SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
white paper

Dimension Data Cloud
Security Overview
The Dimension Data Managed
Cloud Platform (MCP) provides a
secure and scalable cloud computing
platform with a network-centric
design with multiple layers of
security for delivery of Compute-asa-Service (CaaS).
Using our network-centric model
and a Defense-in-Depth security
architecture approach, the
Dimension Data MCP allows clients
to create dedicated layer-2 networks
and control communication into and
out of these networks. Virtual server
resources can be quickly brought
online and taken offline, allowing
for elasticity in resources consumed
and costs borne by clients.

This white paper is intended to
answer questions regarding how
security is maintained in our multitenanted and dynamic environment.
It includes direct statements on how
the MCP solution is secured, as well
as more direct questions likely to be
asked. Lastly, we provide guidance
on good security practices for clients
using the MCP solution.
white paper | Dimension Data Cloud Security Overview

Figure 1

Dimension Data
Managed Cloud Platform™
App

RAM

Firewall

O/S

RESTful API
Web console

Security layer

Service catalogue management

Network in data centre

Load balancing

Data Centre Network
Data centre switching fabric

Multicast

Storage

CPU

Server

Servers

O/S

Provision management

Operational Management

Dimension Data CloudControl™

O/S
Virtualisation layer

Resource management

Compute
O/S

Storage

Orchestration and Automation

NAT

App

VLAN

App

Metering and Billing

Dimension Data CloudControl™ – Cloud management system
Orchestration Administration Billing Provisioning Management Support Federation

Security overview

Multi-tenanting protection

The Dimension Data Managed Cloud
Platform™ (MCP) is our platform for the
delivery of public and private cloud services.
The MCP provides a secure environment for
clients to operate their information systems,
built from the network up using dedicated
physical networks and enterprise grade
security controls on best of breed hardware
and software, with full N+1 resiliency across
the entire stack.

Each MCP client is allocated its own
networks and virtual servers and clients
are segmented from other clients using
enterprise grade network segmentation. The
Dimension Data CloudControl management
systems ensure that clients cannot access
networks and systems owned by other
clients, and CloudControl presents no ability
to bypass the management interface.

At the core of the MCP is the Dimension
Data CloudControl™ orchestration and
management interface. Clients perform all
cloud management activities via the web
user interface or application programming
interface (API). The CloudControl
orchestration systems strictly control the
actions taken by clients, ensuring that
all management requests only affect the
systems managed by that client.

Permanent protection
Dimension Data performs 24x7 security
monitoring and management of all
CloudControl systems, ensuring security of
all clients is maintained. The CloudControl
systems are protected by multiple layers of
security including Intrusion prevention and
denial of service (DoS) protection. Regular
penetration tests are also performed against
the CloudControl systems by external
testing firms, to ensure that there are no
remotely exploitable vulnerabilities in the
management systems. Penetration tests
are performed regularly and every time
there is a major functionality change in the
CloudControl systems.

By enforcing multi-tenanting separation
in the orchestration layer, clients
are prevented from exploiting the
underlying control systems or making
any configuration changes which could
negatively affect other clients.

The CloudControl
systems are
protected by
multiple layers of
security including
Intrusion prevention
and denial of service
(DoS) protection.

Client security tools
Each client has the ability to fully manage
all access to their networks, restricting
or allowing all communication at the IP
and port level. Further, Dimension Data
CloudControl allows clients to create
multiple administrative user accounts, with
each account granted granular control over
cloud networks and virtual server systems.
Using this capability, clients can enact
common criteria role separation to ensure
that no single administrator can change
the configuration of virtual servers and
virtual networks.
In order to manage the operating systems
and applications of virtual servers, each
client is provided with a secure IPSec-based
VPN which allows them secure IP access to
their cloud networks so that they can access
their virtual servers without exposing them
to the Internet.

01
white paper | Dimension Data Cloud Security Overview

MCP product comparisons

MCP security architecture

Fire detection and suppression

The Dimension Data MCP allows clients to
select from any of the following options,
and also mix the options together for a
tailored solution.

Resiliency

All MCP data centres use multi-zoned,
dry pipe, water-based fire suppression
systems. The air is automatically sampled
for evidence of fire to provide time to
generate fire and safety alarms before
fire suppression pipes are pressurised
with water. If a fire occurs, water
discharge is restricted to the areas
within the datacentre where a fire alarm
location has been triggered.

•	 Public Cloud
•	 Hosted Private Cloud
•	 Private Cloud
All MCP offerings are built and operate
using the same architecture and are
managed using the same underlying
CloudControl management infrastructure.

Public and Hosted Private Cloud
Of these options, both Public Cloud and
Hosted Private Cloud use infrastructure
which is located within a Dimension Data
data centre. In a Public environment, cloud
networks and cloud servers are deployed
onto network, compute, and storage
infrastructure that is shared with other
clients. In a Hosted Private Cloud CaaS
environment, the compute and storage
infrastructure elements are dedicated
to the client’s cloud servers and cloud
networks. This provides additional security
risk management advantages and allows
clients to customise their overall CPU,
memory and storage performance.

Private Cloud
The private cloud MCP offering takes the
full complement of MCP infrastructure
and locates this within a client’s own data
centre (or data centre selected by the
client). The system behaves and is managed
identically to the Public and Hosted Private
MCP offerings, however all resources are
dedicated to the client and run within the
client’s own facility.
As the private cloud solution is located
on client premises, Dimension Data
cannot provide service level agreements
for physical security, reliability of Internet
services, power or cooling.

All systems within the Dimension
Data Managed Cloud Platform are full
resilient, using an N+1 resiliency model.
This resiliency is applied to the data
centre physical power and cooling, all
network equipment, all virtual server
hosting systems, all storage systems,
and all components of the CloudControl
management environment.

Compliance
The Dimension Data MCP solution meets
a number of compliance standards and is
regularly audited for its compliance with
SSAE-16, and European Safe Harbour
requirements. Within the North America
geographical region, Dimension Data also
maintains PCI DSS Level 1 service provider
compliance in its Managed Hosting
environment for clients processing or
handling payment card data.
Each Dimension Data data centre
which hosts MCP systems also meets
or exceeds the Uptime Institute’s Tier-3
data centre standards.

Secure facilities
Physical security
All Dimension Data facilities hosting
MCP equipment are secured locations
which are permanently manned by onsite guards with CCTV cameras covering
the entire centre. Multi-factor biometric
authentication is required for access
inside the datacentre, and the MCP
equipment is further segmented again
within a locked cage environment, also
monitored by CCTV cameras.

Power and environment
Each data centre is protected against
environmental failures through the use of
redundant UPS systems, backup power
generation and resilient cooling configured
in an N+1 redundancy configuration.

Flood control and earthquake
All MCP data centres are built above sea
level with no basement areas and there
are dedicated pump rooms for drainage
of any water ingress. Exterior walls
include moisture barriers, and moisture
detection systems are in place to detect
slow water ingress. All facilities meet
or exceed their local requirements for
seismic building codes.

Configuration management and
software lifecycle management
All changes to the Dimension Data
MCP environment are strictly controlled.
Changes cannot occur without them
passing through a workflow change
control process, which requires signoff by
multiple authorised personnel.
Updates to the MCP environment are
applied regularly, and must pass through
multiple testing phases. All changes to
the MCP CloudControl systems include
automatic deployment to dedicated
test MCP environments which complete
multiple passes of functionality and
performance testing before being
accepted and committed for deployment.
In addition to the above, changes are prescheduled and follow an implementation
and test plan that measures the success,
or failure, of a new code or infrastructure
deployment. Back-out procedures, in the
case of failure, are documented as part of
the change plan.

The Dimension Data MCP solution meets a
number of compliance standards and is regularly
audited for its compliance with SSAE-16, and
European Safe Harbour requirements.
02
white paper | Dimension Data Cloud Security Overview

CloudControl

CloudControl security

At its core, the Dimension Data MCP
solution is built around our CloudControl
management technology. The
CloudControl systems are the interface
point between clients and the MCP
network, server and storage control
systems, providing the assurance of secure
separation between clients hosted within
the MCP solution.

The Dimension Data MCP cloud
management systems reside on dedicated
network and server infrastructure,
separate to the infrastructure used to
host client networks and servers. All
CloudControl systems are penetrationtested by external security assessment
firms; testing occurs regularly and after
every major functionality change. The
CloudControl systems are also subject to
rigorous software patching cycles.

The full suite of CloudControl systems
performs the orchestration of server,
storage and network resources, controlling
the segmentation between servers and
networks on the infrastructure used to
create the multi-tenant environment. As
such, the security of this environment
is paramount to providing a secure
environment to all MCP clients.

Network traffic within the CloudControl
environment (Public and Hosted Private
CaaS only) is also monitored by both
network intrusion detection systems and
host-based intrusion detection systems,
providing round the clock monitoring
of each MCP. The Dimension Data
Security Operations Centre performs
24x7 management and monitoring of all
MCPs around the world, reacting to any
abnormal events in real time.

CloudControl resiliency

CloudControl management
interface
All client access to cloud management
settings is performed via CloudControl
using either the web management
interface or the CloudControl API. Both
methods use SSL encryption with 128-bit
keys for security, and all requests made to
the CloudControl interfaces are assessed
and enacted only if the requested changes
are for resources owned by the client.
The CloudControl interfaces also restrict
clients to actions which are necessary for
management of their cloud networks and
virtual servers. No direct access is provided
to the underlying systems, providing all MCP
clients with the assurance that their cloud
networks and systems are protected against
configuration settings which could affect
their performance, security and availability.
No other access method is provided to
clients, ensuring that it is not possible to
directly attack or affect the cloud network
and virtual server hosting technology.

All CloudControl management systems
are hosted on separate network and
server hardware to client systems. N+1
resiliency is applied to all CloudControl
devices, allowing for multiple device
failures with no impact to the accessibility
of CloudControl or the performance of the
management interfaces.

Figure 2

Dimension Data Managed
Cloud Platform™

Dimension Data
CloudControl™

Dimension Data
Managed Cloud Platform™

Service Delivery Layer
Web Console

•	 User Controls

RESTful API

•	 Provisioning
•	 Management

Service Administration

•	 Administration

Pricing

Metering

Accounting

Reporting

User Permissions

Billing

- Sign-up
- Billing and metering
- Permissions
- Reporting

Resource Management
Servers

CPU

Controls

VLAN

Load Balancing

RAM
Firewall
NAT

Dimension Data CloudControl™

Storage

•	 Resource management

VPN
Multicast

03
white paper | Dimension Data Cloud Security Overview

CloudControl network 	
traffic encryption
All CloudControl operations are
encrypted using HTTPS between clients
and the CloudControl web servers.
Transmission encryption is performed
using the RC4 encryption algorithm over
the TLS protocol, with 128-bit keys.
The CloudControl web infrastructure
uses a 2048-bit digital certificate for
authentication of the web server and
encryption of the RC4 initialisation
vector keys.

Remote access
Clients can also access their MCP cloud
networks using the CloudControl
remote access VPN. This service allows
administrators to authenticate using their
MCP account, and connect either using
a web-based SSL VPN portal or a locally
installed Cisco VPN client. Both clients use
RC4 128 bit encryption over HTTPS and
can be used to communicate with servers
inside the client’s cloud networks via the
IP protocol.
Each VPN client is allocated an IP address
which is granted explicit rights to
connect to its MCP cloud networks, and
logically appears to be one IP hop away
from their servers.

Client cloud networks
The first building block for MCP clients
is one or more cloud networks. Each
cloud network created by clients is
a dedicated physical layer-2 VLAN
created and controlled on enterprise
grade Cisco switch infrastructure with
a private IP network address allocated
to it. No software emulation of VLANs
is performed in the MCP environment;
all network controls are enacted by
dedicated network equipment.

Denial of service protection
Client Cloud networks in any Dimension
Data MCP environment (public or
Hosted Private cloud only) are protected
against performance implications
caused by network denial of service
attacks. Traffic entering and leaving
cloud networks destined for the Internet
are constantly monitored for DoS
behaviour and attacks are blocked when
detected. If another client’s network is
under DDoS attack, that client network
will be segmented to ensure that all
remaining clients are not affected.

Network access controls
Every cloud network is protected by ACLs
which define what IP traffic may enter
and leave the network. Inbound access
to cloud networks from the Internet is
disabled by default, ensuring a default
security posture. Outbound access from
cloud networks to the Internet is enabled
by default. All ACLs are fully stateful
and include deep packet inspection for
support of complex protocols.
The ACLs for each cloud network are fully
under the control of clients and can be
used to provide strict or open access to
and from each cloud network. ACLs can
be applied to allow/deny access on both
inbound as well as outbound traffic.

Cloud network IP addressing
Every cloud network created by clients
is allocated a /24 IP subnet within the
10.X.X.X IP address range, and a small
block of publicly reachable IP addresses.
Additional blocks of public IP addresses
can be added to each cloud network.

Network address translation
(NAT)
By default, the first public IP address is used
for outbound access using Source NAT.
Clients can then create static NAT rules to
perform a one-to-one mapping between a
public IP address and the private IP address
of a server located in the cloud network.
This static mapping will force all outbound
traffic from that server to use the selected
public IP address, and will redirect any
inbound connections to that public IP
address to the selected private IP address.
Clients also can create Virtual IP (VIP)
rules to allow more complex IP mapping
scenarios, including load balancing and
port translation.

Cloud network resiliency
The Dimension Data MCP uses N+1
resilient Cisco enterprise grade switching
and routing infrastructure with multiple
hardware modules in each switch for
resiliency of IP routing, access controls
and server load balancing. Failures of any
management, network or security modules
within a switch, or failure of an entire
switch, do not affect the accessibility or
performance of client cloud networks.
All network equipment is connected
together using multiple physical network
paths, with each path providing enough
bandwidth to service MCP operations in
the event of a failure. All physical server
hardware is connected to redundant
core switches with redundant security
blades providing Layer-2 isolation and
network functions.

Each cloud network created by clients
is a dedicated physical layer-2 VLAN
created and controlled on enterprise
grade Cisco switch infrastructure.

04
white paper | Dimension Data Cloud Security Overview

Client virtual servers
Virtual server hosts
The Dimension Data MCP virtual server
hosting solution uses VMware ESX hosts to
host client virtual servers. All management
of VMware ESX functionality is performed
by the CloudControl management systems
or Dimension Data personnel, with no
VMware management interfaces exposed.

Virtual server images
Virtual servers created by clients are based
on operating system (OS) virtual images
created by Dimension Data. These images
include the necessary tools to allow for prebuild configuration settings to be applied
to them as part of the initial server creation
process. Only the necessary software or OS
components are included in the OS images,
and clients are free to further remove any
components they deem not required for
each server once a VM has been built.

Virtual server (ESX) host
resiliency
All ESX servers use multiple physical
network cards, and connect to the
redundant core switches. Link bonding and
LACP is used to provide zero downtime in
the event of a network failure. All storage
used by the ESX hosts is provided by EMC
SAN storage systems, with multiple host
bus adapters installed in each ESX host,
with multiple connections to the SAN array.
All ESX hosts are clustered in an N+1
resiliency model, providing for protection
against hardware failure due to CPU,
memory or motherboard faults. Failover
to another ESX host for client virtual
servers is automatic, with the servers being
automatically re-started. Any affected
virtual servers are offline for the time it
takes for them to be restarted.

Virtual server resource dedication
Clients with either the Private or Hosted
Private MCP are provided dedicated
resilient ESX server clusters for their own
use. Public MCP clients share ESX server
resources with other clients within the
same MCP data centre.

Server administrator passwords
Clients are asked to provide a root/
administrator password for their servers
just before they are created. This password
is briefly stored on the virtual server
operating system disk for the purposes of
automated build and startup, after which
it is erased with no record of the password
kept by Dimension Data.

Console access
To maintain the security of the MCP multitenant environment, console access is
not currently possible. All communication
with virtual servers must be via an IP
connection (RDP for Windows, SSH for
Linux). For security reasons, Dimension
Data recommends clients only connect to
these protocols using the VPN and avoid
exposing these protocols to the Internet.

Virtual server network interfaces
All virtual servers are provisioned with
a single virtual network interface. This
interface is configured by the CloudControl
orchestration systems to interface directly
with the layer-2 VLAN which makes up the
cloud network where the server resides.

Operating system vulnerability
management
All operating system images created by
Dimension Data are periodically patched,
with the latest operating system security
patches installed. When clients bring up a
new server, that server will start operating
with those latest patches installed.
After this point it becomes the client’s
responsibility to maintain patching of the
operating systems and any applications
installed on their virtual servers.
For clients without the desire or skills to
manage their virtual server operating
systems, Dimension Data offers Tech Ops,
a suite of server management offerings
that fully manages the operating system
of cloud servers and includes security
patching.

Operating system security
settings
All operating system images created by
Dimension Data are configured with the
basic required components to perform
common Internet services roles (such as
web servers), and allow clients to add
their own desired functionality using the
relevant package management tools for
the operating system used.
Once an image is customised, clients can
copy this image and use it as their new
base operating system image for new
virtual machines. This allows clients to
create their own secure SOE within the
MCP environment.

All virtual servers are provisioned with a
single virtual network interface.

05
white paper | Dimension Data Cloud Security Overview

Local storage
All client virtual servers are provisioned
with an initial ‘operating system’ disk
which is a VMDK file hosted on the MCP
SAN storage systems. Clients can deploy
an additional 14 disks (maximum 250GB
per disk) to each virtual server, with a
maximum locally attached storage size of
2.5 Terabytes across all disks.

Storage resiliency
All locally attached disks for virtual
servers are located on highly resilient
EMC SAN storage using multiple physical
disks arranged in RAID arrays, which
are presented to virtual servers as locally
attached SCSI disks. Dimension Data
manages all physical disk maintenance
for clients, ensuring that any physical disk
failures are invisible to clients and do not
create service outages.

Storage encryption
Dimension Data does not encrypt client
storage; such an offering would mean that
Dimension Data would need knowledge of
the encryption keys for deployment of the
service on our storage infrastructure.
When encryption at rest is desired for
specific risk mitigation or compliance
circumstances, Dimension Data
recommends that clients enable encryption
of data using tools within their virtual
servers or within the applications
themselves (such as Microsoft SQL
database encryption).
For clients with a high level of concern,
systems with the most highly sensitive
information can be located outside of the
Dimension Data MCP environment and
linked via a secure tunnel. These systems
can be located within the client’s data
centre, or can use the Dimension Data
Managed Hosting offering which provides
secure connectivity between the MCP
environment and dedicated physical servers
located in the Dimension Data data centre.

Storage resource dedication
For clients with their own private (on
premises) MCP deployment, all storage
resources are fully dedicated to that client.
Clients using the Hosted Private MCP can
request dedicated storage resources as an
additional cost item.

Dimension Data does not monitor or log
activities performed by clients on their
network and server resources, ensuring
client privacy and security is maintained.
Hybrid NAS storage

Auditing and monitoring

MCP clients which require storage which
is shared across multiple virtual servers
can use the Dimension Data Hybrid NAS
solution. The Hybrid NAS solution is located
within the same data centre as the MCP
infrastructure but outside the control of the
CloudControl management systems and is
requested by directly contacting Dimension
Data to enable this functionality.

Dimension Data’s CloudControl software
audits all administrator activities
performed by clients and allows each
client to download copies of these logs in
CSV format. Any action taken by a client
through the CloudControl web interface
or API is fully monitored and the results of
those actions are also captured within the
audit trail. The audit trail captures the full
content of each command entered and
the details of any changes made as part of
the change.

Hybrid NAS resiliency
The Hybrid NAS solution is hosted on
N+1 resilient NetApp Filer appliances
with multiple controllers and disk trays
configured in resilient RAID arrays.
Failure of NAS controllers or disks is
invisible to clients with no downtime or
performance degradation.

Hybrid NAS security
Each NAS client is allocated their own
dedicated vFiler instance with access
restricted to their cloud networks. Access
to the NAS is restricted at deployment
time to the cloud networks the client
requests; this can be all, or some of the
clients cloud networks. Any client which
grants access to the NAS from all their
client networks can further restrict this
access using custom ACLs.
The Hybrid NAS deployment does not
implement user-based security and is
designed to serve as shared storage for
server workloads rather than user-based
file and print services.

The audit trail itself can be access via
the API, allowing clients to automatically
monitor all administrator activity on their
MCP accounts, and import these into
log management systems or incident
management systems.
Dimension Data does not monitor or log
activities performed by clients on their
network and server resources, ensuring
client privacy and security is maintained.

Activities logged
The MCP administrator logs include
details of any commands issued from
the CloudControl web interface or
the API. Most functions also log both
the command request and the actual
implementation of that request by the
CloudControl software.

Access to administrator logs
To maintain security against tampering
of the administrator logs, once a log
entry has been created, clients cannot
remove the log entries. Copies of the
administrator logs can be downloaded
by any sub-admin accounts which have
the ‘Report’ access role.

06
white paper | Dimension Data Cloud Security Overview

Access roles

User management
Primary administrator
All MCP clients start with a primary
administrator account. This account
maintains full access to all cloud networks
and servers for the client, and can
create sub-administrator roles with more
granular permissions to create and edit
network, server or storage resources.

Sub administrators
The primary administrator can create subadministrators and grant these specific
permissions only to create and edit
the cloud network, server and storage
resources. This reduces the likelihood
of accidental or malicious removal
of resources, and allows for accurate
auditing of administrator activities.

Sub administrator accounts can be
granted one or more security roles, those
being ‘network’, ‘server’, ‘create image’,
and ‘reports’. If no role is chosen, the
user will have only ‘read-only’ access.
They can view networks, servers, and
images, but cannot deploy, modify, or
delete them.
The network role allows the user to utilise
any of the network functions, allowing
them to create new networks, delete
networks, or modify existing ones (such
as adding/removing firewall rules).
The server role allows the user to deploy
servers, modify the characteristics of
servers, or delete servers. They can take
any action on the server function except
to create a customer image.
The create image role allows the user
to create customer images from any
deployed server.
The reports role allows the user to
view reports functions available on the
‘reports’ tab.

Data sovereignty
MCP clients have a choice of in which
‘hub’ region their accounts are created.
As such, all clients have full control over
the region where servers and storage
resides, and can explicitly choose to use
multiple regions or a single region.

Geographical failover
To enable clients to implement resiliency
against failure of access to an entire
Dimension Data MCP region, clients can
choose to have cloud networks and servers
located in multiple geographical locations,
and can create ACL rules to allow
direct IP communication between their
geographically separated cloud networks.
Clients are responsible for implementing
the failover solution; Dimension Data
recommends the use of global load
balancer technology to perform the
monitoring of their servers and enacting of
the failover event.

Figure 3

Dimension Data
Managed Cloud Platform™
Dimension Data
Managed Cloud Platform™

Dimension Data CloudControl™

Dimension Data
Managed Cloud Platform™

Dimension Data CloudControl™

Santa Clara,
USA

Amsterdam
Dimension Data
Managed Cloud Platform™
Dimension Data CloudControl™

Hong Kong

Dimension Data CloudControl™

Ashburn, USA
Johannesburg
Dimension Data
Managed Cloud Platform™

Dimension Data CloudControl™

Johannesburg

Dimension Data
Managed Cloud Platform™

Dimension Data CloudControl™

Sydney

07
white paper | Dimension Data Cloud Security Overview

Frequently asked questions
Can I install my own network
security device?
The Dimension Data MCP solution does not
support the installation of layer-2 ‘bump in
the wire’ devices. Clients cannot bring their
own hardware devices to either the Public
or Hosted Private cloud solutions; however
clients with their own private cloud
deployment can install network security
devices inside their data centre ‘upstream’
of the MCP equipment.
Virtual servers cannot be used as
network security devices which pass
traffic through them; servers cannot use
multiple network interface cards, and so
cannot act as a bridge or routing point
between MCP networks.
All clients are free to install any software
agent on their servers; therefore the
functionality offered by traditional
layer-2 ‘bump in the wire’ devices can be
performed using tools such as host-based
IPS protection.

Are virtual appliances supported?
Dimension Data MCP does not support the
importation of virtual network appliances.
Each virtual image requires some amount
of automated system preparation by the
CloudControl infrastructure, which may
not be possible on many appliance virtual
machines. In addition, many virtual machine
appliances require direct console access
(either during installation or permanently)
which is not currently supported by the
Dimension Data MCP solution.

Can I install my own hypervisor
security controls?
To ensure that no client can negatively
affect the performance or security of any
other client, there is no access to any
hypervisor functionality, and clients cannot
install or use hypervisor security controls
such as VMware vCloud Networking and
Security. Dimension Data maintains strict
control over the hypervisor to ensure the
highest security is provided to all clients.

Does Dimension Data utilise
any VMware hypervisor security
controls?
The Dimension Data MCP solution uses
dedicated network security devices from
Cisco systems for all network security. No
network security functions are performed
via software emulation which could affect
the performance of virtual server systems.

Does Dimension Data monitor my
audit logs for suspicious activity?

Can I monitor all VLAN traffic on
my networks?

No, due to the wide variety of client needs,
Dimension Data does not assume what
administrative tasks for each client are
normal or abnormal. However, Dimension
Data monitors the CloudControl portal to
detect attacks made against it, which may
result in clients being alerted that their
accounts are being targeted.

The Dimension Data MCP solution does
not allow for monitoring of traffic on
client networks using packet sniffers. All
servers located in client cloud networks can
only see IP traffic destined to them and IP
broadcast traffic for their VLAN. To ensure
that clients cannot attempt to ‘break out’
of the hypervisor and view traffic destined
for other client networks, promiscuous
mode has been disabled in the hypervisor
and cannot be used by any client.

Can Dimension Data monitor my
systems for accessibility?
Dimension Data does not monitor client
servers. However, server start and stop
events are include in administrator logs
and can be used to detect a manually
initiated server shutdown from with the
administrator user interface.
For clients without the desire or skills
to monitor their virtual server operating
systems, Dimension Data offers a suite of
server management offerings under the
‘TechOps’ service, which fully manages
the operating system of cloud servers and
includes uptime monitoring.

Can I increase the network
security between my cloud
networks?
Clients are able to fully control the ACLs
which define what IP traffic can enter and
exit each of their networks. Each client
cloud network is a dedicated VLAN which
reaches all other networks (including
the CloudControl remote access VPN) by
passing through a Cisco security module.
By default, all IP traffic is permitted
between a clients’ remote access VPN and
all their cloud networks. The inbound ACL
for each cloud network can be configured
to restrict this traffic.

Can I restrict communication
between my servers within a
network?
The Dimension Data MCP solution does
not provide the capability to perform
within-VLAN filtering. Clients can configure
and install any IP filtering solution on their
virtual servers, which provides the same
functionality. Any communication between
servers on other client cloud networks can
be controlled using ACLs.

Are my servers backed up?
All virtual server storage (including
operating system drives) are stored
on resilient EMC SAN storage arrays.
Backups of virtual machines are not made,
however clients are free to manually or
programmatically (via the API) clone their
virtual servers. These clones are labelled
as ‘client images’ and can be used to redeploy a server in the event of failure or
server corruption.
Note that clone images may be stored
on the same physical storage array as the
source virtual machine. For the greatest
resiliency, clone images should be exported
out of the MCP environment and/or copied
to a different MCP location if the client has
access to multiple regions.

What happens if an ESX 	
server fails?
The Dimension Data MCP has been built
for resiliency. VM hosting ESX servers are
configured in clusters with the cluster
consisting of actively used ESX hosts and
standby servers. Every ESX server uses a
combination of bonded NICs, resilient SAN
arrays, multiple paths to the SAN, and
redundant power supplies.
Client virtual machines are only active on
one ESX chassis at any given time. If an
ESX server fails, all virtual machines on that
chassis will fail. Each virtual machine will
then be automatically re-started on another
ESX server in the cluster, resulting in a few
minutes downtime while the virtual servers
are moved and restarted.

08
white paper | Dimension Data Cloud Security Overview

Can I customise my server
operating system settings before
creating new virtual servers?
Clients can create their own custom
operating system images of server
operating systems. To do so, the client
must start up a fresh virtual machine
from one of the supplied images from
Dimension Data. Custom settings can be
applied to this image, and it can then be
configured as a custom image to create
new virtual servers from.
Any custom images are not maintained
by Dimension Data; if a client does not
maintain patching of the operating system
for custom images, new virtual machines
based off the image may be insecure.

How can I defend against
downtime caused a virtual 	
server failure?
If an application hosted on a virtual server
fails due to software-based issues outside
of Dimension Data’s control, resiliency
can created by deploying multiple servers
with the same applications installed, and
using load balancing configured within the
client’s cloud network.

Are complex protocols such 		
as FTP supported, given that 		
NAT is a requirement for
external access?
All ACLs are fully stateful and include deep
packet inspection which supports the
following complex protocols:
•	 FTP
•	 DNS
•	 CMP
•	 SCCP
•	 RTSP
•	 ILS
•	 SIP

Can I get log entries for ACL 		
rule hits?
The Dimension Data MCP does not
currently allow for monitoring of ACL
rule hits. If connection logs to servers are
desired, this functionality can be deployed
by using software tools on a client’s virtual
server operating systems, such as hostbased firewalls and web server logs.

How do I create Tier-2/Tier-3/
Intranet networks?
By default, all MCP cloud networks are
configured the same. To make a network
unreachable from the Internet permanently
so that any accidental NAT changes do
not expose systems, clients can delete the
default Inbound allow ACLs and replace
these with new ACLs which are more
restrictive, allowing access only from their
other cloud networks.
Access from these networks to the Internet
can also be controlled by editing the
Outbound ACL, allowing clients to block or
restrict all outbound Internet connectivity
and connectivity to all other cloud networks.

Can I communicate with other
MCP clients from my cloud
networks?
If both parties involved in the connection
use ACL entries which permit the traffic
between the private IP addresses of their
own cloud networks, the communication
is permitted. This is possible between
any Public and Private Hosted MCP cloud
network regardless of the source and
destination MCP data centre, allowing true
private and secure global communication.
All communication between Dimension
Data MCP data centres is encrypted using
IPsec tunnels using Triple DES 168-bit
three-key encryption. Authentication
of the encrypted tunnels is made using
multiple site-specific pre-shared keys which
are managed out of band by Dimension
Data. PKI authentication is not used for
the encrypted tunnels to reduce the attack
surface of the authentication method.

Can I communicate with my 		
own data centre using a 		
site-to-site VPN?
Dimension Data does not currently offer
a managed site-to-site VPN service for
clients; however virtual servers within
cloud networks can be configured as VPN
gateways. Clients are able to add routes to
their virtual servers which direct all traffic to
their own data centre via such a gateway.
Clients can purchase a Managed Hosting
solution from Dimension Data, which
allows for hosting of dedicated physical
servers within Dimension Data data centres.
Servers hosted in such a manner are able
to reach client MCP cloud networks using
direct IP routing configured by Dimension
Data. In some circumstances, double NAT
may be required if there are IP address
conflicts between a client’s IP networks
and those used within their MCP cloud
networks as allocated by Dimension Data.

Can I change the IP addresses of
my virtual servers?
Virtual servers are deployed with private IP
address pre-assigned by the CloudControl
software. Clients can then control the
mapping of this private IP to public IP’s
on the cloud network via NAT or VIP.
Clients can also change the private IP
address of their servers but this is not
recommended as the CloudControl
software will be unaware of the change
and changes outside the private IP range
will stop the server from being able
to access other networks. Additional
secondary IP addresses can be added to
servers; however these cannot be used to
communicate outside of the cloud network
where the server resides unless clients
create a dedicated IPsec or L2TP tunnel to
other networks and servers. 

Is IPv6 supported?
Native IPv6 is not currently offered by
Dimension Data for cloud networks, but
clients are free to use any IPv6 tunnelling
technology on virtual servers to reach
external IPv6 networks. ACLs which grant
access to a client’s chosen IPv6 gateway
device on the Internet may be required if
they have blocked outbound access from
their cloud networks.

09
white paper | Dimension Data Cloud Security Overview

The most powerful
user account for
any MCP client
is the primary
administrator
account. Access to
this account should
be restricted and
it should not be
used for daily MCP
management
operations.

Security best practices

Network security controls

Administrator account
management

Default network security posture

The most powerful user account for any
MCP client is the primary administrator
account. Access to this account should
be restricted and it should not be used
for daily MCP management operations.
Dimension Data recommends the use of a
long passphrase and that the password used
for this account is not used for any other
system or service. The primary administrator
account should also not be used for any
routine MCP operations, as it cannot be
traced back to an individual administrator.

When a network is created, it is
automatically allocated a private IP address
range and a small block of public IP
addresses. Outbound access to the Internet
is immediately possible due to source NAT
being configured automatically. Inbound
ACL rules exist by default to allow access to
ports 80 and 443 on any IP address within
the cloud network. These do not take effect
from a public Internet standpoint until a
static NAT rule is created to map one of
the public IP addresses to the private IP
address of a server. However these ports are
available to other cloud networks, so clients
should modify their ACL rules accordingly if
web servers are deployed.

Allocate sub-administrator roles

ACLs

Can I remove the outbound
source NAT from my cloud
networks?

For all normal MCP CloudControl
operations, sub-administrator accounts
should be used, with their access rights
restricted to the specific networks and
servers to which access is justified. As
with the primary administrator, each subadministrator account should not use a
password which is used anywhere else.

All communication into and out of every
cloud network is governed by the ACLs
applied to that network. Each network
has an Inbound and outbound ACL which
controls the ability for other networks to
initiate connectivity to the network, or allow
hosts within the network to reach other
networks, or the Internet.

No, the outbound source NAT rules are
not alterable by clients. To block outbound
access, clients can edit the default
outbound ACL for their cloud networks to
stop connections to external networks.

For the greatest network security, subadministrators should not be granted the
‘Network’ Role unless they require the
ability to create and modify networks
(including ACL rules).

For each cloud network, there are invisible
ACLs in place which allow the client’s remote
access VPN to reach all cloud networks
created under the primary account.

Can I remove the public IP
addresses from my cloud
networks?

Audit log management

The first two public IP addresses allocated
to each cloud network cannot be removed.
Any additional public IP address blocks
requested by clients can be removed.

Restrict knowledge of the primary
administrator account

Dimension Data recommends that
administrator audit logs are reconciled
with expected activities on a regular basis.
The CloudControl API interface allows
for collection of administrator audit
logs, allowing logs to be automatically
downloaded and imported into a log
analysis tool. Dimension Data recommends
the use of Security Event and Incident
Management technology which has
behavioural learning capabilities for
intelligent log analysis and generation of
alerts when high risk or unexpected actions
are undertaken.
Virtual server security
Whilst Dimension Data provides server
images in a secure format, some settings
should be further hardened to match
client security requirements. For example,
direct root access is enabled (and required
during server builds) for SSH access on
Linux servers. Post deployment of servers,
clients should apply additional security
settings relevant to their information
security management framework and
related standards.

CS / DDMS-1220 / 02/13 © Copyright Dimension Data 2013

To learn more about our cloud services visit: www.dimensiondata.com/cloud
MIDDLE EAST & AFRICA
MIDDLE EAST & AFRICA
ALGERIA · ANGOLA

· ·
·
·
· ·
· ·
·
·
·
·
·

·
·
·
··
· ·
·

BOTSWANA CONGO BURUNDI
ALGERIA ANGOLA
DEMOCR
ATIC CONGO THE CONGO
BOTSWANAREPUBLIC OFBURUNDI
GABON REPUBLIC OFKENYA
DEMOCRATIC GHANA THE CONGO
MALAWI MAURITIUS KENYA
GABON GHANA MOROCCO
MOZAMBIQUE NAMIBIA NIGERIA
MALAWI MAURITIUS MOROCCO
RWANDA NAMIBIA NIGERIA
MOZAMBIQUE SAUDI ARABIA
SOUTH AFRICA
RWANDA SAUDI ARABIA
TANZANIA AFRICA
SOUTH UGANDA
UNITED ARAB EMIRATES ZAMBIA
TANZANIA UGANDA
UNITED ARAB EMIRATES

ASIA

AUSTRALIA

EUROPE

AMERICAS

·
· ·
·
· ·
·
· ·
·
·
··
THAILAND · VIETNAM

AUSTRALIA
AUSTRALIAN CAPITAL TERRITORY
NEW SOUTH WALES QUEENSLAND
AUSTRALIAN CAPITAL TERRITORY
SOUTH AUSTRALIA VICTORIA
NEW SOUTH WALES QUEENSLAND
WESTERN AUSTRALIA
SOUTH AUSTRALIA VICTORIA

·
· ·
· ·
·
·
·
·
SWITZERLAND · UNITED KINGDOM

AMERICAS
BRAZIL CANADA CHILE
MEXICO UNITED CHILE
BRAZIL CANADA STATES

CHINA ASIA KONG
HONG
INDIA INDONESIA JAPAN
CHINA HONG KONG
KOREA MALAYSIA
INDIA INDONESIA JAPAN
NEWKOREA MALAYSIA
ZEALAND PHILIPPINES
SINGAPORE TAIWAN
NEW ZEALAND PHILIPPINES
THAILAND
TAIWAN
SINGAPORE VIETNAM

·
··
·

WESTERN AUSTRALIA

BELGIUMEUROPE
CZECH REPUBLIC
FRANCE GERMANY
BELGIUM CZECH REPUBLIC
ITALY LUXEMBOURG
FRANCE GERMANY
NETHERLANDS SPAIN
ITALY LUXEMBOURG
SWITZERLAND UNITED KINGDOM
NETHERLANDS SPAIN

·
·
··
·
MEXICO · UNITED STATES

·
· ZAMBIA

To learn more about our cloud services visit www.dimensiondata.com/cloud
For contact details in your region please visit www.dimensiondata.com/globalpresence

www.dimensiondata.com

Contenu connexe

Tendances

Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 reportsuthi
 
Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9Ian Sommerville
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudGowthami Konakanchi
 
SungardASRaaS_WhitePaper_Final
SungardASRaaS_WhitePaper_FinalSungardASRaaS_WhitePaper_Final
SungardASRaaS_WhitePaper_FinalEric Brahney
 
Performance, fault tolerance and scalability analysis of virtual infrastructu...
Performance, fault tolerance and scalability analysis of virtual infrastructu...Performance, fault tolerance and scalability analysis of virtual infrastructu...
Performance, fault tolerance and scalability analysis of virtual infrastructu...www.pixelsolutionbd.com
 
Comparative Analysis of IT Monitoring Tools
Comparative Analysis of IT Monitoring ToolsComparative Analysis of IT Monitoring Tools
Comparative Analysis of IT Monitoring Toolsapprize360
 
Security Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing ServicesSecurity Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing ServicesMatteo Leonetti
 
Availability Considerations for SQL Server
Availability Considerations for SQL ServerAvailability Considerations for SQL Server
Availability Considerations for SQL ServerBob Roudebush
 
Sameer Mitter - Management Responsibilities by Cloud service model types
Sameer Mitter - Management Responsibilities by Cloud service model typesSameer Mitter - Management Responsibilities by Cloud service model types
Sameer Mitter - Management Responsibilities by Cloud service model typesSameer Mitter
 
SCCM on Microsoft Azure
SCCM on Microsoft AzureSCCM on Microsoft Azure
SCCM on Microsoft AzureMohamed Tawfik
 
Optimal software-defined network topology for distributed denial of service a...
Optimal software-defined network topology for distributed denial of service a...Optimal software-defined network topology for distributed denial of service a...
Optimal software-defined network topology for distributed denial of service a...journalBEEI
 
An Introduction to Designing Reliable Cloud Services January 2014
An Introduction to Designing Reliable Cloud Services January 2014An Introduction to Designing Reliable Cloud Services January 2014
An Introduction to Designing Reliable Cloud Services January 2014David J Rosenthal
 
System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementC/D/H Technology Consultants
 
DevOps_SelfHealing
DevOps_SelfHealingDevOps_SelfHealing
DevOps_SelfHealingAtul Dhingra
 
Classification of data center operations technology management tools
Classification of data center operations technology management toolsClassification of data center operations technology management tools
Classification of data center operations technology management toolsSchneider Electric India
 
Unix Hosting Service-Level Description
Unix Hosting Service-Level DescriptionUnix Hosting Service-Level Description
Unix Hosting Service-Level Descriptionwebhostingguy
 

Tendances (20)

Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 report
 
Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
SungardASRaaS_WhitePaper_Final
SungardASRaaS_WhitePaper_FinalSungardASRaaS_WhitePaper_Final
SungardASRaaS_WhitePaper_Final
 
Performance, fault tolerance and scalability analysis of virtual infrastructu...
Performance, fault tolerance and scalability analysis of virtual infrastructu...Performance, fault tolerance and scalability analysis of virtual infrastructu...
Performance, fault tolerance and scalability analysis of virtual infrastructu...
 
Comparative Analysis of IT Monitoring Tools
Comparative Analysis of IT Monitoring ToolsComparative Analysis of IT Monitoring Tools
Comparative Analysis of IT Monitoring Tools
 
Security Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing ServicesSecurity Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing Services
 
Availability Considerations for SQL Server
Availability Considerations for SQL ServerAvailability Considerations for SQL Server
Availability Considerations for SQL Server
 
Sameer Mitter - Management Responsibilities by Cloud service model types
Sameer Mitter - Management Responsibilities by Cloud service model typesSameer Mitter - Management Responsibilities by Cloud service model types
Sameer Mitter - Management Responsibilities by Cloud service model types
 
SCCM on Microsoft Azure
SCCM on Microsoft AzureSCCM on Microsoft Azure
SCCM on Microsoft Azure
 
Optimal software-defined network topology for distributed denial of service a...
Optimal software-defined network topology for distributed denial of service a...Optimal software-defined network topology for distributed denial of service a...
Optimal software-defined network topology for distributed denial of service a...
 
An Introduction to Designing Reliable Cloud Services January 2014
An Introduction to Designing Reliable Cloud Services January 2014An Introduction to Designing Reliable Cloud Services January 2014
An Introduction to Designing Reliable Cloud Services January 2014
 
System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device Management
 
DevOps_SelfHealing
DevOps_SelfHealingDevOps_SelfHealing
DevOps_SelfHealing
 
Darren Johnson CV
Darren Johnson CVDarren Johnson CV
Darren Johnson CV
 
System center seminar presentation
System center seminar presentationSystem center seminar presentation
System center seminar presentation
 
Classification of data center operations technology management tools
Classification of data center operations technology management toolsClassification of data center operations technology management tools
Classification of data center operations technology management tools
 
Unix Hosting Service-Level Description
Unix Hosting Service-Level DescriptionUnix Hosting Service-Level Description
Unix Hosting Service-Level Description
 
Embedded systems Implementation in Cloud Challenges
Embedded systems Implementation in Cloud ChallengesEmbedded systems Implementation in Cloud Challenges
Embedded systems Implementation in Cloud Challenges
 

En vedette

CSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud ThreatsCSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud ThreatsBitglass
 
How to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS EnvironmentsHow to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS EnvironmentsInfo-Tech Research Group
 
SAP Cloud security overview 2.0
SAP Cloud security overview 2.0SAP Cloud security overview 2.0
SAP Cloud security overview 2.0Rasmi Swain
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha TukeAnusha Chavan
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentationJamesDempsey1
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingAnkit Singh
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 

En vedette (15)

Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud Security Overview
Cloud Security OverviewCloud Security Overview
Cloud Security Overview
 
CSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud ThreatsCSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud Threats
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
 
How to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS EnvironmentsHow to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS Environments
 
SAP Cloud security overview 2.0
SAP Cloud security overview 2.0SAP Cloud security overview 2.0
SAP Cloud security overview 2.0
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha Tuke
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 

Similaire à Dimension data cloud_security_overview

Managed Cloud Platform
Managed Cloud PlatformManaged Cloud Platform
Managed Cloud PlatformDavid Martin
 
Presentation Wsta
Presentation WstaPresentation Wsta
Presentation Wstawill4468
 
Presentation wsta
Presentation wstaPresentation wsta
Presentation wstawill4468
 
WSTA PRESENTATION
WSTA PRESENTATIONWSTA PRESENTATION
WSTA PRESENTATIONwill4468
 
Windstream Hosted Solutions: Public Cloud Security
Windstream Hosted Solutions: Public Cloud SecurityWindstream Hosted Solutions: Public Cloud Security
Windstream Hosted Solutions: Public Cloud SecurityJason Proctor
 
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld
 
An Easy Way to Adopt Hybrid Cloud, Datacomm Solution
An Easy Way to Adopt Hybrid Cloud, Datacomm SolutionAn Easy Way to Adopt Hybrid Cloud, Datacomm Solution
An Easy Way to Adopt Hybrid Cloud, Datacomm SolutionPT Datacomm Diangraha
 
Cloud management
Cloud managementCloud management
Cloud managementsurbhi jha
 
Planning for MQ in the cloud MQTC 2017
Planning for MQ in the cloud MQTC 2017Planning for MQ in the cloud MQTC 2017
Planning for MQ in the cloud MQTC 2017Robert Parker
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud allan sam
 
Dimension Data Cloud Services, Offerings and MCP Locations
Dimension Data Cloud Services, Offerings and MCP LocationsDimension Data Cloud Services, Offerings and MCP Locations
Dimension Data Cloud Services, Offerings and MCP LocationsDavid Sawatzke
 
Mohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsMohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsnooralmousa
 
Running IBM MQ in the Cloud
Running IBM MQ in the CloudRunning IBM MQ in the Cloud
Running IBM MQ in the CloudRobert Parker
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...IEEEGLOBALSOFTTECHNOLOGIES
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Merlin Govender
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Emmerick Gortz
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Dr. Richard Otieno
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guaranteesKamal Spring
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guaranteesKamal Spring
 

Similaire à Dimension data cloud_security_overview (20)

Managed Cloud Platform
Managed Cloud PlatformManaged Cloud Platform
Managed Cloud Platform
 
Presentation Wsta
Presentation WstaPresentation Wsta
Presentation Wsta
 
Presentation wsta
Presentation wstaPresentation wsta
Presentation wsta
 
WSTA PRESENTATION
WSTA PRESENTATIONWSTA PRESENTATION
WSTA PRESENTATION
 
Windstream Hosted Solutions: Public Cloud Security
Windstream Hosted Solutions: Public Cloud SecurityWindstream Hosted Solutions: Public Cloud Security
Windstream Hosted Solutions: Public Cloud Security
 
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
 
An Easy Way to Adopt Hybrid Cloud, Datacomm Solution
An Easy Way to Adopt Hybrid Cloud, Datacomm SolutionAn Easy Way to Adopt Hybrid Cloud, Datacomm Solution
An Easy Way to Adopt Hybrid Cloud, Datacomm Solution
 
Cloud management
Cloud managementCloud management
Cloud management
 
Planning for MQ in the cloud MQTC 2017
Planning for MQ in the cloud MQTC 2017Planning for MQ in the cloud MQTC 2017
Planning for MQ in the cloud MQTC 2017
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud
 
Dimension Data Cloud Services, Offerings and MCP Locations
Dimension Data Cloud Services, Offerings and MCP LocationsDimension Data Cloud Services, Offerings and MCP Locations
Dimension Data Cloud Services, Offerings and MCP Locations
 
Mohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsMohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environments
 
Running IBM MQ in the Cloud
Running IBM MQ in the CloudRunning IBM MQ in the Cloud
Running IBM MQ in the Cloud
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215
 
Cloud Services Brochure
Cloud Services BrochureCloud Services Brochure
Cloud Services Brochure
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guarantees
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guarantees
 

Dernier

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Dernier (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Dimension data cloud_security_overview

  • 1. white paper Dimension Data Cloud Security Overview The Dimension Data Managed Cloud Platform (MCP) provides a secure and scalable cloud computing platform with a network-centric design with multiple layers of security for delivery of Compute-asa-Service (CaaS). Using our network-centric model and a Defense-in-Depth security architecture approach, the Dimension Data MCP allows clients to create dedicated layer-2 networks and control communication into and out of these networks. Virtual server resources can be quickly brought online and taken offline, allowing for elasticity in resources consumed and costs borne by clients. This white paper is intended to answer questions regarding how security is maintained in our multitenanted and dynamic environment. It includes direct statements on how the MCP solution is secured, as well as more direct questions likely to be asked. Lastly, we provide guidance on good security practices for clients using the MCP solution.
  • 2. white paper | Dimension Data Cloud Security Overview Figure 1 Dimension Data Managed Cloud Platform™ App RAM Firewall O/S RESTful API Web console Security layer Service catalogue management Network in data centre Load balancing Data Centre Network Data centre switching fabric Multicast Storage CPU Server Servers O/S Provision management Operational Management Dimension Data CloudControl™ O/S Virtualisation layer Resource management Compute O/S Storage Orchestration and Automation NAT App VLAN App Metering and Billing Dimension Data CloudControl™ – Cloud management system Orchestration Administration Billing Provisioning Management Support Federation Security overview Multi-tenanting protection The Dimension Data Managed Cloud Platform™ (MCP) is our platform for the delivery of public and private cloud services. The MCP provides a secure environment for clients to operate their information systems, built from the network up using dedicated physical networks and enterprise grade security controls on best of breed hardware and software, with full N+1 resiliency across the entire stack. Each MCP client is allocated its own networks and virtual servers and clients are segmented from other clients using enterprise grade network segmentation. The Dimension Data CloudControl management systems ensure that clients cannot access networks and systems owned by other clients, and CloudControl presents no ability to bypass the management interface. At the core of the MCP is the Dimension Data CloudControl™ orchestration and management interface. Clients perform all cloud management activities via the web user interface or application programming interface (API). The CloudControl orchestration systems strictly control the actions taken by clients, ensuring that all management requests only affect the systems managed by that client. Permanent protection Dimension Data performs 24x7 security monitoring and management of all CloudControl systems, ensuring security of all clients is maintained. The CloudControl systems are protected by multiple layers of security including Intrusion prevention and denial of service (DoS) protection. Regular penetration tests are also performed against the CloudControl systems by external testing firms, to ensure that there are no remotely exploitable vulnerabilities in the management systems. Penetration tests are performed regularly and every time there is a major functionality change in the CloudControl systems. By enforcing multi-tenanting separation in the orchestration layer, clients are prevented from exploiting the underlying control systems or making any configuration changes which could negatively affect other clients. The CloudControl systems are protected by multiple layers of security including Intrusion prevention and denial of service (DoS) protection. Client security tools Each client has the ability to fully manage all access to their networks, restricting or allowing all communication at the IP and port level. Further, Dimension Data CloudControl allows clients to create multiple administrative user accounts, with each account granted granular control over cloud networks and virtual server systems. Using this capability, clients can enact common criteria role separation to ensure that no single administrator can change the configuration of virtual servers and virtual networks. In order to manage the operating systems and applications of virtual servers, each client is provided with a secure IPSec-based VPN which allows them secure IP access to their cloud networks so that they can access their virtual servers without exposing them to the Internet. 01
  • 3. white paper | Dimension Data Cloud Security Overview MCP product comparisons MCP security architecture Fire detection and suppression The Dimension Data MCP allows clients to select from any of the following options, and also mix the options together for a tailored solution. Resiliency All MCP data centres use multi-zoned, dry pipe, water-based fire suppression systems. The air is automatically sampled for evidence of fire to provide time to generate fire and safety alarms before fire suppression pipes are pressurised with water. If a fire occurs, water discharge is restricted to the areas within the datacentre where a fire alarm location has been triggered. • Public Cloud • Hosted Private Cloud • Private Cloud All MCP offerings are built and operate using the same architecture and are managed using the same underlying CloudControl management infrastructure. Public and Hosted Private Cloud Of these options, both Public Cloud and Hosted Private Cloud use infrastructure which is located within a Dimension Data data centre. In a Public environment, cloud networks and cloud servers are deployed onto network, compute, and storage infrastructure that is shared with other clients. In a Hosted Private Cloud CaaS environment, the compute and storage infrastructure elements are dedicated to the client’s cloud servers and cloud networks. This provides additional security risk management advantages and allows clients to customise their overall CPU, memory and storage performance. Private Cloud The private cloud MCP offering takes the full complement of MCP infrastructure and locates this within a client’s own data centre (or data centre selected by the client). The system behaves and is managed identically to the Public and Hosted Private MCP offerings, however all resources are dedicated to the client and run within the client’s own facility. As the private cloud solution is located on client premises, Dimension Data cannot provide service level agreements for physical security, reliability of Internet services, power or cooling. All systems within the Dimension Data Managed Cloud Platform are full resilient, using an N+1 resiliency model. This resiliency is applied to the data centre physical power and cooling, all network equipment, all virtual server hosting systems, all storage systems, and all components of the CloudControl management environment. Compliance The Dimension Data MCP solution meets a number of compliance standards and is regularly audited for its compliance with SSAE-16, and European Safe Harbour requirements. Within the North America geographical region, Dimension Data also maintains PCI DSS Level 1 service provider compliance in its Managed Hosting environment for clients processing or handling payment card data. Each Dimension Data data centre which hosts MCP systems also meets or exceeds the Uptime Institute’s Tier-3 data centre standards. Secure facilities Physical security All Dimension Data facilities hosting MCP equipment are secured locations which are permanently manned by onsite guards with CCTV cameras covering the entire centre. Multi-factor biometric authentication is required for access inside the datacentre, and the MCP equipment is further segmented again within a locked cage environment, also monitored by CCTV cameras. Power and environment Each data centre is protected against environmental failures through the use of redundant UPS systems, backup power generation and resilient cooling configured in an N+1 redundancy configuration. Flood control and earthquake All MCP data centres are built above sea level with no basement areas and there are dedicated pump rooms for drainage of any water ingress. Exterior walls include moisture barriers, and moisture detection systems are in place to detect slow water ingress. All facilities meet or exceed their local requirements for seismic building codes. Configuration management and software lifecycle management All changes to the Dimension Data MCP environment are strictly controlled. Changes cannot occur without them passing through a workflow change control process, which requires signoff by multiple authorised personnel. Updates to the MCP environment are applied regularly, and must pass through multiple testing phases. All changes to the MCP CloudControl systems include automatic deployment to dedicated test MCP environments which complete multiple passes of functionality and performance testing before being accepted and committed for deployment. In addition to the above, changes are prescheduled and follow an implementation and test plan that measures the success, or failure, of a new code or infrastructure deployment. Back-out procedures, in the case of failure, are documented as part of the change plan. The Dimension Data MCP solution meets a number of compliance standards and is regularly audited for its compliance with SSAE-16, and European Safe Harbour requirements. 02
  • 4. white paper | Dimension Data Cloud Security Overview CloudControl CloudControl security At its core, the Dimension Data MCP solution is built around our CloudControl management technology. The CloudControl systems are the interface point between clients and the MCP network, server and storage control systems, providing the assurance of secure separation between clients hosted within the MCP solution. The Dimension Data MCP cloud management systems reside on dedicated network and server infrastructure, separate to the infrastructure used to host client networks and servers. All CloudControl systems are penetrationtested by external security assessment firms; testing occurs regularly and after every major functionality change. The CloudControl systems are also subject to rigorous software patching cycles. The full suite of CloudControl systems performs the orchestration of server, storage and network resources, controlling the segmentation between servers and networks on the infrastructure used to create the multi-tenant environment. As such, the security of this environment is paramount to providing a secure environment to all MCP clients. Network traffic within the CloudControl environment (Public and Hosted Private CaaS only) is also monitored by both network intrusion detection systems and host-based intrusion detection systems, providing round the clock monitoring of each MCP. The Dimension Data Security Operations Centre performs 24x7 management and monitoring of all MCPs around the world, reacting to any abnormal events in real time. CloudControl resiliency CloudControl management interface All client access to cloud management settings is performed via CloudControl using either the web management interface or the CloudControl API. Both methods use SSL encryption with 128-bit keys for security, and all requests made to the CloudControl interfaces are assessed and enacted only if the requested changes are for resources owned by the client. The CloudControl interfaces also restrict clients to actions which are necessary for management of their cloud networks and virtual servers. No direct access is provided to the underlying systems, providing all MCP clients with the assurance that their cloud networks and systems are protected against configuration settings which could affect their performance, security and availability. No other access method is provided to clients, ensuring that it is not possible to directly attack or affect the cloud network and virtual server hosting technology. All CloudControl management systems are hosted on separate network and server hardware to client systems. N+1 resiliency is applied to all CloudControl devices, allowing for multiple device failures with no impact to the accessibility of CloudControl or the performance of the management interfaces. Figure 2 Dimension Data Managed Cloud Platform™ Dimension Data CloudControl™ Dimension Data Managed Cloud Platform™ Service Delivery Layer Web Console • User Controls RESTful API • Provisioning • Management Service Administration • Administration Pricing Metering Accounting Reporting User Permissions Billing - Sign-up - Billing and metering - Permissions - Reporting Resource Management Servers CPU Controls VLAN Load Balancing RAM Firewall NAT Dimension Data CloudControl™ Storage • Resource management VPN Multicast 03
  • 5. white paper | Dimension Data Cloud Security Overview CloudControl network traffic encryption All CloudControl operations are encrypted using HTTPS between clients and the CloudControl web servers. Transmission encryption is performed using the RC4 encryption algorithm over the TLS protocol, with 128-bit keys. The CloudControl web infrastructure uses a 2048-bit digital certificate for authentication of the web server and encryption of the RC4 initialisation vector keys. Remote access Clients can also access their MCP cloud networks using the CloudControl remote access VPN. This service allows administrators to authenticate using their MCP account, and connect either using a web-based SSL VPN portal or a locally installed Cisco VPN client. Both clients use RC4 128 bit encryption over HTTPS and can be used to communicate with servers inside the client’s cloud networks via the IP protocol. Each VPN client is allocated an IP address which is granted explicit rights to connect to its MCP cloud networks, and logically appears to be one IP hop away from their servers. Client cloud networks The first building block for MCP clients is one or more cloud networks. Each cloud network created by clients is a dedicated physical layer-2 VLAN created and controlled on enterprise grade Cisco switch infrastructure with a private IP network address allocated to it. No software emulation of VLANs is performed in the MCP environment; all network controls are enacted by dedicated network equipment. Denial of service protection Client Cloud networks in any Dimension Data MCP environment (public or Hosted Private cloud only) are protected against performance implications caused by network denial of service attacks. Traffic entering and leaving cloud networks destined for the Internet are constantly monitored for DoS behaviour and attacks are blocked when detected. If another client’s network is under DDoS attack, that client network will be segmented to ensure that all remaining clients are not affected. Network access controls Every cloud network is protected by ACLs which define what IP traffic may enter and leave the network. Inbound access to cloud networks from the Internet is disabled by default, ensuring a default security posture. Outbound access from cloud networks to the Internet is enabled by default. All ACLs are fully stateful and include deep packet inspection for support of complex protocols. The ACLs for each cloud network are fully under the control of clients and can be used to provide strict or open access to and from each cloud network. ACLs can be applied to allow/deny access on both inbound as well as outbound traffic. Cloud network IP addressing Every cloud network created by clients is allocated a /24 IP subnet within the 10.X.X.X IP address range, and a small block of publicly reachable IP addresses. Additional blocks of public IP addresses can be added to each cloud network. Network address translation (NAT) By default, the first public IP address is used for outbound access using Source NAT. Clients can then create static NAT rules to perform a one-to-one mapping between a public IP address and the private IP address of a server located in the cloud network. This static mapping will force all outbound traffic from that server to use the selected public IP address, and will redirect any inbound connections to that public IP address to the selected private IP address. Clients also can create Virtual IP (VIP) rules to allow more complex IP mapping scenarios, including load balancing and port translation. Cloud network resiliency The Dimension Data MCP uses N+1 resilient Cisco enterprise grade switching and routing infrastructure with multiple hardware modules in each switch for resiliency of IP routing, access controls and server load balancing. Failures of any management, network or security modules within a switch, or failure of an entire switch, do not affect the accessibility or performance of client cloud networks. All network equipment is connected together using multiple physical network paths, with each path providing enough bandwidth to service MCP operations in the event of a failure. All physical server hardware is connected to redundant core switches with redundant security blades providing Layer-2 isolation and network functions. Each cloud network created by clients is a dedicated physical layer-2 VLAN created and controlled on enterprise grade Cisco switch infrastructure. 04
  • 6. white paper | Dimension Data Cloud Security Overview Client virtual servers Virtual server hosts The Dimension Data MCP virtual server hosting solution uses VMware ESX hosts to host client virtual servers. All management of VMware ESX functionality is performed by the CloudControl management systems or Dimension Data personnel, with no VMware management interfaces exposed. Virtual server images Virtual servers created by clients are based on operating system (OS) virtual images created by Dimension Data. These images include the necessary tools to allow for prebuild configuration settings to be applied to them as part of the initial server creation process. Only the necessary software or OS components are included in the OS images, and clients are free to further remove any components they deem not required for each server once a VM has been built. Virtual server (ESX) host resiliency All ESX servers use multiple physical network cards, and connect to the redundant core switches. Link bonding and LACP is used to provide zero downtime in the event of a network failure. All storage used by the ESX hosts is provided by EMC SAN storage systems, with multiple host bus adapters installed in each ESX host, with multiple connections to the SAN array. All ESX hosts are clustered in an N+1 resiliency model, providing for protection against hardware failure due to CPU, memory or motherboard faults. Failover to another ESX host for client virtual servers is automatic, with the servers being automatically re-started. Any affected virtual servers are offline for the time it takes for them to be restarted. Virtual server resource dedication Clients with either the Private or Hosted Private MCP are provided dedicated resilient ESX server clusters for their own use. Public MCP clients share ESX server resources with other clients within the same MCP data centre. Server administrator passwords Clients are asked to provide a root/ administrator password for their servers just before they are created. This password is briefly stored on the virtual server operating system disk for the purposes of automated build and startup, after which it is erased with no record of the password kept by Dimension Data. Console access To maintain the security of the MCP multitenant environment, console access is not currently possible. All communication with virtual servers must be via an IP connection (RDP for Windows, SSH for Linux). For security reasons, Dimension Data recommends clients only connect to these protocols using the VPN and avoid exposing these protocols to the Internet. Virtual server network interfaces All virtual servers are provisioned with a single virtual network interface. This interface is configured by the CloudControl orchestration systems to interface directly with the layer-2 VLAN which makes up the cloud network where the server resides. Operating system vulnerability management All operating system images created by Dimension Data are periodically patched, with the latest operating system security patches installed. When clients bring up a new server, that server will start operating with those latest patches installed. After this point it becomes the client’s responsibility to maintain patching of the operating systems and any applications installed on their virtual servers. For clients without the desire or skills to manage their virtual server operating systems, Dimension Data offers Tech Ops, a suite of server management offerings that fully manages the operating system of cloud servers and includes security patching. Operating system security settings All operating system images created by Dimension Data are configured with the basic required components to perform common Internet services roles (such as web servers), and allow clients to add their own desired functionality using the relevant package management tools for the operating system used. Once an image is customised, clients can copy this image and use it as their new base operating system image for new virtual machines. This allows clients to create their own secure SOE within the MCP environment. All virtual servers are provisioned with a single virtual network interface. 05
  • 7. white paper | Dimension Data Cloud Security Overview Local storage All client virtual servers are provisioned with an initial ‘operating system’ disk which is a VMDK file hosted on the MCP SAN storage systems. Clients can deploy an additional 14 disks (maximum 250GB per disk) to each virtual server, with a maximum locally attached storage size of 2.5 Terabytes across all disks. Storage resiliency All locally attached disks for virtual servers are located on highly resilient EMC SAN storage using multiple physical disks arranged in RAID arrays, which are presented to virtual servers as locally attached SCSI disks. Dimension Data manages all physical disk maintenance for clients, ensuring that any physical disk failures are invisible to clients and do not create service outages. Storage encryption Dimension Data does not encrypt client storage; such an offering would mean that Dimension Data would need knowledge of the encryption keys for deployment of the service on our storage infrastructure. When encryption at rest is desired for specific risk mitigation or compliance circumstances, Dimension Data recommends that clients enable encryption of data using tools within their virtual servers or within the applications themselves (such as Microsoft SQL database encryption). For clients with a high level of concern, systems with the most highly sensitive information can be located outside of the Dimension Data MCP environment and linked via a secure tunnel. These systems can be located within the client’s data centre, or can use the Dimension Data Managed Hosting offering which provides secure connectivity between the MCP environment and dedicated physical servers located in the Dimension Data data centre. Storage resource dedication For clients with their own private (on premises) MCP deployment, all storage resources are fully dedicated to that client. Clients using the Hosted Private MCP can request dedicated storage resources as an additional cost item. Dimension Data does not monitor or log activities performed by clients on their network and server resources, ensuring client privacy and security is maintained. Hybrid NAS storage Auditing and monitoring MCP clients which require storage which is shared across multiple virtual servers can use the Dimension Data Hybrid NAS solution. The Hybrid NAS solution is located within the same data centre as the MCP infrastructure but outside the control of the CloudControl management systems and is requested by directly contacting Dimension Data to enable this functionality. Dimension Data’s CloudControl software audits all administrator activities performed by clients and allows each client to download copies of these logs in CSV format. Any action taken by a client through the CloudControl web interface or API is fully monitored and the results of those actions are also captured within the audit trail. The audit trail captures the full content of each command entered and the details of any changes made as part of the change. Hybrid NAS resiliency The Hybrid NAS solution is hosted on N+1 resilient NetApp Filer appliances with multiple controllers and disk trays configured in resilient RAID arrays. Failure of NAS controllers or disks is invisible to clients with no downtime or performance degradation. Hybrid NAS security Each NAS client is allocated their own dedicated vFiler instance with access restricted to their cloud networks. Access to the NAS is restricted at deployment time to the cloud networks the client requests; this can be all, or some of the clients cloud networks. Any client which grants access to the NAS from all their client networks can further restrict this access using custom ACLs. The Hybrid NAS deployment does not implement user-based security and is designed to serve as shared storage for server workloads rather than user-based file and print services. The audit trail itself can be access via the API, allowing clients to automatically monitor all administrator activity on their MCP accounts, and import these into log management systems or incident management systems. Dimension Data does not monitor or log activities performed by clients on their network and server resources, ensuring client privacy and security is maintained. Activities logged The MCP administrator logs include details of any commands issued from the CloudControl web interface or the API. Most functions also log both the command request and the actual implementation of that request by the CloudControl software. Access to administrator logs To maintain security against tampering of the administrator logs, once a log entry has been created, clients cannot remove the log entries. Copies of the administrator logs can be downloaded by any sub-admin accounts which have the ‘Report’ access role. 06
  • 8. white paper | Dimension Data Cloud Security Overview Access roles User management Primary administrator All MCP clients start with a primary administrator account. This account maintains full access to all cloud networks and servers for the client, and can create sub-administrator roles with more granular permissions to create and edit network, server or storage resources. Sub administrators The primary administrator can create subadministrators and grant these specific permissions only to create and edit the cloud network, server and storage resources. This reduces the likelihood of accidental or malicious removal of resources, and allows for accurate auditing of administrator activities. Sub administrator accounts can be granted one or more security roles, those being ‘network’, ‘server’, ‘create image’, and ‘reports’. If no role is chosen, the user will have only ‘read-only’ access. They can view networks, servers, and images, but cannot deploy, modify, or delete them. The network role allows the user to utilise any of the network functions, allowing them to create new networks, delete networks, or modify existing ones (such as adding/removing firewall rules). The server role allows the user to deploy servers, modify the characteristics of servers, or delete servers. They can take any action on the server function except to create a customer image. The create image role allows the user to create customer images from any deployed server. The reports role allows the user to view reports functions available on the ‘reports’ tab. Data sovereignty MCP clients have a choice of in which ‘hub’ region their accounts are created. As such, all clients have full control over the region where servers and storage resides, and can explicitly choose to use multiple regions or a single region. Geographical failover To enable clients to implement resiliency against failure of access to an entire Dimension Data MCP region, clients can choose to have cloud networks and servers located in multiple geographical locations, and can create ACL rules to allow direct IP communication between their geographically separated cloud networks. Clients are responsible for implementing the failover solution; Dimension Data recommends the use of global load balancer technology to perform the monitoring of their servers and enacting of the failover event. Figure 3 Dimension Data Managed Cloud Platform™ Dimension Data Managed Cloud Platform™ Dimension Data CloudControl™ Dimension Data Managed Cloud Platform™ Dimension Data CloudControl™ Santa Clara, USA Amsterdam Dimension Data Managed Cloud Platform™ Dimension Data CloudControl™ Hong Kong Dimension Data CloudControl™ Ashburn, USA Johannesburg Dimension Data Managed Cloud Platform™ Dimension Data CloudControl™ Johannesburg Dimension Data Managed Cloud Platform™ Dimension Data CloudControl™ Sydney 07
  • 9. white paper | Dimension Data Cloud Security Overview Frequently asked questions Can I install my own network security device? The Dimension Data MCP solution does not support the installation of layer-2 ‘bump in the wire’ devices. Clients cannot bring their own hardware devices to either the Public or Hosted Private cloud solutions; however clients with their own private cloud deployment can install network security devices inside their data centre ‘upstream’ of the MCP equipment. Virtual servers cannot be used as network security devices which pass traffic through them; servers cannot use multiple network interface cards, and so cannot act as a bridge or routing point between MCP networks. All clients are free to install any software agent on their servers; therefore the functionality offered by traditional layer-2 ‘bump in the wire’ devices can be performed using tools such as host-based IPS protection. Are virtual appliances supported? Dimension Data MCP does not support the importation of virtual network appliances. Each virtual image requires some amount of automated system preparation by the CloudControl infrastructure, which may not be possible on many appliance virtual machines. In addition, many virtual machine appliances require direct console access (either during installation or permanently) which is not currently supported by the Dimension Data MCP solution. Can I install my own hypervisor security controls? To ensure that no client can negatively affect the performance or security of any other client, there is no access to any hypervisor functionality, and clients cannot install or use hypervisor security controls such as VMware vCloud Networking and Security. Dimension Data maintains strict control over the hypervisor to ensure the highest security is provided to all clients. Does Dimension Data utilise any VMware hypervisor security controls? The Dimension Data MCP solution uses dedicated network security devices from Cisco systems for all network security. No network security functions are performed via software emulation which could affect the performance of virtual server systems. Does Dimension Data monitor my audit logs for suspicious activity? Can I monitor all VLAN traffic on my networks? No, due to the wide variety of client needs, Dimension Data does not assume what administrative tasks for each client are normal or abnormal. However, Dimension Data monitors the CloudControl portal to detect attacks made against it, which may result in clients being alerted that their accounts are being targeted. The Dimension Data MCP solution does not allow for monitoring of traffic on client networks using packet sniffers. All servers located in client cloud networks can only see IP traffic destined to them and IP broadcast traffic for their VLAN. To ensure that clients cannot attempt to ‘break out’ of the hypervisor and view traffic destined for other client networks, promiscuous mode has been disabled in the hypervisor and cannot be used by any client. Can Dimension Data monitor my systems for accessibility? Dimension Data does not monitor client servers. However, server start and stop events are include in administrator logs and can be used to detect a manually initiated server shutdown from with the administrator user interface. For clients without the desire or skills to monitor their virtual server operating systems, Dimension Data offers a suite of server management offerings under the ‘TechOps’ service, which fully manages the operating system of cloud servers and includes uptime monitoring. Can I increase the network security between my cloud networks? Clients are able to fully control the ACLs which define what IP traffic can enter and exit each of their networks. Each client cloud network is a dedicated VLAN which reaches all other networks (including the CloudControl remote access VPN) by passing through a Cisco security module. By default, all IP traffic is permitted between a clients’ remote access VPN and all their cloud networks. The inbound ACL for each cloud network can be configured to restrict this traffic. Can I restrict communication between my servers within a network? The Dimension Data MCP solution does not provide the capability to perform within-VLAN filtering. Clients can configure and install any IP filtering solution on their virtual servers, which provides the same functionality. Any communication between servers on other client cloud networks can be controlled using ACLs. Are my servers backed up? All virtual server storage (including operating system drives) are stored on resilient EMC SAN storage arrays. Backups of virtual machines are not made, however clients are free to manually or programmatically (via the API) clone their virtual servers. These clones are labelled as ‘client images’ and can be used to redeploy a server in the event of failure or server corruption. Note that clone images may be stored on the same physical storage array as the source virtual machine. For the greatest resiliency, clone images should be exported out of the MCP environment and/or copied to a different MCP location if the client has access to multiple regions. What happens if an ESX server fails? The Dimension Data MCP has been built for resiliency. VM hosting ESX servers are configured in clusters with the cluster consisting of actively used ESX hosts and standby servers. Every ESX server uses a combination of bonded NICs, resilient SAN arrays, multiple paths to the SAN, and redundant power supplies. Client virtual machines are only active on one ESX chassis at any given time. If an ESX server fails, all virtual machines on that chassis will fail. Each virtual machine will then be automatically re-started on another ESX server in the cluster, resulting in a few minutes downtime while the virtual servers are moved and restarted. 08
  • 10. white paper | Dimension Data Cloud Security Overview Can I customise my server operating system settings before creating new virtual servers? Clients can create their own custom operating system images of server operating systems. To do so, the client must start up a fresh virtual machine from one of the supplied images from Dimension Data. Custom settings can be applied to this image, and it can then be configured as a custom image to create new virtual servers from. Any custom images are not maintained by Dimension Data; if a client does not maintain patching of the operating system for custom images, new virtual machines based off the image may be insecure. How can I defend against downtime caused a virtual server failure? If an application hosted on a virtual server fails due to software-based issues outside of Dimension Data’s control, resiliency can created by deploying multiple servers with the same applications installed, and using load balancing configured within the client’s cloud network. Are complex protocols such as FTP supported, given that NAT is a requirement for external access? All ACLs are fully stateful and include deep packet inspection which supports the following complex protocols: • FTP • DNS • CMP • SCCP • RTSP • ILS • SIP Can I get log entries for ACL rule hits? The Dimension Data MCP does not currently allow for monitoring of ACL rule hits. If connection logs to servers are desired, this functionality can be deployed by using software tools on a client’s virtual server operating systems, such as hostbased firewalls and web server logs. How do I create Tier-2/Tier-3/ Intranet networks? By default, all MCP cloud networks are configured the same. To make a network unreachable from the Internet permanently so that any accidental NAT changes do not expose systems, clients can delete the default Inbound allow ACLs and replace these with new ACLs which are more restrictive, allowing access only from their other cloud networks. Access from these networks to the Internet can also be controlled by editing the Outbound ACL, allowing clients to block or restrict all outbound Internet connectivity and connectivity to all other cloud networks. Can I communicate with other MCP clients from my cloud networks? If both parties involved in the connection use ACL entries which permit the traffic between the private IP addresses of their own cloud networks, the communication is permitted. This is possible between any Public and Private Hosted MCP cloud network regardless of the source and destination MCP data centre, allowing true private and secure global communication. All communication between Dimension Data MCP data centres is encrypted using IPsec tunnels using Triple DES 168-bit three-key encryption. Authentication of the encrypted tunnels is made using multiple site-specific pre-shared keys which are managed out of band by Dimension Data. PKI authentication is not used for the encrypted tunnels to reduce the attack surface of the authentication method. Can I communicate with my own data centre using a site-to-site VPN? Dimension Data does not currently offer a managed site-to-site VPN service for clients; however virtual servers within cloud networks can be configured as VPN gateways. Clients are able to add routes to their virtual servers which direct all traffic to their own data centre via such a gateway. Clients can purchase a Managed Hosting solution from Dimension Data, which allows for hosting of dedicated physical servers within Dimension Data data centres. Servers hosted in such a manner are able to reach client MCP cloud networks using direct IP routing configured by Dimension Data. In some circumstances, double NAT may be required if there are IP address conflicts between a client’s IP networks and those used within their MCP cloud networks as allocated by Dimension Data. Can I change the IP addresses of my virtual servers? Virtual servers are deployed with private IP address pre-assigned by the CloudControl software. Clients can then control the mapping of this private IP to public IP’s on the cloud network via NAT or VIP. Clients can also change the private IP address of their servers but this is not recommended as the CloudControl software will be unaware of the change and changes outside the private IP range will stop the server from being able to access other networks. Additional secondary IP addresses can be added to servers; however these cannot be used to communicate outside of the cloud network where the server resides unless clients create a dedicated IPsec or L2TP tunnel to other networks and servers.  Is IPv6 supported? Native IPv6 is not currently offered by Dimension Data for cloud networks, but clients are free to use any IPv6 tunnelling technology on virtual servers to reach external IPv6 networks. ACLs which grant access to a client’s chosen IPv6 gateway device on the Internet may be required if they have blocked outbound access from their cloud networks. 09
  • 11. white paper | Dimension Data Cloud Security Overview The most powerful user account for any MCP client is the primary administrator account. Access to this account should be restricted and it should not be used for daily MCP management operations. Security best practices Network security controls Administrator account management Default network security posture The most powerful user account for any MCP client is the primary administrator account. Access to this account should be restricted and it should not be used for daily MCP management operations. Dimension Data recommends the use of a long passphrase and that the password used for this account is not used for any other system or service. The primary administrator account should also not be used for any routine MCP operations, as it cannot be traced back to an individual administrator. When a network is created, it is automatically allocated a private IP address range and a small block of public IP addresses. Outbound access to the Internet is immediately possible due to source NAT being configured automatically. Inbound ACL rules exist by default to allow access to ports 80 and 443 on any IP address within the cloud network. These do not take effect from a public Internet standpoint until a static NAT rule is created to map one of the public IP addresses to the private IP address of a server. However these ports are available to other cloud networks, so clients should modify their ACL rules accordingly if web servers are deployed. Allocate sub-administrator roles ACLs Can I remove the outbound source NAT from my cloud networks? For all normal MCP CloudControl operations, sub-administrator accounts should be used, with their access rights restricted to the specific networks and servers to which access is justified. As with the primary administrator, each subadministrator account should not use a password which is used anywhere else. All communication into and out of every cloud network is governed by the ACLs applied to that network. Each network has an Inbound and outbound ACL which controls the ability for other networks to initiate connectivity to the network, or allow hosts within the network to reach other networks, or the Internet. No, the outbound source NAT rules are not alterable by clients. To block outbound access, clients can edit the default outbound ACL for their cloud networks to stop connections to external networks. For the greatest network security, subadministrators should not be granted the ‘Network’ Role unless they require the ability to create and modify networks (including ACL rules). For each cloud network, there are invisible ACLs in place which allow the client’s remote access VPN to reach all cloud networks created under the primary account. Can I remove the public IP addresses from my cloud networks? Audit log management The first two public IP addresses allocated to each cloud network cannot be removed. Any additional public IP address blocks requested by clients can be removed. Restrict knowledge of the primary administrator account Dimension Data recommends that administrator audit logs are reconciled with expected activities on a regular basis. The CloudControl API interface allows for collection of administrator audit logs, allowing logs to be automatically downloaded and imported into a log analysis tool. Dimension Data recommends the use of Security Event and Incident Management technology which has behavioural learning capabilities for intelligent log analysis and generation of alerts when high risk or unexpected actions are undertaken. Virtual server security Whilst Dimension Data provides server images in a secure format, some settings should be further hardened to match client security requirements. For example, direct root access is enabled (and required during server builds) for SSH access on Linux servers. Post deployment of servers, clients should apply additional security settings relevant to their information security management framework and related standards. CS / DDMS-1220 / 02/13 © Copyright Dimension Data 2013 To learn more about our cloud services visit: www.dimensiondata.com/cloud
  • 12. MIDDLE EAST & AFRICA MIDDLE EAST & AFRICA ALGERIA · ANGOLA · · · · · · · · · · · · · · · · ·· · · · BOTSWANA CONGO BURUNDI ALGERIA ANGOLA DEMOCR ATIC CONGO THE CONGO BOTSWANAREPUBLIC OFBURUNDI GABON REPUBLIC OFKENYA DEMOCRATIC GHANA THE CONGO MALAWI MAURITIUS KENYA GABON GHANA MOROCCO MOZAMBIQUE NAMIBIA NIGERIA MALAWI MAURITIUS MOROCCO RWANDA NAMIBIA NIGERIA MOZAMBIQUE SAUDI ARABIA SOUTH AFRICA RWANDA SAUDI ARABIA TANZANIA AFRICA SOUTH UGANDA UNITED ARAB EMIRATES ZAMBIA TANZANIA UGANDA UNITED ARAB EMIRATES ASIA AUSTRALIA EUROPE AMERICAS · · · · · · · · · · · ·· THAILAND · VIETNAM AUSTRALIA AUSTRALIAN CAPITAL TERRITORY NEW SOUTH WALES QUEENSLAND AUSTRALIAN CAPITAL TERRITORY SOUTH AUSTRALIA VICTORIA NEW SOUTH WALES QUEENSLAND WESTERN AUSTRALIA SOUTH AUSTRALIA VICTORIA · · · · · · · · · SWITZERLAND · UNITED KINGDOM AMERICAS BRAZIL CANADA CHILE MEXICO UNITED CHILE BRAZIL CANADA STATES CHINA ASIA KONG HONG INDIA INDONESIA JAPAN CHINA HONG KONG KOREA MALAYSIA INDIA INDONESIA JAPAN NEWKOREA MALAYSIA ZEALAND PHILIPPINES SINGAPORE TAIWAN NEW ZEALAND PHILIPPINES THAILAND TAIWAN SINGAPORE VIETNAM · ·· · WESTERN AUSTRALIA BELGIUMEUROPE CZECH REPUBLIC FRANCE GERMANY BELGIUM CZECH REPUBLIC ITALY LUXEMBOURG FRANCE GERMANY NETHERLANDS SPAIN ITALY LUXEMBOURG SWITZERLAND UNITED KINGDOM NETHERLANDS SPAIN · · ·· · MEXICO · UNITED STATES · · ZAMBIA To learn more about our cloud services visit www.dimensiondata.com/cloud For contact details in your region please visit www.dimensiondata.com/globalpresence www.dimensiondata.com