SlideShare une entreprise Scribd logo
1  sur  49
Palo Alto Networks: Protection for
Security & Compliance
Matt Lehwess - Partner Solutions Architect, AWS
Matt Keil – Director of Product Marketing, Palo Alto Networks
Matt McLimans – Network Security Engineer, Warren Rogers
$6.53M 56% 70%
https://www.csid.com/resources/stats/data-
breaches/
Increase in theft of hard
intellectual property
http://www.pwc.com/gx/en/issues/cyber-
security/information-security-survey.html
Of consumers indicated
they’d avoid businesses
following a security breach
https://www.csid.com/resources/stats/data-
breaches/
Average cost of a
data breach
Your Data and IPAre Your Most Valuable Assets
AWS Can Be More Secure than Your Existing
Environment
In June 2015, IDC released a report which found that most customers can be more secure
in AWS than their on-premises environment. How?
Automating logging
and monitoring
Simplifying
resource access
Making it easy to
encrypt properly
Enforcing strong
authentication
AWS Foundation Services
Compute Storage Database Networking
AWS Global Infrastructure
Regions
Availability Zones
Edge Locations
Identity &
Access Control
Network
Security
Customer applications & content
You get to
define your
controls ON
the Cloud
AWS takes
care of the
security OF
the Cloud
You
Inventory
& Config
Data
Encryption
AWS and you share responsibility for security
Constantly Monitored
The AWS infrastructure is protected by extensive network and security
monitoring systems:
 Network access is monitored by AWS
security managers daily
 AWS CloudTrail lets you monitor
and record all API calls
 Amazon Inspector automatically assesses
applications for vulnerabilities
Highly Available
The AWS infrastructure footprint protects your data from costly downtime
 38 Availability Zones in 14 regions for
multi-synchronous geographic redundancy
 Retain control of where your data resides
for compliance with regulatory requirements
 Mitigate the risk of DDoS attacks using
services like AutoScaling, Route 53
Integrated with Your Existing Resources
AWS enables you to improve your security using many of your existing
tools and practices
 Integrate your existing Active Directory
 Use dedicated connections as a secure,
low-latency extension of your data center
 Provide and manage your own encryption
keys if you choose
Key AWS Certifications and Assurance Programs
Palo Alto Networks and the
VM-Series on AWS
Matt Keil – Director of Product Marketing, Palo Alto Networks
* Non-GAAP financial measures. See appendix for reconciliation to most comparable GAAP measure.
Revenue
Customers
About Palo Alto Networks
Corporate Highlights
 Founded in 2005; first customer
shipment in 2007
 Safely enable applications and prevent
cyber threats
 Addressing all enterprise
cybersecurity needs
 Exceptional ability to support
global customers
 Experienced team of 3,800+
employees
 Q4 FY16: $401.8M revenue
Applications and Data Are the Target
The attack life cycle applies to both physical or virtualized networks in the cloud
Infect User Gain Foothold Move Laterally
Steal Data
Build Botnets
Harvest Bitcoin
Execute Goal:
On the network
or in the Cloud
Shared Security Model: Where We Can Help
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge Locations
Encryption Key
Management
Client & Server
Encryption
Network Traffic
Protection
Platform, Applications, Identity & Access Management
Operating System, Network & Firewall Configuration
Customer content
Where
Palo Alto
Networks
Can Help
Customer Responsibility
Security on the Cloud
AWS Responsibility
Security of the Cloud
VM-Series Next-Generation Firewall on AWS
• Identifies and controls applications across all ports
• Prevents known/unknown threats targeted at your AWS deployment
• Enforces policy consistency with centralized management
• Automates deployment and policy updates
Segmentation: Separate
applications and data for
security and compliance
Deployment Use Cases
GlobalProtect: Policy
consistency for the cloud, the
network, and your devices
All use cases supported in AWS standard regions and AWS GovCloud (US)
Gateway: Protection from
Internet borne threats
Licensing Options
Consumption based licensing
 Two bundles available as annual or
hourly subscriptions
Bring your own license (BYOL)
 Pick and choose licenses,
subscriptions and support to best
suite our needs
 Supported in AWS standard
regions and AWS GovCluod (US)
Auto Scaling the VM-Series on AWS
As workload traffic
increases, security scales
independently of workloads
Note: Auto Scaling the VM-Series on AWS uses AWS Marketplace Bundle 1 or Bundle 2,
in either an annual or an hourly subscription.
Security Groups, WAF, or Next-gen Firewall?
Native AWS security includes Security Groups and Web Application Firewall
Security Groups and ACLs
 Port-based filtering only
 No visibility traffic at the
application level
 Unable to prevent threats
 Cannot control file movement
Web Application Firewalls
 Customized for each application/environment
 Focused narrowly on public facing web
applications on HTTP/HTTPs
 No visibility, control, or protection on other
applications
Customer Success Story: How
Warren Rogers Achieved PCI
Compliance on AWS
Matt McLimans – Network Security Engineer, Warren Rogers
Warren Rogers Services
Variance
reports
Tank
activity
Sales
by hour
Unexplained
removals
Delivery
reports
Dispenser/Probe
out summary
All-Point
monitoring
system that
provides the
most
accurate and
complete
information
about fueling
operations
Customer Store Network
Warren Rogers’ Network
Our Operation
Our Device
“OSP”
AWS as Level 1 Service Provider
Lowest cost PCI
complaint cloud
service.
Reduce and implify
scoped environment.
If required, provides
forensic
investigations
A B
AWS PCI Compliant Services
CloudWatch BeanStalk
SNSSES
FederationIAMCloud TrailCloud FormationOpsWork
SQS Elastic Transcoder Cloud Search SWF
Dynamo ElastiCache RedShift EMR DataPipeline Kinesis CloudFront
Ec2 WorkSpaces S3 Route53ELBDirect ConnectStorage Gateway VPCGlacier
Monitoring Deployment & Management Identity & Access
Application Services
Databases Analytics
Compute Storage Networking
Content Delivery
AppStream
EBS
Deployment
&Management
Application
ServicesFoundationServices
RDS
AWS PCI Compliant Services
CloudWatch BeanStalk
SNSSES
FederationIAMCloud TrailCloud FormationOpsWork
SQS Elastic Transcoder Cloud Search SWF
Dynamo ElastiCache RedShift EMR DataPipeline Kinesis CloudFront
Ec2 WorkSpaces S3 Route53ELBDirect ConnectStorage Gateway VPCGlacier
Monitoring Deployment & Management Identity & Access
Application Services
Databases Analytics
Compute Storage Networking
Content Delivery
AppStream
EBS
Deployment
&Management
Application
ServicesFoundationServices
RDS
AWS PCI Compliant Services
CloudWatch BeanStalk
SNSSES
FederationIAMCloud TrailCloud FormationOpsWork
SQS Elastic Transcoder Cloud Search SWF
Dynamo ElastiCache RedShift EMR DataPipeline Kinesis CloudFront
Ec2 WorkSpaces S3 Route53ELBDirect ConnectStorage Gateway VPCGlacier
Monitoring Deployment & Management Identity & Access
Application Services
Databases Analytics
Compute Storage Networking
Content Delivery
AppStream
EBS
Deployment
&Management
Application
ServicesFoundationServices
RDS
The PCI Challenge for Warren Rogers
How do we protect ourselfs?
Warren Rogers’ Network
Customer Store Network
The PCI Challenge for Warren Rogers
How do we protect ourself?
Warren Rogers’ Network
Customer Store Network
The PCI Challenge for Warren Rogers
How do we protect ourself?
Warren Rogers’ Network
Customer Store Network
Challenges
Previously non-compliant
Questions to Answer
 How can we secure transmission to AWS?
 How do we know if we inadvertently collect cardholder data?
 How do we ensure all our boxes are running PCI required applications?
 How can we standardized access to our OSPs?
Thousands of remote devices Various deployments within
diverse customer environments
CIDR: 10.0.0.0/16 CIDR: 172.17.0.0/24 CIDR: 192.168.3.0/8
Customer A Network Customer B Network Customer n Network
What We Had…
Warren Rogers’ Network
WR Custom IP Range 1 WR Custom IP Range 1 WR Custom IP Range 1
Customer A Network Customer B Network Customer n Network
What We Wanted…
Secure Comm. Secure Comm.
One Access Method
Warren Rogers’ Network
Using Palo Alto Networks to Achieve Our Goal
GlobalProtect
 Encryption
 HIP Profiles
LSVPN
 Reducing latency
 Increasing redundancy
 Increasing global presence
Access Policies
 Data filtering
 Removing uncertainty
 Jump server
GlobalProtect: Use Case
HIP Check
A Unique Deployment
 Installed on OSP
 Pre-Log On
Benefits
 User-ID
 Exceeding PCI requirements.
 Complete insight into data transmission
 Centrally managed & IP Assignment
 HIP Checks & LDAP Segregation Control
Host Information in Policy Enforcement (HIP)
Stages
1. GlobalProtect agent collects information.
2. Agent submits host information.
3. Gateway matches host information against HIP
objects and HIP profiles.
Key Advantages
 Centrally managed from Palo Alto Networks.
 Easy configuration changes & granular policies.
 Custom application IDs.
 Allow box to connect, but notify personnel of
compliance mismatch.
 Routine checks on all OSPs, removes worry.
Firewall Status Data Encryption
Patch Management Anti-Virus
Data Filtering for CHD
CHD Filtering
 Predefined data pattern
 Looks for 16 digit card numbers
through hash algorithm (less false
positives)
 Scan all data or only certain file
types (.pdf .txt .csv ….)
Alerting on CHD Detected
 Contact customer immediately
that their network is passing CHD
to our OSP
Out of
Scope for
Compliance
LSVPN
1. Amazon Data Centers
Key
LSVPN Tunnel
GlobalProtect
AWS Data Center
OSPs
Palo Alto
Networks
VM-Series
LSVPN
1. Amazon Data Centers
2. Geo-located OSPs
Key
LSVPN Tunnel
GlobalProtect
AWS Data Center
OSPs
Palo Alto
Networks
VM-Series
LSVPN
1. Amazon Data Centers
2. Geo-located OSPs
3. Palo Alto Networks VM-300 Portal
Key
LSVPN Tunnel
GlobalProtect
AWS Data Center
OSPs
Palo Alto
Networks
VM-Series
PORTAL
LSVPN
1. Amazon Data Centers
2. Geo-located OSPs
3. Palo Alto Networks VM-300 Portal
4. Palo Alto Networks VM-300 Satellites
Key
LSVPN Tunnel
GlobalProtect
AWS Data Center
OSPs
Palo Alto
Networks
VM-Series
CA.SAT02
OR.SAT01
PORTAL
VA.SAT01
CA.SAT01
LSVPN
1. Amazon Data Centers
2. Geo-located OSPs
3. Palo Alto Networks VM-300 Portal
4. Palo Alto Networks VM-300 Satellites
5. Connecting LSVPN
Key
LSVPN Tunnel
GlobalProtect
AWS Data Center
OSPs
Palo Alto
Networks
VM-Series
CA.SAT02
OR.SAT01
PORTAL
VA.SAT01
CA.SAT01
LSVPN
1. Amazon Data Centers
2. Geo-located OSPs
3. Palo Alto Networks VM-300 Portal
4. Palo Alto Networks VM-300 Satellites
5. Connecting LSVPN
6. GlobalProtect to WR defined satellites
Key
LSVPN Tunnel
GlobalProtect
AWS Data Center
OSPs
Palo Alto
Networks
VM-Series
CA.SAT02
OR.SAT01
PORTAL
VA.SAT01
CA.SAT01
ADDS & Group Policy
LSVPN
Portal Private Network
Oregon
Satellite 1
Virginia
Portal
Satellite Private Network
Active Directory Servers
Break devices into
organizational units
 Geography
 Customer type
 …really anything
Advantages of ADDS
 Sync with Palo Alto Networks Firewalls
 Addressable remote devices by DNS
 Powerful tools available
Group Policy
 “Touch one, configure many”
 Floor to ceiling security model
Active Directory Servers
OSP Default PCI Policy
Customer A
Policy
Site 1 Policy
Group Policy Hierarchy
Private Subnet
Ec2
Public Subnet
Easy Deployment
Infrastructure:
 An AWS VPC.
 A public and private subnet.
 EC2 instances to protect.
Private Subnet
Ec2
Public Subnet
Easy Deployment
Infrastructure:
 An AWS VPC
 A public and private subnet
 EC2 instances to protect
Deployment:
 Launch Palo Alto Networks VM-
Series from the AWS Marketplace.
Private Subnet
Ec2
Tune VM-Series
Public Subnet
Easy Deployment
Infrastructure:
 An AWS VPC.
 A public and private subnet.
 EC2 instances to protect.
Deployment:
 Launch Palo Alto Networks VM-
Series from the AWS Marketplace.
 Tune VM-Series to protect from
network threats.
Private Subnet
Ec2
Simplify
Security
Groups
Tune VM-Series
Public Subnet
Easy Deployment
Infrastructure:
 An AWS VPC
 A public and private subnet
 EC2 instances to protect
Deployment:
 Launch Palo Alto Networks VM-
Series from the AWS Marketplace.
 Tune VM-Series to protect from
network threats.
 Simplify EC2 Security Groups
Making Compliance Easy with Palo Alto Networks
Least Access Control Logging & Flexibility Segmentation
 Reduced Scope
 Reduced Cost
 Reduced Threat
 Changes are
unavoidable for
productive organizations
 Active Directory
 Proof of policy controls
Making Compliance Easy with Palo Alto Networks
CHD
Network
Non-CHD Network
Flat Network Segmented Network
Whole Network
Cardholder servers
4
4
Flat Network
Segmented Network
Total servers
100
100
Open audit scope
100
4
Reduction of audit scope
0%
96%
Some Tips Before I Go…
Reach beyond PCI requirements for security.
 If you don’t have a security plan, use PCI as a base line.
Avoid expensive mistakes!
 Involve a QSA, a Palo Alto Networks Engineer, and your team on all major design decisions.
Remember, a single credit card number is a liability.
 Cost of CHD Compromise > Cost of PCI Compliance
Evaluate whether or not you can eliminate the reasons for necessary compliance.
 Ensure the benefit of touching CHD is greater than the liability.
Compliance with and without is Palo Alto Networks
 “Uncertainty in Compliance” v. “Certainty in Compliance”
Q&A
Matt Lehwess - Partner Solutions Architect, AWS
Matt Keil – Director of Product Marketing, Palo Alto Networks
Matt McLimans – Network Security Engineer, Warren Rogers

Contenu connexe

Tendances

Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
David J Rosenthal
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
Belsoft
 

Tendances (20)

Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use Cases
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
Azure Security Fundamentals
Azure Security FundamentalsAzure Security Fundamentals
Azure Security Fundamentals
 
Fortinet security fabric
Fortinet security fabricFortinet security fabric
Fortinet security fabric
 
SD-WAN Economics 101 - VeloCloud
SD-WAN Economics 101 - VeloCloudSD-WAN Economics 101 - VeloCloud
SD-WAN Economics 101 - VeloCloud
 
SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?
 
FortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxFortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptx
 
Large scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear passLarge scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear pass
 
Ready
ReadyReady
Ready
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
 
SD WAN
SD WANSD WAN
SD WAN
 
Demystifying Prisma Access
Demystifying Prisma AccessDemystifying Prisma Access
Demystifying Prisma Access
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web security
 
Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon Library
 
ClearPass Overview
ClearPass OverviewClearPass Overview
ClearPass Overview
 

En vedette

Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
Castleforce
 
certificate VSP - SV (Server Virtualization 2016)
certificate VSP - SV (Server Virtualization 2016)certificate VSP - SV (Server Virtualization 2016)
certificate VSP - SV (Server Virtualization 2016)
Enrique Del Villar
 
Ronald ortiz web 2.0 ventajas y desventajas
Ronald ortiz web 2.0 ventajas y desventajasRonald ortiz web 2.0 ventajas y desventajas
Ronald ortiz web 2.0 ventajas y desventajas
ronaldyfz
 

En vedette (20)

Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
 
Palo Alto Networks authentication
Palo Alto Networks authenticationPalo Alto Networks authentication
Palo Alto Networks authentication
 
Palo alto networks NAT flow logic
Palo alto networks NAT flow logicPalo alto networks NAT flow logic
Palo alto networks NAT flow logic
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-short
 
User id installation and configuration
User id installation and configurationUser id installation and configuration
User id installation and configuration
 
Palo Alto Networks - Just another Firewall
Palo Alto Networks - Just another FirewallPalo Alto Networks - Just another Firewall
Palo Alto Networks - Just another Firewall
 
Accredited Sales Expert
Accredited Sales ExpertAccredited Sales Expert
Accredited Sales Expert
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture
 
Palo alto networks
Palo alto networksPalo alto networks
Palo alto networks
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
certificate VSP 2016
certificate VSP 2016certificate VSP 2016
certificate VSP 2016
 
certificate VSP - SV (Server Virtualization 2016)
certificate VSP - SV (Server Virtualization 2016)certificate VSP - SV (Server Virtualization 2016)
certificate VSP - SV (Server Virtualization 2016)
 
2016 Wake of Fame Induction Ceremony Fact Sheet
2016 Wake of Fame Induction Ceremony Fact Sheet2016 Wake of Fame Induction Ceremony Fact Sheet
2016 Wake of Fame Induction Ceremony Fact Sheet
 
Ronald ortiz web 2.0 ventajas y desventajas
Ronald ortiz web 2.0 ventajas y desventajasRonald ortiz web 2.0 ventajas y desventajas
Ronald ortiz web 2.0 ventajas y desventajas
 
Paloalto Networks ACE
Paloalto Networks ACEPaloalto Networks ACE
Paloalto Networks ACE
 

Similaire à Palo Alto Networks: Protection for Security & Compliance

Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
Prime Infoserv
 

Similaire à Palo Alto Networks: Protection for Security & Compliance (20)

Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
Customer Case Study: Achieving PCI Compliance in AWS
Customer Case Study: Achieving PCI Compliance in AWSCustomer Case Study: Achieving PCI Compliance in AWS
Customer Case Study: Achieving PCI Compliance in AWS
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Security: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud AdoptionSecurity: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud Adoption
 
Fortinet Automates Migration onto Layered Secure Workloads
Fortinet Automates Migration onto Layered Secure WorkloadsFortinet Automates Migration onto Layered Secure Workloads
Fortinet Automates Migration onto Layered Secure Workloads
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App Security
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Modernizing Technology Governance
Modernizing Technology GovernanceModernizing Technology Governance
Modernizing Technology Governance
 
Warum ist Cloud-Sicherheit und Compliance wichtig?
Warum ist Cloud-Sicherheit und Compliance wichtig?Warum ist Cloud-Sicherheit und Compliance wichtig?
Warum ist Cloud-Sicherheit und Compliance wichtig?
 
Internet of Things, OWASP & WAF
Internet of Things, OWASP & WAF Internet of Things, OWASP & WAF
Internet of Things, OWASP & WAF
 
Check Point Software Technologies: Secure Your AWS Workloads
 Check Point Software Technologies: Secure Your AWS Workloads Check Point Software Technologies: Secure Your AWS Workloads
Check Point Software Technologies: Secure Your AWS Workloads
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud Journey
 
How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...
How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...
How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Automate the Provisioning of Secure Developer Environments on AWS PPT
 Automate the Provisioning of Secure Developer Environments on AWS PPT Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPT
 
ATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdf
ATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdfATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdf
ATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdf
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
 

Plus de Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

Plus de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Palo Alto Networks: Protection for Security & Compliance

  • 1. Palo Alto Networks: Protection for Security & Compliance Matt Lehwess - Partner Solutions Architect, AWS Matt Keil – Director of Product Marketing, Palo Alto Networks Matt McLimans – Network Security Engineer, Warren Rogers
  • 2. $6.53M 56% 70% https://www.csid.com/resources/stats/data- breaches/ Increase in theft of hard intellectual property http://www.pwc.com/gx/en/issues/cyber- security/information-security-survey.html Of consumers indicated they’d avoid businesses following a security breach https://www.csid.com/resources/stats/data- breaches/ Average cost of a data breach Your Data and IPAre Your Most Valuable Assets
  • 3. AWS Can Be More Secure than Your Existing Environment In June 2015, IDC released a report which found that most customers can be more secure in AWS than their on-premises environment. How? Automating logging and monitoring Simplifying resource access Making it easy to encrypt properly Enforcing strong authentication
  • 4. AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Identity & Access Control Network Security Customer applications & content You get to define your controls ON the Cloud AWS takes care of the security OF the Cloud You Inventory & Config Data Encryption AWS and you share responsibility for security
  • 5. Constantly Monitored The AWS infrastructure is protected by extensive network and security monitoring systems:  Network access is monitored by AWS security managers daily  AWS CloudTrail lets you monitor and record all API calls  Amazon Inspector automatically assesses applications for vulnerabilities
  • 6. Highly Available The AWS infrastructure footprint protects your data from costly downtime  38 Availability Zones in 14 regions for multi-synchronous geographic redundancy  Retain control of where your data resides for compliance with regulatory requirements  Mitigate the risk of DDoS attacks using services like AutoScaling, Route 53
  • 7. Integrated with Your Existing Resources AWS enables you to improve your security using many of your existing tools and practices  Integrate your existing Active Directory  Use dedicated connections as a secure, low-latency extension of your data center  Provide and manage your own encryption keys if you choose
  • 8. Key AWS Certifications and Assurance Programs
  • 9. Palo Alto Networks and the VM-Series on AWS Matt Keil – Director of Product Marketing, Palo Alto Networks
  • 10. * Non-GAAP financial measures. See appendix for reconciliation to most comparable GAAP measure. Revenue Customers About Palo Alto Networks Corporate Highlights  Founded in 2005; first customer shipment in 2007  Safely enable applications and prevent cyber threats  Addressing all enterprise cybersecurity needs  Exceptional ability to support global customers  Experienced team of 3,800+ employees  Q4 FY16: $401.8M revenue
  • 11. Applications and Data Are the Target The attack life cycle applies to both physical or virtualized networks in the cloud Infect User Gain Foothold Move Laterally Steal Data Build Botnets Harvest Bitcoin Execute Goal: On the network or in the Cloud
  • 12. Shared Security Model: Where We Can Help AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Encryption Key Management Client & Server Encryption Network Traffic Protection Platform, Applications, Identity & Access Management Operating System, Network & Firewall Configuration Customer content Where Palo Alto Networks Can Help Customer Responsibility Security on the Cloud AWS Responsibility Security of the Cloud
  • 13. VM-Series Next-Generation Firewall on AWS • Identifies and controls applications across all ports • Prevents known/unknown threats targeted at your AWS deployment • Enforces policy consistency with centralized management • Automates deployment and policy updates
  • 14. Segmentation: Separate applications and data for security and compliance Deployment Use Cases GlobalProtect: Policy consistency for the cloud, the network, and your devices All use cases supported in AWS standard regions and AWS GovCloud (US) Gateway: Protection from Internet borne threats
  • 15. Licensing Options Consumption based licensing  Two bundles available as annual or hourly subscriptions Bring your own license (BYOL)  Pick and choose licenses, subscriptions and support to best suite our needs  Supported in AWS standard regions and AWS GovCluod (US)
  • 16. Auto Scaling the VM-Series on AWS As workload traffic increases, security scales independently of workloads Note: Auto Scaling the VM-Series on AWS uses AWS Marketplace Bundle 1 or Bundle 2, in either an annual or an hourly subscription.
  • 17. Security Groups, WAF, or Next-gen Firewall? Native AWS security includes Security Groups and Web Application Firewall Security Groups and ACLs  Port-based filtering only  No visibility traffic at the application level  Unable to prevent threats  Cannot control file movement Web Application Firewalls  Customized for each application/environment  Focused narrowly on public facing web applications on HTTP/HTTPs  No visibility, control, or protection on other applications
  • 18. Customer Success Story: How Warren Rogers Achieved PCI Compliance on AWS Matt McLimans – Network Security Engineer, Warren Rogers
  • 19. Warren Rogers Services Variance reports Tank activity Sales by hour Unexplained removals Delivery reports Dispenser/Probe out summary All-Point monitoring system that provides the most accurate and complete information about fueling operations
  • 20. Customer Store Network Warren Rogers’ Network Our Operation Our Device “OSP”
  • 21. AWS as Level 1 Service Provider Lowest cost PCI complaint cloud service. Reduce and implify scoped environment. If required, provides forensic investigations A B
  • 22. AWS PCI Compliant Services CloudWatch BeanStalk SNSSES FederationIAMCloud TrailCloud FormationOpsWork SQS Elastic Transcoder Cloud Search SWF Dynamo ElastiCache RedShift EMR DataPipeline Kinesis CloudFront Ec2 WorkSpaces S3 Route53ELBDirect ConnectStorage Gateway VPCGlacier Monitoring Deployment & Management Identity & Access Application Services Databases Analytics Compute Storage Networking Content Delivery AppStream EBS Deployment &Management Application ServicesFoundationServices RDS
  • 23. AWS PCI Compliant Services CloudWatch BeanStalk SNSSES FederationIAMCloud TrailCloud FormationOpsWork SQS Elastic Transcoder Cloud Search SWF Dynamo ElastiCache RedShift EMR DataPipeline Kinesis CloudFront Ec2 WorkSpaces S3 Route53ELBDirect ConnectStorage Gateway VPCGlacier Monitoring Deployment & Management Identity & Access Application Services Databases Analytics Compute Storage Networking Content Delivery AppStream EBS Deployment &Management Application ServicesFoundationServices RDS
  • 24. AWS PCI Compliant Services CloudWatch BeanStalk SNSSES FederationIAMCloud TrailCloud FormationOpsWork SQS Elastic Transcoder Cloud Search SWF Dynamo ElastiCache RedShift EMR DataPipeline Kinesis CloudFront Ec2 WorkSpaces S3 Route53ELBDirect ConnectStorage Gateway VPCGlacier Monitoring Deployment & Management Identity & Access Application Services Databases Analytics Compute Storage Networking Content Delivery AppStream EBS Deployment &Management Application ServicesFoundationServices RDS
  • 25. The PCI Challenge for Warren Rogers How do we protect ourselfs? Warren Rogers’ Network Customer Store Network
  • 26. The PCI Challenge for Warren Rogers How do we protect ourself? Warren Rogers’ Network Customer Store Network
  • 27. The PCI Challenge for Warren Rogers How do we protect ourself? Warren Rogers’ Network Customer Store Network
  • 28. Challenges Previously non-compliant Questions to Answer  How can we secure transmission to AWS?  How do we know if we inadvertently collect cardholder data?  How do we ensure all our boxes are running PCI required applications?  How can we standardized access to our OSPs? Thousands of remote devices Various deployments within diverse customer environments
  • 29. CIDR: 10.0.0.0/16 CIDR: 172.17.0.0/24 CIDR: 192.168.3.0/8 Customer A Network Customer B Network Customer n Network What We Had… Warren Rogers’ Network
  • 30. WR Custom IP Range 1 WR Custom IP Range 1 WR Custom IP Range 1 Customer A Network Customer B Network Customer n Network What We Wanted… Secure Comm. Secure Comm. One Access Method Warren Rogers’ Network
  • 31. Using Palo Alto Networks to Achieve Our Goal GlobalProtect  Encryption  HIP Profiles LSVPN  Reducing latency  Increasing redundancy  Increasing global presence Access Policies  Data filtering  Removing uncertainty  Jump server
  • 32. GlobalProtect: Use Case HIP Check A Unique Deployment  Installed on OSP  Pre-Log On Benefits  User-ID  Exceeding PCI requirements.  Complete insight into data transmission  Centrally managed & IP Assignment  HIP Checks & LDAP Segregation Control
  • 33. Host Information in Policy Enforcement (HIP) Stages 1. GlobalProtect agent collects information. 2. Agent submits host information. 3. Gateway matches host information against HIP objects and HIP profiles. Key Advantages  Centrally managed from Palo Alto Networks.  Easy configuration changes & granular policies.  Custom application IDs.  Allow box to connect, but notify personnel of compliance mismatch.  Routine checks on all OSPs, removes worry. Firewall Status Data Encryption Patch Management Anti-Virus
  • 34. Data Filtering for CHD CHD Filtering  Predefined data pattern  Looks for 16 digit card numbers through hash algorithm (less false positives)  Scan all data or only certain file types (.pdf .txt .csv ….) Alerting on CHD Detected  Contact customer immediately that their network is passing CHD to our OSP Out of Scope for Compliance
  • 35. LSVPN 1. Amazon Data Centers Key LSVPN Tunnel GlobalProtect AWS Data Center OSPs Palo Alto Networks VM-Series
  • 36. LSVPN 1. Amazon Data Centers 2. Geo-located OSPs Key LSVPN Tunnel GlobalProtect AWS Data Center OSPs Palo Alto Networks VM-Series
  • 37. LSVPN 1. Amazon Data Centers 2. Geo-located OSPs 3. Palo Alto Networks VM-300 Portal Key LSVPN Tunnel GlobalProtect AWS Data Center OSPs Palo Alto Networks VM-Series PORTAL
  • 38. LSVPN 1. Amazon Data Centers 2. Geo-located OSPs 3. Palo Alto Networks VM-300 Portal 4. Palo Alto Networks VM-300 Satellites Key LSVPN Tunnel GlobalProtect AWS Data Center OSPs Palo Alto Networks VM-Series CA.SAT02 OR.SAT01 PORTAL VA.SAT01 CA.SAT01
  • 39. LSVPN 1. Amazon Data Centers 2. Geo-located OSPs 3. Palo Alto Networks VM-300 Portal 4. Palo Alto Networks VM-300 Satellites 5. Connecting LSVPN Key LSVPN Tunnel GlobalProtect AWS Data Center OSPs Palo Alto Networks VM-Series CA.SAT02 OR.SAT01 PORTAL VA.SAT01 CA.SAT01
  • 40. LSVPN 1. Amazon Data Centers 2. Geo-located OSPs 3. Palo Alto Networks VM-300 Portal 4. Palo Alto Networks VM-300 Satellites 5. Connecting LSVPN 6. GlobalProtect to WR defined satellites Key LSVPN Tunnel GlobalProtect AWS Data Center OSPs Palo Alto Networks VM-Series CA.SAT02 OR.SAT01 PORTAL VA.SAT01 CA.SAT01
  • 41. ADDS & Group Policy LSVPN Portal Private Network Oregon Satellite 1 Virginia Portal Satellite Private Network Active Directory Servers Break devices into organizational units  Geography  Customer type  …really anything Advantages of ADDS  Sync with Palo Alto Networks Firewalls  Addressable remote devices by DNS  Powerful tools available Group Policy  “Touch one, configure many”  Floor to ceiling security model Active Directory Servers OSP Default PCI Policy Customer A Policy Site 1 Policy Group Policy Hierarchy
  • 42. Private Subnet Ec2 Public Subnet Easy Deployment Infrastructure:  An AWS VPC.  A public and private subnet.  EC2 instances to protect.
  • 43. Private Subnet Ec2 Public Subnet Easy Deployment Infrastructure:  An AWS VPC  A public and private subnet  EC2 instances to protect Deployment:  Launch Palo Alto Networks VM- Series from the AWS Marketplace.
  • 44. Private Subnet Ec2 Tune VM-Series Public Subnet Easy Deployment Infrastructure:  An AWS VPC.  A public and private subnet.  EC2 instances to protect. Deployment:  Launch Palo Alto Networks VM- Series from the AWS Marketplace.  Tune VM-Series to protect from network threats.
  • 45. Private Subnet Ec2 Simplify Security Groups Tune VM-Series Public Subnet Easy Deployment Infrastructure:  An AWS VPC  A public and private subnet  EC2 instances to protect Deployment:  Launch Palo Alto Networks VM- Series from the AWS Marketplace.  Tune VM-Series to protect from network threats.  Simplify EC2 Security Groups
  • 46. Making Compliance Easy with Palo Alto Networks Least Access Control Logging & Flexibility Segmentation  Reduced Scope  Reduced Cost  Reduced Threat  Changes are unavoidable for productive organizations  Active Directory  Proof of policy controls
  • 47. Making Compliance Easy with Palo Alto Networks CHD Network Non-CHD Network Flat Network Segmented Network Whole Network Cardholder servers 4 4 Flat Network Segmented Network Total servers 100 100 Open audit scope 100 4 Reduction of audit scope 0% 96%
  • 48. Some Tips Before I Go… Reach beyond PCI requirements for security.  If you don’t have a security plan, use PCI as a base line. Avoid expensive mistakes!  Involve a QSA, a Palo Alto Networks Engineer, and your team on all major design decisions. Remember, a single credit card number is a liability.  Cost of CHD Compromise > Cost of PCI Compliance Evaluate whether or not you can eliminate the reasons for necessary compliance.  Ensure the benefit of touching CHD is greater than the liability. Compliance with and without is Palo Alto Networks  “Uncertainty in Compliance” v. “Certainty in Compliance”
  • 49. Q&A Matt Lehwess - Partner Solutions Architect, AWS Matt Keil – Director of Product Marketing, Palo Alto Networks Matt McLimans – Network Security Engineer, Warren Rogers