Breaking

Tuesday, March 3, 2015

8 steps to secure your data center

Today's dynamic computing environments need a additional versatile and reconciling approach to security; here's the way to get there


It's no secret that data security has did not carry on with the speed of business and IT. whereas information centers became more and more dynamic, accommodating speedy application changes and on-the-fly deployments that span non-public and public clouds, security has remained comparatively static, supported perimeter appliances like firewalls or different network chokepoint devices that leave the insides of the information center at risk of attack.

In addition, security policies area unit tied to network parameters like IP addresses, ports, subnets, and zones. As a result, security is very manual, doubtless fallible, lacking visibility within the perimeter, and inflexible to changes like cloud migrations or application and setting changes. Enterprises ought to think about the subsequent methods to form their security additional reconciling to the strain of chop-chop ever-changing computing environments:

1. Anticipate work changes, additions, and movements
In several enterprises, deploying new applications, ever-changing existing applications, or migrating applications to the cloud needs important effort for security groups as a result of numerous systems -- from firewalls and VLAN configurations to cloud security systems -- should be changed. Enterprises want security designed round the context of application workloads (their properties, environments, and relationships) instead of the underlying infrastructure. Such AN reconciling security strategy will mechanically provision just-in-time policies supported application changes like the launching of latest workloads (as a part of AN autoscaling operation), application migrations, and setting changes.

2. Audit your applications’ interactions

Enterprises usually lack visibility into the east-west traffic between application workloads in their information centers and public cloud environments. they have a graphical read of multitier applications supported the traffic flows between the individual workloads that conjure the applications. This application topology read will give an entire image of north-south and east-west interactions, chatty workloads, and association requests from external entities that don't seem to be approved. higher still, if the applying topology map is interactive, security groups will drill down for details on the precise context of a work and its relationships with different workloads. this could facilitate security groups style correct and intelligent security policies supported application wants.

3. Assume that attacks area unit inevitable

Very often, enterprises invest in sturdy perimeter defenses, then assume that the workloads behind the perimeter area unit secure. nevertheless most information breaches involve attackers UN agency have created it past the perimeter and compromised one server. The attackers then spread out within the information center to different vulnerable systems, finally creating away with sensitive information. Enterprises want security within their information centers which will lock down interactions between workloads to allowable communication methods and stop unauthorized association requests.

Cyber attacks area unit seldom the results of the compromise of one server or end point. albeit one work is compromised by a foul actor, the information center security strategy ought to stop the lateral unfold of that attack to different systems. Such a discount within the attack surface also can facilitate the recovery of systems as a result of individual workloads area unit absolutely isolated from the larger setting.

4. Future-proof your application deployments

Security groups area unit typically involved concerning the dearth of management over the network in cloud deployments. Most information center security methods area unit hooked in to the network, which suggests that the protection for applications privately information centers is usually terribly totally different from security for applications within the cloud. This ends up in divergent security methods that require to be tested and maintained. Enterprises should decide security methods which will be consistent across non-public information centers and public clouds. After all, the expected application behavior and its security wants don’t modification supported wherever it runs.

5. opt for security technology that's freelance of the infrastructure

Security that's designed for a particular computing setting doesn't account for the dynamic nature of today’s computing environments wherever virtual servers is launched on demand anyplace and applications is deployed or modified at can. it's necessary to develop a context-aware security strategy which will defend application workloads with no dependencies on the underlying network or computing setting. Moreover, with information centers running a heterogeneous mixture of bare-metal servers, virtual servers, or maybe UNIX containers, security that's agnostic to the computing setting will facilitate give a standardized security strategy that is straightforward to deploy, straightforward to take care of, and fewer vulnerable to errors.

6. Eliminate the utilization of internal firewalls and traffic steering


Security that depends on traffic steering through chokepoints or perimeter appliances ties security policies to IP addresses, ports, subnets, VLANs, or security zones. This ends up in a static security model that needs manual changes to security rules when AN application changes or new workloads area unit launched -- resulting in firewall rule explosion and increasing the probabilities of human error.

Security which will adapt victimisation the dynamic context of workloads decouples security from the underlying network parameters and permits changes to occur while not poignant security policies. during a context-aware system, security policies is nominal victimisation natural-language syntax rather than IP addresses. Further, the flexibility to enforce policies at the amount of individual workloads provides additional granular management to directors.

7. Use simple, on-demand cryptography of knowledge in motion to safeguard interactions between distributed, heterogeneous apps

In distributed computing environments wherever application workloads have to be compelled to communicate across each public and personal networks, cryptography of knowledge in motion may be a necessity. IPsec property is wont to encipher the communications between application workloads. however whereas IPsec provides permanent, application-agnostic, encrypted connections between nodes, it's conjointly troublesome to line up and maintain. reconciling security solutions will give policy-driven IPsec while not the requirement for added package or hardware. this enables security directors to line up on-demand cryptography of knowledge in motion between application workloads running anyplace.

8. Develop methods to integrate security with devops practices

Devops practices mix agile development practices with IT operations to accelerate the pace of application rollouts and changes. sadly, static security architectures stop businesses from taking advantage of the potential for continuous application delivery. reconciling security architectures give integration with automation and orchestration tools to roll out security changes as a part of the continual delivery method. this enables security and devops groups to create security into the applying right from work beginning and to take care of it all the thanks to work call back.

Your security strategy ought to mirror the dynamic and distributed nature of today’s infrastructure and applications. think about these steps to coming up with AN reconciling approach which will improve your security posture and create security a business enabler.

Chandra Sekar is senior director of product selling at Illumio, maker of the Illumio reconciling Security Platform. Illumio ASP uses time period work measurement to program the protection policy for each work running within the information center or within the public cloud, and recomputes those policies once something changes.

More Info :- InfoWorld

1 comment:

  1. OpenStack Cloud Computing OpenStack Cloud Computing Training "
    Open Stack Cloud Computing Online Training
    Send ur Enquiry to contact@21cssindia.com
    Introduction
    Virtualization Overview
    Software as a service
    platform as a service
    Infrastructure as a Servi" more… Online Training- Corporate Training- IT Support U Can Reach Us On +917386622889 - +919000444287 http://www.21cssindia.com/courses/open-stack-online-training-224.html

    ReplyDelete