Download - VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

Transcript
Page 1: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

Troubleshooting and Monitoring NSX Service

Composer Policies

Shubha Bheemarao, VMware

Mitchell Christensen, VMware

SEC5889

#SEC5889

Page 2: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

2

Objective

• Identify specific use cases that highlight the value of advanced

visibility with simplified workflows

• Showcase why user and application visibility is essential to have

a secure datacenter policy

• Demonstrate how to use NSX Activity Monitoring provides

advanced visibility

Page 3: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

4

Security Teams Care About Policy and Compliance

Security Architect

Regulations,

Standards,

Best Practices

• Access Control

• Segmentation

• Automation

• Audit

Infrastructure

Requirements

Common

Control

Frameworks

Page 4: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

5

Think About Your Last Interaction With The Security Team

VI Admin / Cloud Operator

Do we have

this malicious

software

running?

PCI Auditors

in the

house… are

we

compliant?

High severity

vulnerabilities on

critical business

systems… must

patch!

Page 5: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

6

The Cloud Operator Has to Make This All Work…But How?

VI Admin /

Cloud Operator

Yikes.

Security Policy ≠ Security Operations

Security team asks operator to implement policies that are

specified at user and application level

I need this.

Security

Architect

Page 6: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

7

Agenda

Security Operations Is Catching Up with Policy

Prerequisites To Enforcing Policy – Visibility

NSX Activity Monitoring Provides Advanced Visibility to

Users and Applications

Demo of NSX Activity monitoring to address Common

Enterprise Security Policies

• Insider Threat

• Rogue Applications

• Malicious Software

Next Steps

Page 7: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

8

Visibility Tools Are Required To Implement Security Policy

DEFINE Security

Architect MONITOR VI Admin /

Cloud Operator

ENFORCE

VI Admin /

Cloud Operator

Page 8: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

9

Get Advanced Visibility Into Users and Applications

VI Admin /

Cloud

Operator

No

problem.

Allow THIS user

can access THAT

application

Security

Architect

Step 1. Security team defines policy for who is allowed

access to what applications. Then they ask the data

center operator to make it happen.

Page 9: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

10

VI Admin /

Cloud

Operator

Easy.

Step 2. Operator monitors the system to identify right level

of application protection. Then they tune the enforcement

rules to ensure adherence to expected policy.

Security

Architect

Compliant.

Get Advanced Visibility Into Users and Applications

Page 10: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

11

Step 3. Operator identifies non compliant activity and

informs the security team to remediate/ tune security

policies. Gets approval and applies to workloads.

I found

something

fishy.

VI Admin /

Cloud Operator

Yup. Can

you block

this

Security

Architect

Sure, No

problem

Get Advanced Visibility Into Users and Applications

Page 11: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

12

Agenda

Security Operations Is Catching Up with Policy

Prerequisites To Enforcing Policy – Visibility

NSX Provides Tools for Advanced Visibility

Demo of NSX Activity monitoring to address Common

Enterprise Security Policies

• Insider Threat

• Rogue Applications

• Malicious Software

Next Steps

Page 12: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

13

NSX Provides Tools To Define and Enforce Policy

MONITOR

ENFORCE

DEFINE Security

Architect VI Admin /

Cloud Operator

VI Admin /

Cloud Operator

NSX Service

Composer

NSX Service Composer

NSX Firewall

Page 13: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

14

Built-In Services • Firewall, Identity-based Firewall

• Data Security (DLP / Discovery)

Visibility • Network traffic flows

• User access of network assets

• Active In-guest applications

• User access of in-guest applications

3rd Party Services • IDS / IPS, AV, Vulnerability Mgmt

• 2013 Vendors: Symantec, McAfee, Trend

Micro, Rapid 7

Any Application (without modification)

Virtual Networks

VMware NSX Network Virtualization Platform

Logical L2

Any Network Hardware

Any Cloud Management Platform

Logical

Firewall

Logical

Load Balancer

Logical L3

Logical

VPN

Any Hypervisor

Security Policies • Define policies using profiles from built-in

services and 3rd party services - HOW you

want to protect workloads

VMware NSX Service Composer Provides Policy Framework

Automation • Use security tags and other context to drive

dynamic membership of security groups –

results in IF-THEN workflows across services

Page 14: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

15

NSX Provides Advanced Visibility Into Users and Applications

MONITOR

ENFORCE

DEFINE Security

Architect VI Admin /

Cloud Operator

VI Admin /

Cloud Operator

NSX Service

Composer NSX Activity

Monitoring

NSX Service Composer

NSX Firewall

Page 15: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

16

Built-In Services • Firewall, Identity-based Firewall

• Data Security (DLP / Discovery)

Visibility • Network traffic flows

• User access of network assets

• Active In-guest applications

• User access of in-guest applications

3rd Party Services • IDS / IPS, AV, Vulnerability Mgmt

• 2013 Vendors: Symantec, McAfee, Trend

Micro, Rapid 7

Any Application (without modification)

Virtual Networks

VMware NSX Network Virtualization Platform

Logical L2

Any Network Hardware

Any Cloud Management Platform

Logical

Firewall

Logical

Load Balancer

Logical L3

Logical

VPN

Any Hypervisor

Security Policies • Define policies using profiles from built-in

services and 3rd party services - HOW you

want to protect workloads

NSX Activity Monitoring Provides Advanced Visibility

Automation • Use security tags and other context to drive

dynamic membership of security groups –

results in IF-THEN workflows across services

Page 16: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

17

NSX Activity Monitoring Provides Advanced VIsibility

AD Group AD Group

Security

Group

Security

Group

Desktop

Pool

NSX Activity Monitoring provides

visibility into group, application

and destination activity in the

virtual environment User: Joe

• Users accessing assets

• Applications running on virtual

machines

• Server access by AD Group,

Security group or Desktop Pool

• Interactions between groups (

AD, SG or DP)

Page 17: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

18

Agenda

Security Operations Is Catching Up with Policy

Prerequisites To Enforcing Policy – Visibility

NSX Activity Monitoring Provides Advanced Visibility to

Users and Applications

Demo of NSX Activity monitoring to address Common

Enterprise Security Policies

• Insider Threat

• Rogue Applications

• Malicious Software

Next Steps

Page 18: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

19

Sample Security Policy

Allow only approved users access specific

applications on corporate assets. Have a policy on

WHO is allowed access to WHAT from WHERE is

critical to secure assets.

In other words..

1. Allow only authorized users to access critical

business applications

2. Allow only authorized applications on

corporate servers

3. Allow access to only required ports from

specific networks

MONITOR

ENFORCE

DEFINE

Page 19: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

20

Challenge: Do You Trust All Your Users?

Monitor

Enforce

Define Policy Category

Regulatory / HIPAA: Access

controls should enable authorized

users to access the minimum

necessary information needed to

perform job functions.

Challenges

• Threats are not just outside

organizational boundaries

• Network level access control is

not sufficient for cloud

environments

• Controlled access for insiders

based on user identity is required

to safeguard corporate assets

Page 20: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

21

EPIC Servers

Nurses Doctors

✔ ✔

Requirement: Allow only authorized users to access critical applications

Requirements

Find which user group needs

access to which asset

Ability to generate reports on:

Which users are connecting

to the set of applications?

What applications are the

non trusted users connecting

to?

Option to limit access based

on user identity

Monitor

Enforce

Define

Financ

e

Accounting Servers

Page 21: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

22

Demo UI Introduction

Page 22: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
Page 23: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

24

Demo Verify EPIC Access

Page 24: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
Page 25: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

26

Demo Block Finance access to EPIC Servers

Page 26: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
Page 27: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

28

Agenda

Security Operations Is Catching Up with Policy

Prerequisites To Enforcing Policy – Visibility

NSX Activity Monitoring Provides Advanced Visibility to

Users and Applications

Demo of NSX Activity monitoring to address Common

Enterprise Security Policies

• Insider Threat

• Rogue Applications

• Malicious Software

Next Steps

Page 28: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

29

Challenge: Do you know what’s running on your servers?

Monitor

Enforce

Define Policy Category • Acceptable use of Information

Systems: Clear definition of what

is and is not acceptable

• Corporate Governance of IT:

Define how technology is used

and managed to support

business needs

Challenges • Visibility into all data center

applications

• Identify Rogue Applications that

either capture confidential

information or siphon sensitive

data to external sources

• Identify Vulnerable Applications

to reduce the scope of attack

Page 29: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

30

Requirement: Allow only authorized applications corporate servers

DB Administrators

HR

Requirements

Identify all applications running

on corporate servers

Create a list of acceptable,

grey listed and non permitted

applications for servers

Monitor, restrict and report

violations of all acceptable use

policies

Monitor

Enforce

Define

HTTP

WEB

APP

DATABASE

✔ ODBC ODBC

Page 30: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

31

Demo User Access to Applications

Page 31: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

32

Page 32: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

33

Demo Inbound Application Access

Page 33: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
Page 34: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

35

Agenda

Security Operations Is Catching Up with Policy

Prerequisites To Enforcing Policy – Visibility

NSX Activity Monitoring Provides Advanced Visibility to

Users and Applications

Demo of NSX Activity monitoring to address Common

Enterprise Security Policies

• Insider Threat

• Rogue Applications

• Malicious Software

Next Steps

Page 35: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

36

Challenge: Are you protected from malware?

Monitor

Enforce

Define Policy Category

• Acceptable use of

Information Systems: Clear

definition of what is and is

not acceptable

• Single use systems: for

protection of critical services

Challenges

• Identify and prevent further

spread of malware in the

network

• Regular Monitoring for rogue

or vulnerable applications to

avoid compromise

Page 36: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

37

Requirement: Allow only required ports to be open based on expected use

HTTPS

WEB

APP

DATABASE

Requirements

Find all user and application

activity on critical servers

Ensure that only allowed

applications are running

Monitor applicable controls

regularly

Monitor

Enforce

Define

HR

Page 37: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

38

Demo VM Activity

Page 38: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
Page 39: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
Page 40: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

41

How Do You Deploy?

Active Directory Eric Frost

Today

Source Destination

172.16.254.1 172.16.112.2

With Activity

Monitoring

VM Tools

User AD Group App Name Originating VM

Name

Destination

VM Name

Source IP Destination IP

Eric Engineering iexplorer.exe Windows 7 Apache Server 192.168.10.75 192.168.10.78

NSX

Mgr SVM

Compute Management Gateway

Page 41: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

42

Agenda

Security Operations Is Catching Up with Policy

Prerequisites To Enforcing Policy – Visibility

NSX Activity Monitoring Provides Advanced Visibility to

Users and Applications

Demo of NSX Activity monitoring to address Common

Enterprise Security Policies

• Insider Threat

• Rogue Applications

• Malicious Software

Next Steps

Page 42: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

43

Back At The Office…

VI Admin /

Cloud

Operator Security

Architect

1. Point your security team to VMware NSX.

2. Partner with security team to evaluate NSX Activity Monitoring to

implement security policy

I just learned about

VMware NSX Activity

Monitoring and we could

simplify a lot of this!

No kidding.

Prove it!

I will.

Page 43: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

THANK YOU

Page 44: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

45

Related Sessions

NET5847 - NSX: Introducing the World to VMware NSX

SEC5749 - Introducing NSX Service Composer: The New

Consumption Model for Security Services in the SDDC

SEC5820 - NSX PCI Reference Architecture Workshop

Session 2 - Privileged User Control

Page 45: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
Page 46: VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies

Troubleshooting and Monitoring NSX Service

Composer Policies

Shubha Bheemarao, VMware

Mitchell Christensen, VMware

SEC5889

#SEC5889