Design and Deploy Secure Clouds for Financial Services – Use Cases August 18, 2016
Copyright © PLUMgrid, Inc. 2011-2015 Introduction Speakers 2 Principal Solutions Architect Justin Moore Sr. Solution Architect – OpenStack Tiger Team Joe Antkowiak PLUMgrid Red Hat
Copyright © PLUMgrid, Inc. 2011-2015 Agenda What’s will be covered today 3 1 OpenStack Infrastructure Security - Addressing Common Security Challenges using Red Hat OpenStack Platform Security and compliance through automation and micro-segmentation with OpenStack and SDN Micro-Segmentation Demo3 2
OpenStack Infrastructure Security Addressing Common Security Challenges using Red Hat OpenStack Platform Joe Antkowiak Sr Solution Architect August 18, 2016
Agenda  Common OpenStack Infrastructure Security Challenges  Addressing Challenges with Red Hat OpenStack Platform Director  Addressing Challenges with Red Hat CloudForms
OpenStack Infrastructure Security Common Challenges  Many Manual Tasks  Infrastructure Secured Post Deployment  Detecting Change and Enforcing Policy  Maintaining Secure Configuration and Policy When Upgrading and Scaling
<footer> OPENSTACK PLATFORM DIRECTOR DAY 1 + SCALING/UPGRADING Director is included in Red Hat OpenStack Platform CLOUDFORMS DAY 2 + LIFECYCLE CloudForms is included in Red Hat OpenStack Platform
<footer> Red Hat OpenStack Platform Director DEPLOYMENTPLANNING OPERATIONS Updates and upgrades Scaling up and down Change management Deployment orchestration Service configuration Sanity checks Network topology Service parameters Resource capacity OpenStack Orchestration
OpenStack Platform Director (OSPd) Advantages for OpenStack Security USES OPENSTACK TO DEPLOY OPENSTACK Concepts applicable to workloads running on OpenStack are applicable to OpenStack itself IMAGE BASED Nodes installed from a customize-able source image TEMPLATE BASED Customize-able, reusable, repeatable use of Heat templates (YAML) to install, scale, and upgrade
OSP Director Image Customization Image Customization Examples for Security KERNEL Deploy a custom kernel build, or hardened kernel (with validation) PACKAGES Deploy specific package versions or additional packages LOCAL ACCOUNTS AND POLICIES Define custom local accounts and SELinux configuration
OSP Director Template-Based Deployment Template-Based Configuration Examples for Security SSL/TLS ENABLED CONTROL PLANE AND ENDPOINTS Enable transport encryption on all control plane communication using your certificates AAA INTEGRATION Integrate with your AAA infrastructure (LDAP, Kerberos, etc) SERVICES CONFIGURATION Configure Logging, NTP, Monitoring Tools
<footer> Red Hat CloudForms UNIFIED MANAGEMENT AND OPERATIONS COMPLETE LIFECYCLE MANAGEMENT VISIBILITY AND ANALYTICS COMPLIANCE AND GOVERNANCE INTEGRATION AND COMPOSABILITY Unified Management for OpenStack
CloudForms Compliance and Governance ANALYZE Automatically perform SmartState Analysis on OpenStack Nodes and Instances (agent-less) TRACK AND ALERT Report on changes and drift, automatically alert based on defined policy REMEDIATE Automatically kick off defined remediation or deeper inspection actions Example Functions
CloudForms SmartState Analysis Examples of Items Tracked PACKAGES AND FILES Package versions, new/changed files LOCAL USERS AND ACTIONS User actions/commands, users and groups added or changed COMPONENT CHANGES Added or changed network interfaces, storage attached, new instances or containers running
Thank you! Please Post Questions in Webinar Visit Red Hat at OpenStack East August 23-24, NYC red.ht/openstack red.ht/cloudforms
Security and compliance through automation and micro-segmentation with OpenStack and SDN Justin Moore
Copyright © PLUMgrid, Inc. 2011-2015 • Regulatory Compliance • PCI • SOX • Security • Separation of concerns • Minimize attack surface • Strict enforcement of access control • Operations • Reduce manual effort through automation • Protect against misconfiguration • Dev/Test pointed to Prod • Incorrect or invalid firewall rule • Server placed on wrong network • Rapidly scale Technology Challenges in FSI
Copyright © PLUMgrid, Inc. 2011-2015 • Too slow • Ticket based manual workflows take days or weeks • New methodologies demand on-demand infrastructure, and tight integration with the SDLC • Agile • CI/CD • Micro-services • Error prone • Lack of automation and standardization leads to errors • Incomplete or inadequate de-comission processes • Too expensive • Scale-up Access Control devices/Forklift upgrades • Highly skilled and highly paid engineers performing trivial ticket based activities Traditional Approaches No Longer Work 18
Copyright © PLUMgrid, Inc. 2011-2015 • Cloud! • Ok – it’s not really that simple. What about all of that security stuff? • SDN! • Again – it’s not really as simple as buying an SDN. • How will we design the system to ensure that security is baked into the end-to-end environment? • Micro-segmentation • Great – another buzzword! • Micro-segmentation is the process of controlling access to and from a service based on the combination of security boundary and attack foot- print • Don’t we already do that? • Not really! So How Do We Keep Up? 19
Copyright © PLUMgrid, Inc. 2011-2015 Virtual Domains Your Private Virtual Data Center 20 • Tenant Virtual Domains • Isolation & segmentation of workloads • Self-service provision of all functions • Service Virtual Domains • Owned by Cloud Operator • Used to apply common services or security policies • Hosts external connectivity • Virtual Domain Chaining • Decouple changes from physical infrastructure • Fully distributed within IO Visor layer on each compute node DNS Service Virtual Domain Tenant Virtual Domains
Copyright © PLUMgrid, Inc. 2011-2015 PLUMgrid Virtual Domains Components of a Virtual Domain 21 Virtual Domain DistributedPolicy EnforcementZone Edge Policy Enforcement Point Virtual Domain (VD) — ISOLATION • Secure Tenant Isolation for multi-tenant clouds Contains all Network definitions for that Project • Rich set of analytics and monitoring • Option to encrypt traffic on a per VD basis Topology — Overlay based fully Distributed Network Functions • Network topology view • DVS/DVR/NAT/DNS/DHCP functions • Fully Distributed (No hairpin or network nodes) • Integration with external VTEP Gateways • Topology based Service Insertion (FW/LB/IPS) Policy boundary — SEGMENTATION • Group Based Policies & Micro-segmentation • All traffic in-out of VD goes through Policy Engine • Used for Security Groups (L2-4 stateless or state- full security) • Policy based VTAP (traffic capture) • Policy based Service Insertion (FW/LB/IPS) • Support for Service Chains or single Service Function
Copyright © PLUMgrid, Inc. 2011-2015 PLUMgrid ONS Components 22 Internet IO Visor Gateway IO Visor Edges (Compute Nodes) PLUMgrid Directors VXLAN-based Overlay PLUMgrid CloudApex & OpsVM
Copyright © PLUMgrid, Inc. 2011-2015 Example Application – Customer Service Tool 23 DNS Global Cloud Policy Prod CSTDev CST
Copyright © PLUMgrid, Inc. 2011-2015 Three-Tier Architecture Presentation tier Logic tier Data tier Database Storage GET LIST OF ALL SALES MADE LAST YEAR ADD ALL SALES TOGETHER > GET SALES TOTAL > GET SALES TOTAL 4 TOTAL SALES QUERY SALE 1 SALE 2 SALE 3 SALE 4
Copyright © PLUMgrid, Inc. 2011-2015 PLUMgrid Policy Path 25 Group Classification (source & destination End Point classification) Packets - sMAC / .1Q - src_IP/dst_IP - Application / Ports - Protocols Meta Data - Tenant ID / App ID - VM UUID / Name - End Point Type / Group - Location / physical Server Behavior - Traffic Profile - Sys Call profile - Storage Access Profile Stateful Security Groups Security Logs & Alerts Policy based VTAP Traffic mirroring Policy based Service Insertion VNF 1 VNF 2 VNF 3 - Service Chains - Distributed Service Insertion - Local Affinity
Micro-Segmentation Demo 26
Q&A Please use the Q&A panel to ask questions
Copyright © PLUMgrid, Inc. 2011-2015 THANK YOU!

Design and Deploy Secure Clouds for Financial Services Use Cases

  • 1.
    Design and DeploySecure Clouds for Financial Services – Use Cases August 18, 2016
  • 2.
    Copyright © PLUMgrid,Inc. 2011-2015 Introduction Speakers 2 Principal Solutions Architect Justin Moore Sr. Solution Architect – OpenStack Tiger Team Joe Antkowiak PLUMgrid Red Hat
  • 3.
    Copyright © PLUMgrid,Inc. 2011-2015 Agenda What’s will be covered today 3 1 OpenStack Infrastructure Security - Addressing Common Security Challenges using Red Hat OpenStack Platform Security and compliance through automation and micro-segmentation with OpenStack and SDN Micro-Segmentation Demo3 2
  • 4.
    OpenStack Infrastructure Security AddressingCommon Security Challenges using Red Hat OpenStack Platform Joe Antkowiak Sr Solution Architect August 18, 2016
  • 5.
    Agenda  Common OpenStackInfrastructure Security Challenges  Addressing Challenges with Red Hat OpenStack Platform Director  Addressing Challenges with Red Hat CloudForms
  • 6.
    OpenStack Infrastructure Security CommonChallenges  Many Manual Tasks  Infrastructure Secured Post Deployment  Detecting Change and Enforcing Policy  Maintaining Secure Configuration and Policy When Upgrading and Scaling
  • 7.
    <footer> OPENSTACK PLATFORM DIRECTOR DAY1 + SCALING/UPGRADING Director is included in Red Hat OpenStack Platform CLOUDFORMS DAY 2 + LIFECYCLE CloudForms is included in Red Hat OpenStack Platform
  • 8.
    <footer> Red Hat OpenStackPlatform Director DEPLOYMENTPLANNING OPERATIONS Updates and upgrades Scaling up and down Change management Deployment orchestration Service configuration Sanity checks Network topology Service parameters Resource capacity OpenStack Orchestration
  • 9.
    OpenStack Platform Director(OSPd) Advantages for OpenStack Security USES OPENSTACK TO DEPLOY OPENSTACK Concepts applicable to workloads running on OpenStack are applicable to OpenStack itself IMAGE BASED Nodes installed from a customize-able source image TEMPLATE BASED Customize-able, reusable, repeatable use of Heat templates (YAML) to install, scale, and upgrade
  • 10.
    OSP Director ImageCustomization Image Customization Examples for Security KERNEL Deploy a custom kernel build, or hardened kernel (with validation) PACKAGES Deploy specific package versions or additional packages LOCAL ACCOUNTS AND POLICIES Define custom local accounts and SELinux configuration
  • 11.
    OSP Director Template-BasedDeployment Template-Based Configuration Examples for Security SSL/TLS ENABLED CONTROL PLANE AND ENDPOINTS Enable transport encryption on all control plane communication using your certificates AAA INTEGRATION Integrate with your AAA infrastructure (LDAP, Kerberos, etc) SERVICES CONFIGURATION Configure Logging, NTP, Monitoring Tools
  • 12.
  • 13.
    CloudForms Compliance andGovernance ANALYZE Automatically perform SmartState Analysis on OpenStack Nodes and Instances (agent-less) TRACK AND ALERT Report on changes and drift, automatically alert based on defined policy REMEDIATE Automatically kick off defined remediation or deeper inspection actions Example Functions
  • 14.
    CloudForms SmartState Analysis Examplesof Items Tracked PACKAGES AND FILES Package versions, new/changed files LOCAL USERS AND ACTIONS User actions/commands, users and groups added or changed COMPONENT CHANGES Added or changed network interfaces, storage attached, new instances or containers running
  • 15.
    Thank you! Please PostQuestions in Webinar Visit Red Hat at OpenStack East August 23-24, NYC red.ht/openstack red.ht/cloudforms
  • 16.
    Security and compliancethrough automation and micro-segmentation with OpenStack and SDN Justin Moore
  • 17.
    Copyright © PLUMgrid,Inc. 2011-2015 • Regulatory Compliance • PCI • SOX • Security • Separation of concerns • Minimize attack surface • Strict enforcement of access control • Operations • Reduce manual effort through automation • Protect against misconfiguration • Dev/Test pointed to Prod • Incorrect or invalid firewall rule • Server placed on wrong network • Rapidly scale Technology Challenges in FSI
  • 18.
    Copyright © PLUMgrid,Inc. 2011-2015 • Too slow • Ticket based manual workflows take days or weeks • New methodologies demand on-demand infrastructure, and tight integration with the SDLC • Agile • CI/CD • Micro-services • Error prone • Lack of automation and standardization leads to errors • Incomplete or inadequate de-comission processes • Too expensive • Scale-up Access Control devices/Forklift upgrades • Highly skilled and highly paid engineers performing trivial ticket based activities Traditional Approaches No Longer Work 18
  • 19.
    Copyright © PLUMgrid,Inc. 2011-2015 • Cloud! • Ok – it’s not really that simple. What about all of that security stuff? • SDN! • Again – it’s not really as simple as buying an SDN. • How will we design the system to ensure that security is baked into the end-to-end environment? • Micro-segmentation • Great – another buzzword! • Micro-segmentation is the process of controlling access to and from a service based on the combination of security boundary and attack foot- print • Don’t we already do that? • Not really! So How Do We Keep Up? 19
  • 20.
    Copyright © PLUMgrid,Inc. 2011-2015 Virtual Domains Your Private Virtual Data Center 20 • Tenant Virtual Domains • Isolation & segmentation of workloads • Self-service provision of all functions • Service Virtual Domains • Owned by Cloud Operator • Used to apply common services or security policies • Hosts external connectivity • Virtual Domain Chaining • Decouple changes from physical infrastructure • Fully distributed within IO Visor layer on each compute node DNS Service Virtual Domain Tenant Virtual Domains
  • 21.
    Copyright © PLUMgrid,Inc. 2011-2015 PLUMgrid Virtual Domains Components of a Virtual Domain 21 Virtual Domain DistributedPolicy EnforcementZone Edge Policy Enforcement Point Virtual Domain (VD) — ISOLATION • Secure Tenant Isolation for multi-tenant clouds Contains all Network definitions for that Project • Rich set of analytics and monitoring • Option to encrypt traffic on a per VD basis Topology — Overlay based fully Distributed Network Functions • Network topology view • DVS/DVR/NAT/DNS/DHCP functions • Fully Distributed (No hairpin or network nodes) • Integration with external VTEP Gateways • Topology based Service Insertion (FW/LB/IPS) Policy boundary — SEGMENTATION • Group Based Policies & Micro-segmentation • All traffic in-out of VD goes through Policy Engine • Used for Security Groups (L2-4 stateless or state- full security) • Policy based VTAP (traffic capture) • Policy based Service Insertion (FW/LB/IPS) • Support for Service Chains or single Service Function
  • 22.
    Copyright © PLUMgrid,Inc. 2011-2015 PLUMgrid ONS Components 22 Internet IO Visor Gateway IO Visor Edges (Compute Nodes) PLUMgrid Directors VXLAN-based Overlay PLUMgrid CloudApex & OpsVM
  • 23.
    Copyright © PLUMgrid,Inc. 2011-2015 Example Application – Customer Service Tool 23 DNS Global Cloud Policy Prod CSTDev CST
  • 24.
    Copyright © PLUMgrid,Inc. 2011-2015 Three-Tier Architecture Presentation tier Logic tier Data tier Database Storage GET LIST OF ALL SALES MADE LAST YEAR ADD ALL SALES TOGETHER > GET SALES TOTAL > GET SALES TOTAL 4 TOTAL SALES QUERY SALE 1 SALE 2 SALE 3 SALE 4
  • 25.
    Copyright © PLUMgrid,Inc. 2011-2015 PLUMgrid Policy Path 25 Group Classification (source & destination End Point classification) Packets - sMAC / .1Q - src_IP/dst_IP - Application / Ports - Protocols Meta Data - Tenant ID / App ID - VM UUID / Name - End Point Type / Group - Location / physical Server Behavior - Traffic Profile - Sys Call profile - Storage Access Profile Stateful Security Groups Security Logs & Alerts Policy based VTAP Traffic mirroring Policy based Service Insertion VNF 1 VNF 2 VNF 3 - Service Chains - Distributed Service Insertion - Local Affinity
  • 26.
  • 27.
    Q&A Please use theQ&A panel to ask questions
  • 28.
    Copyright © PLUMgrid,Inc. 2011-2015 THANK YOU!