200 likes | 208 Views
This presentation explores the challenges and solutions for implementing a Zero Trust Security Model in public cloud environments for containerized applications. It discusses the journey towards unified networking and IT, the dream of simplified service provisioning and management, and the solution of orchestration and SDN policies. A demo showcases the successful implementation.
E N D
Extending the Zero Trust Security Model for Containerized Applications to Public Clouds Jason Sones VNO North America – Nuage Networks from Nokia Sherif Awad SDN Solution Architect Lead - Nuage Networks from Nokia April 30th, 2019 VNO
Agenda Extending the Zero Trust Security Model for Containerized Applications to Public Clouds or Blah Blah Blah![title is too long !!!] • Overview • The Journey • The Dream • Challenges • The Solution • Demo • Questions
Overview What is this presentation about?
Overview What is the Zero Trust Security Model? • Never implicitly trust any public infrastructure. • Start with the assumption that every potential shared resource can be compromised. • Implement policies to enable services based on minimal required access privileges. • Always use micro-segmentation, authentication, authorization and encryption • Between application and/or user endpoints. • Constantly monitor access requests (analytics) and intrusion attempts and adjust policy to maintain the ZTM • Prevent/Detect and Respond Automate this if you can!
Overview The move towards unified networking and IT • Unifying Islands of connectivity though central policy and control. • Impact of the move to public cloud • The emergence of hosting sensitive enterprise IT applications as containers work-loads in public clouds. • Challenge is applying enterprise grade security policy to public cloud applications. • Simplifying service provisioning and management across branch, private and public clouds. • How to ease the end-user provisioning, consumption and management of these new unified services.
The Journey How did we get to this point?
The journey Kubernetes 1 Data Center (Private Cloud) Connecting & Serving Disparate Locations (SD-WAN) 2 Site A VPN Site B vm vm Site C Public Transport VxLAN over IPSEC Trusted Infrastrucutre = VxLAN only
The journey (continued) SDN Policy Engine Kubernetes MPLS Branch 4 3 App 1 WAN SDN Controller DC SDN Controller Branch 3 MPLS PE Internet Any DC underlay Branch 1 VNF 2 SDN GW Data Center WAN End-to-End Service Overlay Public Transport VxLAN over IPSEC Trusted Infrastrucutre = VxLAN only
The Dream Why Orchestration
Why Orchestration? m Branch types q versions r configurations p VNF types VxLAN SD-WAN overlay Firewall Mail-scanner Anti-DDoS SDN / Nuage ThickCPE Access Control WAN optimization Load-balancing 3rd party Cloud Internet Underlay Telco Cloud NAT Other VAS SlimCPE n Enterprises Local Cloud GRE ThinCPE c VPC environments NSG-BR b datacenter stacks Legacy IP/MPLS VPN a underlays OpenStack AWS Azure GCP IP/MPLS Underlay Nuage VNS Nuage VCS Legacy NSP SR/vSR
Why Orchestration? Service Updates Single-click deployment Maintainable Service Public Cloud Hypervisor Hypervisor Hypervisor Hypervisor Hypervisor Hypervisor
Challenges Identifying the obstacles that are standing in our way.
Challenges What is missing to be able to realize the dream … • How to ensure only authorized hosts can run containers workloads? • How to secure traffic between containers on different hosts? • How to provide end-to-end service provisioning, security, monitoring and visibility from branch to private DC to public cloud? • Can I rely on public cloud for data that I am responsible to keep secure?
The Solution Putting it all together
The Solution Orchestration SDN Policy Engine Kubernetes WAN SDN Controller Bootstrap Proxy MPLS Branch 4 3 App 1 DC SDN Controller Branch 3 MPLS PE Internet Public Cloud Network Branch 1 App-22 Public Cloud GW Public Cloud Network WAN End-to-End Service Overlay ZTM VxLAN over IPSEC
Demo We actually got it to work!!! … mostly …
Lab Topology Branch User MGMT Kubernetes DNS-NTP Master Node01 Node02 Cloud VSD OpenShift Cluster WAN Branch Nuage SDN Cluster SSL Proxy VNO DATA/CP
Demo And so it begins
Questions Don’t be shy! Contact Info sherif.awad@nokia.com jason.sones@nokia.com