Top Banner
Chris Swan, CTO, @cpswan Application centric: How the cloud has changed the way we deploy, secure and connect
38

CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

Apr 14, 2017

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

Chris Swan, CTO, @cpswan

Application centric: How the cloud has changed the way

we deploy, secure and connect

Page 2: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

Google moves its corporate apps to the Internet

2

Google Inc., taking a new approach to enterprise security, is moving its corporate applications to the Internet. In doing so, the Internet giant is flipping common corporate security practice on its head, shifting away from the idea of a trusted internal corporate network secured by perimeter devices such as firewalls, in favor of a model where corporate data can be accessed from anywhere with the right device and user credentials. The new model — called the BeyondCorp initiative — assumes that the internal network is as dangerous as the Internet.

(Wall Street Journal | “Google Moves Its Corporate Applications to the Internet” | May 11, 2015 )

Page 3: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

Setting the scene

Page 4: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

Traditional apps

4

Business applications are collections of (virtual) servers

Is the “right” traffic going to/from our servers?

Database Tier

AppServer Tier

Web Tier

= type of server

Page 5: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

Modern architectures don’t change things that much

5

Micro services based applications are collections of services

Is the “right” traffic going to/from our services?

Persistence services

Business services

Front end services

= type of server

Page 6: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

Enterprise data center

6

Perimeter Security

Enterprise data centers are filled with these applications, often left insecure by lack of focus on interior network paths.

20% of Security Spend is on

“interior”, yet 80% of the network traffic.

80% of Security Spend is on perimeter, 20% of traffic.

Page 7: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

Hard on the outside, soft on the inside

7

Perimeter Security

Hacker Penetration

Page 8: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

One penetration creates major “East-West” exposure

8

Perimeter Security

On average undetected for

234 days!

Page 9: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

Cloud architectures have been different

Page 10: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

2006 – The lonely (and exposed) VM

VM

Page 11: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

2008 - Overlays

VM VM VM

VM

Page 12: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

2009 - VPCs

VM VM VM VM

Page 13: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

Containment often not enough – overlays stayed

VM

VM VM VM VM

Page 14: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

Lots of people did something like this

VM

Page 15: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

Some even did something like this

VM VM

Page 16: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

And the really large (or paranoid) might do this

VM

VM

Page 17: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

Or even this

VM VM

Page 18: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

Thankfully almost nobody tries to do this

Page 19: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

What was that perimeter made of?

A quick detour to the worlds of:

Unified Threat Management (UTM) and Application Delivery Controllers (ADC)

Page 20: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

Unified Threat Management

Firewall

NIDS/NIPS

AV

Anti Spam

VPN

DLP

Load Balancer

UTM

Page 21: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

Application Delivery Controllers

Cache

TLS offload

Compression

WAF

Multiplexing

Load Balancer

ADC

Traffic Shaping

Page 22: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

The UTM & ADC delivery model

Page 23: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

SDN and NFV

Page 24: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

Networks made from and configured by software

Page 25: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

We can put a bunch of ‘network’ onto a VM

Firewall

VPN

Switch

Router

Page 26: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

And add more functions into containers

Firewall

VPN

Switch

Router Cache

TLS offload

WAF

Load Balancer

NIDS/NIPS

Page 27: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

This could be thought of as an app centric perimeter

Page 28: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

But it refactors very readily into microservices

Page 29: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

The audit paradox

Page 30: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

Building in

CC photo by WorldSkills

Page 31: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

What building in looks like

Page 32: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

Bolting on

CC photo by arbyreed

Page 33: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

What bolting on looks like

Page 34: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

PaaS gives us the chance to ‘bolt in’

Page 35: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

But Docker adoption shows a movement against opinionated platforms

Page 36: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

If a security event happens and it isn’t monitored

Page 37: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

Some challenges remain

Page 38: CTO Chris Swan's talk from Internet and Mobile World " Application centric – how the cloud has changed the way we deploy, secure and connect"

© 2015

ToDo: SecDevOps

APIs are necessary but not sufficient: Need to have them integrated into the overall system Control metadata (and its mutability): Must be visible and understandable Security events need to be captured: Then turned into something humans can action