SlideShare a Scribd company logo
Scaling
    the
    Cloud


    Bill Burns
    Sr. Manager, Networks &
    Security


    CISO Executive Forum
    February 26, 2012



Thursday, March 8, 12
Agenda


            • Netflix Background and Culture
            • Why We Moved to the Cloud
            • InfoSec Challenges in an IaaS Cloud
            • InfoSec Perspective: Running In The Cloud


Thursday, March 8, 12
Netflix
        Business




(c) 2011 Sandvine
Thursday, March 8, 12
Netflix
        Business

    • 24+ million members globally




(c) 2011 Sandvine
Thursday, March 8, 12
Netflix
        Business

    • 24+ million members globally
    • Streaming in 47 countries




(c) 2011 Sandvine
Thursday, March 8, 12
Netflix
        Business

    • 24+ million members globally
    • Streaming in 47 countries
    • Watch on more than 700
         devices



(c) 2011 Sandvine
Thursday, March 8, 12
Netflix
        Business

    • 24+ million members globally
    • Streaming in 47 countries
    • Watch on more than 700
         devices

    • 33% of US peak evening
         Internet traffic
(c) 2011 Sandvine
Thursday, March 8, 12
Background and
            Context



            • High Performance Culture
            • Fail Fast, Learn Fast ... Get Results
            • Core Value: “Freedom & Responsibility”


Thursday, March 8, 12
Engineering-
            Centric Culture




Thursday, March 8, 12
Engineering-
            Centric Culture

            • Sought the Cloud for Availability, Capacity
             • ...and also found Agility




Thursday, March 8, 12
Engineering-
            Centric Culture

            • Sought the Cloud for Availability, Capacity
             • ...and also found Agility
            • DevOps / NoOps means engineering teams own:
             • New deployments and upgrades
             • Capacity planning & procurement

Thursday, March 8, 12
Freedom
                             &
                        Responsibility




Thursday, March 8, 12
Freedom
                             &
                        Responsibility




Thursday, March 8, 12
Why Cloud?

            • Transforming Netflix’s Core Business
            • Availability, Capacity, Consistency
            • Lower operational effort
            • Mission Focus
            • Agility

Thursday, March 8, 12
Demand vs Capacity




Thursday, March 8, 12
Demand vs Capacity




Thursday, March 8, 12
Demand vs Capacity


                          37x growth in
                           13 months




Thursday, March 8, 12
Demand vs Capacity


                          37x growth in
                           13 months




                                          DataCenter
                                           Capacity




Thursday, March 8, 12
Cloud:
     On-
     Demand
     Capacity




Thursday, March 8, 12
Demand


                                1
     Cloud:
     On-
     Demand
     Capacity

 1. Demand: Typical pattern
    of customer requests rise
    & fall over time




Thursday, March 8, 12
Demand


                                1
     Cloud:
     On-
     Demand                         # Servers
     Capacity
                                2
 1. Demand: Typical pattern
    of customer requests rise
    & fall over time
 2. Reaction: System
    automatically adds,
    removes servers to the
    application pool




Thursday, March 8, 12
Demand


                                  1
     Cloud:
     On-
     Demand                           # Servers
     Capacity
                                  2
 1. Demand: Typical pattern
    of customer requests rise
    & fall over time
                                      Utilization
 2. Reaction: System
    automatically adds,
    removes servers to the
    application pool              3
 3. Result: Overall utilization
    stays constant

Thursday, March 8, 12
InfoSec
                        Confiden"ality'                   Challenges
                                                         In An IaaS
              U"lity'                     Integrity'
                                                         Cloud


         Authen"city'                    Availability'


                        Possession'




Thursday, March 8, 12
InfoSec Challenge
                        in an IaaS Cloud ::
                        Confidentiality




Thursday, March 8, 12
InfoSec Challenge
                        in an IaaS Cloud ::
                        Integrity




Thursday, March 8, 12
InfoSec Challenge
                        in an IaaS Cloud ::
                        Availability




Thursday, March 8, 12
InfoSec Challenge
                        in an IaaS Cloud ::
                        Possession/Control




Thursday, March 8, 12
InfoSec Challenge
                        in an IaaS Cloud ::
                        Authenticity




Thursday, March 8, 12
InfoSec Challenge
                        in an IaaS Cloud ::
                        Authenticity




Thursday, March 8, 12
InfoSec Challenge
                        in an IaaS Cloud ::
                        Authenticity




Thursday, March 8, 12
InfoSec Challenge
                        in an IaaS Cloud ::
                        Authenticity




Thursday, March 8, 12
Running In
                        The Cloud ::
                        InfoSec
                        Perspective




Thursday, March 8, 12
Running In
                        The Cloud ::
                        InfoSec
                        Perspective




Thursday, March 8, 12
Running In
                        The Cloud ::
                        InfoSec
                        Perspective




Thursday, March 8, 12
Running In
                        The Cloud ::
                        InfoSec
                        Perspective




Thursday, March 8, 12
InfoSec In
     The Cloud ::
     Harder




Thursday, March 8, 12
InfoSec In
     The Cloud ::
     Harder

     1.“You’re host attacked me
     yesterday. Please stop!”




Thursday, March 8, 12
InfoSec In
     The Cloud ::
     Harder

     1.“You’re host attacked me
     yesterday. Please stop!”
     2.Dealing with other people’s traffic
     at your front door




Thursday, March 8, 12
InfoSec In
     The Cloud ::
     Harder

     1.“You’re host attacked me
     yesterday. Please stop!”
     2.Dealing with other people’s traffic
     at your front door
     3.Herding ephemeral instances
     with vendor applications




Thursday, March 8, 12
InfoSec In
     The Cloud ::
     Harder

     1.“You’re host attacked me
     yesterday. Please stop!”
     2.Dealing with other people’s traffic
     at your front door
     3.Herding ephemeral instances
     with vendor applications
     4.Trusting endpoints, infrastructure



Thursday, March 8, 12
InfoSec In
     The Cloud ::
     Harder

     1.“You’re host attacked me
     yesterday. Please stop!”
     2.Dealing with other people’s traffic
     at your front door
     3.Herding ephemeral instances
     with vendor applications
     4.Trusting endpoints, infrastructure
     5.Key management

Thursday, March 8, 12
InfoSec In The
            Cloud :: Easier




Thursday, March 8, 12
InfoSec In The
            Cloud :: Easier

            1.Reacting to business velocity      6.Embedding security controls
            2.Detecting instance changes         7.Least privilege enforcement
            3.Application ownership,
              management                         8.Testing/auditing for
                                                   conformance
            4.Patching, updating
            5.Availability, in a failure-prone   9.Consistency, conformity in
              environment                          build and launch


Thursday, March 8, 12
Old IT way:
                        Hand-Crafted
                        configuration




                           (C) courtesy: Flikr (piper, viamoi)
Thursday, March 8, 12
Old IT way:
                        Hand-Crafted
                        configuration




                           (C) courtesy: Flikr (piper, viamoi)
Thursday, March 8, 12
New: Automation




Thursday, March 8, 12
Change
        Controls ::
        Patching
        • Goal: Running instances do not get patched
        • Alternative:
          • Bake a new AMI for any change
          • Launch new instances in parallel
          • Kill the old instances



Thursday, March 8, 12
Change
     Controls ::
     Upgrades
     •   Bake a new AMI for any
         change
     •   Launch new instances
         in parallel
     •   Kill the old instances


     Lesson Learned: Make the
     secure, consistent
     behavior the easier
     alternative.

Thursday, March 8, 12
Availability ::
     Never Launch
     One of Anything




(c) Courtesy Flikr - Winton
Thursday, March 8, 12
Availability ::
     Never Launch
     One of Anything

     •Chaos Monkey induces failures,
         helps us practice recovery




(c) Courtesy Flikr - Winton
Thursday, March 8, 12
Availability ::
     Never Launch
     One of Anything

     •Chaos Monkey induces failures,
         helps us practice recovery
     •Balance across Availability
         Zones




(c) Courtesy Flikr - Winton
Thursday, March 8, 12
Availability ::
     Never Launch
     One of Anything

     •Chaos Monkey induces failures,
         helps us practice recovery
     •Balance across Availability
         Zones
     •Applications automatically
         scale-out, regenerate



(c) Courtesy Flikr - Winton
Thursday, March 8, 12
Availability ::
     Never Launch
     One of Anything

     •Chaos Monkey induces failures,
         helps us practice recovery
     •Balance across Availability
         Zones
     •Applications automatically
         scale-out, regenerate
     •Conformity Monkey detects
         differences, improper settings
(c) Courtesy Flikr - Winton
Thursday, March 8, 12
Identity
            Challenges ::
            Vendors Lagging




Thursday, March 8, 12
Identity
            Challenges ::
            Vendors Lagging

            • Cloud instances are ephemeral
             • Customers cannot necessarily pick
                        their IP addresses, ranges

                • Instances need to base context on
                        apps, services, tagging (not IPs)

                • Vendors need better support            for
                        ephemeral licensing, stateless
                        instances, self-config




Thursday, March 8, 12
Identity
            Challenges ::
            Vendors Lagging

            • Cloud instances are ephemeral
             • Customers cannot necessarily pick
                        their IP addresses, ranges

                • Instances need to base context on
                        apps, services, tagging (not IPs)

                • Vendors need better support            for
                        ephemeral licensing, stateless
                        instances, self-config

            • Machine capacity is no longer a
                 CapEx friction item.

Thursday, March 8, 12
Conformity
                        &
                        Consistency




Thursday, March 8, 12
Conformity
                        &
                        Consistency




Thursday, March 8, 12
Automation =
     Conformity
     &
     Consistency




Thursday, March 8, 12
Automation =
     Conformity
     &
     Consistency


     • All apps, tiers are
         Highly Available

     • Secure defaults
         applied automatically

     • Replacement
         instances look just like
         the originals


Thursday, March 8, 12
Automation =
     Conformity
     &
     Consistency


     • All apps, tiers are
         Highly Available

     • Secure defaults
         applied automatically

     • Replacement
         instances look just like
         the originals


Thursday, March 8, 12
Baked-In
     Security
     Controls ::
     Netflix
     Simian Army


  • Cloud Ready Dashboard
    • Identify and test
          common failure modes

      • Continuous, aggressive
          monitoring, testing

      • Mostly opt-In


Thursday, March 8, 12
Baked-In
     Security
     Controls ::
     Netflix
     Simian Army


  • Cloud Ready Dashboard
    • Identify and test
          common failure modes

      • Continuous, aggressive
          monitoring, testing

      • Mostly opt-In


Thursday, March 8, 12
Baked-In
     Security
     Controls ::
     Netflix                     •   Chaos Monkey - Randomly kills instances
     Simian Army


  • Cloud Ready Dashboard
    • Identify and test
          common failure modes

      • Continuous, aggressive
          monitoring, testing

      • Mostly opt-In


Thursday, March 8, 12
Baked-In
     Security
     Controls ::
     Netflix                     •   Chaos Monkey - Randomly kills instances
     Simian Army
                                 •   Conformity Monkey - Various policy checks

  • Cloud Ready Dashboard
    • Identify and test
          common failure modes

      • Continuous, aggressive
          monitoring, testing

      • Mostly opt-In


Thursday, March 8, 12
Baked-In
     Security
     Controls ::
     Netflix                     •   Chaos Monkey - Randomly kills instances
     Simian Army
                                 •   Conformity Monkey - Various policy checks

  • Cloud Ready Dashboard        •   Latency Monkey – Induces random latency
    • Identify and test
          common failure modes

      • Continuous, aggressive
          monitoring, testing

      • Mostly opt-In


Thursday, March 8, 12
Baked-In
     Security
     Controls ::
     Netflix                     •   Chaos Monkey - Randomly kills instances
     Simian Army
                                 •   Conformity Monkey - Various policy checks

  • Cloud Ready Dashboard        •   Latency Monkey – Induces random latency
    • Identify and test          •   Janitor Monkey – Kills orphaned instances
          common failure modes

      • Continuous, aggressive
          monitoring, testing

      • Mostly opt-In


Thursday, March 8, 12
Baked-In
     Security
     Controls ::
     Netflix                     •   Chaos Monkey - Randomly kills instances
     Simian Army
                                 •   Conformity Monkey - Various policy checks

  • Cloud Ready Dashboard        •   Latency Monkey – Induces random latency
    • Identify and test          •   Janitor Monkey – Kills orphaned instances
          common failure modes

      • Continuous, aggressive   •   Security Monkey – Various security checks
          monitoring, testing

      • Mostly opt-In


Thursday, March 8, 12
Baked-In
     Security
     Controls ::
     Netflix                     •   Chaos Monkey - Randomly kills instances
     Simian Army
                                 •   Conformity Monkey - Various policy checks

  • Cloud Ready Dashboard        •   Latency Monkey – Induces random latency
    • Identify and test          •   Janitor Monkey – Kills orphaned instances
          common failure modes

      • Continuous, aggressive   •   Security Monkey – Various security checks
          monitoring, testing
                                 •   Exploit Monkey – Vuln Scans / Pen Tests
      • Mostly opt-In


Thursday, March 8, 12
Baked-In
     Security
     Controls ::
     Netflix                     •   Chaos Monkey - Randomly kills instances
     Simian Army
                                 •   Conformity Monkey - Various policy checks

  • Cloud Ready Dashboard        •   Latency Monkey – Induces random latency
    • Identify and test          •   Janitor Monkey – Kills orphaned instances
          common failure modes

      • Continuous, aggressive   •   Security Monkey – Various security checks
          monitoring, testing
                                 •   Exploit Monkey – Vuln Scans / Pen Tests
      • Mostly opt-In
                                 •   Unnamed – File integrity monitoring, HIDS

Thursday, March 8, 12
Embedded
                        Security
                        Controls




Thursday, March 8, 12
Embedded
                        Security
                        Controls



                        • Controls baked into the “base AMI”
                          • Controls placed near the data
                          • Applied as machines die/reborn




Thursday, March 8, 12
Embedded
                        Security
                        Controls



                        • Controls baked into the “base AMI”
                          • Controls placed near the data
                          • Applied as machines die/reborn
                        • Security controls are “Data Center
                          agnostic”
                          • Provide a “single pane of glass”
                            awareness
                          • Span all regions, data centers



Thursday, March 8, 12
CISO Forum
            Take-Aways




Thursday, March 8, 12
CISO Forum
            Take-Aways

            1. The public cloud / IaaS is not just a technology.

            2. Cloud IaaS is disruptive to Operations, Engineering, Vendors, Auditors.

            3. Your Data is your new perimeter.

            4. Design for failures in everything.

            5. IaaS providers care about their infrastructure.

            6. Public cloud Information Security is still about the basics, but in a new context.

            7. There’s still plenty left to resolve, like trusted infrastructure, strong key
               management, COTS support.



Thursday, March 8, 12
Questions




Thursday, March 8, 12
Questions




Thursday, March 8, 12

More Related Content

PDF
Challenges in cloud computing to enable future internet of things v0.3
KEY
Cloud Security Alliance - Cloud Summit Keynote
PDF
Cloud Computing – Time for delivery. The question is not “if”, but “how, whe...
PDF
Leaders in the Cloud: Identifying Cloud Business Value for Customers
PDF
Cloud Computing for Enterprise Architects
PPT
Cloud Computing and Enterprise Architecture
PPTX
ClientSummit2010_CloudWorkshop
PDF
2012 Future of Cloud Computing
Challenges in cloud computing to enable future internet of things v0.3
Cloud Security Alliance - Cloud Summit Keynote
Cloud Computing – Time for delivery. The question is not “if”, but “how, whe...
Leaders in the Cloud: Identifying Cloud Business Value for Customers
Cloud Computing for Enterprise Architects
Cloud Computing and Enterprise Architecture
ClientSummit2010_CloudWorkshop
2012 Future of Cloud Computing

What's hot (18)

PDF
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
PDF
Cloud Computing Without The Hype An Executive Guide (1.00 Slideshare)
PPTX
Lean Cloud - Amazon Web Services
PDF
Defining Your Cloud Strategy
PPTX
Public vs private vs hybrid cloud what is best for your business-
PPTX
#UNIT 2017: Cloud Computing
PPTX
Big data and intelligent platforms
PPTX
Cloud discussion
PPTX
Cloud Computing security issues
PDF
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
PDF
Privacy issues in the cloud final
PDF
Taming the ever-evolving Compliance Beast : Lessons learnt at LinkedIn [Strat...
PPT
Choosing Public vs. Private vs. Hybrid Cloud Computing
PPTX
AAF - Enterprise Architecture and Cloud Computing
PPTX
5 BENEFITS OF HYBRID CLOUD
PPTX
Hadoop Twelve Predictions for 2012
PPTX
Introduction to Cloud Computing and Security
PPTX
Transitioning to Hybrid Cloud
Hybrid Customer Insight - Data Collection and Analysis from On-premise and in...
Cloud Computing Without The Hype An Executive Guide (1.00 Slideshare)
Lean Cloud - Amazon Web Services
Defining Your Cloud Strategy
Public vs private vs hybrid cloud what is best for your business-
#UNIT 2017: Cloud Computing
Big data and intelligent platforms
Cloud discussion
Cloud Computing security issues
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
Privacy issues in the cloud final
Taming the ever-evolving Compliance Beast : Lessons learnt at LinkedIn [Strat...
Choosing Public vs. Private vs. Hybrid Cloud Computing
AAF - Enterprise Architecture and Cloud Computing
5 BENEFITS OF HYBRID CLOUD
Hadoop Twelve Predictions for 2012
Introduction to Cloud Computing and Security
Transitioning to Hybrid Cloud
Ad

Viewers also liked (7)

PPT
Building the European Cloud Computing Strategy
PDF
Cloud Computing Technology Overview 2012
PPT
How to Get Cloud Architecture and Design Right the First Time
PPTX
Zuora @ AlwaysOn 2012 - The Only 3 SaaS Metrics That Matter
PDF
Open APIs: What's Hot, What's Not?
PDF
Google App Engine for Business 101
PDF
Architectures for open and scalable clouds
Building the European Cloud Computing Strategy
Cloud Computing Technology Overview 2012
How to Get Cloud Architecture and Design Right the First Time
Zuora @ AlwaysOn 2012 - The Only 3 SaaS Metrics That Matter
Open APIs: What's Hot, What's Not?
Google App Engine for Business 101
Architectures for open and scalable clouds
Ad

Similar to Scaling the Cloud - Cloud Security (20)

PDF
Ciso executive summit 2012
PDF
Cloud security and cyber security v 3.1
PDF
SIIA & INPUT Webinar: Federal Cloud Computing Initiative Update
PDF
Presd1 10
PDF
2010 grail research_cloud_computing
PDF
Cloud Computing: Fact versus Fog
PDF
CCCC Neustar Lenny Rachitsky
PDF
Himss 2011 securing health information in the cloud -- feisal nanji
PDF
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
PDF
The Complexities of Cloud Computing - The Rules are New, But is the Game
PDF
Cloud Camp Feb 21 2013 - All Slides
PDF
Cloud content security vs innovation 2012_0821
PDF
Peering Through the Cloud Forrester EMEA 2010
PPTX
Hey you, get onto my cloud
PDF
Cloud Webinar Neiditz Weitz Mitchell Goodman
PDF
CCSK, cloud security framework, Indonesia
PPT
#CU12: Another cloud is possible - Allen Gunn at Connecting Up 2012
PDF
Cloud computing white paper who do you trust
DOCX
What is the future of cloud security linked in
PPTX
Future of cloud computing linthicum
Ciso executive summit 2012
Cloud security and cyber security v 3.1
SIIA & INPUT Webinar: Federal Cloud Computing Initiative Update
Presd1 10
2010 grail research_cloud_computing
Cloud Computing: Fact versus Fog
CCCC Neustar Lenny Rachitsky
Himss 2011 securing health information in the cloud -- feisal nanji
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
The Complexities of Cloud Computing - The Rules are New, But is the Game
Cloud Camp Feb 21 2013 - All Slides
Cloud content security vs innovation 2012_0821
Peering Through the Cloud Forrester EMEA 2010
Hey you, get onto my cloud
Cloud Webinar Neiditz Weitz Mitchell Goodman
CCSK, cloud security framework, Indonesia
#CU12: Another cloud is possible - Allen Gunn at Connecting Up 2012
Cloud computing white paper who do you trust
What is the future of cloud security linked in
Future of cloud computing linthicum

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Approach and Philosophy of On baking technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Cloud computing and distributed systems.
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
KodekX | Application Modernization Development
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Advanced IT Governance
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
cuic standard and advanced reporting.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Approach and Philosophy of On baking technology
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectral efficient network and resource selection model in 5G networks
Chapter 3 Spatial Domain Image Processing.pdf
Cloud computing and distributed systems.
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
KodekX | Application Modernization Development
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
NewMind AI Monthly Chronicles - July 2025
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Advanced IT Governance
Understanding_Digital_Forensics_Presentation.pptx
Review of recent advances in non-invasive hemoglobin estimation
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
cuic standard and advanced reporting.pdf

Scaling the Cloud - Cloud Security

  • 1. Scaling the Cloud Bill Burns Sr. Manager, Networks & Security CISO Executive Forum February 26, 2012 Thursday, March 8, 12
  • 2. Agenda • Netflix Background and Culture • Why We Moved to the Cloud • InfoSec Challenges in an IaaS Cloud • InfoSec Perspective: Running In The Cloud Thursday, March 8, 12
  • 3. Netflix Business (c) 2011 Sandvine Thursday, March 8, 12
  • 4. Netflix Business • 24+ million members globally (c) 2011 Sandvine Thursday, March 8, 12
  • 5. Netflix Business • 24+ million members globally • Streaming in 47 countries (c) 2011 Sandvine Thursday, March 8, 12
  • 6. Netflix Business • 24+ million members globally • Streaming in 47 countries • Watch on more than 700 devices (c) 2011 Sandvine Thursday, March 8, 12
  • 7. Netflix Business • 24+ million members globally • Streaming in 47 countries • Watch on more than 700 devices • 33% of US peak evening Internet traffic (c) 2011 Sandvine Thursday, March 8, 12
  • 8. Background and Context • High Performance Culture • Fail Fast, Learn Fast ... Get Results • Core Value: “Freedom & Responsibility” Thursday, March 8, 12
  • 9. Engineering- Centric Culture Thursday, March 8, 12
  • 10. Engineering- Centric Culture • Sought the Cloud for Availability, Capacity • ...and also found Agility Thursday, March 8, 12
  • 11. Engineering- Centric Culture • Sought the Cloud for Availability, Capacity • ...and also found Agility • DevOps / NoOps means engineering teams own: • New deployments and upgrades • Capacity planning & procurement Thursday, March 8, 12
  • 12. Freedom & Responsibility Thursday, March 8, 12
  • 13. Freedom & Responsibility Thursday, March 8, 12
  • 14. Why Cloud? • Transforming Netflix’s Core Business • Availability, Capacity, Consistency • Lower operational effort • Mission Focus • Agility Thursday, March 8, 12
  • 17. Demand vs Capacity 37x growth in 13 months Thursday, March 8, 12
  • 18. Demand vs Capacity 37x growth in 13 months DataCenter Capacity Thursday, March 8, 12
  • 19. Cloud: On- Demand Capacity Thursday, March 8, 12
  • 20. Demand 1 Cloud: On- Demand Capacity 1. Demand: Typical pattern of customer requests rise & fall over time Thursday, March 8, 12
  • 21. Demand 1 Cloud: On- Demand # Servers Capacity 2 1. Demand: Typical pattern of customer requests rise & fall over time 2. Reaction: System automatically adds, removes servers to the application pool Thursday, March 8, 12
  • 22. Demand 1 Cloud: On- Demand # Servers Capacity 2 1. Demand: Typical pattern of customer requests rise & fall over time Utilization 2. Reaction: System automatically adds, removes servers to the application pool 3 3. Result: Overall utilization stays constant Thursday, March 8, 12
  • 23. InfoSec Confiden"ality' Challenges In An IaaS U"lity' Integrity' Cloud Authen"city' Availability' Possession' Thursday, March 8, 12
  • 24. InfoSec Challenge in an IaaS Cloud :: Confidentiality Thursday, March 8, 12
  • 25. InfoSec Challenge in an IaaS Cloud :: Integrity Thursday, March 8, 12
  • 26. InfoSec Challenge in an IaaS Cloud :: Availability Thursday, March 8, 12
  • 27. InfoSec Challenge in an IaaS Cloud :: Possession/Control Thursday, March 8, 12
  • 28. InfoSec Challenge in an IaaS Cloud :: Authenticity Thursday, March 8, 12
  • 29. InfoSec Challenge in an IaaS Cloud :: Authenticity Thursday, March 8, 12
  • 30. InfoSec Challenge in an IaaS Cloud :: Authenticity Thursday, March 8, 12
  • 31. InfoSec Challenge in an IaaS Cloud :: Authenticity Thursday, March 8, 12
  • 32. Running In The Cloud :: InfoSec Perspective Thursday, March 8, 12
  • 33. Running In The Cloud :: InfoSec Perspective Thursday, March 8, 12
  • 34. Running In The Cloud :: InfoSec Perspective Thursday, March 8, 12
  • 35. Running In The Cloud :: InfoSec Perspective Thursday, March 8, 12
  • 36. InfoSec In The Cloud :: Harder Thursday, March 8, 12
  • 37. InfoSec In The Cloud :: Harder 1.“You’re host attacked me yesterday. Please stop!” Thursday, March 8, 12
  • 38. InfoSec In The Cloud :: Harder 1.“You’re host attacked me yesterday. Please stop!” 2.Dealing with other people’s traffic at your front door Thursday, March 8, 12
  • 39. InfoSec In The Cloud :: Harder 1.“You’re host attacked me yesterday. Please stop!” 2.Dealing with other people’s traffic at your front door 3.Herding ephemeral instances with vendor applications Thursday, March 8, 12
  • 40. InfoSec In The Cloud :: Harder 1.“You’re host attacked me yesterday. Please stop!” 2.Dealing with other people’s traffic at your front door 3.Herding ephemeral instances with vendor applications 4.Trusting endpoints, infrastructure Thursday, March 8, 12
  • 41. InfoSec In The Cloud :: Harder 1.“You’re host attacked me yesterday. Please stop!” 2.Dealing with other people’s traffic at your front door 3.Herding ephemeral instances with vendor applications 4.Trusting endpoints, infrastructure 5.Key management Thursday, March 8, 12
  • 42. InfoSec In The Cloud :: Easier Thursday, March 8, 12
  • 43. InfoSec In The Cloud :: Easier 1.Reacting to business velocity 6.Embedding security controls 2.Detecting instance changes 7.Least privilege enforcement 3.Application ownership, management 8.Testing/auditing for conformance 4.Patching, updating 5.Availability, in a failure-prone 9.Consistency, conformity in environment build and launch Thursday, March 8, 12
  • 44. Old IT way: Hand-Crafted configuration (C) courtesy: Flikr (piper, viamoi) Thursday, March 8, 12
  • 45. Old IT way: Hand-Crafted configuration (C) courtesy: Flikr (piper, viamoi) Thursday, March 8, 12
  • 47. Change Controls :: Patching • Goal: Running instances do not get patched • Alternative: • Bake a new AMI for any change • Launch new instances in parallel • Kill the old instances Thursday, March 8, 12
  • 48. Change Controls :: Upgrades • Bake a new AMI for any change • Launch new instances in parallel • Kill the old instances Lesson Learned: Make the secure, consistent behavior the easier alternative. Thursday, March 8, 12
  • 49. Availability :: Never Launch One of Anything (c) Courtesy Flikr - Winton Thursday, March 8, 12
  • 50. Availability :: Never Launch One of Anything •Chaos Monkey induces failures, helps us practice recovery (c) Courtesy Flikr - Winton Thursday, March 8, 12
  • 51. Availability :: Never Launch One of Anything •Chaos Monkey induces failures, helps us practice recovery •Balance across Availability Zones (c) Courtesy Flikr - Winton Thursday, March 8, 12
  • 52. Availability :: Never Launch One of Anything •Chaos Monkey induces failures, helps us practice recovery •Balance across Availability Zones •Applications automatically scale-out, regenerate (c) Courtesy Flikr - Winton Thursday, March 8, 12
  • 53. Availability :: Never Launch One of Anything •Chaos Monkey induces failures, helps us practice recovery •Balance across Availability Zones •Applications automatically scale-out, regenerate •Conformity Monkey detects differences, improper settings (c) Courtesy Flikr - Winton Thursday, March 8, 12
  • 54. Identity Challenges :: Vendors Lagging Thursday, March 8, 12
  • 55. Identity Challenges :: Vendors Lagging • Cloud instances are ephemeral • Customers cannot necessarily pick their IP addresses, ranges • Instances need to base context on apps, services, tagging (not IPs) • Vendors need better support for ephemeral licensing, stateless instances, self-config Thursday, March 8, 12
  • 56. Identity Challenges :: Vendors Lagging • Cloud instances are ephemeral • Customers cannot necessarily pick their IP addresses, ranges • Instances need to base context on apps, services, tagging (not IPs) • Vendors need better support for ephemeral licensing, stateless instances, self-config • Machine capacity is no longer a CapEx friction item. Thursday, March 8, 12
  • 57. Conformity & Consistency Thursday, March 8, 12
  • 58. Conformity & Consistency Thursday, March 8, 12
  • 59. Automation = Conformity & Consistency Thursday, March 8, 12
  • 60. Automation = Conformity & Consistency • All apps, tiers are Highly Available • Secure defaults applied automatically • Replacement instances look just like the originals Thursday, March 8, 12
  • 61. Automation = Conformity & Consistency • All apps, tiers are Highly Available • Secure defaults applied automatically • Replacement instances look just like the originals Thursday, March 8, 12
  • 62. Baked-In Security Controls :: Netflix Simian Army • Cloud Ready Dashboard • Identify and test common failure modes • Continuous, aggressive monitoring, testing • Mostly opt-In Thursday, March 8, 12
  • 63. Baked-In Security Controls :: Netflix Simian Army • Cloud Ready Dashboard • Identify and test common failure modes • Continuous, aggressive monitoring, testing • Mostly opt-In Thursday, March 8, 12
  • 64. Baked-In Security Controls :: Netflix • Chaos Monkey - Randomly kills instances Simian Army • Cloud Ready Dashboard • Identify and test common failure modes • Continuous, aggressive monitoring, testing • Mostly opt-In Thursday, March 8, 12
  • 65. Baked-In Security Controls :: Netflix • Chaos Monkey - Randomly kills instances Simian Army • Conformity Monkey - Various policy checks • Cloud Ready Dashboard • Identify and test common failure modes • Continuous, aggressive monitoring, testing • Mostly opt-In Thursday, March 8, 12
  • 66. Baked-In Security Controls :: Netflix • Chaos Monkey - Randomly kills instances Simian Army • Conformity Monkey - Various policy checks • Cloud Ready Dashboard • Latency Monkey – Induces random latency • Identify and test common failure modes • Continuous, aggressive monitoring, testing • Mostly opt-In Thursday, March 8, 12
  • 67. Baked-In Security Controls :: Netflix • Chaos Monkey - Randomly kills instances Simian Army • Conformity Monkey - Various policy checks • Cloud Ready Dashboard • Latency Monkey – Induces random latency • Identify and test • Janitor Monkey – Kills orphaned instances common failure modes • Continuous, aggressive monitoring, testing • Mostly opt-In Thursday, March 8, 12
  • 68. Baked-In Security Controls :: Netflix • Chaos Monkey - Randomly kills instances Simian Army • Conformity Monkey - Various policy checks • Cloud Ready Dashboard • Latency Monkey – Induces random latency • Identify and test • Janitor Monkey – Kills orphaned instances common failure modes • Continuous, aggressive • Security Monkey – Various security checks monitoring, testing • Mostly opt-In Thursday, March 8, 12
  • 69. Baked-In Security Controls :: Netflix • Chaos Monkey - Randomly kills instances Simian Army • Conformity Monkey - Various policy checks • Cloud Ready Dashboard • Latency Monkey – Induces random latency • Identify and test • Janitor Monkey – Kills orphaned instances common failure modes • Continuous, aggressive • Security Monkey – Various security checks monitoring, testing • Exploit Monkey – Vuln Scans / Pen Tests • Mostly opt-In Thursday, March 8, 12
  • 70. Baked-In Security Controls :: Netflix • Chaos Monkey - Randomly kills instances Simian Army • Conformity Monkey - Various policy checks • Cloud Ready Dashboard • Latency Monkey – Induces random latency • Identify and test • Janitor Monkey – Kills orphaned instances common failure modes • Continuous, aggressive • Security Monkey – Various security checks monitoring, testing • Exploit Monkey – Vuln Scans / Pen Tests • Mostly opt-In • Unnamed – File integrity monitoring, HIDS Thursday, March 8, 12
  • 71. Embedded Security Controls Thursday, March 8, 12
  • 72. Embedded Security Controls • Controls baked into the “base AMI” • Controls placed near the data • Applied as machines die/reborn Thursday, March 8, 12
  • 73. Embedded Security Controls • Controls baked into the “base AMI” • Controls placed near the data • Applied as machines die/reborn • Security controls are “Data Center agnostic” • Provide a “single pane of glass” awareness • Span all regions, data centers Thursday, March 8, 12
  • 74. CISO Forum Take-Aways Thursday, March 8, 12
  • 75. CISO Forum Take-Aways 1. The public cloud / IaaS is not just a technology. 2. Cloud IaaS is disruptive to Operations, Engineering, Vendors, Auditors. 3. Your Data is your new perimeter. 4. Design for failures in everything. 5. IaaS providers care about their infrastructure. 6. Public cloud Information Security is still about the basics, but in a new context. 7. There’s still plenty left to resolve, like trusted infrastructure, strong key management, COTS support. Thursday, March 8, 12

Editor's Notes

  • #2: Why did Netflix migrate to the public Cloud?\nWhich InfoSec controls were harder or easier in the Cloud?\nWhat’s left to solve?\n\nRunning in a public cloud is less about virtualization and more about disrupting how you currently deliver services. Here’s the infosec lens on how Netflix is migrating to the Cloud.\n\nAugments Jason Chan’s “Practical Cloud Security” presentations.\n
  • #3: I won’t spend a lot of time on background, but it’s important to cover the context so that you understand why we’re doing this.\n\nIn two years we went from “traditional IT” to running one of the largest public cloud infrastructures on Amazon.\n\nWhen I briefed the DoD CyberSecurity Task Force, they were shocked at the rate of our innovation. I thought 2 years was a long time; but they helped put things into perspective.\n\nThese ideas may seem strange to you. But you probably have teams doing this already, or are trying to achieve this, or you will acquire a company that does this now. I assert that many of these design and operations ideas will be the norm for new companies in less than 5 years.\n\n
  • #4: (doubled subscribers in 2010, moved to cloud)\n3+ billion rev in 2011, S&P 500\n\nQ: Soon every TV sold anywhere in the world will have WiFi and Netflix built in \n\n
  • #5: (doubled subscribers in 2010, moved to cloud)\n3+ billion rev in 2011, S&P 500\n\nQ: Soon every TV sold anywhere in the world will have WiFi and Netflix built in \n\n
  • #6: (doubled subscribers in 2010, moved to cloud)\n3+ billion rev in 2011, S&P 500\n\nQ: Soon every TV sold anywhere in the world will have WiFi and Netflix built in \n\n
  • #7: (doubled subscribers in 2010, moved to cloud)\n3+ billion rev in 2011, S&P 500\n\nQ: Soon every TV sold anywhere in the world will have WiFi and Netflix built in \n\n
  • #8: (doubled subscribers in 2010, moved to cloud)\n3+ billion rev in 2011, S&P 500\n\nQ: Soon every TV sold anywhere in the world will have WiFi and Netflix built in \n\n
  • #9: (doubled subscribers in 2010, moved to cloud)\n3+ billion rev in 2011, S&P 500\n\nQ: Soon every TV sold anywhere in the world will have WiFi and Netflix built in \n\n
  • #10: (doubled subscribers in 2010, moved to cloud)\n3+ billion rev in 2011, S&P 500\n\nQ: Soon every TV sold anywhere in the world will have WiFi and Netflix built in \n\n
  • #11: (doubled subscribers in 2010, moved to cloud)\n3+ billion rev in 2011, S&P 500\n\nQ: Soon every TV sold anywhere in the world will have WiFi and Netflix built in \n\n
  • #12: (doubled subscribers in 2010, moved to cloud)\n3+ billion rev in 2011, S&P 500\n\nQ: Soon every TV sold anywhere in the world will have WiFi and Netflix built in \n\n
  • #13: (doubled subscribers in 2010, moved to cloud)\n3+ billion rev in 2011, S&P 500\n\nQ: Soon every TV sold anywhere in the world will have WiFi and Netflix built in \n\n
  • #14: (doubled subscribers in 2010, moved to cloud)\n3+ billion rev in 2011, S&P 500\n\nQ: Soon every TV sold anywhere in the world will have WiFi and Netflix built in \n\n
  • #15: (doubled subscribers in 2010, moved to cloud)\n3+ billion rev in 2011, S&P 500\n\nQ: Soon every TV sold anywhere in the world will have WiFi and Netflix built in \n\n
  • #16: We’re dev-focused so it was OK for us to build our own.\nDidn’t need to wait for industry to build shims and orchestration tools.\nAlso weren’t multi-CSP concerned at this point, YMMV. We’re also not in a regulated industry, so again YMMV.\n
  • #17: In other words: the Cloud is not a technology, it’s more than virtualization. It’s a fundamentally different way of thinking about writing applications, providing computing services, and running your business.\n
  • #18: In other words: the Cloud is not a technology, it’s more than virtualization. It’s a fundamentally different way of thinking about writing applications, providing computing services, and running your business.\n
  • #19: (No Central architecture review boards, etc)\n(eliminated unnecessary complexity)\nLoosely-coupled, highly-aligned teams\nResponsible people thrive on, are worthy of freedom\nIncrease freedom as we grow, rather than limit it\nNetflix loves killing unnecessary processes\n
  • #20: (No Central architecture review boards, etc)\n(eliminated unnecessary complexity)\nLoosely-coupled, highly-aligned teams\nResponsible people thrive on, are worthy of freedom\nIncrease freedom as we grow, rather than limit it\nNetflix loves killing unnecessary processes\n
  • #21: (No Central architecture review boards, etc)\n(eliminated unnecessary complexity)\nLoosely-coupled, highly-aligned teams\nResponsible people thrive on, are worthy of freedom\nIncrease freedom as we grow, rather than limit it\nNetflix loves killing unnecessary processes\n
  • #22: \n
  • #23: \n
  • #24: \n
  • #25: \n
  • #26: (doubled subscribers in 2010, moved to cloud)\nExample: Superbowl, Christmas scaling\n\nScale up early, scale down slowly\nprovision for AZ capacity\n\nWe now kill and respawn more Cloud servers every week than we have in our datacenter. It’s approaching a daily rate.\n
  • #27: (doubled subscribers in 2010, moved to cloud)\nExample: Superbowl, Christmas scaling\n\nScale up early, scale down slowly\nprovision for AZ capacity\n\nWe now kill and respawn more Cloud servers every week than we have in our datacenter. It’s approaching a daily rate.\n
  • #28: (doubled subscribers in 2010, moved to cloud)\nExample: Superbowl, Christmas scaling\n\nScale up early, scale down slowly\nprovision for AZ capacity\n\nWe now kill and respawn more Cloud servers every week than we have in our datacenter. It’s approaching a daily rate.\n
  • #29: (doubled subscribers in 2010, moved to cloud)\nExample: Superbowl, Christmas scaling\n\nScale up early, scale down slowly\nprovision for AZ capacity\n\nWe now kill and respawn more Cloud servers every week than we have in our datacenter. It’s approaching a daily rate.\n
  • #30: (doubled subscribers in 2010, moved to cloud)\nExample: Superbowl, Christmas scaling\n\nScale up early, scale down slowly\nprovision for AZ capacity\n\nWe now kill and respawn more Cloud servers every week than we have in our datacenter. It’s approaching a daily rate.\n
  • #31: (doubled subscribers in 2010, moved to cloud)\nExample: Superbowl, Christmas scaling\n\nScale up early, scale down slowly\nprovision for AZ capacity\n\nWe now kill and respawn more Cloud servers every week than we have in our datacenter. It’s approaching a daily rate.\n
  • #32: \n
  • #33: Goal: Assume Man In The Middle\nCountermeasures / Mindset:\nEnd-to-end encryption\nMutual authentication\nEncrypt storage\nFBI warning\n
  • #34: Countermeasures / Mindset:\nSegment key management from data usage\nSegment build / run environment\nTest for conformance, integrity\n
  • #35: ASG for everything\nAWS fleet-wide patch\nApril 2011 outage of a single AZ in US-EAST\n\nCountermeasures / Mindset:\nNever depend on “one” of anything (host, AZ, etc)\nStateless design in running instances\nTest for conformity, alert on non-conformity\n
  • #36: You can’t protect Software with More Software\nCountermeasures / Mindset:\nStrong key management\nSeparation of keys, data\nHardware key management\n
  • #37: Hard\nCountermeasures / Mindset:\nSLA, CSP in your Incident Response plan, TEST!\nRely on your other CIAp controls\n
  • #38: Hard\nCountermeasures / Mindset:\nSLA, CSP in your Incident Response plan, TEST!\nRely on your other CIAp controls\n
  • #39: Hard\nCountermeasures / Mindset:\nSLA, CSP in your Incident Response plan, TEST!\nRely on your other CIAp controls\n
  • #40: Hard\nCountermeasures / Mindset:\nSLA, CSP in your Incident Response plan, TEST!\nRely on your other CIAp controls\n
  • #41: Some lessons learned, some aspirational and in-motion\nIt’s hard work to move your systems, processes, and staff into this new environment\nAt times, it’ll feel chaotic..like you’re herding sheep and they’re running every which way\nBut once you learn the vocabulary and understand this technology, you’ll come to appreciate it. It’s actually very enabling and refreshing.\n
  • #42: Some lessons learned, some aspirational and in-motion\nIt’s hard work to move your systems, processes, and staff into this new environment\nAt times, it’ll feel chaotic..like you’re herding sheep and they’re running every which way\nBut once you learn the vocabulary and understand this technology, you’ll come to appreciate it. It’s actually very enabling and refreshing.\n
  • #43: Some lessons learned, some aspirational and in-motion\nIt’s hard work to move your systems, processes, and staff into this new environment\nAt times, it’ll feel chaotic..like you’re herding sheep and they’re running every which way\nBut once you learn the vocabulary and understand this technology, you’ll come to appreciate it. It’s actually very enabling and refreshing.\n
  • #44: Just like learning a new skill, it’s hard at first. Some things are still hard, but we’re working to make them easier. We’ll have some announcements in this space for everyone’s benefit, very exciting.\n
  • #45: Just like learning a new skill, it’s hard at first. Some things are still hard, but we’re working to make them easier. We’ll have some announcements in this space for everyone’s benefit, very exciting.\n
  • #46: Just like learning a new skill, it’s hard at first. Some things are still hard, but we’re working to make them easier. We’ll have some announcements in this space for everyone’s benefit, very exciting.\n
  • #47: Just like learning a new skill, it’s hard at first. Some things are still hard, but we’re working to make them easier. We’ll have some announcements in this space for everyone’s benefit, very exciting.\n
  • #48: Just like learning a new skill, it’s hard at first. Some things are still hard, but we’re working to make them easier. We’ll have some announcements in this space for everyone’s benefit, very exciting.\n
  • #49: Just like learning a new skill, it’s hard at first. Some things are still hard, but we’re working to make them easier. We’ll have some announcements in this space for everyone’s benefit, very exciting.\n
  • #50: Here’s a sample of what we’ve found to be easier, in our environment.\nWe’ll discuss some of these in more detail.\n
  • #51: Here’s a sample of what we’ve found to be easier, in our environment.\nWe’ll discuss some of these in more detail.\n
  • #52: Here’s a sample of what we’ve found to be easier, in our environment.\nWe’ll discuss some of these in more detail.\n
  • #53: Here’s a sample of what we’ve found to be easier, in our environment.\nWe’ll discuss some of these in more detail.\n
  • #54: Here’s a sample of what we’ve found to be easier, in our environment.\nWe’ll discuss some of these in more detail.\n
  • #55: Here’s a sample of what we’ve found to be easier, in our environment.\nWe’ll discuss some of these in more detail.\n
  • #56: Here’s a sample of what we’ve found to be easier, in our environment.\nWe’ll discuss some of these in more detail.\n
  • #57: Here’s a sample of what we’ve found to be easier, in our environment.\nWe’ll discuss some of these in more detail.\n
  • #58: Here’s a sample of what we’ve found to be easier, in our environment.\nWe’ll discuss some of these in more detail.\n
  • #59: Classic IT: uptime was paramount. Rebooting was something you snickered at the Windows guys about.\n\nYou patched, and tweaked, and documented all your changes.\n\nAnd prayed to God that all those fixes and tweaks worked, and the system actually came back up the next time you restarted it.\n\nEvery instance was unique, a special snowflake.\n
  • #60: Classic IT: uptime was paramount. Rebooting was something you snickered at the Windows guys about.\n\nYou patched, and tweaked, and documented all your changes.\n\nAnd prayed to God that all those fixes and tweaks worked, and the system actually came back up the next time you restarted it.\n\nEvery instance was unique, a special snowflake.\n
  • #61: Classic IT: uptime was paramount. Rebooting was something you snickered at the Windows guys about.\n\nYou patched, and tweaked, and documented all your changes.\n\nAnd prayed to God that all those fixes and tweaks worked, and the system actually came back up the next time you restarted it.\n\nEvery instance was unique, a special snowflake.\n
  • #62: We’ve been moving towards automation for a while now. The paradigm was to make adjustments to instances already running. The best models create “gold standard” images and deploy those.\n\nThe goal is to have every instance look exactly the same, run the same, and behave the same.\n\nWe’re taking a hard stance on this. We got here because of agility, but we have many security wins as a result.\n\n
  • #63: It sounds heretical. Why patch when you can throw it away and start over?\n
  • #64: Why bother fixing the configuration when you can deploy the “right” configuration from the start?\n\nThe same behavior for deploying new, for patching, and for upgrades means operations becomes simpler, easy to do/train/monitor.\n
  • #65: Look at problems as opportunities. Rather than mandate 100% uptime from our CSP, we assumed the environment would be unpredictable. This forced us to build reliability into our applications and infrastructure.\n\nIn other words: the Cloud is not a technology, it’s more than virtualization. It’s a fundamentally different way of thinking about writing applications, providing computing services, and running your business.\n
  • #66: Look at problems as opportunities. Rather than mandate 100% uptime from our CSP, we assumed the environment would be unpredictable. This forced us to build reliability into our applications and infrastructure.\n\nIn other words: the Cloud is not a technology, it’s more than virtualization. It’s a fundamentally different way of thinking about writing applications, providing computing services, and running your business.\n
  • #67: Look at problems as opportunities. Rather than mandate 100% uptime from our CSP, we assumed the environment would be unpredictable. This forced us to build reliability into our applications and infrastructure.\n\nIn other words: the Cloud is not a technology, it’s more than virtualization. It’s a fundamentally different way of thinking about writing applications, providing computing services, and running your business.\n
  • #68: Look at problems as opportunities. Rather than mandate 100% uptime from our CSP, we assumed the environment would be unpredictable. This forced us to build reliability into our applications and infrastructure.\n\nIn other words: the Cloud is not a technology, it’s more than virtualization. It’s a fundamentally different way of thinking about writing applications, providing computing services, and running your business.\n
  • #69: Look at problems as opportunities. Rather than mandate 100% uptime from our CSP, we assumed the environment would be unpredictable. This forced us to build reliability into our applications and infrastructure.\n\nIn other words: the Cloud is not a technology, it’s more than virtualization. It’s a fundamentally different way of thinking about writing applications, providing computing services, and running your business.\n
  • #70: \n
  • #71: \n
  • #72: Conformity:\nProvisioning: Can easily list every application running, all attributes including owner\nConformity Monkey checks for consistency , detects out-of-spec instances\nInconsistencies create runtime problems, outages, troubleshooting nightmares.\n* Lesson Learned: Identify failure modes, bake these test controls into your infrastructure.\n\nConsistency:\nAutomated software packaging, host build processes\nHands-off launch process; spans hosts, load balancers, security groups, etc.\nInstances are formed into “application groups”\n\n
  • #73: Conformity:\nProvisioning: Can easily list every application running, all attributes including owner\nConformity Monkey checks for consistency , detects out-of-spec instances\nInconsistencies create runtime problems, outages, troubleshooting nightmares.\n* Lesson Learned: Identify failure modes, bake these test controls into your infrastructure.\n\nConsistency:\nAutomated software packaging, host build processes\nHands-off launch process; spans hosts, load balancers, security groups, etc.\nInstances are formed into “application groups”\n\n
  • #74: Conformity:\nProvisioning: Can easily list every application running, all attributes including owner\nConformity Monkey checks for consistency , detects out-of-spec instances\nInconsistencies create runtime problems, outages, troubleshooting nightmares.\n* Lesson Learned: Identify failure modes, bake these test controls into your infrastructure.\n\nConsistency:\nAutomated software packaging, host build processes\nHands-off launch process; spans hosts, load balancers, security groups, etc.\nInstances are formed into “application groups”\n\n
  • #75: All instances have:\n- ASG, SecGrp, ELBs, owners, description, email addr -- almost like a CMDB.\n- everything that doesn’t gets killed by janitor monkey\n-control over my env is straightforward\n\nA few clicks on a web page and about an hour to go from nothing to a very large Cassandra cluster consisting of 288 medium sized instances, with 96 instances in each of three EC2 availability zones in the US-East region.\n\n15 minutes to boot EC2, out of our total of 66 minutes. The rest of the time was taken to boot Linux, start the Apache Tomcat JVM that runs our automation tooling, start the Cassandra JVM and join the "ring" that makes up the Cassandra data store.\n\n For a more typical 12 instance Cassandra cluster the same sequence takes 8 minutes.\n\n
  • #76: All instances have:\n- ASG, SecGrp, ELBs, owners, description, email addr -- almost like a CMDB.\n- everything that doesn’t gets killed by janitor monkey\n-control over my env is straightforward\n\nA few clicks on a web page and about an hour to go from nothing to a very large Cassandra cluster consisting of 288 medium sized instances, with 96 instances in each of three EC2 availability zones in the US-East region.\n\n15 minutes to boot EC2, out of our total of 66 minutes. The rest of the time was taken to boot Linux, start the Apache Tomcat JVM that runs our automation tooling, start the Cassandra JVM and join the "ring" that makes up the Cassandra data store.\n\n For a more typical 12 instance Cassandra cluster the same sequence takes 8 minutes.\n\n
  • #77: All instances have:\n- ASG, SecGrp, ELBs, owners, description, email addr -- almost like a CMDB.\n- everything that doesn’t gets killed by janitor monkey\n-control over my env is straightforward\n\nA few clicks on a web page and about an hour to go from nothing to a very large Cassandra cluster consisting of 288 medium sized instances, with 96 instances in each of three EC2 availability zones in the US-East region.\n\n15 minutes to boot EC2, out of our total of 66 minutes. The rest of the time was taken to boot Linux, start the Apache Tomcat JVM that runs our automation tooling, start the Cassandra JVM and join the "ring" that makes up the Cassandra data store.\n\n For a more typical 12 instance Cassandra cluster the same sequence takes 8 minutes.\n\n
  • #78: some items are aspirational, but we’re working on it.\n\nThese are similar to NIST’s “continuous monitoring” movement.\n
  • #79: some items are aspirational, but we’re working on it.\n\nThese are similar to NIST’s “continuous monitoring” movement.\n
  • #80: some items are aspirational, but we’re working on it.\n\nThese are similar to NIST’s “continuous monitoring” movement.\n
  • #81: some items are aspirational, but we’re working on it.\n\nThese are similar to NIST’s “continuous monitoring” movement.\n
  • #82: some items are aspirational, but we’re working on it.\n\nThese are similar to NIST’s “continuous monitoring” movement.\n
  • #83: some items are aspirational, but we’re working on it.\n\nThese are similar to NIST’s “continuous monitoring” movement.\n
  • #84: some items are aspirational, but we’re working on it.\n\nThese are similar to NIST’s “continuous monitoring” movement.\n
  • #85: some items are aspirational, but we’re working on it.\n\nThese are similar to NIST’s “continuous monitoring” movement.\n
  • #86: \n
  • #87: \n
  • #88: It’s a completely different way to provide your services. More disruptive than just a new technology.\n Bring your InfoSec expertise and foresight to secure your data in the cloud migration.\n You can embed security controls in your development, infrastructure, business operations.\n The old ways won’t work; embrace the new ones and have better control.\n
  • #89: It’s a completely different way to provide your services. More disruptive than just a new technology.\n Bring your InfoSec expertise and foresight to secure your data in the cloud migration.\n You can embed security controls in your development, infrastructure, business operations.\n The old ways won’t work; embrace the new ones and have better control.\n
  • #90: It’s a completely different way to provide your services. More disruptive than just a new technology.\n Bring your InfoSec expertise and foresight to secure your data in the cloud migration.\n You can embed security controls in your development, infrastructure, business operations.\n The old ways won’t work; embrace the new ones and have better control.\n
  • #91: It’s a completely different way to provide your services. More disruptive than just a new technology.\n Bring your InfoSec expertise and foresight to secure your data in the cloud migration.\n You can embed security controls in your development, infrastructure, business operations.\n The old ways won’t work; embrace the new ones and have better control.\n
  • #92: It’s a completely different way to provide your services. More disruptive than just a new technology.\n Bring your InfoSec expertise and foresight to secure your data in the cloud migration.\n You can embed security controls in your development, infrastructure, business operations.\n The old ways won’t work; embrace the new ones and have better control.\n
  • #93: It’s a completely different way to provide your services. More disruptive than just a new technology.\n Bring your InfoSec expertise and foresight to secure your data in the cloud migration.\n You can embed security controls in your development, infrastructure, business operations.\n The old ways won’t work; embrace the new ones and have better control.\n
  • #94: It’s a completely different way to provide your services. More disruptive than just a new technology.\n Bring your InfoSec expertise and foresight to secure your data in the cloud migration.\n You can embed security controls in your development, infrastructure, business operations.\n The old ways won’t work; embrace the new ones and have better control.\n
  • #95: \n
  • #96: \n