data center security challenges and solutions · technology clustered security services using n+1...

35

Upload: others

Post on 16-Mar-2020

1 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION
Page 2: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Data Center Security Challenges and Solutions Automated Security for Today’s Dynamic Data Centers

Mohammad AlYousef

Sr. Systems Engineer

Page 3: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

VPN

Functions

IPS

Functions

Context

Aware

Functions

Traditional

Firewall

Functions

Web

Functions

W W W

Security Functions in the Data Center

Page 4: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Key Trends for Security in the Data Center

Scale: Need for policy enforcement for high speed networks

Segmentation: Policy between specific groups, users, or applications

Resiliency: High availability is imperative for applications

Expanded Deployment Options: Policy enforcement on inter-DC traffic

Contextual Analysis: Global and local threat correlation

Virtualization: Security for east-west traffic in multi-hypervisor environments

Page 5: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Key Trends for Security in the Data Center

Scale: Need for policy enforcement for high speed networks

Expanded Deployment Options: Policy enforcement on inter-DC traffic

Resiliency: High availability is imperative for applications

Segmentation: Policy between specific groups, users, or applications

Contextual Analysis: Global and local threat correlation

Virtualization: Security for east-west traffic in multi-hypervisor environments

Page 6: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014 ©2013 Cisco and/or its affiliates. All rights reserved.

Data Center

Scale

TOTAL THROUGHPUT

CONCURRENT CONNECTIONS

CONNECTIONS / SEC

POWER & SPACE

Page 7: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Key Trends for Security in the Data Center

Scale: Need for policy enforcement for high speed networks

Expanded Deployment Options: Policy enforcement on inter-DC traffic

Resiliency: High availability is imperative for applications

Segmentation: Policy between specific groups, users, or applications

Contextual Analysis: Global and local threat correlation

Virtualization: Security for east-west traffic in multi-hypervisor environments

Page 8: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Network Integrated Clustering & Resiliency

Ease of Deployment

Solves Asymmetric Traffic

Linear, Predictable Performance

Increase

Only Buy What You Need

Compliance and Security

Benefit

Integration with VSS, vPC and

Fabric Path

Consistent Scaling Factor

Pay as You Grow

FW, VPN, IPS Services

Technology

Clustered

Security

Services

Using N+1 HA

Integration with

DC Switches

Page 9: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Key Trends for Security in the Data Center

Scale: Need for policy enforcement for high speed networks

Expanded Deployment Options: Policy enforcement on inter-DC traffic

Resiliency: High availability is imperative for applications

Segmentation: Policy between specific groups, users, or applications

Contextual Analysis: Global and local threat correlation

Virtualization: Security for east-west traffic in multi-hypervisor environments

Page 10: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Security Services Cluster

Symmetric Traffic Patterns in the Data Center

Inside Network

Client

Outside Network

Server

Page 11: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Inside Network

Outside Network

Client

Security Services Cluster

Server

Symmetric Traffic Patterns in the Data Center

Page 12: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Inside Network

Outside Network

Client

Security Services Cluster

Server

Symmetric Traffic Patterns in the Data Center

Page 13: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Inside Network

Outside Network

Client

Security Services Cluster

Server

Owner

Director

Forwarder

Asymmetric Traffic Patterns in the Data Center

Page 14: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Inside Network

Outside Network

Client

Security Services Cluster

Server

Owner

Director

Forwarder

Asymmetric Traffic Patterns in the Data Center

Page 15: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

EXPANDING SECURITY BETWEEN DATA CENTERS

Use Cases

Power outage, catastrophic failure Disaster Recovery

Optimization of resources Follow the sun operations

Dealing with traffic bursts Dynamic Load Distribution

Page 16: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

EXPANDING SECURITY BETWEEN DATA CENTERS

Infrastructure

Demands Traditional

Approach

Over- provisioned HW Simplicity

Low Latency Manual traffic engineering

High Scale Static, external stateless LB

High Availability Siloed HA at different sites

– no sharing of info

Optimized

Approach

Workload

mobility

Optimize traffic flows to

minimize latency

Security state maintained with

application mobility via CCL

Persistent security HA across

DC

Page 17: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Key Trends for Security in the Data Center

Scale: Need for policy enforcement for high speed networks

Expanded Deployment Options: Policy enforcement on inter-DC traffic

Resiliency: High availability is imperative for applications

Segmentation: Policy between specific groups, users, or applications

Contextual Analysis: Global and local threat correlation

Virtualization: Security for east-west traffic in multi-hypervisor environments

Page 18: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

TrustSec Overview

TrustSec lets you define policy in meaningful business terms

Business Policy

Context Classification

Security Group Tag TAG

Source

Destination

Exec PC

Prod HRMS

HR Database

HR Database Prod HRMS Storage

Exec BYOD X X

X X

X

X

Distributed Enforcement throughout Network

Switch Router DC FW DC Switch

Unified Context & Network Control – TrustSec +ASA

Page 19: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Key Trends for Security in the Data Center

Scale: Need for policy enforcement for high speed networks

Expanded Deployment Options: Policy enforcement on inter-DC traffic

Resiliency: High availability is imperative for applications

Segmentation: Policy between specific groups, users, or applications

Contextual Analysis: Global and local threat correlation

Virtualization: Security for east-west traffic in multi-hypervisor environments

Page 20: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Turning Big Data into Threat Intelligence

Global and local correlation through analytics and human intelligence

THREAT ANALYTICS

Broadest range of threat & vulnerability data sources

SECURITY SENSOR BASE

Contextual Policy with Distributed Enforcement

INTELLIGENCE DELIVERED

Heuristics

Engines

Self-Learning

Algorithms

Human

Research

Data

Filtration

Global

& Local

Data

Correlation

Trust

Modeling

Faster Threat

Detection

Remediate

Dynamically

Perimeter

& Cloud

Delivered

Context for

Common

Policy

Real Time

Appliance

Updates

Threat

Prevention

By Network

150M Deployed

Endpoints

14M Deployed

Access

Gateways

1.6M Deployed

Security

Devices

100TB Security

Intelligence

13B Web

Requests

93B Daily Email

Messages

Page 21: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Key Trends for Security in the Data Center

Scale: Need for policy enforcement for high speed networks

Expanded Deployment Options: Policy enforcement on inter-DC traffic

Resiliency: High availability is imperative for applications

Segmentation: Policy between specific groups, users, or applications

Contextual Analysis: Global and local threat correlation

Virtualization: Security for east-west traffic in multi-hypervisor environments

Page 22: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

76

%

East – West Traffic

17

%

North – South Traffic

TRAFFIC TRENDS IN DATA CENTER

Source: Cisco Global Cloud Index 2012 by destination

7

%

Inter-DC Traffic

Page 23: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

TRADITIONAL APPROACH TO TRAFFIC TRENDS DC Core

DC Aggregation

DC Access

VM VM VM VM VM VM VM VM VM VM

Policy for North-South

traffic enforced by firewalls

Inspection of inter-VM

East-West traffic requires

complex traffic steering

Infrastructure

Demands Traditional

Approach

Traffic

Hairpinning

Insert East-West

Services

Need for Scale Over-provision HW

Diverse Users/Devices Rules

Explosion

Rapid Provisioning Manual & Fragmented

Page 24: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

On-Demand Scaling DISTRIBUTED DEPLOYMENTS

Physical & Virtual HETERGENEOUS IMPLEMENTATION

Dynamic Instantiation/Removal

DYNAMIC WORKLOADS

Transparent to Underlying Network

INFRASTRUCTURE INDEPENDENT

Migration across public/private clouds

CLOUD-AWARE

APPLICATION TRENDS IN DATA CENTER

Instantiate

new VM

Decommission

existing VM

Migrate

existing VM

Page 25: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

On-Demand Scaling DISTRIBUTED DEPLOYMENTS

Physical & Virtual HETERGENEOUS IMPLEMENTATION

Dynamic Instantiation/Removal

DYNAMIC WORKLOADS

Transparent to Underlying Network

INFRASTRUCTURE INDEPENDENT

Migration across public/private clouds

CLOUD-AWARE

APPLICATION TRENDS IN DATA CENTER

The adoption rate of server virtualization will

reach 21.3% of total servers in 2016.

GARTNER

Applications on both

physical & virtual

Page 26: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

On-Demand Scaling DISTRIBUTED DEPLOYMENTS

Physical & Virtual HETERGENEOUS IMPLEMENTATION

Dynamic Instantiation/Removal

DYNAMIC WORKLOADS

Transparent to Underlying Network

INFRASTRUCTURE INDEPENDENT

Migration across public/private clouds

CLOUD-AWARE

APPLICATION TRENDS IN DATA CENTER

New Applications,

Devices & Users

Page 27: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

On-Demand Scaling DISTRIBUTED DEPLOYMENTS

Physical & Virtual HETERGENEOUS IMPLEMENTATION

Dynamic Instantiation/Removal

DYNAMIC WORKLOADS

Transparent to Underlying Network

INFRASTRUCTURE INDEPENDENT

Migration across public/private clouds

CLOUD-AWARE

APPLICATION TRENDS IN DATA CENTER

Dynamically Shared

Resource Pools

Silioed

Resources

oversubscribed underutilized

Shared

Resource Pools

optimized

Page 28: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

On-Demand Scaling DISTRIBUTED DEPLOYMENTS

Physical & Virtual HETERGENEOUS IMPLEMENTATION

Dynamic Instantiation/Removal

DYNAMIC WORKLOADS

Transparent to Underlying Network

INFRASTRUCTURE INDEPENDENT

Migration across public/private clouds

CLOUD-AWARE

APPLICATION TRENDS IN DATA CENTER

By 2016, 66% of all workloads will be processed in

the cloud CISCO GLOBAL CLOUD INDEX

Inter-DC

Secure

Multi-tenant aware

Page 29: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

KEY REQUIREMENTS TO ADDRESS DC TRENDS

Simplified

Provisioning

Dynamic workloads

Centralized Management

Physical/Virtual agnostic

Dynamic

Scaling

Dynamic

On-Demand

Physical + Virtual

Location independent

Centralized

Management

Centralized policy for network & security

Rapid instantiation based on resource availability

Automated

Policy

Management

Dynamic ACL insertion / removal

Open

Architecture

Hypervisor agnostic

vSwitch compatible

Programmable API

Multi-tenant aware

Application aware

Page 30: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

APPLICATION CENTRIC INFRASTRUCTURE ENABLING APPLICATION VELOCITY – ANY APPLICATION, ANYWHERE

APIC

Physical Networking

Compute L4–L7 Services

Multi DC WAN and Cloud

Storage

Integrated

WAN Edge

Hypervisors and Virtual Networking

Nexus 9500

Nexus 9300 and 9500

Nexus 2K

Nexus 7K

ASA

Page 31: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

Transparent Integration of Security into Cisco’s Application Centric Infrastructure

Centralized Infrastructure with Automated Security Policy Management

Elastic Scalability across Virtual and Physical Environments

CISCO’S APPLICATION CENTRIC INFRASTRUCTURE SECURITY SOLUTION

Page 32: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

VIRTUAL PHYSICAL

ASA 5585-X

16 Way Clustering with

State Synchronization

Scalable to 640Gbps

ASAv

• Full ASA Feature Set

• Hypervisor Independent

• Virtual Switch Agnostic

• Dynamic Scalability

ACI SECURITY SOLUTION STARTS WITH CISCO ASA

ASA

ASAv on VMWare – Available in Beta Today – Ask your SE

Page 33: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

PROTECTION Integrated Security and Consistent Policy Enforcement (Physical & Virtual)

Active Monitoring & Comprehensive Diagnostics for Threat Mitigation

PROVISIONING Simplified Service Chaining

Dynamic Policy Management

Rapid Instantiation

PERFORMANCE On Demand Scalability

Increased Clustering Size

Multi-Site Clustering

CISCO SECURITY INTEGRATED INTO ACI

Page 34: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION

Cisco Connect, Riyadh, Saudi Arabia, April 29-30, 2014

The Network and Security: Synergies Drive Value

Data Center Service

Clustering Delivers

Unmatched Scale

Automated Network

Re-direction

Consistent, End-to-end Security

Policy Enforcement

Mobility and BYOD

Accelerator / Enabler

Rich Data Sets Accelerate

Threat Detection

Security

Network

Scales

Enforcement

Accelerates

Detection

Aggregates

Unique Context

Page 35: Data Center Security Challenges and Solutions · Technology Clustered Security Services Using N+1 HA Integration with ... East – West Traffic 17 % North – South Traffic ... APPLICATION