SlideShare a Scribd company logo
A Pragmatic Approach
to Network Security
Across Your Hybrid
Cloud Environment
Nimmy Reichenberg
VP Strategy
Rich Mogull
Analyst and CEO
2 | Confidential
WHAT IS THE #1 REASON
COMPANIES MOVE TO THE CLOUD?
3 | Confidential
COST AGILITY
4 | Confidential
AlgoSec simplifies, automates and orchestrates
security policy management to enable you to
Manage Security at the Speed of Business
Cloud and DevOps
• Cloud is a new operational model.
• It requires a re-thinking of fundamental
architectures.
• DevOps is a new operational framework, highly
attuned to cloud.
• Both shatter existing security approaches.
The Technical Security
Challenge
• The vast majority of information security is really
infrastructure-centric security.
• Infrastructure-centric security relies on fixed locations of
relatively static resources.
• Even many of our application security models rely on
fixed infrastructure.
• It is context-unaware. DevOps and cloud are all about
context.
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
Network Security Challenges
• Virtual networks don’t provide the same visibility.
• Cloud networks are managed via APIs.
• Cloud networks change constantly, and quickly.
• Cloud networks look the same, but aren’t.
The same words mean different things…
Cloud Network Types
• Network hardware
handles config.
• Limited
customization and IP
ranges.
• Poor Security
segregation.
VLAN SDN
• Configuration and
management
abstracted from
underlying hardware.
• Software-defined
and managed.
• Massive flexibility.
Cloud Network Types
• Network hardware
handles config.
• Limited
customization and IP
ranges.
• Poor Security
segregation.
VLAN SDN
• Configuration and
management
abstracted from
underlying hardware.
• Software-defined
and managed.
• Massive flexibility.
Getting Started
• Public Network
• Private Network
• Hybrid Cloud
• Gateways and VPNs
• Regions/Locations
• Zones (Availability Zones)
• Autoscaling
• Security Groups
Public Network
Private Network
Private Network
Notice
anything
missing?
Hybrid Network
• Extends on-premise network
• Technically, has to extend a private cloud. but
that’s a “purist” definition we don’t use in
practice.
• Harder to secure, and consistency becomes
critical. Each side affects the other.
• Best when you need to connect to legacy things.
Hybrid Connection Options
Direct/Private Line
VPN VPN
Network Security Controls
Cloud Providers Give You Commercial Options
• Perimeter Security
• Security Groups
• ACLs
• Physical Security
Appliances
• Virtual Security
Appliances
• Host Security Agents
How it all works (in Amazon)
Route53
us-east-1
d
cba
Web
App
cba
us-west-2
cba
Web
App
cba
Route53
us-east-1
d
cba
Web
App
cba
us-west-2
cba
Web
App
cba
Route53
us-east-1
d
cba
Web
App
cba
us-west-2
cba
Web
App
cba
us-east-1
cba
Web
App
cba
us-east-1
cba
Web
App
cba
cba
Web
App
cba
cba
Web
Subnet 1 Subnet 2
cba
Web X X
Immutable Infrastructure
Source Code
GitCloudformation
Templates
Jenkins
Functional
Tests
Chef Recipes
Chef
Server
NonFunctional
Tests
Security
Tests
Test Prod
Chef
Server
Chef
Server
Building Your Program
• Key considerations:
• Provider specific limitations and advantages
• Application needs
• “New” architectures
• Impact of elasticity
• How you will manage
Design the Architecture
Design the Security Architecture
Manage Operations
• Organizing and staffing
• Use dedicated, trained people
• Discover
• Procurement can help, network scanning
can’t (except sometimes for hybrid)
• Access requests to data/applications
• Integrate with development
• Build a handbook of approved patterns
• Have a cloud security architect to help with
design
• Provide automation code and support
• Policy enforcement
• Limit entitlements for security operations
• Template and automate as much as
possible
• Automate change monitoring/management
Managing Hybrid
• Normalize security
• Translate rules based on application needs, don't blindly apply.
• Understand the difference between security groups and firewall rulesets.
• DON’T JUST CONVERT TO ACL’s
• Don’t just drop in virtual appliances out of habit; always start with cloud features
• If migrating applications, watch out for network configurations
The AlgoSec Suite
Application-Centric Approach
Abstraction of Underlying Network
Consistency across Hybrid-Cloud
The AlgoSec Suite
Move servers from on-prem
datacenter to AWS
The AlgoSec Suite
Topology Analysis Discovers New Path
Proactive Risk and Compliance Assessment
Relevant Security Groups Added/Modified
On-Prem Firewall Rules Decommissioned
Log and Audit Trail
Logical Application Connectivity Unchanged!
Sample Architectures
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
Summary
• Cloud networks may look the same, but they aren’t.
• Segregation is your most powerful security control, and you get it by
default.
• Hybrid networks are tougher, and need extra security care and feeding.
• Once you accept that cloud networking is “software defined everything”,
adapting your security knowledge isn’t very difficult.
SECURITY FUNDAMENTALS STAY THE SAME
• Monitoring
• Least privileged
• Change management
• Risk analysis
• (Micro) Segmentation
• Governance
• Compliance
45 | Confidential
ALL THIS IN A SINGLE PANE
Secure Application Connectivity
Security Policy Change Management
Continuous Compliance and Auditing
Security Policy Optimization
Security Policy Risk Mitigation
Network Segmentation Enforcement
Rich Mogull
Securosis
@rmogull
Nimmy Reichenberg
AlgoSec
@algosec
Find out more at -
www.algosec.com
blog.algosec.com

More Related Content

PPTX
Dos and Don’ts for Managing External Connectivity to/from Your Network
AlgoSec
 
PPTX
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
AlgoSec
 
PPTX
AWS Security Fundamentals: Dos and Don’ts
AlgoSec
 
PDF
Avoid outages-from-misconfigured-devices-webinar-slides
AlgoSec
 
PDF
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
AlgoSec
 
PPTX
Migrating Application Connectivity and Network Security to AWS
AlgoSec
 
PDF
Managing risk and vulnerabilities in a business context
AlgoSec
 
PPTX
Shift Happens: Eliminating the Risks of Network Security Policy Changes
AlgoSec
 
Dos and Don’ts for Managing External Connectivity to/from Your Network
AlgoSec
 
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
AlgoSec
 
AWS Security Fundamentals: Dos and Don’ts
AlgoSec
 
Avoid outages-from-misconfigured-devices-webinar-slides
AlgoSec
 
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
AlgoSec
 
Migrating Application Connectivity and Network Security to AWS
AlgoSec
 
Managing risk and vulnerabilities in a business context
AlgoSec
 
Shift Happens: Eliminating the Risks of Network Security Policy Changes
AlgoSec
 

What's hot (20)

PPTX
Algosec security policy management for financial institutions
Maytal Levi
 
PPTX
Simplifying Security Management in the Virtual Data Center
AlgoSec
 
PPT
Create and Manage a Micro-Segmented Data Center – Best Practices
AlgoSec
 
PPTX
Tying cyber attacks to business processes, for faster mitigation
Maytal Levi
 
PDF
Cisco aci and AlgoSec webinar
Maytal Levi
 
PDF
Migrating and Managing Security in an AWS Environment- Best Practices
shira koper
 
PDF
Security Change Management: Agility vs. Control
AlgoSec
 
PPTX
Ransomware Attack: Best Practices to proactively prevent contain and respond
AlgoSec
 
PPTX
Application visibility across the security estate the value and the vision ...
AlgoSec
 
PDF
AlgoSec Application Migration Webinar
Maytal Levi
 
PDF
best practices-managing_security_in_the hybrid cloud
AlgoSec
 
PPTX
A business driven approach to security policy management a technical perspec...
AlgoSec
 
PPTX
2019 02-20 micro-segmentation based network security strategies (yoni geva)
AlgoSec
 
PPTX
SDN's managing security across the virtual network final
AlgoSec
 
PDF
compliance made easy. pass your audits stress-free webinar
AlgoSec
 
PDF
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
shira koper
 
PDF
Microsegmentation from strategy to execution
AlgoSec
 
PPTX
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
AlgoSec
 
PDF
2021 01-13 reducing risk-of_ransomware
AlgoSec
 
PPTX
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
AlgoSec
 
Algosec security policy management for financial institutions
Maytal Levi
 
Simplifying Security Management in the Virtual Data Center
AlgoSec
 
Create and Manage a Micro-Segmented Data Center – Best Practices
AlgoSec
 
Tying cyber attacks to business processes, for faster mitigation
Maytal Levi
 
Cisco aci and AlgoSec webinar
Maytal Levi
 
Migrating and Managing Security in an AWS Environment- Best Practices
shira koper
 
Security Change Management: Agility vs. Control
AlgoSec
 
Ransomware Attack: Best Practices to proactively prevent contain and respond
AlgoSec
 
Application visibility across the security estate the value and the vision ...
AlgoSec
 
AlgoSec Application Migration Webinar
Maytal Levi
 
best practices-managing_security_in_the hybrid cloud
AlgoSec
 
A business driven approach to security policy management a technical perspec...
AlgoSec
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
AlgoSec
 
SDN's managing security across the virtual network final
AlgoSec
 
compliance made easy. pass your audits stress-free webinar
AlgoSec
 
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
shira koper
 
Microsegmentation from strategy to execution
AlgoSec
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
AlgoSec
 
2021 01-13 reducing risk-of_ransomware
AlgoSec
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
AlgoSec
 
Ad

Viewers also liked (11)

PDF
Security in the Hybrid Cloud Now and in 2016
IDG Connect
 
PPTX
Hybrid Cloud Security: Potential to be the Stuff of Dreams, not Nightmares
Adrian Sanabria
 
PDF
Learn how an app-centric approach will improve security & operational efficiency
Adi Gazit Blecher
 
PDF
Cisco aci and AlgoSec webinar
Maytal Levi
 
PDF
Taking the fire drill out of making firewall changes
AlgoSec
 
PPTX
Segmenting your Network for Security - The Good, the Bad and the Ugly
AlgoSec
 
PDF
The Security Policy Management Maturity Model: How to Move Up the Curve
AlgoSec
 
PDF
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
Adi Gazit Blecher
 
PPTX
5 Steps to a Zero Trust Network - From Theory to Practice
AlgoSec
 
PPTX
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
AlgoSec
 
PPTX
Best Practics for Automating Next Generation Firewall Change Processes
Adi Gazit Blecher
 
Security in the Hybrid Cloud Now and in 2016
IDG Connect
 
Hybrid Cloud Security: Potential to be the Stuff of Dreams, not Nightmares
Adrian Sanabria
 
Learn how an app-centric approach will improve security & operational efficiency
Adi Gazit Blecher
 
Cisco aci and AlgoSec webinar
Maytal Levi
 
Taking the fire drill out of making firewall changes
AlgoSec
 
Segmenting your Network for Security - The Good, the Bad and the Ugly
AlgoSec
 
The Security Policy Management Maturity Model: How to Move Up the Curve
AlgoSec
 
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
Adi Gazit Blecher
 
5 Steps to a Zero Trust Network - From Theory to Practice
AlgoSec
 
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
AlgoSec
 
Best Practics for Automating Next Generation Firewall Change Processes
Adi Gazit Blecher
 
Ad

Similar to A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment (20)

PPT
Cloud Security: Make Your CISO Successful
CloudPassage
 
PDF
Addressing Cloud Security with OPA
DiemShin
 
PPTX
Cloud Technology Brief 2013 Q1 - Thailand
Aruj Thirawat
 
PPTX
Cloud computing
Hamza Sajjad
 
PDF
Outpost24 webinar - Mastering the art of multicloud security
Outpost24
 
PDF
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Priyanka Aash
 
PDF
The do's and dont's of cloud computing - StatPro Cloud Summit 2012
StatPro Group
 
PPTX
Transforming cloud security into an advantage
Moshe Ferber
 
PPTX
Security and Compliance for Enterprise Cloud Infrastructure
CloudPassage
 
PPTX
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
PPTX
Uncovering the Cloud: Is it Right for You? - Marco
MarcoTechnologies
 
PPTX
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24
 
PPTX
Presentacion de solucion cloud de navegacion segura
RogerChaucaZea
 
PPTX
What is Cloud Security, and Can I Have Some?
John Kinsella
 
PDF
110307 cloud security requirements gourley
GovCloud Network
 
PPTX
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Cryptzone
 
PPT
CLOUD COMPUTING.ppt
Dss
 
PPTX
Introducing Azure Arc
Mohamed Wali
 
PPTX
I am sharing 'Unit-2' with youuuuuu.PPTX
padhaipadhai639
 
PDF
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera Technologies
 
Cloud Security: Make Your CISO Successful
CloudPassage
 
Addressing Cloud Security with OPA
DiemShin
 
Cloud Technology Brief 2013 Q1 - Thailand
Aruj Thirawat
 
Cloud computing
Hamza Sajjad
 
Outpost24 webinar - Mastering the art of multicloud security
Outpost24
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Priyanka Aash
 
The do's and dont's of cloud computing - StatPro Cloud Summit 2012
StatPro Group
 
Transforming cloud security into an advantage
Moshe Ferber
 
Security and Compliance for Enterprise Cloud Infrastructure
CloudPassage
 
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
Uncovering the Cloud: Is it Right for You? - Marco
MarcoTechnologies
 
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24
 
Presentacion de solucion cloud de navegacion segura
RogerChaucaZea
 
What is Cloud Security, and Can I Have Some?
John Kinsella
 
110307 cloud security requirements gourley
GovCloud Network
 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Cryptzone
 
CLOUD COMPUTING.ppt
Dss
 
Introducing Azure Arc
Mohamed Wali
 
I am sharing 'Unit-2' with youuuuuu.PPTX
padhaipadhai639
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera Technologies
 

More from AlgoSec (20)

PDF
The state of the cloud csa survey webinar
AlgoSec
 
PDF
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
AlgoSec
 
PDF
2021 01-27 reducing risk of ransomware webinar
AlgoSec
 
PDF
Compliance made easy. Pass your audits stress-free.
AlgoSec
 
PDF
Cloud migrations made simpler safe secure and successful migrations
AlgoSec
 
PDF
Build and enforce defense in depth - an algo sec-cisco tetration webinar
AlgoSec
 
PDF
Radically reduce firewall rules with application-driven rule recertification
AlgoSec
 
PDF
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
AlgoSec
 
PDF
2020 04-07 webinar slides -turning network security alerts into action change...
AlgoSec
 
PPT
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
AlgoSec
 
PPTX
Put out audit security fires, pass audits -every time
AlgoSec
 
PPTX
2019 08-13 selecting the right security policy management solution
AlgoSec
 
PPTX
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
AlgoSec
 
PPT
More Things You Can Do with the AlgoSec Security Policy Management Suite
AlgoSec
 
PPTX
2018 11-19 improving business agility with security policy automation final
AlgoSec
 
PPT
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
AlgoSec
 
PPTX
Zero Trust Framework for Network Security​
AlgoSec
 
PPTX
2018 10-11 automating network security policy management allows financial ins...
AlgoSec
 
PPT
Selecting the right security policy management solution for your organization
AlgoSec
 
PPT
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
AlgoSec
 
The state of the cloud csa survey webinar
AlgoSec
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
AlgoSec
 
2021 01-27 reducing risk of ransomware webinar
AlgoSec
 
Compliance made easy. Pass your audits stress-free.
AlgoSec
 
Cloud migrations made simpler safe secure and successful migrations
AlgoSec
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
AlgoSec
 
Radically reduce firewall rules with application-driven rule recertification
AlgoSec
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
AlgoSec
 
2020 04-07 webinar slides -turning network security alerts into action change...
AlgoSec
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
AlgoSec
 
Put out audit security fires, pass audits -every time
AlgoSec
 
2019 08-13 selecting the right security policy management solution
AlgoSec
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
AlgoSec
 
More Things You Can Do with the AlgoSec Security Policy Management Suite
AlgoSec
 
2018 11-19 improving business agility with security policy automation final
AlgoSec
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
AlgoSec
 
Zero Trust Framework for Network Security​
AlgoSec
 
2018 10-11 automating network security policy management allows financial ins...
AlgoSec
 
Selecting the right security policy management solution for your organization
AlgoSec
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
AlgoSec
 

Recently uploaded (20)

PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Software Development Methodologies in 2025
KodekX
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Doc9.....................................
SofiaCollazos
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 

A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment