SlideShare a Scribd company logo
The Role of Networking in building
Secure Public/Private Clouds



                           Pere Monclus
                           Oct 18th, 2012
                  pmonclus@plumgrid.com
Networking Dilemma




   Prevent Unwanted                   Provide
   Connectivity                       Connectivity
   (default closed)                   (default open)


                 A matter of Policy
        QoS                          ∞ QoS
                        QoS
                                                       2
Why so hard? (part 1)




         Midsize Enterprise Network diagram (Cisco Safe guides)


      WHERE to apply Security Policies is harder than Connectivity

                                                                     3
The approach to Security


 Designing Network Security
 •  Adding Security as a self contained element




 Designing Secure Networks
 •  Incorporate Security from the beginning




                 Network Security is a System !!


                                                   4
Why so hard? (part 2)


  The problem doesn’t start at Network Security …


              Business Needs


               Risk Analysis


             Security Policies


              Security System



                   … often is expected to be solved by a Network Service
                                                                      5
And… what about Cloud?


                   Tenant 1               Tenant 2                    Tenant 3
                   Business Needs          Business Needs             Business Needs


                    Risk Analysis           Risk Analysis              Risk Analysis


                   Security Policies       Security Policies          Security Policies


                   Security System         Security System            Security System


Users / Tenants
                                                                                          Infrastructure
                                                                                           Guarantees
Public / Private
Cloud provider                                                 Superset of
                                       Business Needs
                                                               requirements

                                        Risk Analysis




                                       Security Policies




                                       Security System




                                                                                                           6
Cloud Provider: Tenant Isolation




                                                    Provider
                Tenant   Tenant      Tenant
     Internet                                        Control
                  1        2           3         Infrastructure




                           Cloud Provider




                                              Multitenancy
    Isolation                                 Self Provisioning
                                              Cloud Services
                                                                  7
Tenant: Networking Application Isolation


                                       Inbound/Outbound policies




                       10.0.1.0/24        10.0.2.0/24




                  VM            VM        VM            VM




         Interface attached network security policies
      Services: FW, VPN, IPS, UTM, … (pics!)


          Is this the right model in a virtual world?
                                                                   8
What is Isolation? What SLA are we willing to sign up to?

 •    Subnet separation?
 •    Security rules?
 •    Security services (FW/IPS/UTM/…)
                                                            Tenant
 •                   •  Enforcement points?
      Tenant Inbound/Outbound enforcement?                  owns?
                                 •  Common/Separate?
 •    …
                                 •  New types

                        •  How to merge policies?
 •    Network separation? Physical? Virtual?                  Provider
 •                                                            owns?
      Transit Policies? •  Policy definition vs. Policy Rendering?
 •    Data Leakage?
                        •  Proper workflows
 •    Physical Placement?
 •    Traffic confidentiality?
 •    ...



                                                                         9
Security Life Cycle


  What about?

  •    System Monitoring and Maintenance

  •    Compliance Checks

  •    Incident Response

  •    Forensics / Visibility / Analysis tools



  Who owns that?
  How do we cross from Provider to Tenant and we still
  provide simple operational models?

                                                         10
Network security and OpenStack




                                 11
OpenStack Quantum Model

                                                                    Network
                                                                    Controller
                                 Management Network

                                                                                         Compute
      Network Node(s)                                            Quantum server

      quantum-*-plugin-agent
                                      Compute Node(s)          Cloud Controller         Networking
        quantum-l3-agent
                                                                    Node
       quantum-dhcp-agent
                                      quantum-*-plugin-agent
                                                                                          Storage


                          Virtual Network
                            Data Network
                         Physical Network




                                                                                  * from Quantum Admin guide
                                                                                                        12
OpenStack Network Types




    Virtual    Virtual                Local
    Network    Ports                 Network
                                                            Tenant
               (VMs)                                       Networks

                            Linux               Overlays               Tenant
                           Bridges                                    Networks
                                                           Provider
    Physical   Physical                                    Networks
    Network    Ports              Flat
                                               VLANs
                                 Network
               (Servers)




                                                                                 13
Spoofing/MiM v2.0 (Provider Worries)


 Can I compromise/impersonate a VM/Server/Port?
 •    How to prevent the provisioning of a rogue Server
 •    How to prevent the provisioning of a rogue VM
 •    How to prevent the provisioning of a rogue Port / Taps
 But… if it happens:
 •    How to prevent the ‘connectivity’ of a rogue Server / VM / Port to
      a physical or logical network




 * Not to enter into discussions about securing the Cloud Controller


                                                                           14
Application Policy Management (Tenant Worries)


In a Virtual environment:
•    Policy definition
•    Policy Rendering
•    Policy Enforcement


•    Security Services Offering (Virtual Appliances)




                                                       15
Identity and Location to the rescue




     Understanding the linkage between Physical and Virtual

     Understanding the linkage between Identity and Address

                                                              16
Multisite Clouds




  Physical/Virtual and Identity/Address expand across Datacenters


                                                                17
Possible steps to integrate Security in OpenStack

•    Service Insertion (Choke points at the Operator and Tenant level)
     •  Physical Appliances
     •  Virtual Appliances
     •  Distributed Appliances

•    New policy capabilities
     •  Applied at the VM ifc level (definition-rendering problem)
     •  Identity based

•    Proper articulation of Virtual/Physical bindings

•    Cloud Controller workflows for security

•    Discussion on where to apply/attach global policies

•    What SLAs and Certifications will the Tenants expect?



                                                                         18
Conclusion


 •    No easy answer to Security
 •    Blurring the line between Virtual and Physical
      networks brings many additional challenges and
      OPPORTUNITIES
 •    Centralized control structures are more vulnerable.
      Need proper workflows.
 •    Incorporate Security from early stages, it is difficult to
      bolt it in



                                                                   19
Questions?


                      Pere Monclus
             pmonclus@plumgrid.com
         www.plumgrid.com


                                     20

More Related Content

What's hot (20)

PPTX
Trend Micro - 13martie2012
Agora Group
 
PDF
Introduction - Trend Micro Deep Security
Andrew Wong
 
PDF
ClubHack Magazine issue 26 March 2012
ClubHack
 
PPTX
From Physical to Virtual to Cloud
Cisco Security
 
PDF
Trend Micro Dec 6 Toronto VMUG
tovmug
 
PPTX
Defending the Data Center: Managing Users from the Edge to the Application
Cisco Security
 
PDF
Sharing the Cloud
Glen Roberts, CISSP
 
PPTX
Safe Net: Cloud Security Solutions
ASBIS SK
 
PDF
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust
 
PDF
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
IJIR JOURNALS IJIRUSA
 
PDF
An Architecture for Providing Security to Cloud Resources
Niranjana Padmanabhan
 
PDF
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
UNIT4 IT Solutions
 
PDF
Resarch paper i cloud computing
Bharat Gupta
 
PDF
Alcatellucentsdn2013
deepersnet
 
PPTX
Cloud securityperspectives cmg
Neha Dhawan
 
PPTX
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Acrodex
 
PDF
Network Configuration Example: Deploying Scalable Services on an MX Series Ro...
Juniper Networks
 
PDF
XTM moving security forward
Medley India Infosolution Pvt Ltd
 
PPT
Cloudcomputingoct2009 100301142544-phpapp02
abhisheknayak29
 
PDF
MidoNet US Launch - Oct 15
Midokura
 
Trend Micro - 13martie2012
Agora Group
 
Introduction - Trend Micro Deep Security
Andrew Wong
 
ClubHack Magazine issue 26 March 2012
ClubHack
 
From Physical to Virtual to Cloud
Cisco Security
 
Trend Micro Dec 6 Toronto VMUG
tovmug
 
Defending the Data Center: Managing Users from the Edge to the Application
Cisco Security
 
Sharing the Cloud
Glen Roberts, CISSP
 
Safe Net: Cloud Security Solutions
ASBIS SK
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust
 
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
IJIR JOURNALS IJIRUSA
 
An Architecture for Providing Security to Cloud Resources
Niranjana Padmanabhan
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
UNIT4 IT Solutions
 
Resarch paper i cloud computing
Bharat Gupta
 
Alcatellucentsdn2013
deepersnet
 
Cloud securityperspectives cmg
Neha Dhawan
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Acrodex
 
Network Configuration Example: Deploying Scalable Services on an MX Series Ro...
Juniper Networks
 
XTM moving security forward
Medley India Infosolution Pvt Ltd
 
Cloudcomputingoct2009 100301142544-phpapp02
abhisheknayak29
 
MidoNet US Launch - Oct 15
Midokura
 

Similar to Integrating network virtualization security in OpenStack Deployments.pdf (20)

PDF
Layer 7 & Burton Group: New Cloud Security Model Requirements
CA API Management
 
PPTX
Network Management in System Center 2012 SP1 - VMM
Microsoft TechNet - Belgium and Luxembourg
 
PPTX
What is cloud computing
Brian Bullard
 
PPTX
Hp gavin pratt - open stack networking presentation
laurabeckcahoon
 
PPTX
Monetizing the Enterprise: Borderless Networks
Cisco Service Provider Mobility
 
PDF
Security in the Cloud
Prabath Siriwardena
 
PDF
Security in the Cloud
WSO2
 
PPTX
BayThreat Why The Cloud Changes Everything
CloudPassage
 
PDF
2012 CloudStack Design Camp in Taiwan--- CloudStack Overview-1
tcloudcomputing-tw
 
PDF
Enterprise Applications on AWS
Amazon Web Services LATAM
 
PDF
Securing a public cloud infrastructure : Windows Azure
vivekbhat
 
PDF
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
Open Data Center Alliance
 
PPTX
Bright and Gray areas of Clound Computing
pallavikhandekar212
 
PPTX
Cloud stack overview
gavin_lee
 
PDF
Projecting Enterprise Security Requirements on the Cloud
Scientia Groups
 
PPTX
Triangle OpenStack Meetup
mestery
 
PDF
Enterprise Strategy for Cloud Security
Bob Rhubart
 
PDF
Fedramp developing-system-security-plan-slides
Tuan Phan
 
PPT
Osac2012
OpenCity Community
 
PPTX
Nicira chef webinar-merged
Stathy Touloumis
 
Layer 7 & Burton Group: New Cloud Security Model Requirements
CA API Management
 
Network Management in System Center 2012 SP1 - VMM
Microsoft TechNet - Belgium and Luxembourg
 
What is cloud computing
Brian Bullard
 
Hp gavin pratt - open stack networking presentation
laurabeckcahoon
 
Monetizing the Enterprise: Borderless Networks
Cisco Service Provider Mobility
 
Security in the Cloud
Prabath Siriwardena
 
Security in the Cloud
WSO2
 
BayThreat Why The Cloud Changes Everything
CloudPassage
 
2012 CloudStack Design Camp in Taiwan--- CloudStack Overview-1
tcloudcomputing-tw
 
Enterprise Applications on AWS
Amazon Web Services LATAM
 
Securing a public cloud infrastructure : Windows Azure
vivekbhat
 
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
Open Data Center Alliance
 
Bright and Gray areas of Clound Computing
pallavikhandekar212
 
Cloud stack overview
gavin_lee
 
Projecting Enterprise Security Requirements on the Cloud
Scientia Groups
 
Triangle OpenStack Meetup
mestery
 
Enterprise Strategy for Cloud Security
Bob Rhubart
 
Fedramp developing-system-security-plan-slides
Tuan Phan
 
Nicira chef webinar-merged
Stathy Touloumis
 
Ad

More from OpenStack Foundation (20)

PDF
Sponsor Webinar - OpenStack Summit Vancouver 2018
OpenStack Foundation
 
PDF
OpenStack Summits 101: A Guide For Attendees
OpenStack Foundation
 
PPT
OpenStack Marketing Plan - Community Presentation
OpenStack Foundation
 
PPTX
OpenStack 5th Birthday - User Group Parties
OpenStack Foundation
 
PPTX
Liberty release: Preliminary marketing materials & messages
OpenStack Foundation
 
PPTX
OpenStack Foundation 2H 2015 Marketing Plan
OpenStack Foundation
 
PPTX
OpenStack Summit Tokyo Sponsor Webinar
OpenStack Foundation
 
PPTX
Cinder Updates - Liberty Edition
OpenStack Foundation
 
PPTX
Glance Updates - Liberty Edition
OpenStack Foundation
 
PPTX
Heat Updates - Liberty Edition
OpenStack Foundation
 
PPTX
Neutron Updates - Liberty Edition
OpenStack Foundation
 
PPTX
Nova Updates - Liberty Edition
OpenStack Foundation
 
PPTX
Sahara Updates - Liberty Edition
OpenStack Foundation
 
PDF
Searchlight Updates - Liberty Edition
OpenStack Foundation
 
PPTX
Trove Updates - Liberty Edition
OpenStack Foundation
 
PPTX
OpenStack: five years in
OpenStack Foundation
 
PDF
Swift Updates - Liberty Edition
OpenStack Foundation
 
PPTX
Congress Updates - Liberty Edition
OpenStack Foundation
 
PDF
Release Cycle Management Updates - Liberty Edition
OpenStack Foundation
 
PPT
OpenStack Day CEE 2015: Real-World Use Cases
OpenStack Foundation
 
Sponsor Webinar - OpenStack Summit Vancouver 2018
OpenStack Foundation
 
OpenStack Summits 101: A Guide For Attendees
OpenStack Foundation
 
OpenStack Marketing Plan - Community Presentation
OpenStack Foundation
 
OpenStack 5th Birthday - User Group Parties
OpenStack Foundation
 
Liberty release: Preliminary marketing materials & messages
OpenStack Foundation
 
OpenStack Foundation 2H 2015 Marketing Plan
OpenStack Foundation
 
OpenStack Summit Tokyo Sponsor Webinar
OpenStack Foundation
 
Cinder Updates - Liberty Edition
OpenStack Foundation
 
Glance Updates - Liberty Edition
OpenStack Foundation
 
Heat Updates - Liberty Edition
OpenStack Foundation
 
Neutron Updates - Liberty Edition
OpenStack Foundation
 
Nova Updates - Liberty Edition
OpenStack Foundation
 
Sahara Updates - Liberty Edition
OpenStack Foundation
 
Searchlight Updates - Liberty Edition
OpenStack Foundation
 
Trove Updates - Liberty Edition
OpenStack Foundation
 
OpenStack: five years in
OpenStack Foundation
 
Swift Updates - Liberty Edition
OpenStack Foundation
 
Congress Updates - Liberty Edition
OpenStack Foundation
 
Release Cycle Management Updates - Liberty Edition
OpenStack Foundation
 
OpenStack Day CEE 2015: Real-World Use Cases
OpenStack Foundation
 
Ad

Integrating network virtualization security in OpenStack Deployments.pdf

  • 1. The Role of Networking in building Secure Public/Private Clouds Pere Monclus Oct 18th, 2012 [email protected]
  • 2. Networking Dilemma Prevent Unwanted Provide Connectivity Connectivity (default closed) (default open) A matter of Policy  QoS ∞ QoS QoS 2
  • 3. Why so hard? (part 1) Midsize Enterprise Network diagram (Cisco Safe guides) WHERE to apply Security Policies is harder than Connectivity 3
  • 4. The approach to Security Designing Network Security •  Adding Security as a self contained element Designing Secure Networks •  Incorporate Security from the beginning Network Security is a System !! 4
  • 5. Why so hard? (part 2) The problem doesn’t start at Network Security … Business Needs Risk Analysis Security Policies Security System … often is expected to be solved by a Network Service 5
  • 6. And… what about Cloud? Tenant 1 Tenant 2 Tenant 3 Business Needs Business Needs Business Needs Risk Analysis Risk Analysis Risk Analysis Security Policies Security Policies Security Policies Security System Security System Security System Users / Tenants Infrastructure Guarantees Public / Private Cloud provider Superset of Business Needs requirements Risk Analysis Security Policies Security System 6
  • 7. Cloud Provider: Tenant Isolation Provider Tenant Tenant Tenant Internet Control 1 2 3 Infrastructure Cloud Provider Multitenancy Isolation Self Provisioning Cloud Services 7
  • 8. Tenant: Networking Application Isolation Inbound/Outbound policies 10.0.1.0/24 10.0.2.0/24 VM VM VM VM Interface attached network security policies Services: FW, VPN, IPS, UTM, … (pics!) Is this the right model in a virtual world? 8
  • 9. What is Isolation? What SLA are we willing to sign up to? •  Subnet separation? •  Security rules? •  Security services (FW/IPS/UTM/…) Tenant •  •  Enforcement points? Tenant Inbound/Outbound enforcement? owns? •  Common/Separate? •  … •  New types •  How to merge policies? •  Network separation? Physical? Virtual? Provider •  owns? Transit Policies? •  Policy definition vs. Policy Rendering? •  Data Leakage? •  Proper workflows •  Physical Placement? •  Traffic confidentiality? •  ... 9
  • 10. Security Life Cycle What about? •  System Monitoring and Maintenance •  Compliance Checks •  Incident Response •  Forensics / Visibility / Analysis tools Who owns that? How do we cross from Provider to Tenant and we still provide simple operational models? 10
  • 11. Network security and OpenStack 11
  • 12. OpenStack Quantum Model Network Controller Management Network Compute Network Node(s) Quantum server quantum-*-plugin-agent Compute Node(s) Cloud Controller Networking quantum-l3-agent Node quantum-dhcp-agent quantum-*-plugin-agent Storage Virtual Network Data Network Physical Network * from Quantum Admin guide 12
  • 13. OpenStack Network Types Virtual Virtual Local Network Ports Network Tenant (VMs) Networks Linux Overlays Tenant Bridges Networks Provider Physical Physical Networks Network Ports Flat VLANs Network (Servers) 13
  • 14. Spoofing/MiM v2.0 (Provider Worries) Can I compromise/impersonate a VM/Server/Port? •  How to prevent the provisioning of a rogue Server •  How to prevent the provisioning of a rogue VM •  How to prevent the provisioning of a rogue Port / Taps But… if it happens: •  How to prevent the ‘connectivity’ of a rogue Server / VM / Port to a physical or logical network * Not to enter into discussions about securing the Cloud Controller 14
  • 15. Application Policy Management (Tenant Worries) In a Virtual environment: •  Policy definition •  Policy Rendering •  Policy Enforcement •  Security Services Offering (Virtual Appliances) 15
  • 16. Identity and Location to the rescue Understanding the linkage between Physical and Virtual Understanding the linkage between Identity and Address 16
  • 17. Multisite Clouds Physical/Virtual and Identity/Address expand across Datacenters 17
  • 18. Possible steps to integrate Security in OpenStack •  Service Insertion (Choke points at the Operator and Tenant level) •  Physical Appliances •  Virtual Appliances •  Distributed Appliances •  New policy capabilities •  Applied at the VM ifc level (definition-rendering problem) •  Identity based •  Proper articulation of Virtual/Physical bindings •  Cloud Controller workflows for security •  Discussion on where to apply/attach global policies •  What SLAs and Certifications will the Tenants expect? 18
  • 19. Conclusion •  No easy answer to Security •  Blurring the line between Virtual and Physical networks brings many additional challenges and OPPORTUNITIES •  Centralized control structures are more vulnerable. Need proper workflows. •  Incorporate Security from early stages, it is difficult to bolt it in 19
  • 20. Questions? Pere Monclus [email protected] www.plumgrid.com 20