Transforming Security with NSX Micro-Segmentation
Transcription
Transforming Security with NSX Micro-Segmentation
Transforming Security with NSX Micro-Segmentation InfoSec 2015 Peter Bury, VMware SDDC Security and Compliance @Peter_Bury © 2015 VMware Inc. All rights reserved. Why do breaches still occur? Today’s data centers are protected by strong perimeter defense… But threats and exploits still infect servers. Lowpriority systems are often the target. Threats can lie dormant, waiting for the right moment to strike. 10110100110 101001010000010 1001110010100 Attacks spread inside the data center, where internal controls are often weak. Critical systems are targeted. Server-server traffic growth has outpaced client-server traffic. The attack spreads and goes unnoticed. Possibly after months of reconnaissance, the infiltration relays secret data to the attacker. 2 The legacy security model emphasized perimeter security Perimeter-centric network security has proven insufficient Internet Data Center Perimeter And is incompatible with a world where security is needed everywhere Adding more internal security… requires placing more firewalls across workloads Physical Firewalls Cost prohibitive with complex configurations Internet Virtual Firewalls Slower performance, costly and complicated Data Center Perimeter Making it possible - Network intelligence in software Software Defined Data Center (SDDC) Network & Security Services Now in the Hypervisor Any Application Firewalling/ACLs Load Balancing L2 Switching L3 Routing SDDC Platform Data Center Virtualization Any x86 Any Storage Any IP network 5 CONFIDENTIAL 6 NSX Distributed Firewalling Hypervisor Kernel Embedded Firewall: • Is built directly in to the Hypervisor • “Line Rate” Performance No VM can circumvent Firewall (egress and ingress packets are always processed by firewall). – In case of extreme load (CPU saturated or memory completely full) the Distributed Firewall behaves as fail open: no packet will pass the FW. V M V M Distributed Virtual Firewall: V M V M V M V M V M • No “Choke Point” • Scale Out • Enforcement closest to VM at vNIC level V M V M V M V M V M V M V M V M 7 | 35 Higher levels of data center security: micro-segmentation 1 Isolation and segmentation 2 Unit-level trust / least privilege 3 Ubiquity and centralized control Micro-segmentation: Isolation No communication path between unrelated networks Segmentation Controlled communication path within a single network Advanced services Advanced services: addition of 3rd party security, as needed by policy 9 Micro-segmentation and Security Groups Finance HR Engineering Perimeter firewall DMZ Inside firewall Each VM can now be its own perimeter App Policies align with logical groups Prevents threats from spreading DB Services AD NTP DHCP DNS CERT 10 Visibility & Adaptable Security – User Identity Differentiate control based on what is running inside the workload (data, app) & who is accessing it Finance HR Engineering Threat Reduction: Limit access to micro-segments based on user identity Restrict access using Identity Firewall Threat Response: Dynamic policies to enable adaptive security for ever-changing environments CONFIDENTIAL 11 Extensibility to Partner Ecosystem CONFIDENTIAL 12 In Summary …NSX Enhanced Security • Micro-segmentation places simpler security controls at the application • Micro-segmentation focuses simpler security policies on users and applications • Micro-segmentation creates pervasive E/W visibility • Micro-segmentation simplifies all security technologies CONFIDENTIAL 13 Thank You 14