatp+ aatp  overview
Microsoft threat protection + wdatp+ aatp overview
Allessandra Negri
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
Tripwire
 
Top Application Security Threats
Top Application Security Threats Top Application Security Threats
Top Application Security Threats
ColumnInformationSecurity
 
Kofax Document Security
Kofax Document Security Kofax Document Security
Kofax Document Security
Kofax
 
Can Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network SecurityCan Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network Security
EC-Council
 
Disaster recovery glossary
Disaster recovery glossaryDisaster recovery glossary
Disaster recovery glossary
singlehopsn
 
Qualys Brochure for CISOs
Qualys Brochure for CISOsQualys Brochure for CISOs
Qualys Brochure for CISOs
Qualys
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105
Thomas Treml
 

What's hot (20)

Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
 
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security ChallengesInfosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
 
Equifax Breach Postmortem
Equifax Breach PostmortemEquifax Breach Postmortem
Equifax Breach Postmortem
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
Msft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksMsft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacks
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security Issues
 
Cloud Native Security: New Approach for a New Reality
Cloud Native Security: New Approach for a New RealityCloud Native Security: New Approach for a New Reality
Cloud Native Security: New Approach for a New Reality
 
Cloud Security - Kloudlearn
Cloud Security - KloudlearnCloud Security - Kloudlearn
Cloud Security - Kloudlearn
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
 
Cloud Security Myths Vs Facts
Cloud Security Myths Vs FactsCloud Security Myths Vs Facts
Cloud Security Myths Vs Facts
 
Microsoft threat protection + wdatp+ aatp overview
Microsoft threat protection + wdatp+ aatp  overviewMicrosoft threat protection + wdatp+ aatp  overview
Microsoft threat protection + wdatp+ aatp overview
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
 
Top Application Security Threats
Top Application Security Threats Top Application Security Threats
Top Application Security Threats
 
Kofax Document Security
Kofax Document Security Kofax Document Security
Kofax Document Security
 
Can Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network SecurityCan Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network Security
 
Disaster recovery glossary
Disaster recovery glossaryDisaster recovery glossary
Disaster recovery glossary
 
Qualys Brochure for CISOs
Qualys Brochure for CISOsQualys Brochure for CISOs
Qualys Brochure for CISOs
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105
 

Viewers also liked

Transforming the digital experience of your workforce
Transforming the digital experience of your workforceTransforming the digital experience of your workforce
Transforming the digital experience of your workforce
RES
 
Achieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security AutomationAchieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security Automation
Tripwire
 
Around the world in eight pages
Around the world in eight pagesAround the world in eight pages
Around the world in eight pages
ceholland
 
Copy of sdev stylistic differentiation of the english vocabulary
Copy of sdev stylistic differentiation of the english vocabularyCopy of sdev stylistic differentiation of the english vocabulary
Copy of sdev stylistic differentiation of the english vocabularyjverftukli
 
The story of beowulf
The story of beowulfThe story of beowulf
The story of beowulfjverftukli
 
Phs carp powerpoint presentation final version
Phs carp powerpoint presentation   final versionPhs carp powerpoint presentation   final version
Phs carp powerpoint presentation final version
ceholland
 
Learn spanish vocabulary presentation transcript
Learn spanish vocabulary   presentation transcriptLearn spanish vocabulary   presentation transcript
Learn spanish vocabulary presentation transcriptjverftukli
 
Assistive tech pecha kucha
Assistive tech pecha kuchaAssistive tech pecha kucha
Assistive tech pecha kucha
ceholland
 
Copy of «stylistic classification of the english vocabulary»
Copy of «stylistic classification of the english vocabulary»Copy of «stylistic classification of the english vocabulary»
Copy of «stylistic classification of the english vocabulary»jverftukli
 
Holland c mrp powerpoint
Holland c mrp powerpointHolland c mrp powerpoint
Holland c mrp powerpoint
ceholland
 
Stylistic classification of english vocabulary presentation transcript
Stylistic classification of english vocabulary   presentation transcriptStylistic classification of english vocabulary   presentation transcript
Stylistic classification of english vocabulary presentation transcriptjverftukli
 
Supporting student collaboration
Supporting student collaborationSupporting student collaboration
Supporting student collaboration
ceholland
 
MRP Powerpoint
MRP PowerpointMRP Powerpoint
MRP Powerpointceholland
 
A survey of world literature
A survey of world literatureA survey of world literature
A survey of world literature
ceholland
 
Class set of 10th grade poem coding
Class set of 10th grade poem codingClass set of 10th grade poem coding
Class set of 10th grade poem coding
ceholland
 
Family unit intro pecha kucha
Family unit intro   pecha kuchaFamily unit intro   pecha kucha
Family unit intro pecha kucha
ceholland
 
The Psychology of Security Automation
The Psychology of Security AutomationThe Psychology of Security Automation
The Psychology of Security Automation
Jason Chan
 

Viewers also liked (20)

Transforming the digital experience of your workforce
Transforming the digital experience of your workforceTransforming the digital experience of your workforce
Transforming the digital experience of your workforce
 
Achieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security AutomationAchieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security Automation
 
Around the world in eight pages
Around the world in eight pagesAround the world in eight pages
Around the world in eight pages
 
Copy of sdev stylistic differentiation of the english vocabulary
Copy of sdev stylistic differentiation of the english vocabularyCopy of sdev stylistic differentiation of the english vocabulary
Copy of sdev stylistic differentiation of the english vocabulary
 
Catalan number presentation2
Catalan number presentation2Catalan number presentation2
Catalan number presentation2
 
The story of beowulf
The story of beowulfThe story of beowulf
The story of beowulf
 
Phs carp powerpoint presentation final version
Phs carp powerpoint presentation   final versionPhs carp powerpoint presentation   final version
Phs carp powerpoint presentation final version
 
Learn spanish vocabulary presentation transcript
Learn spanish vocabulary   presentation transcriptLearn spanish vocabulary   presentation transcript
Learn spanish vocabulary presentation transcript
 
Assistive tech pecha kucha
Assistive tech pecha kuchaAssistive tech pecha kucha
Assistive tech pecha kucha
 
Copy of «stylistic classification of the english vocabulary»
Copy of «stylistic classification of the english vocabulary»Copy of «stylistic classification of the english vocabulary»
Copy of «stylistic classification of the english vocabulary»
 
Holland c mrp powerpoint
Holland c mrp powerpointHolland c mrp powerpoint
Holland c mrp powerpoint
 
Catalan number presentation2
Catalan number presentation2Catalan number presentation2
Catalan number presentation2
 
Stylistic classification of english vocabulary presentation transcript
Stylistic classification of english vocabulary   presentation transcriptStylistic classification of english vocabulary   presentation transcript
Stylistic classification of english vocabulary presentation transcript
 
Catalan number presentation2
Catalan number presentation2Catalan number presentation2
Catalan number presentation2
 
Supporting student collaboration
Supporting student collaborationSupporting student collaboration
Supporting student collaboration
 
MRP Powerpoint
MRP PowerpointMRP Powerpoint
MRP Powerpoint
 
A survey of world literature
A survey of world literatureA survey of world literature
A survey of world literature
 
Class set of 10th grade poem coding
Class set of 10th grade poem codingClass set of 10th grade poem coding
Class set of 10th grade poem coding
 
Family unit intro pecha kucha
Family unit intro   pecha kuchaFamily unit intro   pecha kucha
Family unit intro pecha kucha
 
The Psychology of Security Automation
The Psychology of Security AutomationThe Psychology of Security Automation
The Psychology of Security Automation
 

Similar to Security automation in virtual and cloud environments v2

AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
Amazon Web Services
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
Ploynatcha Akkaraputtipat
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicrodvmug1
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
Amazon Web Services
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security
PCM
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloudInterop
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
Shah Sheikh
 
NetWatcher Customer Overview
NetWatcher Customer OverviewNetWatcher Customer Overview
NetWatcher Customer Overview
Scott Suhy
 
Steve Porter : cloud Computing Security
Steve Porter : cloud Computing SecuritySteve Porter : cloud Computing Security
Steve Porter : cloud Computing Security
Gurbir Singh
 
Security Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldSecurity Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud World
Mark Nunnikhoven
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Amazon Web Services
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
Amazon Web Services
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationGraeme Wood
 
Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação Cibernética
Hamilton Oliveira
 
Security Analytics & Security Intelligence-as-a-Service
Security Analytics & Security Intelligence-as-a-ServiceSecurity Analytics & Security Intelligence-as-a-Service
Security Analytics & Security Intelligence-as-a-Service
Marco Casassa Mont
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
NetworkCollaborators
 

Similar to Security automation in virtual and cloud environments v2 (20)

Campus jueves
Campus juevesCampus jueves
Campus jueves
 
Stu w22 a
Stu w22 aStu w22 a
Stu w22 a
 
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicro
 
Clouds And Security
Clouds And SecurityClouds And Security
Clouds And Security
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
NetWatcher Customer Overview
NetWatcher Customer OverviewNetWatcher Customer Overview
NetWatcher Customer Overview
 
Steve Porter : cloud Computing Security
Steve Porter : cloud Computing SecuritySteve Porter : cloud Computing Security
Steve Porter : cloud Computing Security
 
Security Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldSecurity Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud World
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
 
Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação Cibernética
 
Security Analytics & Security Intelligence-as-a-Service
Security Analytics & Security Intelligence-as-a-ServiceSecurity Analytics & Security Intelligence-as-a-Service
Security Analytics & Security Intelligence-as-a-Service
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Security automation in virtual and cloud environments v2

  • 1. SECURITY AUTOMATION IN VIRTUAL AND CLOUD ENVIRONMENTS Richard Park Senior Product Manager rpark@sourcefire.com @richardpark31
  • 3. Security Automation In Virtual & Cloud Environments
  • 4. “ The ‘fortress mentality’ is outdated – and is no longer realistic or practical… Automation will quickly become a ‘must-have’ component in the overall security strategy of every IT organization. There is simply no other way to detect threats swiftly enough, let alone to contain the damage and recover from it. ” - Accenture Technology Vision 2011
  • 5. Presentation Outline 1 2 Virtualization Security Challenges vShield Vision and Overview 4 3 Achieving the Security Automation VIsion Security Integration Use Cases
  • 6. Dealing With Enterprise Silos Networking Security Server Ops
  • 7. Today’s security is often static...
  • 8. But we don’t live in a static world!
  • 9. New PCI Virtualization Guidelines www.sourcefire.com/pcivirt
  • 10.
  • 14. SQL
  • 16. The Easy Apps(infrastructure, file, print)30% penetration Inflection Point for Virtualization
  • 17. vShield Vision for Security vShield is security middleware between disparate devices. Security products work together to adjust to changes in the environment.
  • 18. vShield as security middleware is a realistic vision for virtual environments vShield Is NOT A Silver Bullet ≠ vShield
  • 19. “Code is law.” Lawrence Lessig
  • 21. Our Focus Today Policy Violations Application 1 3rd Party Vendor X FW rule changes vShield App/Edge X VMware vSphere
  • 22. Example of REST API GET command GET https://10.1.1.1/api/2.0/app/firewall/datacenter01/config ----> (username, password) <----------------------------- vShield XML Ruleset
  • 23. REST API POST Command POST https://10.1.1.1/api/2.0/app/firewall/datacenter01/config----> <------------------------------------ Ruleset Acknowledgement
  • 25. vShield and Private Cloud Provisioning Provision Secure Maintain Security Request User-Initiated Automated Automated Automated User requests virtual infrastructure via Web portal vCenter, vCloudAPIs are used to provision VM(s) vShield APIs are used to provision VM firewall rulesets Third party security products use vShield & vCenter APIs to update security configuration
  • 26. Use Case: Virtual Server Deployment Virtual Server Portal Step 1: User requests a VM from a Web portal Your Contact Information VM Configuration Your Org Information, Cost Code, etc. 2 CPU CPU Region 2 GB Memory Server Type 40 GB Lease timeframe Disk Storage More…
  • 27. Use Case: Virtual Server Deployment Step 2: vCloud Director provisions the VM
  • 28. Step 3: Apply security group and firewall ruleset Use Case: Virtual Server Deployment
  • 29. Step 4: Third party products update configuration Use Case: Virtual Server Deployment 443 vShield API Third Party Security Vendor
  • 30. Step 4 (optional): VM Quarantine can be used Use Case: Virtual Server Deployment vShield API Third Party Security Vendor
  • 31. vShield and Multitenant Clouds Step 3 Maintain Security Step 2 Secure Cloud Step 1 Provision Cloud minutes Weeks? Months?
  • 32. vShield and Multitenant Clouds Step 3 Maintain Security Step 2 Secure Cloud Step 1 Provision Cloud Tenant requests a datacenter vCloud Director provisions a resource pool and a port group vShield Edge is deployed on port group with appropriate firewall, NAT, and load balancing configuration Automated IT-Initiated Automated Update firewall configuration as required
  • 33. Use Case: Public Cloud Deployment Step 1: Tenant requests datacenter Resource pool and port group are provisioned Port Group Resource Pool CPU Memory Storage Network VMware vSphere + vCenter
  • 34. Use Case: Public Cloud Deployment Step 2: vShield Edge is deployed SHARED SERVICES Physical Datacenter Virtual Datacenter Tenant A NAT NAT VMware vSphere + vCenter
  • 35. Step 3: Update firewall configuration as required Virtual Datacenter Tenant A Use Case: Public Cloud Deployment VMware vSphere + vCenter
  • 36. Change control exists for a reason!
  • 37. Virtual Environments are Dynamic Source: Christofer Hoff, Virtualization & the End of Network Security
  • 38. Operation Shady RAT “ There are only two types of Fortune 2000 companies – those that know they’ve been compromised, and those that don’t know. ” - Dmitri Alperovitch, McAfee Threat Research
  • 39. “ In the past, IT has architected everything around the idea of ‘100 percent security’… there is no such thing as watertight IT security. This fortress mentality must now give way to a realistic and practical approach… the speed and frequency of attacks dictate that human responses must make way for automated capabilities. ” - Accenture Technology Vision 2011
  • 40. ” “ Never send a man to do a machine’s job. Agent Smith
  • 41. “ Applications are like fish and data is like wine. Only one gets better with age. ” James Governor, RedMonk
  • 42. vCenter Integration Becomes Crucial VM and Host Inventory Migration & Snapshot History VM Online/Offline Status
  • 43. Security APIs Become Important IDS/IPS Antivirus Firewall API Data Exchange Flow Analysis Vulnerability Assessment Full Packet Capture
  • 44. So How Do I Get Started? So how do I get started with security automation?
  • 45. 1 2 VMware vSphere Implement Security in Virtual Environments Bridge the Enterprise Silos 4 3 Consider Open Source Vendor Integrations Require vShieldIntegration and APIs
  • 46. Security Must be Dynamic and Automated
  • 47. vShield Has a Vision for Dynamic Security
  • 48. Vendors Must Evolve With Better Automation and Integration

Editor's Notes

  1. I wanted to also share this quote from the Accenture Technology Vision report of 2011. This report addresses some of the big trends in technology such as big data and cloud computing. About IT security, the report makes the point that there needs to be a shift in how security professionals think. Security used to be about setting up a secure perimeter and if this perimeter were breached then the entire organization is at risk. But the reality is a lot more complex. Organizations are getting compromised all the time, and some attacks are really successful and some are not. But no organization has the resources to adequately investigate every single compromise and figure out what happened. This is why automation is so important.
  2. So with that said, let’s go into the main outline of this presentation. I’ll break it into 4 major parts. The first will be about why we’ve seen so many challenges in properly implementing security in virtual environments, and why we are hopefully seeing changes. The second part will give a brief overview of the vShield vision and how its API works. The third part will go through some use cases of how to use this API for security integration and automation. We’ll also talk about how APIs from other security products can also be used to help. And then we’ll end with some practical steps for how one can start implementing more security automation solutions.
  3. How much are we seeing security in virtual environments? Unfortunately, not as much as we would like.One of the big issues I’ve seen in customer environments is the existence of silos. This has been the nature of enterprise IT – each group runs its own separate hardware and software. Networking, virtual, and security teams have traditionally owned and run their own gear.In many situations, the VMware group needs to focus on critical factors such as hardware consolidation, ROI, and speed of deployment. So security tends to fall lower on the priority list. And because security is a separate silo with its own concerns, it hasn’t gotten too involved in that virtual environment.
  4. Another challenge with security is its static natureMany security tools make the assumption that the environment is static and policies don’t have to change very often. As one example, look at how long it takes to make a firewall rule change. It could take a few days.
  5. But we don’t live in a static world, especially given the dynamic nature of virtual environmentsThink about how many VMs are being created, or moved around between locations, or changing because of snapshot reversions.I think the recently announced VXLAN will help to ease migration of VMs between private and public clouds but there’s still the open question of how you update all of your security devices in different clouds as you are moving these VMs.What all this means, is that the static nature of security is another hindrance. Security devices may fragment the virtual network and create overly rigid topologies. This keeps the virtual environment from being as dynamic as it should be so it can’t provide the appropriate business benefits. Or the security tools may not even work properly because they can’t see inside the virtual environment or their policies are obsolete. If any of this happens then the security just won’t be put in because it gets in the way or it isn’t worth it.(Devices are chokepoints and fragment the virtual architecture; capacity is never right-sized, no intra-VM visibility, rigid topologies)You also may need lots of different boxes that each perform different functions. Integrating together is challengingLastly, vendors may not even have virtual-specific solutions that you can use
  6. But I think we’re seeing some positive trends now. One key driver is the new PCI virtualizationguideilnes, released this past June. And they really try to clarify how PCI applies to virtual environments. If you deal with PCI at all, I highly recommend you download this document from the PCI Web site and take a look. Here is a high level summary of what’s in the document:You need to implement some type of network security to monitor and protect virtual assetsYou need to enforce segregation of duties and least privilege in a virtual environment – which means that no one group can no longer have root access over everything.Mixed mode virtual environments are possible but you need to put in extensive security controls to show your auditor that isolation between trust zones is properly enforced.Finally, In-scope virtual systems and the hypervisor are subject to hardening and monitoring requirementsThe bottom line is that we should see greater collaboration between virtual and security teams because they need to work together to ensure their environment complies with the PCI requirements.
  7. Here’s another driver for security, which is the steadily increasing percentage of virtualized assets in the enterprise. This graphic here from this past year’s Partner Exchange last February and shows that we have hit a crucial milestone at 30% virtualization. So the easy stuff has been virtualized and enterprises are now looking to virtualize their mission critical apps such as their database and SAP servers. I know that many of you would argue that you’ve already done this in your environments but we’re talking about doing this across the board in general.So to get to the point where 40-50% of applications are virtualized, and this is one of VMware’s big goals for this year, security becomes a much bigger deal. It’s not as critical for some of these easy apps, but it needs to be addressed or at least discussed for the mission critical apps.
  8. And this brings us to how security products themselves need to change to be more dynamic.And this is where the vShield vision comes in. vShield is promoting a vision of integration between different security devices to protect the environment and adhere to regulations. It becomes the “security middleware” so products can work more seamlessly.vShield is not intended to be a manager of managers, but it enables multiple security products to work together to understand the virtual environment and adjust to changes. Policy violations is just one example.
  9. vShield is NOT a silver bullet for security or compliance in virtual environments because this doesn’t exist. It’s too complex of a problem. But I think this vision of vShield as security middleware is realistic and I hope it will bring multiple security vendors together.
  10. Which brings me to this phrase here that “code is law”. Lawrence Lessig is a lawyer who used this phrase to basically say that source code determines what is real and what is not. This phrase applies here too. vShield isn’t just fluffy vaporware. We have a documented API and source code samples. And we can see what this API can and can’t do. So let’s explore the API in more detail and see what’s possible.
  11. Here’s a quick overview of the main components of vShield. They’ve been well discussed by now. We’ll mainly focus on vShield App and Edge and their network security functions.Edge is a virtual router supporting firewall and various other functionsApp is primarily a NIC-level firewall for VMs – each virtual NIC can have its own separate firewall rules
  12. So here’s a specific example of vShield and policy enforcement. So as a third party security vendors sees behavior in a virtual environment that violates policy, it uses the vShield API to change the environment’s security configuration. The API changes firewall rules or security groups so you can block traffic or quarantine an entire VM.This specific diagram is showing App but the same principle applies to Edge, where the firewall sits at the edge of the virtual datacenter.
  13. The API is very simple. A REST API is based on HTTP URLs. The URL determines the command. You do a GET to retrieve data, and you do a POST to send data back. So in this case we want to look at all the firewall rules for a virtual datacenter. You do an HTTP GET to this URL while submitting your username and password with HTTP authentication, and vShield Manager sends back the ruleset in XML format. This is for a datacenter object but you could get rules at different levels of granularity: clusters, resource pools, vApps, or port groups.This means that you can have rulesets down to the individual port group. So as VMs are migrated between physical ESX hosts, if they are connected to a distributed switch then their port group configuration remains the same. This means that rulesets can essentially “follow” VMs as they are migrated between hosts.
  14. Now that you have your rules, you make a change such as adding a new rule. And then you call the same URL with an HTTP POST command and submit the new XML ruleset.That’s how you would see and change firewall rules. The most important principle is that it is very straightforward to use these URLs to access security configurations, make changes to them, then push them back to activate them.
  15. I’ve included other examples of REST commands. Hopefully they are self-explanatory. The first URL enables you to get or edit the NAT configuration, the second will start the load balancers, and the third will enable you to get or edit a list of syslog servers to send data to
  16. Now that we understand some more about vShield and its API, let’s see how they fit into the bigger picture of security automation. In this specific example, you want to automate security for the provisioning process of a new VM. Here I’m talking about a private cloud. But this concept can also apply to non-cloud virtual environments too.Here’s a 4 step process: Request a new VM. Then provision the instance. Then provision its security policy in the form of a firewall. And finally, maintain this policy over time by making the appropriate changes. So the security automation is in the provisioning and ongoing maintenance stages.
  17. To provide even more detail, let’s go through an actual use case. I know this is highly simplified and there are a lot more details I could have included but I wanted to just get the main points across. An enterprise has built a private cloud for virtual server deployment. This example is also well suited for virtual desktop deployment and you can substitute virtual desktop as we go through this. But integration between vCloud Director and VMware View is still down the road.In any case, this enterprise has built a portal so multiple groups worldwide can request a server VM to be created. And the Server Type such as Web server, LDAP server, etc. determines the server’s function and its security policy as well. LDAP servers should only have ports 389 and 636 open, along with a few other management ports. Instead of individual servers, you could also request entire applications because we’ll be provisioning vApps on the back end.
  18. The next step is for a vApp to be created from the appropriate Org datacenter with the appropriate resources. The vApp consists of a single VM. There are different ways of assigning the IP address but once it’s obtained, it is then registered for that VM.Internal database: register IP, MACvCloud Director: provision cloudWeb PortalFront End displaying information regarding the service and form to request a systemMicrosoft SharePointWorkflow Engine including Lifecycle ManagementIntegration Point for internal systems including Chargeback and Hostmaster Registration SystemVMware vCloud DirectorWeb Based User Interface to consume cloud resourcesEnables the Private CloudVMware vShield Application / EdgeVirtual Appliance to implement, manage and maintain security policySecurity in the Private Cloud
  19. Step 3: vShield App is deployed and configured [does any part of this happen before new VMs are added?]each VM is automatically put into the required Security Group (determined by what user requested in portal) Deploy vShield App on all hosts which will have VMs in this vDC/private cloud Configure vShield App for datacenter level rules (L2/L3 ICMP, ARP DENY, etc. - get from slides] Configure vSheild App for SG level rules (VDI can’t talk to each other, etc. - get from slides]
  20. Firewall changes can be permanent or temporary
  21. Step 4 (optional): vShield App can also quarantine the VM if it is considered to violate a security or policy thresholdQuarantine can be temporary or permanent, i.e. requiring operator intervention to restoreSo that ends the first example of how you would security automation to apply a security policy for provisioning and then enforce that policy over time.
  22. Now I’ll go through a public cloud example with a multitenant environment. Automation is similar in that you’re using it in the provisioning and ongoing operations stages, but the architecture is different. And you may make different kinds of security policy changes, which I’ll show in a bit.
  23. In that org datacenter, you deploy an Edge security appliance is provisioned via vShield API with the appropriate firewall, NAT, load balancing servicesYou would also use the API to assign internal and external IP addressDefine NAT rulesDefine firewall rules for that Edge device.
  24. And the final stage is that you would update the tenant’s firewall configuration as required. In this example, the tenant has subscribed for a protection service where they want the firewall to block additional IP addresses that could be members of botnets. So an ongoing basis, the firewall configuration is updated with addresses from a variety of third party security sources to provide additional protection.So here is another example of security automation, this time in a multitenant environment. You’re once again using the vShield APIs for security provisioning and then you also them to provide additional security services.
  25. So at this point I want to do a reality check and ask you, do you think all of this is really practical? I’m sure for some of you, you’re wondering if you ever want to allow these type of dynamic firewall rule updates? After all, change control processes exist for a reason. Lack of change control helped to create this kind of environment shown here. You need some sort of order to hold back the chaos that will result. And you may also need processes for compliance or regulatory reasons.
  26. I don’t claim to have all of these answers, and I think we collectively as a security industry will have to figure this out over time. But I do know that we don’t live in a static world. And we can’t assume anymore that static security will adequately protect us.I touched on the highly dynamic nature of virtual environments previously. No one can manually keep track of what is going on. Static security policies will constantly be out of date. And these obsolete security policies not only don’t adequately protect the environment, they get in the way of the business. Legitimate applications get blocked, and this just lends ammunition to NOT putting security into a virtual environment.
  27. And we can never forget that there is an adversary out there that is constantly changing, getting smarter, always looking for new ways of breaking into systems and stealing data. That’s ultimately why the security industry exists. Many of you may have heard of Operation Shady RAT, where multiple governments and defense contractors were compromised in a 5-year hacking campaign. Targets were found in 14 different countries. There are other examples of compromises that we know about, such as Sony, RSA, Epsilon, and Citibank. There are many others that we don’t know about, and it’s not clear that the organizations who have been hacked are even aware of this.The bottom line is that we as a security industry – both vendors and enterprises – need to think beyond what we’ve been doing and look at new tactics. Automation has transformed the IT industry in general and there’s every reason to think that it can transform our industry as well.
  28. I just wanted to mention another quote from the Accenture report underscoring this point. We can’t keep the hackers out 100% of the time. Watertight IT security doesn’t exist, as the quote says. This isn’t realistic. Instead we build automation to detect attacks and to respond to them as the first line of defense. What we’ve talked about today, about automating the provisioning process and policy enforcement, are just first steps. There’s so much more that we need to do.
  29. Put another way: let’s not do manually what we should be doing automatically.
  30. Before we end, I want to shift gears a bit and go beyond just vShield automation and talk about how security products can become more tightly integrated with one another to automate the analyst’s job.What is the value of integrating security products together? From what I can tell by talking with lots of customers out there, it’s all about the data. Each security product generates its own dataset, and what security analysts really need is a way of taking multiple security datasets and intelligently combining it together. Security products shouldn’t be focused on keeping the data locked up in its own product but the data should be freely available via APIs and database queries so it can be used for analysis.
  31. And this is where contextual data about the virtual environment can be helpful too. Security products can use this data to determine some really useful things:Which VMs are located on an ESX hostWhen a migration takes place and where toHow security policies may change or break because of a migration Whether a VM is online or offline and available for scanning or patchingAll this data is accessible via the vSphere SDK.One of the signs of a security vendor who understands the virtual environment is one who is pulling this data and doing something useful with it.
  32. So as I talk about combining security datasets for useful analysis, I’m not just talking about what SIMs do, where they aggregate the data in one place and then use correlation rules.I’m talking about selecting combining data to make intelligent decisions. This is what security analysts do today. If they see something strange in one security console, they will jump from product to product manually to figure out if this represents an actual compromise. This manual process is what we need to automate so the security person can focus on more important tasks, such as defining the architecture.Many of you may have heard the term “big data”. It’s becoming somewhat of a fad but it’s the idea of taking massive datasets and utilizing automated analysis techniques such as machine learning to figure out useful trends. Machine learning recommends new books for us to buy, or it identifies spam. We need these tools to identify anomalies in security data or mutations in existing malware because humans can’t look through all the data themselves.
  33. So this vision of security automation may appeal but you’re not sure where to begin. You don’t know how to use these APIs, and you don’t have to time to build integrations.
  34. We’re at the beginning of this transition to automation so it will take time and we have to go one step at a time. Step 1 is to make security a priority for your virtual environment. Create a specific security policy for VMs as they are provisioned or migrated. Are you going to scan them? What do you do about offline VMs? Think about how you should segment your VMs, either on the same host or between hosts. Think about where vShield will fit in.Step 2 should be a result of step 1 but it’s really about working together on a shared goal. It really will take a bridging of the silos to implement proper security.Step 3: Talk to your vendors and ask them about their plans for vShield integration. What is their vision for understanding the virtual environment and dynamically adjusting to changes? How can they make their data available for analysis by other products?Step 4: This may be a bit controversial but some integrations between vendors may still be open source and not “officially” supported. But take a look at them and see if they add value. If they do then consider pushing a vendor to officially support them.
  35. This is my conclusion. My biggest point is that we need security automation in a dynamic environment because security people just don’t have time to find and react to all of the malicious activity out there. Automation should be our first line of defense.
  36. If you haven’t already, take a closer look at vShield. It has a vision of dynamic security that is provisioned “at birth” and hooks into other security products. I’ll be the first to say that there are many other improvements that could be made to vShield. I have a whole list of feature requests. But at least they have a vision for security automation and they are on the right path.
  37. Finally, we as vendors need to do a better job with automation in general. We also need to more fully plug into the virtual environment, being aware of what’s going on and responding to changes dynamically.