Top Banner
Don’t Go Naked in the Cloud Rob Quiros [email protected] June 1, 2015
17
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Soha Systems DevOps Summit New York June 2015

Don’t Go Naked in the CloudRob Quiros

[email protected]

June 1, 2015

Page 2: Soha Systems DevOps Summit New York June 2015

2

One Key Difference…

Data CenterInfrastructure Cloud

(AWS, Azure,…)

AppUser

App

User

Page 3: Soha Systems DevOps Summit New York June 2015

3

Security and Remote Access

Apps

Employees

Customers

Partners

Bad Guys

DDoS attacks

Compromised credentials

Untrusted endpoints

Compliance

Page 4: Soha Systems DevOps Summit New York June 2015

4

Shared Responsibility Model

Application

Hosted Operating System

Virtualization Layer

Physical Infrastructure

Customer Responsibility

Cloud ProviderResponsibility

Page 5: Soha Systems DevOps Summit New York June 2015

5

Solution #1: Build Security Perimeter in your Cloud

Firewall

VPN

ADC

IDS

WAF

WANopt

DDoS

Firewall

User

Directory

Logging

Your Apps

Your Users

Your Admins

VPN

Page 6: Soha Systems DevOps Summit New York June 2015

6

Solution #1: Build Security Perimeter in your Cloud

Firewall

VPN

ADC

IDS

WAF

WANopt

DDoS

Firewall

User

Directory

Logging

Your Apps

Your Users

Your Admins

VPN

6 Months

3 Engineers

$100,000

Page 7: Soha Systems DevOps Summit New York June 2015

9

Solution #2: Expose Your Apps on The Internet

Your Apps

Your Users

Your Admins

SSH

HTTP

Page 8: Soha Systems DevOps Summit New York June 2015

10

Page 9: Soha Systems DevOps Summit New York June 2015

11

Good Morning!

Page 10: Soha Systems DevOps Summit New York June 2015

12

Take your applications off the internet

Lock down your cloud to all inbound access

Yet still control security and access policy

With full logging and audit trail?

What If You Could….

?And have it running in 15 minutes?

Page 11: Soha Systems DevOps Summit New York June 2015

13

Tackle Shared Responsibility with Soha Cloud

Architected for hybrid cloud & mobile world Distributed in-the-cloud security enforcement Centralized security oversight and control Performance-assured path between users and

apps

AWS

Azure

Vcloud Air

Private Cloud

Public Clouds

VMwareOpenStack

Page 12: Soha Systems DevOps Summit New York June 2015

14

• Double proxy architecture takes your cloud off the Internet

• Soha Cloud provides all security and access control

• No network changes

Hide Your Clouds Behind Ours

Cloudlet dials out onlyNo inbound ports open to your Cloud

Page 13: Soha Systems DevOps Summit New York June 2015

15

• User enters public URL for application into any browser

• Cloud authenticates user

• Optional MFA, 2FA, access control rules

• No Client on user device

Air Gap Between Your Apps and the Internet

INVISIBLE

No connectivity before user identity verified

Page 14: Soha Systems DevOps Summit New York June 2015

16

Highly Available, Highly Scalable

Page 15: Soha Systems DevOps Summit New York June 2015

17

Don’t Go Naked in the Cloud

GET

Page 16: Soha Systems DevOps Summit New York June 2015

18

Sign up for a free account: http://soha.io/signup

Find us at BOOTH #131

email me (Rob @ SOHA dot IO) for a free upgrade to PREMIUM

To Learn More …

Page 17: Soha Systems DevOps Summit New York June 2015

Thank you