SlideShare a Scribd company logo
Security POC
     June 12, 2012


      Matt Lowth                Jeffrey Deacon            Albert Caballero
Principal Security Architect   Chief Cloud Strategist   Chief Technology Officer




                                                                            1
2
NAB and the ODCA



About Us                              NAB and the ODCA

National Australia Bank Group
(the Group) is a financial services   Part of the ODCA as a Steering
organisation with over                Committee Member since 2010.
12,000,000 customers and
                                      Chair of Security Workgroup and
50,000 people, operating more
                                      helped develop Security Usage
than 1,750 stores and Service
                                      Models.
Centres globally.

Currently developing our Internal
Private Cloud Capability.




                                                                        3
Challenges and Role of Usage Models



Challenges                        Usage Models
• Common understanding            • Usage models developed
  of security standards             to overcome these issues
  is a big hurdle to enterprise
  cloud adoption                  • Provider assurance

• Very difficult to determine     • Security monitoring
  “what is secure”
                                  • Bronze/Silver/Gold/Platinum




                                                                  4
ODCA Proof of Concept Process


Pre-engagement                  Project                              Project                     Project
Match Making                    Planning                             Execution                   Closure
• SP checklist                  • Generate/Agree on                  • Acquire equipment,        • Reports
  submitted                       statement of work                    SW, and licensing
                                                                                                 • WG feedback
• Members select SP             • Determine PM                       • Configure Test bed
                                  method                                                         • Demos
• Initiate kick-off                                                  • Execute test
  meeting                       • Generate test plan                   plan/document             • Other

• WG, steering comm.            • WG approval
  notified                        of test plan




                 REAL WORLD SOLUTIONS built on industry driven guidelines


               PM = Project Management, SP= Solution Provider, SW = Software, WG = Work Group,

                                                                                                                 5
ODCA Security POC Usage Model



Security Provider            Security
Assurance                    Monitoring
• 26 security requirements   • Requires proof of achieving
                               requirements
• 8 test cases
                             • 2 success scenarios




                                                             6
Enterprise Cloud
Services




                   7
Terremark Vision for Enterprise Cloud

Core Capabilities
Purpose-Built Data Centers
Secure and Isolate Customer Data
Automated and Efficient
Programmable with Application Services



Attributes
Global
Extensible Hybrid Capability
Service Levels
Simplicity of Use
Predictability and Control


Investment
Expansion
Expertise and People                     Globally Delivered
New Solutions and Markets                from World-Class
                                         Facilities




                                                              8
Virtual Farm with Intelligent Networking
The Building Block of Your Environment
The virtual farm creates the individual customer network construct
and delivers a secure and resilient configuration to access and protect
customer data.


                                                            Directly provisioned from the portal

                      Virtual Farm N

                                Virtual
                                                            Carves out secure access to resources
                                Load
                                Balancer                    and creates customer VLAN

                                Virtual
                                Firewall
                                                            Every virtual farm contains:
                                                            • Virtual Firewall
                                       DMZ Network          • Virtual Load Balancer
            Trusted                    (Public IP-Facing)
           Network
                                                            Two-tiered networking space:
             Server                 Server                  •   Trusted network accessible only to other CaaS servers
            Resources              Resources
                                                            •   DMZ network can be configured for Public IP-facing
                                                                applications


                                                            Virtual Farm is key part of security story

            Storage




                                                                                                                9
ODCA Gold Provider Assurance
Terremark Verizon Managed Cloud
Cloud Subscriber Security Infrastructure




                                                                                                                              Internet

                                                                                             CP Firewall 01




                                                                     ODCA Gold                                        Remote Connections
      Name: CP Bastion 02       Name: CP Bastion 01                  Firewall 01        CP Load
      Server OS: RH Linux       Server OS: Windows 2003                                 Balancer                                                                      Remote Sites
      Role: Remote Access       Role: Remote Access




                                                         DMZ




                                                                                                                                                          CP Firewall 02



     SecApp02                SecApp01                     WebApp02                   WebApp01
     Server OS: Windows 2003 Server OS: Windows 2008      Server OS: RH Linux        Server OS: RH Linux
     Role: ODCA Gold Demos   Role: Security Management    Role: Application Server   Role: Application Server

                                                                                                                                                            ODCA Gold
                                                                                                                                                            Firewall 02


                                                                                                           Internal Network




                                      SecMgmt01                       SecScanner01                  SecSIEM01                   SecPol01                    SecDB01
                                      Server OS: Windows 2003         Server OS: Windows 2003       Server OS: Windows 2008     Server OS: Windows 2008     Server OS: Linux Red Hat 5.6
                                      Role: Directory Services        Role: Vulnerability Scanner   Role: Log Management        Role: Policy Management     Role: Database Server




                                                                                                                                                                                           10
11
Testing Methodology

1. Assess Provider Assurance Requirements



2. Identify Security Technologies and Provider Policies Needed to
   Support the Solution


3. Implement ODCA Solution:
  • Trapezoid Interoperability Lab
  • Terremark Managed VMware Cloud
  • Applied Innovations HyperV Cloud



4. Security Monitoring




                                                                    12
ODCA Gold Assurance: Challenges

Providers don’t perform         Proof of Concepts Steps
many of the security
requirements yet                1. Multiple service providers

                                2. 8 test cases covering provider
                                   assurance requirements
Surfacing data from tools
that aren’t truly multi-        3. Subscriber validation of
tenant                             requirements

                                4. Also designing a portal that
All security requirements          provides a web interface to
needs to be in place prior to      tools that have multiple views
the security monitoring            and reports for Platinum ODCA
reports




                                                                13
ODCA Gold Assurance: Results


Currently no service providers are meeting all of the
requirements




Service Providers must work more closely with cloud
subscriber



Third party security providers can help facilitate the process
by adding layers of security required by each assurance
level




                                                                 14
Impact of PoC


                           Elements of usage model
Usage model developed      well defined, however some
with best intention        controls difficult to assess
                           and/or implement




                           Further refinement of the
Purpose of the PoC was     usage model to come to allow
to determine whether the   the more broad adoption
standards we’d created     of these tiered offerings,
were implementable         including distinction between
                           managed/unmanaged service




                                                          15
RFP / Adoption


Additional refresh of usage model to take into account
results of the PoC




RFP requirements also refined as part of this process



Your Opportunity:
Learn from this POC to form your organizational strategy.
Demand secure and standard solutions based on ODCA requirements




                                                                  16
Thank You




            17
Resources
               Learn the latest about ODCA requirements
  PRIORITIZE   at www.opendatacenteralliance.org

               Use ODCA PEAT Tool for Upcoming RFPs
    DELIVER    Explore the Latest Solutions at ODCA's
               Cloud Expo Showcase Booth #411


               Actively Participate in Today's Sessions   #Forecast12
      SHARE    Scale your Knowledge with ODCA MEET

More Related Content

PDF
21st Century SOA
PPTX
Softchoice Webinar Series: VMware vSphere 5.1 Changes
PDF
Security and Virtualization in the Data Center
PDF
Securing Your Cloud Applications with Novell Cloud Security Service
PDF
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
PDF
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
PPTX
Lawful Interception in Virtual Environments
21st Century SOA
Softchoice Webinar Series: VMware vSphere 5.1 Changes
Security and Virtualization in the Data Center
Securing Your Cloud Applications with Novell Cloud Security Service
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
Lawful Interception in Virtual Environments

What's hot (17)

PDF
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...
PDF
Applying Novell Identity Manager to Your Everyday Problems
PPTX
Ixia anue maximum roi from your existing toolsets
PDF
The Novell Collaboration Strategy
PPTX
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
PPTX
BIG-IP Data Center Firewall Solution
PDF
Using Server Virtualization for Manufacturing Operations
PDF
Realizing the Promise of the Cloud
PDF
Virtual sharp cloud aware bc dr up 2012 cloud
PPTX
Cloud Connect
PDF
How to Maintain Software Appliances
PDF
vCenter Infrastructure Navigator 1.1 - What's New
PDF
Covmug v sphere 4.1 what's new
PDF
Cloud computing bringing the dark side of enterprise apps into the light by...
PDF
Five Must Haves to Prevent Encryption Disasters
PDF
VMwareAidan Dalgleish
PDF
Cisco open network environment
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...
Applying Novell Identity Manager to Your Everyday Problems
Ixia anue maximum roi from your existing toolsets
The Novell Collaboration Strategy
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
BIG-IP Data Center Firewall Solution
Using Server Virtualization for Manufacturing Operations
Realizing the Promise of the Cloud
Virtual sharp cloud aware bc dr up 2012 cloud
Cloud Connect
How to Maintain Software Appliances
vCenter Infrastructure Navigator 1.1 - What's New
Covmug v sphere 4.1 what's new
Cloud computing bringing the dark side of enterprise apps into the light by...
Five Must Haves to Prevent Encryption Disasters
VMwareAidan Dalgleish
Cisco open network environment
Ad

Viewers also liked (18)

PDF
10 Tips for Writing Pythonic Code by Michael Kennedy
PDF
Kodu class
PPTX
Circuit poc alabama
PDF
About Streaming Data Solutions for Hadoop
PPTX
Big Data Strategy for the Relational World
PPTX
Azure ml screen grabs
PPTX
Pricing and Revenue Projection in a Cloud-Centric World
PPTX
Intro to the Google Cloud for Developers
PPTX
Cloud-centric Internet of Things
PDF
Practical Machine Learning
PPTX
Microsoft Machine Learning Smackdown
PPTX
SQL Server on Google Cloud Platform
PDF
PPTX
Practical Machine Learning in Python
PPTX
What exactly is Business Intelligence?
PPTX
Planning your OpenStack PoC
PDF
Real Time Analytics: Algorithms and Systems
PDF
Python for the C# developer
10 Tips for Writing Pythonic Code by Michael Kennedy
Kodu class
Circuit poc alabama
About Streaming Data Solutions for Hadoop
Big Data Strategy for the Relational World
Azure ml screen grabs
Pricing and Revenue Projection in a Cloud-Centric World
Intro to the Google Cloud for Developers
Cloud-centric Internet of Things
Practical Machine Learning
Microsoft Machine Learning Smackdown
SQL Server on Google Cloud Platform
Practical Machine Learning in Python
What exactly is Business Intelligence?
Planning your OpenStack PoC
Real Time Analytics: Algorithms and Systems
Python for the C# developer
Ad

Similar to Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid (20)

PPTX
Private cloud day session 5 a solution for private cloud security
PPTX
Yes, you can be pci compliant using a public iaas cloud a case study by phi...
PPTX
VMware vCloud Director 1.5 - What's New
PPTX
Rightscale Webinar: Designing Private & Hybrid Clouds (Hosted by Citrix)
PDF
Who owns security in the cloud
PPTX
Monetizing the Enterprise: Borderless Networks
PDF
Cloud Security: Perception Vs. Reality
PPTX
CloudPassage Overview
PDF
Integrating network virtualization security in OpenStack Deployments.pdf
PDF
VMware Zimbra vs. Novell Groupwise
PPT
Cloudcomputingoct2009 100301142544-phpapp02
PPTX
Smart cloud - single to multi cloud
PDF
Cf intro for spring devs
PDF
Becloud hybrid cloud
PPTX
Secure Your AWS Cloud Data by Porticor
PPTX
Building Blocks for Private and Hybrid Clouds
PPTX
Building a Secure Cloud with Identity Management
PPTX
Architecting a Private Cloud - Cloud Expo
PDF
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
PPTX
eFolder Webinar, Three Winning Deployment Scenarios for Dell AppAssure
Private cloud day session 5 a solution for private cloud security
Yes, you can be pci compliant using a public iaas cloud a case study by phi...
VMware vCloud Director 1.5 - What's New
Rightscale Webinar: Designing Private & Hybrid Clouds (Hosted by Citrix)
Who owns security in the cloud
Monetizing the Enterprise: Borderless Networks
Cloud Security: Perception Vs. Reality
CloudPassage Overview
Integrating network virtualization security in OpenStack Deployments.pdf
VMware Zimbra vs. Novell Groupwise
Cloudcomputingoct2009 100301142544-phpapp02
Smart cloud - single to multi cloud
Cf intro for spring devs
Becloud hybrid cloud
Secure Your AWS Cloud Data by Porticor
Building Blocks for Private and Hybrid Clouds
Building a Secure Cloud with Identity Management
Architecting a Private Cloud - Cloud Expo
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
eFolder Webinar, Three Winning Deployment Scenarios for Dell AppAssure

More from Open Data Center Alliance (20)

PPTX
ODCA DevOps: Magnifying Business Value
PPTX
Cloud & Enterprise IT. Hybrid IT, Coexistence Strategies
PPTX
Open Data Center Alliance 2014 Member Survey on Cloud Adoption
PDF
ODCA Board Best Practice: High Performance Computing at BMW
PDF
Forecast 2014: Making Better Business Decisions with Big Data and IoT
PDF
Forecast 2014: The Grand Challenge, Simplifying IT to Unleash Innovation
PDF
Forecast 2014: Why Open Platforms Matter to Enterprises and Developers
PDF
Forecast 2014: ODCA Cloud Maturity Model V2.0
PDF
Forecast 2014: TOSCA: An Open Standard for Business Application Agility and P...
PDF
Forecast 2014: Maximizing Your Cloud Service Quality and Costs
PDF
Forecast 2014: TOSCA Proof of Concept
PDF
Forecast 2014: Welcome to the ODCA University - School is Way Cool!
PDF
Forecast 2014: Software Defined Networking - What's New?
PDF
Forecast 2014: Cloud-Aware Applications
PDF
Forecast 2014: eDiscovery and Forensics
PDF
Forecast 2014: Cloud Service Brokering
PDF
Forecast 2014: Infrastructure as a Service (IaaS)
PDF
Forecast 2014: SaaS Data Exchange
PDF
Forecast 2014: Business Strategy Enabled by Cloud
PDF
Forecast 2014 Keynote: Re-architecting the Data Center for the Digital Servic...
ODCA DevOps: Magnifying Business Value
Cloud & Enterprise IT. Hybrid IT, Coexistence Strategies
Open Data Center Alliance 2014 Member Survey on Cloud Adoption
ODCA Board Best Practice: High Performance Computing at BMW
Forecast 2014: Making Better Business Decisions with Big Data and IoT
Forecast 2014: The Grand Challenge, Simplifying IT to Unleash Innovation
Forecast 2014: Why Open Platforms Matter to Enterprises and Developers
Forecast 2014: ODCA Cloud Maturity Model V2.0
Forecast 2014: TOSCA: An Open Standard for Business Application Agility and P...
Forecast 2014: Maximizing Your Cloud Service Quality and Costs
Forecast 2014: TOSCA Proof of Concept
Forecast 2014: Welcome to the ODCA University - School is Way Cool!
Forecast 2014: Software Defined Networking - What's New?
Forecast 2014: Cloud-Aware Applications
Forecast 2014: eDiscovery and Forensics
Forecast 2014: Cloud Service Brokering
Forecast 2014: Infrastructure as a Service (IaaS)
Forecast 2014: SaaS Data Exchange
Forecast 2014: Business Strategy Enabled by Cloud
Forecast 2014 Keynote: Re-architecting the Data Center for the Digital Servic...

Recently uploaded (20)

PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
KodekX | Application Modernization Development
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
cuic standard and advanced reporting.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Mobile App Security Testing_ A Comprehensive Guide.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
CIFDAQ's Market Insight: SEC Turns Pro Crypto
KodekX | Application Modernization Development
The Rise and Fall of 3GPP – Time for a Sabbatical?
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
cuic standard and advanced reporting.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Modernizing your data center with Dell and AMD
Advanced Soft Computing BINUS July 2025.pdf
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Understanding_Digital_Forensics_Presentation.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Empathic Computing: Creating Shared Understanding
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Diabetes mellitus diagnosis method based random forest with bat algorithm

Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid

  • 1. Security POC June 12, 2012 Matt Lowth Jeffrey Deacon Albert Caballero Principal Security Architect Chief Cloud Strategist Chief Technology Officer 1
  • 2. 2
  • 3. NAB and the ODCA About Us NAB and the ODCA National Australia Bank Group (the Group) is a financial services Part of the ODCA as a Steering organisation with over Committee Member since 2010. 12,000,000 customers and Chair of Security Workgroup and 50,000 people, operating more helped develop Security Usage than 1,750 stores and Service Models. Centres globally. Currently developing our Internal Private Cloud Capability. 3
  • 4. Challenges and Role of Usage Models Challenges Usage Models • Common understanding • Usage models developed of security standards to overcome these issues is a big hurdle to enterprise cloud adoption • Provider assurance • Very difficult to determine • Security monitoring “what is secure” • Bronze/Silver/Gold/Platinum 4
  • 5. ODCA Proof of Concept Process Pre-engagement Project Project Project Match Making Planning Execution Closure • SP checklist • Generate/Agree on • Acquire equipment, • Reports submitted statement of work SW, and licensing • WG feedback • Members select SP • Determine PM • Configure Test bed method • Demos • Initiate kick-off • Execute test meeting • Generate test plan plan/document • Other • WG, steering comm. • WG approval notified of test plan REAL WORLD SOLUTIONS built on industry driven guidelines PM = Project Management, SP= Solution Provider, SW = Software, WG = Work Group, 5
  • 6. ODCA Security POC Usage Model Security Provider Security Assurance Monitoring • 26 security requirements • Requires proof of achieving requirements • 8 test cases • 2 success scenarios 6
  • 8. Terremark Vision for Enterprise Cloud Core Capabilities Purpose-Built Data Centers Secure and Isolate Customer Data Automated and Efficient Programmable with Application Services Attributes Global Extensible Hybrid Capability Service Levels Simplicity of Use Predictability and Control Investment Expansion Expertise and People Globally Delivered New Solutions and Markets from World-Class Facilities 8
  • 9. Virtual Farm with Intelligent Networking The Building Block of Your Environment The virtual farm creates the individual customer network construct and delivers a secure and resilient configuration to access and protect customer data. Directly provisioned from the portal Virtual Farm N Virtual Carves out secure access to resources Load Balancer and creates customer VLAN Virtual Firewall Every virtual farm contains: • Virtual Firewall DMZ Network • Virtual Load Balancer Trusted (Public IP-Facing) Network Two-tiered networking space: Server Server • Trusted network accessible only to other CaaS servers Resources Resources • DMZ network can be configured for Public IP-facing applications Virtual Farm is key part of security story Storage 9
  • 10. ODCA Gold Provider Assurance Terremark Verizon Managed Cloud Cloud Subscriber Security Infrastructure Internet CP Firewall 01 ODCA Gold Remote Connections Name: CP Bastion 02 Name: CP Bastion 01 Firewall 01 CP Load Server OS: RH Linux Server OS: Windows 2003 Balancer Remote Sites Role: Remote Access Role: Remote Access DMZ CP Firewall 02 SecApp02 SecApp01 WebApp02 WebApp01 Server OS: Windows 2003 Server OS: Windows 2008 Server OS: RH Linux Server OS: RH Linux Role: ODCA Gold Demos Role: Security Management Role: Application Server Role: Application Server ODCA Gold Firewall 02 Internal Network SecMgmt01 SecScanner01 SecSIEM01 SecPol01 SecDB01 Server OS: Windows 2003 Server OS: Windows 2003 Server OS: Windows 2008 Server OS: Windows 2008 Server OS: Linux Red Hat 5.6 Role: Directory Services Role: Vulnerability Scanner Role: Log Management Role: Policy Management Role: Database Server 10
  • 11. 11
  • 12. Testing Methodology 1. Assess Provider Assurance Requirements 2. Identify Security Technologies and Provider Policies Needed to Support the Solution 3. Implement ODCA Solution: • Trapezoid Interoperability Lab • Terremark Managed VMware Cloud • Applied Innovations HyperV Cloud 4. Security Monitoring 12
  • 13. ODCA Gold Assurance: Challenges Providers don’t perform Proof of Concepts Steps many of the security requirements yet 1. Multiple service providers 2. 8 test cases covering provider assurance requirements Surfacing data from tools that aren’t truly multi- 3. Subscriber validation of tenant requirements 4. Also designing a portal that All security requirements provides a web interface to needs to be in place prior to tools that have multiple views the security monitoring and reports for Platinum ODCA reports 13
  • 14. ODCA Gold Assurance: Results Currently no service providers are meeting all of the requirements Service Providers must work more closely with cloud subscriber Third party security providers can help facilitate the process by adding layers of security required by each assurance level 14
  • 15. Impact of PoC Elements of usage model Usage model developed well defined, however some with best intention controls difficult to assess and/or implement Further refinement of the Purpose of the PoC was usage model to come to allow to determine whether the the more broad adoption standards we’d created of these tiered offerings, were implementable including distinction between managed/unmanaged service 15
  • 16. RFP / Adoption Additional refresh of usage model to take into account results of the PoC RFP requirements also refined as part of this process Your Opportunity: Learn from this POC to form your organizational strategy. Demand secure and standard solutions based on ODCA requirements 16
  • 17. Thank You 17
  • 18. Resources Learn the latest about ODCA requirements PRIORITIZE at www.opendatacenteralliance.org Use ODCA PEAT Tool for Upcoming RFPs DELIVER Explore the Latest Solutions at ODCA's Cloud Expo Showcase Booth #411 Actively Participate in Today's Sessions #Forecast12 SHARE Scale your Knowledge with ODCA MEET