55
Copyright CohesiveFT 2009 Cohesive Flexible Technologies Controlling and Securing Your Assets in the Cloud Chris Purrington, CohesiveFT 1

Securing Enterprise Assets In The Cloud

Embed Size (px)

DESCRIPTION

From the Gaming Scalability event, June 2009 in London (http://gamingscalability.org). In this talk, Chris Purrington will discuss security challenges for cloud deployments and present VPN Cubed, a solution for the problem of integrating your existing infrastructure with the cloud. VPN-Cubed is a federated mesh of VPN servers that can be embedded in applications to run as a secure overlay network across multple locations, allowing your cloud machines can appear to exist on an extension of your local network. The enables you to run applications in the cloud while remaining connected to immobile systems such as databases and management interfaces.As VP Sales at cloud enabler CohesiveFT Chris is responsible for worldwide sales. With over 20 years in the software industry. Chris has extensive experience in leading ISVs to success in EMEA, this includes 9+ years at Application Lifecycle Management company Borland where he was UK MD and VP UK , Ireland and Africa. Chris is an active member of the London cloud community, organising CloudCamp London and the AWS London User Group. Don't hold it against him but Chris started his career as a 'bean counter', and is a Fellow of the Chartered Association of Certified Accountants.

Citation preview

Page 1: Securing Enterprise Assets In The Cloud

Copyright CohesiveFT 2009

Cohesive Flexible Technologies

Controlling and Securing Your Assets in the Cloud

Chris Purrington, CohesiveFT

1

Page 20: Securing Enterprise Assets In The Cloud

Copyright CohesiveFT 2009 20

Server “assembly” costs are THE Enterprise IT cost

20-year journey from single file deployment to homogenous architecture (the “C” program on Unix) to single file deployment on heterogeneous architecture (the VM to everywhere)

As such - assembly error and propagation represents one of the biggest security risks as well

Photo credit: Zach Rosing, May 25, 2007,

Page 22: Securing Enterprise Assets In The Cloud

Copyright CohesiveFT 2009 22

“P2V and SLA are mutually EXCLUSIVE!”

Why? The 3 rules of hardware computing...

1) When you get a physical machine installed and working - NEVER MOVE IT2) When you get the software installed and working - NEVER TOUCH IT3) When you “touch it”, don’t tell anyone.

PHYSICAL TO VIRTUAL........easy.

Ahh...you will use P2V(somehow)

Page 27: Securing Enterprise Assets In The Cloud

Copyright CohesiveFT 2009 27

I have software that REQUIRES multicast for service discovery

This is true of many enterprise software packages (grid computing packages, database clusters, wikis and more). 

Even inside the enterprise complexity and lead times prevent shared use of available resources in disparate customer controlled data centers because VLAN reconfiguration would be too expensive. 

VPN-Cubed allows you to get the multicast traffic into the overlay network before it is rejected by the underlying network infrastructure. This allows you control of your protocols.

Page 28: Securing Enterprise Assets In The Cloud

Copyright CohesiveFT 2009 28

I want to control my own network addresses

I am an early adopter of cloud computing and love the flexibility provided by public cloud like Amazon EC2 but I want to control my own network addresses, not be given some different set of VLAN addresses when I reboot my servers. 

VPN-Cubed gives you control of your addressing allowing you to give your cloud servers static addresses that only change when YOU want them to.  Local infrastructure control of addressing in the public clouds!

Page 29: Securing Enterprise Assets In The Cloud

Copyright CohesiveFT 2009 29

Can’t I use my existing data center NOC?

I have completed some of my “datacenter to cloud” migrations but am now under pressure to use new monitoring and management tools.  Can’t I use my existing datacenter NOC (network operations center)? 

VPN-Cubed allows you to simply set up an overlay network for the express purpose of connecting cloud VLANS (at EC2 for example) to data center management installations using popular commercial systems like Tivoli, Unicenter, OpenView, as well as leading open source systems like Nagios, Hyperic and GroundWorks.

Page 30: Securing Enterprise Assets In The Cloud

Copyright CohesiveFT 2009 30

I want to use EC2 USA and EC2 Europe for both fail over and data privacy issues

I am a cloud early adopter and I want to use both Amazon EC2 USA and Amazon EC2 Europe for both fail over and data privacy issues.  How can I securely link the two environments and treat them as one logical network? 

VPN-Cubed does this “out of the box” with a pre-packaged solution “VPN-Cubed for EC2” available for self-service clients as well as those needing some professional services support.

Page 31: Securing Enterprise Assets In The Cloud

Copyright CohesiveFT 2009 31

Isn’t there a way I can test ISV solutions as if on my local network?

I have an ISV who has a solution which I would like to evaluate but it will be quite disruptive for me to install. Can’t I can test their solution as if it was on my local network? 

VPN-Cubed allows your ISV to install their solution as a virtual server in a public cloud like EC2, yet make it available to a DMZ or particular set of VLANs in your corporate environment. 

The burden of testing the ISV solution should rest with your vendor with minimal impact or workload on your team.

Page 36: Securing Enterprise Assets In The Cloud

Copyright CohesiveFT 2009 36

VPN-Cubed: Datacenter to EC2 Run an overlay network using Manager pairs in EC2 region and your data center

36

WHAT IS DIFFERENT?The local VPN-Cubed Managers will need to be assembled in a virtual machine format you can support.

You WILL need to allow the Managers in your data center to initiate outbound connections.

You MIGHT want to allow the Managers in EC2 to initiate inbound connections to the local managers, if so you LIKELY will have to make some NAT entries in your network control equipment.

You SHOULD put the VPN-Cubed Managers in a VLAN setup where you are comfortable with what traffic can and cannot traverse to and from your EC2 VLAN.

EC2EUor

EC2USA

Peers

Peers

YourData

Center

Page 37: Securing Enterprise Assets In The Cloud

Copyright CohesiveFT 2009 37

VPN-Cubed: Datacenter to EC2 (IPSEC) Overlay network created via Manager pairs in EC2 and your data center equipmentt

37

WHAT IS DIFFERENT?There are no local VPN-Cubed Managers.

Your data center extranet solution (Cisco ASA, Cisco Pix, Juniper Netscreen) will connect to VPN-Cubed Managers in the cloud, front-ended by VPN-Cubed IPSEC Gateways.

You MIGHT want to allow the Managers in the cloud to route traffic to your datacenter, if so you WILL have to make some routing entries in the VPN-Cubed Managers. EC2

EUor

EC2USA

Peers

YourData

Center

IPSECGateways

Page 38: Securing Enterprise Assets In The Cloud

Copyright CohesiveFT 2009 38

VPN-Cubed: Enterprise EditionComplex, multi-manager, custom topology captured as a specification

38

Evolution of use cases.As we discover different use cases we retrofit them as specification to automatically drive the user interface for peering and monitoring.

It is in incremental and ongoing process at this point of the market.

Page 40: Securing Enterprise Assets In The Cloud

Copyright CohesiveFT 2009 40

Bill of Materials

With a BOM approach:

- Identity - Customization- Provenance

This is an EC2 server...right?

Look again...

Page 41: Securing Enterprise Assets In The Cloud

Copyright CohesiveFT 2009 41

Bill of Materials

With a BOM approach:

Re-master device:- new cloud- new VM type- new OS

Make clones with unique IDs, unique MAC addresses

It the BOM!

Page 50: Securing Enterprise Assets In The Cloud

confidential

Assembly portals allow:- control of your message

- control of your brand

- control of your architecture

- control of your execution context

- control of your customer connection

- support and highlight your ecosystem

- support e-commerce integration

- support usage pattern analysis

MarketMessage

Distribute

50

Page 53: Securing Enterprise Assets In The Cloud

confidential

Elastic Server Key Themes and Values

53

ES as a meta-packaging system

ES covers the continuum from “vm building” to an online community for teamsourcing/crowdsourcing virtual servers- Appliance Builders

- OSS ISVs

- Traditional ISVs

- Enterprises

ES as a driver of provenance, certification and standards

ES as a tool to integrate developers to the production flow

ES as an e-commerce system for marketing, messaging and distributing virtual servers

ES as a defense against vendor lock in

Page 54: Securing Enterprise Assets In The Cloud

Copyright CohesiveFT 2009 54

www.elasticsever.com

blog.elasticserver.comtwitter.com/elasticserver

www.cohesiveft.com