Top Banner
1| ©2014, Palo Alto Networks. Confidential and Proprietary. Securing Your Enterprise Applications in Amazon AWS Jigar Shah Sr. Product Manager
13

Securing Your Enterprise Applications in Amazon AWS · 1 | ©2014, Palo Alto Networks. Confidential and Proprietary. Securing Your Enterprise Applications in Amazon AWS Jigar Shah

Aug 19, 2018

Download

Documents

dinhque
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Securing Your Enterprise Applications in Amazon AWS · 1 | ©2014, Palo Alto Networks. Confidential and Proprietary. Securing Your Enterprise Applications in Amazon AWS Jigar Shah

1 | ©2014, Palo Alto Networks. Confidential and Proprietary.

Securing Your Enterprise Applications in Amazon AWS

Jigar Shah

Sr. Product Manager

Page 2: Securing Your Enterprise Applications in Amazon AWS · 1 | ©2014, Palo Alto Networks. Confidential and Proprietary. Securing Your Enterprise Applications in Amazon AWS Jigar Shah

2 | ©2014, Palo Alto Networks. Confidential and Proprietary.

Our next-generation enterprise security platform

� Gathers potential threats from network and endpoints

� Analyses and correlates threat intelligence

� Disseminates threat intelligence to network and endpoints

Threat Intelligence Cloud� Inspects all traffic

� Blocks known threats

� Sends unknown to cloud

� Extensible to mobile & virtual networks

Next-Generation Firewall

� Inspects all processes and files

� Prevents both known & unknown exploits

� Integrates with cloud to prevent known & unknown malware

Advanced Endpoint Protection

Page 3: Securing Your Enterprise Applications in Amazon AWS · 1 | ©2014, Palo Alto Networks. Confidential and Proprietary. Securing Your Enterprise Applications in Amazon AWS Jigar Shah

3 | ©2014, Palo Alto Networks. Confidential and Proprietary.

Ports and protocols have lost their meaning

But how does this relate to your applications in AWS?

Page 4: Securing Your Enterprise Applications in Amazon AWS · 1 | ©2014, Palo Alto Networks. Confidential and Proprietary. Securing Your Enterprise Applications in Amazon AWS Jigar Shah

4 | ©2014, Palo Alto Networks. Confidential and Proprietary.

Is datacenter security that different for workloads in AWS?

Applications

Users

Content

Page 5: Securing Your Enterprise Applications in Amazon AWS · 1 | ©2014, Palo Alto Networks. Confidential and Proprietary. Securing Your Enterprise Applications in Amazon AWS Jigar Shah

5 | ©2014, Palo Alto Networks. Confidential and Proprietary.

Cloud security challenge #1

� Applications of different trust levels now run on shared infrastructure� Port and protocol-based security is not sufficient � Virtualized next-generation security is needed to:

� Safely enable application traffic between VMs� Protect against cyber attacks

Incomplete security features on existing virtual security solutions

MS-SQL SharePoint Web Front End

Page 6: Securing Your Enterprise Applications in Amazon AWS · 1 | ©2014, Palo Alto Networks. Confidential and Proprietary. Securing Your Enterprise Applications in Amazon AWS Jigar Shah

6 | ©2014, Palo Alto Networks. Confidential and Proprietary.

Cloud security challenge #2

� Application provisioning can occur in minutes; attribute changes are frequent

� Security approvals and configuration changes may take weeks

� Removal of old servers from security policy rules is slow or does not occur

� Dynamic security policies that understand application context are needed

Static policies cannot keep pace with dynamic workload deployments

Source Destination protocol Action

10.1.1.2 10.1.2.2 HTTP:80 Allow

10.1.2.2 10.1.3.2 TCP:1433 Deny

…. …. …. ….

10.1.1.2 10.1.2.2 10.1.3.2

Page 7: Securing Your Enterprise Applications in Amazon AWS · 1 | ©2014, Palo Alto Networks. Confidential and Proprietary. Securing Your Enterprise Applications in Amazon AWS Jigar Shah

7 | ©2014, Palo Alto Networks. Confidential and Proprietary.

Cloud security challenge #3

� Security administrators need an consistent way to manage policy

� Require consistent auditing and analysis tools such as logging and reporting

� Simplify administrator roles and access controls

Consistent management of network security is difficult

Page 8: Securing Your Enterprise Applications in Amazon AWS · 1 | ©2014, Palo Alto Networks. Confidential and Proprietary. Securing Your Enterprise Applications in Amazon AWS Jigar Shah

8 | ©2014, Palo Alto Networks. Confidential and Proprietary.

VM-Series for Amazon Web Services

� Palo Alto Networks Next-Gen Firewall as an AMI

� Can be centrally managed from Panorama

� Automation features enable policies to dynamically keep pace with EC2 changes

Page 9: Securing Your Enterprise Applications in Amazon AWS · 1 | ©2014, Palo Alto Networks. Confidential and Proprietary. Securing Your Enterprise Applications in Amazon AWS Jigar Shah

9 | ©2014, Palo Alto Networks. Confidential and Proprietary.

VM-Series in Amazon AWS – How it works

Page 10: Securing Your Enterprise Applications in Amazon AWS · 1 | ©2014, Palo Alto Networks. Confidential and Proprietary. Securing Your Enterprise Applications in Amazon AWS Jigar Shah

10 | ©2014, Palo Alto Networks. Confidential and Proprietary.

VM-Series for AWS Use Cases� Deploy the VM-Series

through AWS console� Use case: Perimeter gateway

applying NGFW protection to traffic traversing the Virtual Private Cloud (VPC)

� Use case: IPSec VPN connecting back to corporate DC

� Use case: VM-to-VM security based on application, blocking lateral movement of threats

� Automation features enable policies to dynamically keep pace with EC2 changes

Page 11: Securing Your Enterprise Applications in Amazon AWS · 1 | ©2014, Palo Alto Networks. Confidential and Proprietary. Securing Your Enterprise Applications in Amazon AWS Jigar Shah

11 | ©2014, Palo Alto Networks. Confidential and Proprietary.

Availability in AWS Marketplace

� BYOL available Now

� Paid-subscription expected 1H 2015

Page 12: Securing Your Enterprise Applications in Amazon AWS · 1 | ©2014, Palo Alto Networks. Confidential and Proprietary. Securing Your Enterprise Applications in Amazon AWS Jigar Shah

12 | ©2014, Palo Alto Networks. Confidential and Proprietary.

AWS demo logical topology

Internet

Web DB

Main Router

IGW

E1/1, External, .10 (.11 and .12)

E1/3, DB, .10E1/2, Web, .10

10.0.0.0/24

10.0.1.0/24 10.0.2.0/24

.200.100

Mgt, .100

Page 13: Securing Your Enterprise Applications in Amazon AWS · 1 | ©2014, Palo Alto Networks. Confidential and Proprietary. Securing Your Enterprise Applications in Amazon AWS Jigar Shah

13 | ©2014, Palo Alto Networks. Confidential and Proprietary.