Secure DevOps for Government in MOC

Slides:



Advertisements
Similar presentations
Cloud computing is used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication.
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
If you knew what I know or CloudWave - Improving services in the Cloud through collaborative adaptation Eliot Salant IBM Haifa Research.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
DevOps: Why you should care Bruce Vincent Senior Technology Strategist and IT Architect.
1 Security on OpenStack 11/7/2013 Brian Chong – Global Technology Strategist.
BETA!BETA! Building a secure private cloud on Microsoft technologies Private cloud security concerns Security & compliance in a Microsoft private cloud.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
Cloud Computing in Large Scale Projects George Bourmas Sales Consulting Manager Database & Options.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Achieving Agility with WSO2 App Factory S. Uthaiyashankar Director, Cloud Solutions WSO2 Inc. Dimuthu Leelarathne Software Architect WSO2 Inc.
Successful Deployment and Solid Management … Close Relatives Tim Sinclair, General Manager, Windows Enterprise Management.
1 Multi Cloud Navid Pustchi April 25, 2014 World-Leading Research with Real-World Impact!
UI and Data Entry UI and Data Entry Front-End Business Logic Mid-Tier Data Store Back-End.
Light showcase: System Center 2012 SP1- Operations Manager Medium showcase: System Center 2012 SP1- Operations Manager Deep showcase:
MICROSOFT CONFIDENTIAL – INTERNAL ONLY
From Virtualization Management to Private Cloud with SCVMM 2012 Dan Stolts Sr. IT Pro Evangelist Microsoft Corporation
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Introducing Microsoft Azure Government Steve Read Barbara Brucker.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Automating Operational and Management Tasks in Microsoft Operations Management Suite and Azure
Microsoft Azure Active Directory. AD Microsoft Azure Active Directory.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
Introduction to CloudStack Networking Geoff Higginbottom CTO ShapeBlue
Vignesh Ravindran Sankarbala Manoharan. Infrastructure As A Service (IAAS) is a model that is used to deliver a platform virtualization environment with.
Cisco Consulting Services for Application-Centric Cloud Your Company Needs Fast IT Cisco Application-Centric Cloud Can Help.
Alfresco on AWS Provisioning and deploying Alfresco solutions on Amazon Web Services.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Air France KLM Private.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Microsoft Virtual Academy. Microsoft Virtual Academy First HalfSecond Half (01) Introduction to Microsoft Virtualization(05) Hyper-V Management (02) Hyper-V.
Agenda  What is Cloud Computing?  Milestone of Cloud Computing  Common Attributes of Cloud Computing  Cloud Service Layers  Cloud Implementation.
Check Point vSEC STORY [Protected] Non-confidential content.
If it’s not automated, it’s broken!
Alfresco Software Provisioning Kit
Best Practices for securing Hybrid CLouds
Security on OpenStack 11/7/2013
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Critical Security Controls
Infrastructure Orchestration to Optimize Testing
Hybrid Management and Security
Cloud-First, Modern Windows Management and Security
Configure and Manage Your Hybrid Cloud Environment at Scale
Principles of Computer Security
Microsoft Ignite /17/ :54 PM BRK2092
Cloud Security.
Open source Cloud Management Platforms
Best Practices for Securing Hybrid Clouds
GROUP 2 Cloud Computing Abdoul Karim Dolo Gary Kirk Baboucarr W Mbai
S3 Lifecycle Policies to Glacier
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
S3 Lifecycle Policies to Glacier
Data Security for Microsoft Azure
Is your deployment in pants-down mode?
AWS Boulder - Denver Meetup – January 2017
If you knew what I know or CloudWave - Improving services in the Cloud through collaborative adaptation Eliot Salant IBM Haifa Research.
Cloud Security from an Orchestration Perspective: Shifting Left
Managing Services with VMM and App Controller
Hybrid / Federated Tuesday, January 15, 2019.
Cloud Security AWS as an example.
Cloud Security AWS as an example.
Day 2, Session 2 Connecting System Center to the Public Cloud
IT Management Services Infrastructure Services
SQL Server on Amazon Web Services
SQL Server on Amazon Web Services
06 | SQL Server and the Cloud
Presentation transcript:

Secure DevOps for Government in MOC Hanscom milCloud Secure DevOps for Government in MOC

DoD Software “Development” More than $32B per year on IT Systems Test, Evaluation & Certification Process $2.2B over budget $948M over budget $2.4B over budget $808M over budget Official Acquisition Process

DoD & Cloud Mixed messages Slow adoption Evolving policy Mapping old policies & process to new world Data center vs. cloud Mostly in IaaS phase Paperwork Process

What is Hanscom milCloud (HmC) HmC delivers cloud and security orchestration… simultaneously across multiple public & private clouds… with Automation and Validation… and DevOps across the your favorite tools and the entire lifecycle. It provides self service access to… automated provisioning of applications, configs & data, source code builds, and ElasticTest™, for functional & performance tests, security scans, and network defense. Along with… workflow orchestration, a whole new level of system design discipline, and access to shared library of assets for true collaboration.

HmC & MOC Integration Windows server & desktop USAF Challenges Need for security stack Remote access restricted No Windows (AF loves Windows!) Use Government issues credentials Accreditation Data distribution controls Get things done HmC Implementation AWS VPC-like infrastructure Browser based Remote access to console Windows server & desktop PKI support for auth-n Umbrella accreditation Impact Level governance All other CONS3RT capabilities, inc. ElasticTest™ for functional, performance and security validation

Standard OpenStack Project Flat network No firewall, NAT, etc. Limited logging Protection limited to security groups Separation of activities requires individual OpenStack projects public router user-network user A VM user B VM

CONS3RT Deployed Open Stack Project Each cloudspace has an Open Stack router Each user network has perimeter system to provide firewall logging nat other network services as needed CONS3RT creates and configures: networks nat instance firewall rules

Powered by: www.cons3rt.com Peter Walsh peter.walsh@jackpinetech.com (617) 816-6001