end-to-end visibility: state government virtualization’s ... · end-to-end visibility: state...

43
1 End-to-End Visibility: State Government Virtualization’s Secret Sauce Renault Ross CISSP,MCSE,VCP5,CHSS United States Security & Privacy Architect Symantec Strategic SLED Programs

Upload: doandat

Post on 25-Aug-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

1

End-to-End Visibility: State Government Virtualization’s Secret Sauce

Renault Ross CISSP,MCSE,VCP5,CHSS United States Security & Privacy Architect Symantec Strategic SLED Programs

Page 2: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Agenda

2

Managing the Virtual Environment 1

Securing the Virtual Environment 2

Compliance & Event Monitoring 3

Automation with Virtual Environment 4

Virtual Desktop Initiative & Application Virtualization 5

Backup & Availability of Virtual Environments 6

Page 3: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Virtualization is a technology, not a strategy

3

Page 4: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Virtualization Strategy

• Vision and Mission

– Vision: People should be able to work and play freely in a connected world

– Mission: We enable customers to have confidence in their connected experiences - infrastructure, information, and interactions

• Virtualization 101

– Virtualization is the abstraction and simulation of resources

• Platform Virtualization/Virtual Machines (VMs) are software simulations of physical machines, an innovation that allows more than one running OS per physical machine

– How will virtualization change computing paradigms?

• What new opportunities emerge from that change?

• How must our existing approaches change?

• Will our existing markets and approaches be relevant or continue to exist?

4

Page 5: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Interfacing with the Cloud

Application

Data

Runtime

Middleware

O/S

Virtualization

Servers

Storage

Networking

Application

Data

Runtime

Middleware

O/S

Virtualization

Servers

Storage

Networking

Application

Data

Runtime

Middleware

O/S

Virtualization

Servers

Storage

Networking

Application

Data

Runtime

Middleware

O/S

Virtualization

Servers

Storage

Networking

Traditional IT IaaS PaaS SaaS

you manage

provider manages

Page 6: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Managing your Virtual Environments

6

Page 7: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Server Virtualization Requirements

Users need:

1. Full IT lifecycle management of VMs

2. One console for managing physical and virtual

Requires company-wide coordination. EPM is one

of several players.

7

Growing Needs

Page 8: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

It all starts with a managed envinroment

• Inventory & Baselining solution will detect new VM’s that have been created and baseline them.

• Once Detected vendor solutions can ensure that the VM has the appropriate configuration applied to it.

• Monitoring of the Virtual and Physical.

• Remote Diagnostics of VM’s and the physical environment it resides on.

“A Well managed virtual environment, is a more Secure Server”

8

Page 9: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

• Incident & Problem Management

• Asset Management

• License Compliance

• CMDB

• System Provisioning

• Inventory & Baselining

• Hardware & System Monitoring

• Virtualization Management

• Remote Diagnostics

• Deployment & Migration

• Inventory & Application Metering

• Software Packaging & Delivery

• Software Virtualization

• Remote Control & Diagnostics

Systems Management Platform

9

Client Management Server Management Service & Asset Management

Traditional Vendor Management Platform Components

IT Analytics

Software Virtualization Pro Workflow Solution

Add-On Solutions

Data Loss Backup AntiVirus

Integration Components

Page 10: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Management portal access

• Consolidated view of the virtualization infrastructure in the network

• Display of Host-VM relationships with Host and VM views

• 100% based on agent less communications

Host Server View

• Create VM, Disk,

Network

• Get Host Inventory

Virtual Machine View

• VM Status Mgt

• Manage Snapshots

Create VM Wizard

VMM Tasks

10

Page 11: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Virtualization management must be integrated. Virtualization issues are still

lingering in the background of IT operations. This chapter must be closed

quickly and integrated into current management tools as yet another layer of

technology.

Per Forrester

Page 12: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Securing the Virtual Environment

12

Page 13: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

13

VMWare Evironment Challenges

– VMWare ESX Host is a RHEL kernel and increasingly subjected to vulnerabilities and attacks.

– A malware can potentially use the host as launching pad for attacks to the guest OS.

Industry capabilites that address

– Provides Host IDS to monitor user, system and resource activities and report on real-time intrusions

– Protects ESX host with its IPS policies to provide firewall protection, device control, configuration and system lock down, admin access control and file system protection

– Provides protection so you can comfortably put PCI Server in virtualization

Symantec Critical System Protection

Ho

st

Gu

es

t

Gu

es

t

Gu

es

t

Page 14: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

14

Critical System Protection “Hardens the guest OS”

Network Protection

(Host IPS)

Exploit Prevention

(Host IPS)

System Controls (Host IPS)

Auditing & Alerting (Host IDS)

Critical System

Protection

On ESX

• Restrict apps & O/S

behaviors

• Protect systems from

buffer overflow

• Intrusion prevention for

day-zero attacks

• Application control

• Monitor logs and security

events

• Consolidate & forward

logs for archives and

reporting

• Smart event response

for quick action

• Close back doors (block

ports)

• Limit network connectivity

by application

• Restrict traffic flow inbound

and outbound

• Lock down configuration &

settings

• Enforce security policy

• De-escalate user

privileges

• Prevent removable media

use

Page 15: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Malware Protection of guest

– Virtual Security Solution (VSS)

– VMSafe API Integration

– Offline Scanning & “vNac”

– Software Virtualization Solution (SVS)

15

The Internet

Corporate Network

Virtual Appliance

PC Hardware

Intel® VT CPU Intel® PRO/1000 LAN

User Environment

Apps: Spreadsheet, Word Processing,

E-Mail Security: SAV, SCS

User OS

Vendor Virtual Appliance

LVMM

Page 16: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Endpoint Protection Best Practices

• Randomized Scans to reduce concurrent requests for the same physical disks. – Definition Updates

• Changes have been made in each MR since MR3 to improve disk I/O -

• 81% reduction in reads

• 37% reduction in writes

• Use Randomization Feature

– Scheduled Scans

• Randomization and scan window

• IDLE scan and Scan Less

• Randomized Definition updates to reduce memory utilization.

• Developing for later release, AV Whitelisting to reduce consumption on Host and Guest VM’s.

• Network Access Control- Host Integrity Feature ensuring VM’s are compliant and auto fix themselves or quarantine if they fail compliance.

SCSP Product Overview 16

Page 17: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Protect what’s Important

Customer Information

Company Information

Credit Card Info

Medical Records

SSNs and Government IDs

Financials HR Records

Intellectual Property

Internal Auditing

M&A and Strategy

Page 18: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Integrate At Both System And Management Levels

Integrate virtual systems into

security programs

Integrate virtualization

security data into overall view of risk

19

Page 19: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Compliance of virtualized environment spans across

Configuration Hardening

Hypervisor settings

Server instance settings

Access Rights Management

Implement least privileged access

Prevent access escalation

Separation of Instances on a Shared Host

Threats jumping across instances

Compliance and legal issues as

workloads move across zones

Limited Logging and Reporting

Logging for failed actions

Activity logging is not attributable

20

Page 20: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Rolls up to an Executive dashboard

21

Page 21: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Automation in Virtualization

22

Page 22: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Automating the Virtual processes

23

•Automate the Provisioning of VM’s

•Decommission VM’s via an Automated Process

• Leverage Workflow solutions to automate process kickoff from Security

or non security events, IE System Lockdowns, Patching and more.

Page 23: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Workspace & Application Virtualization

24

Page 24: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Virtual Desktop Initiative and Application Virtualization

Givers User a

portable

Experience

Can Reduce

Software cost

app app app app

os os os os

app app app app

os os os os

Can Improve

App

Management

Page 25: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

How this aligns with industry capabilities

On-demand application delivery

and license management system

Virtual Distribution

Workspace Streaming

Desktop connection broker with secure single sign-on and

roaming desktop with location awareness

Virtual Workspace

Thin Client Technology

Layering technology to contain applications

and eliminate conflicts and OS degradation

Virtual Execution

Application Virtualization

Personal workspace customization that

follows the user across multiple

devices

Virtual Profiles

User

Profiles

26

Page 26: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

App

A

App

B

App

C

Virtual Apps

Experience

App

A

App

B

App

C

Traditional Apps

Experience

Windows Operating System

Virtual Applications

Windows Operating System

27

Virtual

Layer

Virtual

Layer

Virtual

Layer

Page 27: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Backup & Availability of the Virtual Environment

28

Page 28: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Virtualization Poses Challenges for Backup & Recovery

Virtualization Slows Backup Processes

• Consumes server I/O & CPU

• Impact other applications

• Creates bandwidth problems

Virtualization Increases Storage Consumption

• Virtual machine “sprawl” requires backup & recovery

• Duplicate data stored across every virtual machine

• Disaster recovery = duplicate data (OS)

Virtualization Reduces Productivity of Backup Team

• Multiple tools for virtual and physical server recovery

• Finding individual files consumes time w/o a catalog

• Time to manage gap between protected machines and unprotected machines

Page 29: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Client/Source

Media server/Target

Dedupe appliance

Data Deduplication at the Source

• Data is deduplicated at the source/client before being sent across the network

• Benefits include:

– Reduced WAN/LAN bandwidth impact

– Reduced backend storage requirements

– Transparent support for applications

• Ideal for:

– Remote offices

– Protecting virtual machines

– File/folder & Database backups with low change rate

= Deduplication engine

30

Page 30: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Client/Source

Media server/Target

Dedupe appliance

Server Deduplication

• Data is deduplicated inline at the media server before being stored on disk

• Benefits include:

– No client impact

– Leverage commodity hardware

– Reduced backend storage requirements (1Gb/s vs. 10Gb/s)

– Highly scalable

• Ideal for:

– Data center environments

= Deduplication engine

31

Page 31: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Client/Source

Media server/Target

Dedupe appliance

Deduplication Appliances

• Data is deduplicated at the appliance and centrally managed by NetBackup via OpenStorage API

• Benefits include:

– Centralized policy management and replication control

– Improved performance

• Wide range of supported appliances

32

Page 32: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Reduce Storage

Gaining better insight of data

• Address unstructured datea

• Effective consumptions/Chargeback

• Understand data utilization

Leverage Symantec Deduplication

• 90% reduction in backup & DR storage

• You choose storage – we manage deduplication

• Source and/or target-based deduplication

33

Page 33: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Eliminate Unused Data

34

• Identify data users, not just data owners

• Identify inactive or orphaned data

• Understand storage consumption and trends

• Tie in to storage security

Users

File System Monitoring Technology

Unstructured data

Data (File Servers)

Page 34: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

35

Use Tiered Storage Effectively

Tier 1 Storage

• Highest Performance

• Highest Cost

Tier 1 Storage

• High Performance

• High Cost

Tier 1 Storage

• Lower Performance

• Lowest Cost

Automated real time data movement based on policy

Data Usage

Page 35: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Virtual Machine Backup Management

• Centralize Administration

– Automatic discovery of new VMs for VMware & Hyper-V

– Common policy management

• Fast, Three Step Recovery

– Centralized catalog – find the right file instantly

– Recover virtual to physical or to a new virtual

• Monitor & Report on Exposure

– Identify unprotected VMware or Hyper-V VMs

– Automatically generate daily reports

– Centralize reporting across different backup products / platforms (Backup Reporter)

36

Identify unprotected virtual machines (VMware & Hyper-V)

Page 36: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Storage Management and High Availability

Page 37: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

38

Enterprise Operations Management Consoles

End to End Visibility

•Single pane of glass

•Application to LUN mapping

•Discover native volume managers and file systems

Provisioning

•Provision File Systems and Volumes from templates

•Thin Storage awareness

•Dynamic Storage Tiering

Fault and Risk Management

•Real time monitoring

•Root cause analysis

•Custom policies for health checks

HA/DR Operations

•Configure Service Groups

•Perform maintenance

•Global failover

Storage Operations

•Volume Migration

•Path maintenance

•Manage File Systems, Volumes and Replication

Licensing

•Keyless license discovery

•Product version and patch reporting

•Deployment policy settings Analytics

•Uptime analysis

•Performance trends

•Product Inventory and resource activity

Utilization

•Storage allocation by host

•Storage consumption

•Underutilized file systems and LUN information

Extensible Platform

perl

Page 38: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

VM1

OS

VM2

OS

VM1

OS

VM2

OS

Leverage AppControl: Application-aware HA in VMware

• Integrated VMware-Symantec solution to improve app availability

• VMware HA + VCS for coordinated recovery of apps

– Monitor apps, show health status, detect app failures

– Restart apps. If needed, trigger VMware HA for VM restart

• vCenter + VCS plugin for visualization and control of apps

– Visualize, Start, Stop apps in VMs

– Customize app start/stop behavior

• Simple deployment

– Push install to multiple VMs

– Discover and auto-configure apps in VM

VMware ESX

VMware HA

VMware ESX

VMware HA

AppCtrl

AppCtrl

SQL ORA SQL ORA

APA APA APA

SQL SQL SAP

SQL SQL APA

WAS WAS WAS

datacent

er_1

cluster_

1

esx_2

vm_1

vm_2

vCenter GUI

ORA_1

SQL_1

Start

Stop

Restart

39

Page 39: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

40

Automate High Availability and Disaster Recovery

Metropolitan HA (Stretch Cluster)

Wide-Area DR (Global Cluster)

Local HA • Recover faster

• Reduce reliance on personnel during an incident

• Reduce operator error

• Provide comprehensive data and application availability

• Simplify by using a single solution for:

– Local HA

– Campus/Metro DR

– Global DR

The Benefits Symantec High Availability and Disaster Recovery

SAP APP 1 APP 3 APP 2 SAP SAP APP 4

Synch Replication or Mirroring

APP 4 APP 1 APP 2 APP 3

Asynchronous Replication

Page 40: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Summary

41

Page 41: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

42

Summary End-to-End Visibility: State Government Virtualization’s Secret Sauce

Reduce Downtime

Manage Environment

Disaster Recovery

Optimize Storage

Data Protection

Systems Mtg. Strategy

Security Strategy

Compliance Framework

Automation Capabilities

Data Protection Strategy

High Availability & Storage Mtg.

Page 42: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

More information: Symantec Connect

www.symantec.com/community

• Breaking product news • In-depth articles

• Tips from the trenches • Tools and utilities • Training videos

• Podcasts • RSS feeds

• Rewards program

Page 43: End-to-End Visibility: State Government Virtualization’s ... · End-to-End Visibility: State Government Virtualization’s ... across every virtual machine ... to-End Visibility:

Thank you!

Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Thank you!

Securing the Virtual Environment 44