SlideShare une entreprise Scribd logo
1  sur  38
Télécharger pour lire hors ligne
Chris Swan, CTO, @cpswan
Application centric:
How the cloud has changed the way
we deploy, secure and connect
© 2015
Google moves its corporate apps to the Internet
2
Google Inc., taking a new approach to enterprise security, is moving its corporate
applications to the Internet. In doing so, the Internet giant is flipping common
corporate security practice on its head, shifting away from the idea of a trusted
internal corporate network secured by perimeter devices such as firewalls, in
favor of a model where corporate data can be accessed from anywhere with the
right device and user credentials.
The new model — called the BeyondCorp initiative — assumes that the
internal network is as dangerous as the Internet.
(Wall Street Journal | “Google Moves Its Corporate Applications to the Internet” | May 11, 2015 )
© 2015
Setting the scene
© 2015
Traditional apps
4
Business applications are collections of (virtual) servers
Is the “right” traffic going to/from our servers?
Database Tier
AppServer Tier
Web Tier
= type of server
© 2015
Modern architectures don’t change things that much
5
Micro services based applications are collections of services
Is the “right” traffic going to/from our services?
Persistence services
Business services
Front end services
= type of server
© 2015
Enterprise data center
6
Perimeter Security
Enterprise data centers are filled with these applications, often left
insecure by lack of focus on interior network paths.
20% of Security
Spend is on
“interior”, yet 80% of
the network traffic.
80% of Security Spend is on perimeter, 20% of traffic.
© 2015
Hard on the outside, soft on the inside
7
Perimeter Security
Hacker
Penetration
© 2015
One penetration creates major “East-West” exposure
8
Perimeter Security
On average
undetected for
234 days!
© 2015
Cloud architectures have been different
© 2015
2006 – The lonely (and exposed) VM
VM
© 2015
2008 - Overlays
VMVM VM
VM
© 2015
2009 - VPCs
VMVM VM VM
© 2015
Containment often not enough – overlays stayed
VM
VMVM VM VM
© 2015
Lots of people did something like this
VM
© 2015
Some even did something like this
VM VM
© 2015
And the really large (or paranoid) might do this
VM
VM
© 2015
Or even this
VM VM
© 2015
Thankfully almost nobody tries to do this
© 2015
What was that perimeter made of?
A quick detour to the worlds of:
Unified Threat Management (UTM)
and Application Delivery Controllers (ADC)
© 2015
Unified Threat Management
Firewall
NIDS/NIPS
AV
Anti Spam
VPN
DLP
Load Balancer
UTM
© 2015
Application Delivery Controllers
Cache
TLS offload
Compression
WAF
Multiplexing
Load Balancer
ADC
Traffic Shaping
© 2015
The UTM & ADC delivery model
© 2015
SDN and NFV
© 2015
Networks made from and configured by software
© 2015
We can put a bunch of ‘network’ onto a VM
Firewall
VPN
Switch
Router
© 2015
And add more functions into containers
Firewall
VPN
Switch
Router
Cache
TLS offload
WAF
Load Balancer
NIDS/NIPS
© 2015
This could be thought of as an app centric perimeter
© 2015
But it refactors very readily into microservices
© 2015
The audit paradox
© 2015
Building in
CC photo by WorldSkills
© 2015
What building in looks like
© 2015
Bolting on
CC photo by arbyreed
© 2015
What bolting on looks like
© 2015
PaaS gives us the chance to ‘bolt in’
© 2015
But Docker adoption shows a movement against
opinionated platforms
© 2015
If a security event happens and it isn’t monitored
© 2015
Some challenges remain
© 2015
ToDo: SecDevOps
APIs are necessary but not sufficient:
Need to have them integrated into the overall system
Control metadata (and its mutability):
Must be visible and understandable
Security events need to be captured:
Then turned into something humans can action

Contenu connexe

Tendances

Cast Iron for NetSuite Sales Training
Cast Iron for NetSuite Sales TrainingCast Iron for NetSuite Sales Training
Cast Iron for NetSuite Sales Training
Sean O'Connell
 
Cloud for IT Apprentices
Cloud for IT ApprenticesCloud for IT Apprentices
Cloud for IT Apprentices
Simon May
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
GovCloud Network
 

Tendances (20)

A Practical Guide to Migrating Legacy Applications
A Practical Guide to Migrating Legacy ApplicationsA Practical Guide to Migrating Legacy Applications
A Practical Guide to Migrating Legacy Applications
 
Have cloud, will delight
Have cloud, will delightHave cloud, will delight
Have cloud, will delight
 
Walking In Clouds Thunderbolts Are Opportunities
Walking In Clouds Thunderbolts Are OpportunitiesWalking In Clouds Thunderbolts Are Opportunities
Walking In Clouds Thunderbolts Are Opportunities
 
IBM Cloud Point of View
IBM Cloud Point of ViewIBM Cloud Point of View
IBM Cloud Point of View
 
Of Clouds and Container Ships
Of Clouds and Container ShipsOf Clouds and Container Ships
Of Clouds and Container Ships
 
Engage more Customers Re-build Trust in Internet Services, Open-Xchange - Uni...
Engage more Customers Re-build Trust in Internet Services, Open-Xchange - Uni...Engage more Customers Re-build Trust in Internet Services, Open-Xchange - Uni...
Engage more Customers Re-build Trust in Internet Services, Open-Xchange - Uni...
 
Federation - One Cloud
Federation - One CloudFederation - One Cloud
Federation - One Cloud
 
Telstra Cloud
Telstra CloudTelstra Cloud
Telstra Cloud
 
Secure your journey to the public cloud
Secure your journey to the public cloudSecure your journey to the public cloud
Secure your journey to the public cloud
 
Pulling Back the Curtain - Robert Ames
Pulling Back the Curtain - Robert AmesPulling Back the Curtain - Robert Ames
Pulling Back the Curtain - Robert Ames
 
The Impact of Cloud Computing and the Event Industry's Cloud Killer
The Impact of Cloud Computing and the Event Industry's Cloud KillerThe Impact of Cloud Computing and the Event Industry's Cloud Killer
The Impact of Cloud Computing and the Event Industry's Cloud Killer
 
Cast Iron for NetSuite Sales Training
Cast Iron for NetSuite Sales TrainingCast Iron for NetSuite Sales Training
Cast Iron for NetSuite Sales Training
 
Comarch ICT - CLOUD EXPO
Comarch ICT - CLOUD EXPOComarch ICT - CLOUD EXPO
Comarch ICT - CLOUD EXPO
 
Adform Cloud Infrastructure
Adform Cloud Infrastructure Adform Cloud Infrastructure
Adform Cloud Infrastructure
 
Hybrid Cloud Point of View - IBM Event, 2015
Hybrid Cloud Point of View - IBM Event, 2015Hybrid Cloud Point of View - IBM Event, 2015
Hybrid Cloud Point of View - IBM Event, 2015
 
Cloud for IT Apprentices
Cloud for IT ApprenticesCloud for IT Apprentices
Cloud for IT Apprentices
 
EVOLUTION Seattle
EVOLUTION Seattle EVOLUTION Seattle
EVOLUTION Seattle
 
TIBCO Silver at the SOA Forum in Paris Oct 6 2009
TIBCO Silver at the SOA Forum in Paris Oct 6 2009TIBCO Silver at the SOA Forum in Paris Oct 6 2009
TIBCO Silver at the SOA Forum in Paris Oct 6 2009
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
 
Sidecar patterns in modern infrastructure
Sidecar patterns in modern infrastructureSidecar patterns in modern infrastructure
Sidecar patterns in modern infrastructure
 

En vedette

Een Gezond Gebit2
Een Gezond Gebit2Een Gezond Gebit2
Een Gezond Gebit2
guest031320
 
Alan Johnson Resume
Alan Johnson ResumeAlan Johnson Resume
Alan Johnson Resume
alan Johnson
 

En vedette (20)

(SEC313) Security & Compliance at the Petabyte Scale
(SEC313) Security & Compliance at the Petabyte Scale(SEC313) Security & Compliance at the Petabyte Scale
(SEC313) Security & Compliance at the Petabyte Scale
 
Reactive Cloud Security | AWS Public Sector Summit 2016
Reactive Cloud Security | AWS Public Sector Summit 2016Reactive Cloud Security | AWS Public Sector Summit 2016
Reactive Cloud Security | AWS Public Sector Summit 2016
 
Automated Infrastructure Security: Monitoring using FOSS
Automated Infrastructure Security: Monitoring using FOSSAutomated Infrastructure Security: Monitoring using FOSS
Automated Infrastructure Security: Monitoring using FOSS
 
ITV& Bashton
ITV& Bashton ITV& Bashton
ITV& Bashton
 
Developing highly scalable applications with Symfony and RabbitMQ
Developing highly scalable applications with  Symfony and RabbitMQDeveloping highly scalable applications with  Symfony and RabbitMQ
Developing highly scalable applications with Symfony and RabbitMQ
 
Yirgacheffe Chelelelktu Washed Coffee 2015
Yirgacheffe Chelelelktu Washed Coffee 2015Yirgacheffe Chelelelktu Washed Coffee 2015
Yirgacheffe Chelelelktu Washed Coffee 2015
 
Chicago AWS user group meetup - May 2014 at Cohesive
Chicago AWS user group meetup - May 2014 at CohesiveChicago AWS user group meetup - May 2014 at Cohesive
Chicago AWS user group meetup - May 2014 at Cohesive
 
Jake Fox Pd. 5
Jake Fox Pd. 5Jake Fox Pd. 5
Jake Fox Pd. 5
 
Apache Ambari: Managing Hadoop and YARN
Apache Ambari: Managing Hadoop and YARNApache Ambari: Managing Hadoop and YARN
Apache Ambari: Managing Hadoop and YARN
 
Platform - Technical architecture
Platform - Technical architecturePlatform - Technical architecture
Platform - Technical architecture
 
Security For Humans
Security For HumansSecurity For Humans
Security For Humans
 
Risk management
Risk managementRisk management
Risk management
 
Een Gezond Gebit2
Een Gezond Gebit2Een Gezond Gebit2
Een Gezond Gebit2
 
Alan Johnson Resume
Alan Johnson ResumeAlan Johnson Resume
Alan Johnson Resume
 
Evolution of OPNFV CI System: What already exists and what can be introduced
Evolution of OPNFV CI System: What already exists and what can be introduced  Evolution of OPNFV CI System: What already exists and what can be introduced
Evolution of OPNFV CI System: What already exists and what can be introduced
 
Introduction to smpc
Introduction to smpc Introduction to smpc
Introduction to smpc
 
AWS + Puppet = Dynamic Scale
AWS + Puppet = Dynamic ScaleAWS + Puppet = Dynamic Scale
AWS + Puppet = Dynamic Scale
 
You know, for search
You know, for searchYou know, for search
You know, for search
 
Persistence in the cloud with bosh
Persistence in the cloud with boshPersistence in the cloud with bosh
Persistence in the cloud with bosh
 
Neuigkeiten von DEPAROM & Co
Neuigkeiten von DEPAROM & CoNeuigkeiten von DEPAROM & Co
Neuigkeiten von DEPAROM & Co
 

Similaire à IM World presentation from Chris Swan: Application centric – how the cloud has changed the way we deploy, secure and connect

2015 cloud trend and cloud DR
2015 cloud trend and cloud DR2015 cloud trend and cloud DR
2015 cloud trend and cloud DR
bizmerce
 
Cloud Computing - Everything you wanted to know!
Cloud Computing - Everything you wanted to know!Cloud Computing - Everything you wanted to know!
Cloud Computing - Everything you wanted to know!
Debasish Patra
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
TheInevitableCloud
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
shibamughal
 

Similaire à IM World presentation from Chris Swan: Application centric – how the cloud has changed the way we deploy, secure and connect (20)

Why 85% of workloads are not on public cloud, and why they will be
Why 85% of workloads are not on public cloud, and why they will beWhy 85% of workloads are not on public cloud, and why they will be
Why 85% of workloads are not on public cloud, and why they will be
 
2015 cloud trend and cloud DR
2015 cloud trend and cloud DR2015 cloud trend and cloud DR
2015 cloud trend and cloud DR
 
Wavefront by vmware june 2019 - legraswindow
Wavefront by vmware   june 2019 - legraswindowWavefront by vmware   june 2019 - legraswindow
Wavefront by vmware june 2019 - legraswindow
 
One And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptxOne And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptx
 
Automate the Provisioning of Secure Developer Environments on AWS PPT
 Automate the Provisioning of Secure Developer Environments on AWS PPT Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPT
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
 
Enabling Secure Use of Cloud Applications
Enabling Secure Use of Cloud ApplicationsEnabling Secure Use of Cloud Applications
Enabling Secure Use of Cloud Applications
 
Cloud Computing - Everything you wanted to know!
Cloud Computing - Everything you wanted to know!Cloud Computing - Everything you wanted to know!
Cloud Computing - Everything you wanted to know!
 
Cloud_computing Notes.docx
Cloud_computing Notes.docxCloud_computing Notes.docx
Cloud_computing Notes.docx
 
Hybrid- and Multi-Cloud by design - IBM Cloud and your journey to Cloud
Hybrid- and Multi-Cloud by design - IBM Cloud and your journey to CloudHybrid- and Multi-Cloud by design - IBM Cloud and your journey to Cloud
Hybrid- and Multi-Cloud by design - IBM Cloud and your journey to Cloud
 
Transformace IT s technologiemi VMware
Transformace IT s technologiemi VMwareTransformace IT s technologiemi VMware
Transformace IT s technologiemi VMware
 
Cloud Options for a Modern Architecture
Cloud Options for a Modern ArchitectureCloud Options for a Modern Architecture
Cloud Options for a Modern Architecture
 
IntoductionToCloudComputing.pptx
IntoductionToCloudComputing.pptxIntoductionToCloudComputing.pptx
IntoductionToCloudComputing.pptx
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
 
Delivering infrastructure, security, and operations as code - DEM06 - Santa C...
Delivering infrastructure, security, and operations as code - DEM06 - Santa C...Delivering infrastructure, security, and operations as code - DEM06 - Santa C...
Delivering infrastructure, security, and operations as code - DEM06 - Santa C...
 
Cloud for the Military - Projects, Promise
Cloud for the Military - Projects, PromiseCloud for the Military - Projects, Promise
Cloud for the Military - Projects, Promise
 
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern WorkforceThe Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Introduction to Cloud B2B Integration
Introduction to Cloud B2B IntegrationIntroduction to Cloud B2B Integration
Introduction to Cloud B2B Integration
 

Plus de Cohesive Networks

Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 ClassicCohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks
 

Plus de Cohesive Networks (20)

CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
 
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
 
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
 
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
 
Comparison: VNS3 vs Vyatta
Comparison: VNS3 vs VyattaComparison: VNS3 vs Vyatta
Comparison: VNS3 vs Vyatta
 
Comparison: VNS3 and Openswan
Comparison: VNS3 and OpenswanComparison: VNS3 and Openswan
Comparison: VNS3 and Openswan
 
Cohesive Networks Support Docs: VNS3 Administration
Cohesive Networks Support Docs: VNS3 AdministrationCohesive Networks Support Docs: VNS3 Administration
Cohesive Networks Support Docs: VNS3 Administration
 
Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide
 
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 ClassicCohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
 
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
 
Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks Support Docs: VNS3 Configuration in Azure Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks Support Docs: VNS3 Configuration in Azure
 
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
 
Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM SoftlayerCohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
 
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
 
Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks Support Docs: VNS3 Configuration for GCE Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks Support Docs: VNS3 Configuration for GCE
 
Cohesive Networks Support Docs: Welcome to VNS3 3.5
Cohesive Networks Support Docs: Welcome to VNS3 3.5 Cohesive Networks Support Docs: Welcome to VNS3 3.5
Cohesive Networks Support Docs: Welcome to VNS3 3.5
 
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
 
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade GuideCohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 

IM World presentation from Chris Swan: Application centric – how the cloud has changed the way we deploy, secure and connect

  • 1. Chris Swan, CTO, @cpswan Application centric: How the cloud has changed the way we deploy, secure and connect
  • 2. © 2015 Google moves its corporate apps to the Internet 2 Google Inc., taking a new approach to enterprise security, is moving its corporate applications to the Internet. In doing so, the Internet giant is flipping common corporate security practice on its head, shifting away from the idea of a trusted internal corporate network secured by perimeter devices such as firewalls, in favor of a model where corporate data can be accessed from anywhere with the right device and user credentials. The new model — called the BeyondCorp initiative — assumes that the internal network is as dangerous as the Internet. (Wall Street Journal | “Google Moves Its Corporate Applications to the Internet” | May 11, 2015 )
  • 4. © 2015 Traditional apps 4 Business applications are collections of (virtual) servers Is the “right” traffic going to/from our servers? Database Tier AppServer Tier Web Tier = type of server
  • 5. © 2015 Modern architectures don’t change things that much 5 Micro services based applications are collections of services Is the “right” traffic going to/from our services? Persistence services Business services Front end services = type of server
  • 6. © 2015 Enterprise data center 6 Perimeter Security Enterprise data centers are filled with these applications, often left insecure by lack of focus on interior network paths. 20% of Security Spend is on “interior”, yet 80% of the network traffic. 80% of Security Spend is on perimeter, 20% of traffic.
  • 7. © 2015 Hard on the outside, soft on the inside 7 Perimeter Security Hacker Penetration
  • 8. © 2015 One penetration creates major “East-West” exposure 8 Perimeter Security On average undetected for 234 days!
  • 9. © 2015 Cloud architectures have been different
  • 10. © 2015 2006 – The lonely (and exposed) VM VM
  • 11. © 2015 2008 - Overlays VMVM VM VM
  • 12. © 2015 2009 - VPCs VMVM VM VM
  • 13. © 2015 Containment often not enough – overlays stayed VM VMVM VM VM
  • 14. © 2015 Lots of people did something like this VM
  • 15. © 2015 Some even did something like this VM VM
  • 16. © 2015 And the really large (or paranoid) might do this VM VM
  • 17. © 2015 Or even this VM VM
  • 18. © 2015 Thankfully almost nobody tries to do this
  • 19. © 2015 What was that perimeter made of? A quick detour to the worlds of: Unified Threat Management (UTM) and Application Delivery Controllers (ADC)
  • 20. © 2015 Unified Threat Management Firewall NIDS/NIPS AV Anti Spam VPN DLP Load Balancer UTM
  • 21. © 2015 Application Delivery Controllers Cache TLS offload Compression WAF Multiplexing Load Balancer ADC Traffic Shaping
  • 22. © 2015 The UTM & ADC delivery model
  • 24. © 2015 Networks made from and configured by software
  • 25. © 2015 We can put a bunch of ‘network’ onto a VM Firewall VPN Switch Router
  • 26. © 2015 And add more functions into containers Firewall VPN Switch Router Cache TLS offload WAF Load Balancer NIDS/NIPS
  • 27. © 2015 This could be thought of as an app centric perimeter
  • 28. © 2015 But it refactors very readily into microservices
  • 29. © 2015 The audit paradox
  • 30. © 2015 Building in CC photo by WorldSkills
  • 31. © 2015 What building in looks like
  • 32. © 2015 Bolting on CC photo by arbyreed
  • 33. © 2015 What bolting on looks like
  • 34. © 2015 PaaS gives us the chance to ‘bolt in’
  • 35. © 2015 But Docker adoption shows a movement against opinionated platforms
  • 36. © 2015 If a security event happens and it isn’t monitored
  • 38. © 2015 ToDo: SecDevOps APIs are necessary but not sufficient: Need to have them integrated into the overall system Control metadata (and its mutability): Must be visible and understandable Security events need to be captured: Then turned into something humans can action