Unlock the full potential of data centre virtualisation with micro

Transcription

Unlock the full potential of data centre virtualisation with micro
Unlock the full potential of data centre
virtualisation with micro-segmentation
Making software-defined security (SDS) work for your data centre
Contents
1
Making
software-defined security (SDS) work for
your data centre
2
The barriers to implementing micro-segmentation
2 Managing distributed services: the key to
micro-segmentation is automation
3
Micro-segmentation in action
4 Delivering a successful micro-segmentation
programme
4 Summary: putting network risk in context with
micro-segmentation
2
www.nttcomsecurity.com
Making software-defined security (SDS)
work for your data centre
It’s time to unlock the full potential of virtualisation. Almost every organisation we talk to relies upon
virtualised environments somewhere in the business to increase efficiency, flexibility and scalability.
Whether these virtualised environments
are used to spin up development
environments, add more computing power
to meet processing spikes or to replicate
production systems for testing or disaster
recovery – virtualisation gives organisations
the agility to respond to user demands
without the constraints and associated
costs of traditional hardware. Data centre
infrastructure design has evolved in order
to accommodate a never ending list of
new business requirements (such as cloud
computing, the consumerisation of IT, mobile
working and an explosion of critical business
software applications). However, data centre
security architectures have not evolved at
the same pace.
to the flexible provisioning, application
workload management and free network
flows that virtualisation promises. Data
centre networks were originally designed to
operate from client to server, or north-south
traffic. In line with this model, perimeter
defences and network segments were
constructed to control traffic by department
or function (east-west) in order to manage
the risk of external threats. By combining
these perimeter controls and segmenting
machines and networks, organisations
created distinct security zones. Firewalling is
used extensively to establish security zones
for particular applications, and network
zoning plays a key role in a data centre
security architecture.
In many organisations, existing data centre
security architectures are actually a barrier
These security zones are essential –
particularly in organisations that have to
comply with standards such as PCI-DSS
which require clear separation of data
within the network. To comply with PCIDSS regulations for example, cardholder
data must be isolated from other areas of
the network that contain less sensitive
information. Point-of-Sale (PoS) systems and
databases must be completely separated
from certain areas of the network, including
those accessed by third parties, creating
a PCI Zone with stringent constraints that
limit connectivity to as few servers and
applications as possible. This is not only good
practice for network segmentation, but also
for a PCI environment.
But security professionals have discovered,
as the number of these security zones
increases so does the complexity of
managing them. This not only creates
DMZ
App
DB
■ Finance
■ HR
■ Engineering
Perimeter
firewall
DMZ
Inside
firewall
App
DB
Services
AD
NTP
DHCP
DNS
CERT
Figure 1: How a traditional security infrastructure compares with micro-segmentation architecture
www.nttcomsecurity.com
1
new security risks, but also the potential
for misconfiguration. This approach also
makes it nearly impossible to enforce the
consistent security policies an organisation
needs to embrace and benefit from a fully
visualised environment. So, in an attempt to
maintain an element of visibility and control,
organisations have attempted to limit the
number of security zones.
In today’s data centre, up to 80 percent
of traffic stays within the data centre
(referred to as east-west traffic). As we have
seen in many high profile attacks, this
means that once the perimeter firewall is
breached, an attacker can operate at will
within the network. And the reality is that
the current mix of data centre security
controls is insufficient to prevent the spread
of attacks from server to server. This is
even more challenging in the virtualised
world, as multiple servers are hosted on
the same physical hardware – the result is
that traditional security controls have zero
visibility to these potential threats.
In NTT Com Security’s experience,
organisations that want to evolve network
and security segmentation should take full
advantage of virtualisation by:
1.Managing risk in context with security
policies that are configured and applied
for logical groups, not physical ones
2.Establishing granular visibility and
control of network traffic for both zero
trust defence and faster incident response
3.Introducing automation of provisioning
and other changes that would typically be
resource intensive
Our customers want micro-segmentation to
help them solve critical security breaches
by stopping attackers from moving laterally
within the data centre.
The barriers to implementing
micro-segmentation
The concept of software-defined networking
(SDN) presents exciting possibilities as
networking evolves from being controlled
exclusively by boxes with flashing lights,
to being driven by software stacks. SDN
provides, separation of control, the ability
to pragmatically manage all the datapath
state in the network – and centralised
management. This change in approach
makes the concept of micro-segmentation a
reality. It gives us a scalable, operationally
feasible, and cost-effective solution whereby
isolation and segmentation of traffic between
any two endpoints can be analysed and
filtered based on a security policy. These
security policies are coordinated, automated
and orchestrated centrally. Firewalls, both
traditional and next generation, work by
implementing controls as physical or virtual
‘choke points’ on the network. Firewall
rules are enforced and packets are either
blocked or allowed to pass through when
application workload traffic is directed
through these control points. If organisations
tried to implement micro-segmentation
using a traditional firewall approach, they
would experience two operational barriers –
capacity and managing change.
If budget is no object, an organisation can
tackle capacity issues by adding enough
physical or virtual firewalls to the network
to deliver micro-segmentation. Even if
an organisation has unlimited resources,
manually adding, deleting and/or modifying
firewall rules every time you add, move or
decommission a new virtual machine can
rapidly overwhelm even the most efficient
data centre operations. For the organisations
we talk to, this is the most common barrier
to achieving a ‘zero trust’ approach with
micro-segmentation.
Figure 2: Orchestration layer in action
Managing distributed services: the key
to micro-segmentation is automation
The data centre functions of compute,
storage, and networking are often treated
as separate entities and are managed by
separate teams. An organisation may be able
to provision a virtual machine in a matter of
seconds, but the value of this is diminished if
it takes several days to provision the virtual
machines on an organisation’s VLAN.
In high-performing virtualised data centres,
network and security configuration changes
happen automatically and immediately. Key
to this is the adoption of a well-configured
2
www.nttcomsecurity.com
automation (policy and orchestration)
layer. Using an orchestration tool such
as VMWare’s NSX network and security
virtualisation platform, when a new virtual
machine is provisioned, the VLAN it belongs
to is configured automatically.
We have seen clear examples of how
introducing an automation layer into an
organisation’s virtualised data centre can
transform visibility, control and advanced
protection and detection capabilities. It can
also reduce operational costs, increase speedto-market of new products and services and
enable easier migration to the cloud – all
with greater confidence.
An automation layer enables the correct
firewall policies to be automatically
provisioned when a workload is
programmatically created. These policies
follow the workload as it moves within the
data centre, between data centres or even
into the cloud. And when an application is
deleted, the associated security policies are
removed with it, eliminating a key barrier
to effective micro-segmentation. This layer
can also help organisations to evaluate the
impact of a breach by automating elements
of incident response, manage vulnerability
scanning, IPS policy or even load balancing
during the day.
Micro-segmentation in action
Technology innovations that have
combined automation (policy and
orchestration) and hypervisor capabilities
mean that network and security services
(routing, switching, firewalling and quality of
service, for example) that are provisioned via
a workload are automatically created
and distributed.
Micro-segmentation is achieved by
applying the correct security policy at
the virtual interface layer. All traffic, even
traffic within the same subnet, is able to be
centrally inspected and controlled. NTT Com
Security has been working with a number of
organisations to achieve this operational and
compliance Nirvana.
Operating System
Machine Name
Unique Tags
Application Tier
Regulatory Requirements
Security Posture
Advanced Services
Built-in Services
Firewall (North L7 and
East to West L2)
Data Security
Server Activity Monitoring
VPN (IPSEC, SSL, L2VPN)
Third-party Services
McAfee
Palo Alto Networks
Fortinet
Check Point
Trend Micro
F5
...and more in progress
Advanced services: addition of NTT Com
Security’s strategic technology vendors, as
required by policy
Figure 3: How micro-segmentation creates intelligence and context, enhancing organisations’ detection and protection capabilities. Example shows VMWare’s NSX
network virtualisation platform
www.nttcomsecurity.com
3
Delivering a successful
micro-segmentation programme
>
Discovery – our consultants work
closely with you to understand
your existing architecture and
information security needs across your
environment and identify your current
risk exposure
>
Evaluation – using the data from
the Discovery phase, we define the
relevant adaptive security architecture
with the appropriate intelligence,
context, policy and controls in order to
meet your organisation’s IS needs
>
Planning – these activities are
consolidated into solutions which are
aligned to the security architecture and
matched to your commercial goals
> I mplementation – we execute a
programme of delivery measured
against the agreed controls, while
managing the change within your
organisation
>
Security Operations – we deliver an
agreed security operations model for
continuous risk management
Summary: putting network risk in
context with micro-segmentation
Micro-segmentation is a fundamental
component of delivering the security
required in today’s threat landscape.
This, along with the speed, flexibility
and reduced complexity promised by
virtualisation delivers to the bottom line by
providing scale, but also drives governance
and compliance by offering new levels
of isolation, separation and protection for
sensitive workloads.
Micro-segmentation delivered via
virtualisation has distinct advantages
over the physical data centre network
model that it will, in time, replace. For many
organisations, traditional host-based and
network perimeter-based security controls
remain the only pillars of defence, each
control responding with little or no common
reference or context. Micro-segmentation
delivered via virtualisation replaces
hardware risk with an architecture solution
that helps to address today’s network and
security concerns. Built in software provides
unified coverage, control and context,
unrestricted by agent function or confined
to individual aggregation points on
your network.
Do not be misled by the name – it may be
called micro-segmentation, but the business
benefits are enormous.
4
www.nttcomsecurity.com
We see a more secure world
NTT Com Security is in the business of
information security and risk management.
By choosing our WideAngle consulting,
managed security and technology services,
our customers are free to focus on business
opportunities while we focus on
managing risk.
The breadth of our Governance, Risk and
Compliance (GRC) engagements, innovative
managed security services and pragmatic
technology implementations, means we
can share a unique perspective with our
customers – helping them to prioritise
projects and drive standards. We want to
give the right objective advice every time.
To learn more about NTT Com Security
and our unique WideAngle services for
information security and risk management,
please speak to your account representative
or visit: www.nttcomsecurity.com for
regional contact information.
Our global approach is designed to drive
out cost and complexity – recognising
the growing value of information security
and risk management as a differentiator
in high-performing businesses. Innovative
and independent, NTT Com Security
has offices spanning the Americas,
Europe, and APAC (Asia Pacific) and is
part of the NTT Communications Group,
owned by NTT (Nippon Telegraph and
Telephone Corporation), one of the largest
telecommunications companies in the world.
Copyright© NTT Com Security 2015
8
www.nttcomsecurity.com