Security Virtualization

Slides:



Advertisements
Similar presentations
Virtualization of Fixed Network Functions on the Oracle Fabric Krishna Srinivasan Director, Product Management Oracle Networking Savi Venkatachalapathy.
Advertisements

5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
Virtual Machine Security Design of Secure Operating Systems Summer 2012 Presented By: Musaad Alzahrani.
Keith Wiles DPACC vNF Overview and Proposed methods Keith Wiles – v0.5.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Data-Center Traffic Management COS 597E: Software Defined Networking.
Virtual Machine Security Summer 2013 Presented by: Rostislav Pogrebinsky.
5205 – IT Service Delivery and Support
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Data Center Network Redesign using SDN
VAP What is a Virtual Application ? A virtual application is an application that has been optimized to run on virtual infrastructure. The application software.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Enabling Innovation Inside the Network Jennifer Rexford Princeton University
Extreme Networks Confidential and Proprietary. © 2010 Extreme Networks Inc. All rights reserved.
DPI in an SDN world Charles Glass.
S T A N F O R D U N I V E R S I T Y I N F O R M A T I O N T E C H N O L O G Y S E R V I C E S C o m m u n i c a t i o n S e r v i c e s July 12,
Microkernels, virtualization, exokernels Tutorial 1 – CSC469.
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
Honeypot and Intrusion Detection System
In the name of God :).
Secure Systems Research Group - FAU Classifying security patterns E.B.Fernandez, H. Washizaki, N. Yoshioka, A. Kubo.
High Performance Computing on Virtualized Environments Ganesh Thiagarajan Fall 2014 Instructor: Yuzhe(Richard) Tang Syracuse University.
How to Integrate Security Tools to Defend Data Assets Robert Lara Senior Enterprise Solutions Consultant, GTSI.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
A. Frank - P. Weisberg Operating Systems Structure of Operating Systems.
Networking Components WILLIAM NELSON LTEC HUB  Device that operated on Layer 1 of the OSI stack.  All I/O flows out all other ports besides the.
Introduction to Avaya’s SDN Architecture February 2015.
PART1: NETWORK COMPONENTS AND TRANSMISSION MEDIUM Wired and Wireless network management 1.
Slide 1/20 "PerfSight: Performance Diagnosis for Software Dataplanes." Wu, Wenfei, Keqiang He, and Aditya Akella ACM ICM, Presented by: Ayush Patwari.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Embrace the Future of.
VIRTUALIZATION TECHNOLOGIES BY COLLIN DONALDSON. PHYSICAL COMPUTING Install Hardware Load Operating System and other software Deploy either manually or.
Unit 2 VIRTUALISATION. Unit 2 - Syllabus Basics of Virtualization Types of Virtualization Implementation Levels of Virtualization Virtualization Structures.
VIRTUALIZATION TECHNIQUES By:- Aman, Denis and Dharit.
Eric Osborne ARNOG 2016 NFV (and SDN). Introduction About me: 20+ years in Internet networking: startup, Cisco, Level(3) Currently a principal architect.
Network Processing Systems Design
Intro To Virtualization Mohammed Morsi
Cloud Agility with Performance Bridging the Performance Gap for Virtual Network Infrastructure Paul Andersen Sr. Marketing Director.
Software Defined Networking BY RAVI NAMBOORI. Overview  Origins of SDN.  What is SDN ?  Original Definition of SDN.  What = Why We need SDN ?  Conclusion.
Network Virtualization Ben Pfaff Nicira Networks, Inc.
Deep Security and VMware NSX Advanced Security Framework for the Software-Defined Data Center Anand Patil National Sales Manager, SDDC CONFIDENTIAL1.
Early Adopter of NFV? Mitigate Risk! UKNOF 34 - Manchester Anthony Magee, 21 st April 2016 Global Business Development.
REMOTE MANAGEMENT OF SYSTEM
Md Baitul Al Sadi, Isaac J. Cushman, Lei Chen, Rami J. Haddad
CLOUD SECURITY Timothy Brown Director, Security & Virtualization
Instructor Materials Chapter 7: Network Evolution
CompTIA Security+ Study Guide (SY0-401)
Chapter 6: Securing the Cloud
Firmware threat Dhaval Chauhan MIS 534.
Current Generation Hypervisor Type 1 Type 2.
Napatech Acceleration Platform
StratusLab Final Periodic Review
StratusLab Final Periodic Review
Clinton A Jones Eastern Kentucky University Department of Technology
1.
CompTIA Security+ Study Guide (SY0-401)
Virtual Local Area Network
VMware NSX and Micro-Segmentation
Digital Pacman: Firewall Edition
Network Function Virtualization: Challenges and
Software Defined Networking (SDN)
Virtualization Layer Virtual Hardware Virtual Networking
Concept of VLAN (Virtual LAN) and Benefits
IS4680 Security Auditing for Compliance
O.S. Security.
Xen and the Art of Virtualization
NFV and SD-WAN Multi vendor deployment
Presentation transcript:

Security Virtualization Timothy Brown Director, S&V Practice Network Utility Force tim@netuf.net

Intro

What is this presentation about? Survey of security elements and techniques Virtualization advantages and disadvantages How virtualization alters security architecture Three main concepts: Infrastructure as code Security moving with the target Reduce burden of security

Security Basics Protecting information systems Balance between risk, protection from risk and ease of use Protecting systems has a real cost, heavy armor costs more and armor is oriented towards the attacker

How are elements protected? IDS/IPS – Host and network Firewalls Segmentation (Limiting the pivot) Systems Monitoring Network Telemetry and Monitoring Host Integrity Intelligence (All Source) PEOPLE

A reference diagram

Virtualization Basics Hypervisor: A hypervisor or virtual machine monitor (VMM) is a piece of computer software, firmware or hardware that creates and runs virtual machines. Core: A microprocessor (with multiple threads, cache, …) Virtual Machine: In computing, a virtual machine (VM) is an emulation of a particular computer system. vSwitch (Virtual Switch): A piece of code that emulates or runs a switch.

Market evolving in three ways Appliances being made available virtually Elements more powerful Automation

A reference diagram

VM changes Add a new VLAN or Virtual Virtual Switch Can have many VLANs attached to one virtual switch …or many virtual switches… …controlled by different parties…

A reference diagram

How does a virtual switch work? Virtual switch similar in functionality to a traditional switch Accelerated by special drivers MAC learning or manual MAC programming (Hypervisor knows MACs, can do creative processing) Greater flexibility in where a MAC lives and where traffic goes

What does it mean? Can insert { any security element } { anywhere in the virtualized network } Can connect { any security element } to { any physical or virtualized host }

Security relationships can be built anywhere Virtualization allows flexibility: Resources, FWs, or everything can be moved around (including between DCs)

Resources can be moved between DCs

Resources can be moved between DCs Firewall moving with elements

Interesting ideas Virtual network firewalls Virtual application firewalls Virtual load balancers / application delivery controllers Virtual taps Virtual IDS/IPS

How does virtualization add to security? Segmentation and microsegmentation Including with physical hardware through the use of VXLAN Separation of management concerns Functional separation Snapshots and imaging SDN

Motivations for security virtualization Reduce scope of changes and testing Increase performance for lower aggregated cost Minimize reliability concerns and impact Flexibility in architecture Move things around Reduced audit scope Hide security infrastructure from attackers More security closer to the host at higher performance

(Mis)conceptions Virtualization reduces performance More to manage Impact is quite mild on the right hardware More to manage Yes, but vendors are getting smart and infrastructure is now code Cost will be high Vendors are getting smart: Cost is coming down (volume) and hardware is a losing game (commoditization) Harder to learn This is true, but only if you have a weaker understanding of the basics MACs, bridges, traffic flows, TCP…

What is now available in virtual form? Firewalls Application Firewalls Database Firewalls Monitoring Appliances Sandboxing, DPI, Netflow Load Balancing Intrusion Detection

Coming back Easier to hide my infrastructure Segments and snapshots; easier IDS Roll back machine quickly, better change management Firewall and IDS in front of every host, good luck with the pivot

Questions?

Thanks http://go.netuf.net/afcea-2017-dobbins