SlideShare a Scribd company logo
Introducing NSX Service Composer:
The New Consumption Model for Security Services
in the SDDC
Merritte Stidston, McKesson
James Wiese, VMware
SEC5749
#SEC5749
2
Agenda
 Cloud Security: The Challenge
 Customer Example: McKesson
 Introducing - NSX Service Composer
 Product Examples
3
Problems with Security Products in a Virtual Environment
 End Users Blame IT for being ‘Slow’
• Focus generally is only on Storage, Network, Compute but Security can drag
deployments – Need mechanism to apply policy to VM provisioning (make it stick)
 Bigger Datacenter Threat: Rapid Deployment From the Inside (Drift)
• Users Create Servers Instantly – Snapshot of a golden image used to provision many
instances of server instantly, New VMs are not connected to protection service
• Servers have stale configurations & vulnerable software which introduces threat
 Security Product Can Not “See” the VM
• VLANs can also segment out the network scanning services
• Is the VM on the right network? Is the right version of the agent there? Does the VM
agent have access to the security product console? What are the credentials?
 Security Products Do Not Interoperate
• No Ability to Detect Issue & Remediate without complicated scripts & process
• Many Ways to Identify a VM – Requires correlation for management (SID, IP, VMID)
4
Overall Challenge: Security in the SDDC
Cumbersome Provisioning
Complicated deployment and troubleshooting
processes make it difficult to maintain service
levels for security.
Manual, Cross-Service Workflows
Security and cloud admins volley back and
forth to identify, assess, plan, implement
security risks…a very inefficient process.
Security Policy ≠ Security Operations
Expecting cloud operators to manage security
policies is unrealistic and unfair. Security
architects define policy. Cloud operators
implement policy.
Cloud
Operator
✔ ?
5
Challenge: Firewall Roulette: Which VM is behind Which Wire?
CISO: We need to
make sure the
Firewall is protecting
the RED VMs
appropriately. Can
you confirm this?
6
Challenge: Detection Services Not Interoperable & Increase Process
Web Servers
Services
Monitor
Events
Identify Threat
Report
File Ticket
With NetBios ID
Receive Ticket
Notification
Correlate to IP
(Attempt)
Ask for
VLAN Tag
Determine
VM -> Subnet -> Tag
Realize NAT Issue?
Create
Rule
Verify RuleClose Ticket
Open Ticket
To Patch Machine
7
7
Challenge: 9-Dashboards of Wonder & Making Security Stick
Agile security is possible in
2012…
…if you identify workloads and
connect the system – by IP, by
SID, by subnet, by host, by user,
and don’t change anything…
Vulnerability
System
Antivirus
System
Firewall
vCenter
IDS System
DLP System
8
 No knowledge of internal traffic and potential threats
 Most breaches are not discovered by the breached party.
 Common point of purchase
Current state — head in the sand
"I know I am wearing rose-colored glasses; we
just haven't looked into this."
9
10
Agenda
 Cloud Security: The Challenge
 Customer Example: McKesson
 Introducing - NSX Service Composer
 Product Examples
11
Architectural Complexity: Securing Virtualization within the IT Infrastructure
12
Architectural Complexity: Securing Virtualization within the IT Infrastructure
Management & Admin Network
Zone
PCI Internal Service
Networks CoLo Internal Service
Network
ASP-MSP Internal
Service Network
McKIT Shared Service
Network
Network Core Layer McKIT
WAN-MPLS
B2B
Extranet
Internet McKesson CareBridge
Edge Perimeter Zone
Edge
Router
ISP 1
F/W
F/W
F/WF/W
F/W
F/W
CoLo’s
External HostingASP
MPS
Partners, Vendors,
Sub-Contractors
McKIT
Shared DMZ
PCI
DMZ
VPN
Remote Access
Core Edge Firewall Layer
O/S
Build
VM
Build
VM
Repository
HyTrust
Gateway
vCenter
vShield
App
Edge
Endpoint
Crypto
AV Agent
Auth-LDAP
Logs
VM1…n
Hypervisor Layer
B/U
Mngt. Agent
Hosts 1…n
vNet Fabric
vSwitch1 vSwitch2 vSwitch3 vSwitchn
Management &
Security
Services
(Physical)
Patch
Secure
VMs
B.U.R.N
VTLVTL
De-Dup
Back-up/Restore
Solution
Tape
* DASD
* SAN
* NAS
-NSF
-ISCI
-SMB
vSafe 1.6/API
vShield 1.6/API
ISP 2
Internal
Router
Infrastructure Distribution Layer
External Untrusted Layer
McK
Remote Offices
McK Remote Sites
Internal Trusted
Layer
ESXi
Mngt YF
vShield Endpoint
Patching
HP CSA SEIM
EKMDE
Directory Services
Central Logging
Key Management
vShield Edge
Backup & Recovery
Nessus
Vulnerability Scan
DLPIDS / IPS
Anti-virus
Inventory
13
What is Secure Lab?
 What were some of the business problems that prompted you to
pick up the security baton?
• A fundamental belief that security is everyone's responsibility
• Our business units requested it and our customers expect it
• Build infrastructure with a security 1st approach was a challenge
 What technical challenges made this an urgent need?
• No roadmap to help guide the way
• Multiple tools to integrate
• Common framework with common goals
• Decoupled software & hardware stack (Allows for future changes)
14
SecureLab
McKesson
Imaging
VDC
Developers &
App Support
ESXi
INTEL TXT INTEL TXT
VCD
ESXiESXiESXi
View 5 VDI
(hardened)
McKesson SecureLab: NGDC Architecture
Physical
desktops
& laptops
VDI “bastion host”
only access
App A
Web MW DB
VDI
VDI
VDI
VDI WebDBMW
App B
vShield App
All VDI instances
automatically
firewalled from
one another
vShield Edge
Network Gateway and
Secure Multi-tenancy
vShield App
VDI “group” to App access
allowed by vShield App
ESXi Trusted boot
with Intel TPM/TXT
TPM/TXT
Horizon
Clinicals
VDC
App C
WebDB MW
App D
DB
15
Agenda
 Cloud Security: The Challenge
 Customer Example: McKesson
 Introducing - NSX Service Composer
 Product Examples
16
NSX Service Composer
Security services can now be consumed more efficiently in the
software-defined data center.
Apply.
Apply and visualize
security policies for
workloads, in one
place.
Automate.
Automate
workflows across
different services,
without custom
integration.
Provision.
Provision and
monitor uptime of
different services,
using one method.
17
Concept – Apply Policies to Workloads
Security Groups
WHAT you want to
protect
Members (VM, vNIC…) and
Context (user identity, security
posture)
HOW you want to
protect it
Services (Firewall, antivirus…)
and Profiles (labels representing
specific policies)
APPLY
Define security policies based on service profiles already defined (or
blessed) by the security team. Apply these policies to one or more
security groups where your workloads are members.
18
NSX Service Composer – Canvas View
19
Introducing – NSX Service Composer
Policies – collection of service
profiles - assigned to this
container…to define HOW you
want to protect this container
e.g. “PCI Compliance” or
“Quarantine Policy’
Nested containers –
other groupings within
the container
e.g. “Quarantine Zone” is
a sub group within “My
Data Center”
VMs (workloads) that belong to this
container.
e.g. “Apache-Web-VM”, “Exchange Server-
VM”
Containers – Grouping of VMs, IPs, and
more…to define WHAT you want to protect.
e.g. “Financial Applications”, “Desktop Users”,
“Quarantine Zone”
Service profiles for *deployed*
services, assigned to these
policies
Services supported today:
• Distributed Virtual Firewall
• Anti-virus
• Vulnerability Management
• Network IPS
• Data Security (DLP scan)
• User Activity Monitoring
• File Integrity Monitoring
20
NSX Service Composer – Canvas View
Members: Apps and workloads that belong to this container.
e.g. “Apache-Web-VM”, “Exchange Server-VM”
21
22
Agenda
 Cloud Security: The Challenge
 Customer Example: McKesson
 Introducing - NSX Service Composer
 Product Examples
Corp
Cust Svc
Desktop
Engineering
Domain Controllers
Sales
Desktop
Sales
SAPSalesWeb
Extranet (DMZ)
External FTP
Servers
Corp External
Web
Eng Desktop
P1 – Corp Policy
Block Telnet, SSH from *
P2 – Department Policy
Block HTTP
P3 – Web App Policy
Allow 8080 from Desktops
Allow 443 from *
Block All Other
P4 – Eng Department Policy
Allow 80 HTTP from Internet
P5 – Desktop Policy
Block * to these from these
P6 – Sales Desktop Policy
Allow * from Sales/SAP
P7 – AD Policy
Allow * , TCP/UDP on port 137,445
Example: Firewall By Policy
24
Example: Orchestrating Security Between Multiple Services
SG: QuarantineSG: Web Servers
1.Web Server VM running IIS is deployed, unknowingly having a vulnerability
2.Vulnerability Scan is initiated on web server (e.g. Rapid7’s Nexpose product)
3.VM is tagged in NSX Manager with the CVE and CVSS Score
4.NSX Manager associates the VM with the Quarantine (VSM F/W Deny)
5.[Externally] Admin applies patches, Nexpose re-scans VMs, clears tag
6.NSX Manager removes the VM from Quarantine ; VM returns to it’s normal
duties
VSM F/W VSM F/W
Services Services
Membership: Include VMs which have CVSS score >= 9Membership: Include VMs which have been provisioned as “WebServer”
NSX Manager
25 Confidential
Example: Deploying Security Services On Demand
1. ESX Host added to cluster
2. Service Composer: Deploys Security VMs (Partner & VMW)
3. VM brought up on host
4. Service Composer: Appropriate Security Services applied
5. VM vMotions to different host
6. Service Composer: Appropriate Security Services applied
26
“Dev” “Test” “Stage”
wire FW wire FW
“Production”
wire LB FW IDS
FIM SVM AV LOG
wire LB FW IDS
FIM SVM AV LOG
Example: Precedence Enforced for Dev/Test to Production
Service Policy for
App
27
NSX Integrated Partners
NSX Controller & NSX Manager
NSX API
Partner Extensions
L2 Gateway FirewallADC/LB IDS/IPS
+
Cloud Management
Platforms
AV/FIM Vulnerability
Management
Security Services
28
VM Based Group Policy For Services
App
Consumer
Cloud
Operations
Infrastructure
(NOC)
29
NSX Service Composer Benefits
Streamline Service Provisioning
Fewer steps to deploy VMware and partner
content. Service outages are easy to
identify and troubleshoot.
Automate Workflows Across Services
Workflows between different services are
easily automated on this platform
Apply Policies in the SDDC
Workloads are easily organized (WHAT you
want to protect) and services can be easily
mapped to resources (HOW you want to
protect them), for consumption in the SDDC
AVFW
IPS DLP
Vuln. Mgmt
AVFWIPS DLPVuln. Mgmt
✔ ✔
30
Related Sessions
 SEC-5750: Security Automation Workflows with NSX
 SEC-5253: Get on with Business: Vmware Reference Architectures
Help Streamline Compliance Efforts
 HOL: HOL-SDC1303: VMware NSX Network Virtualized Platform
THANK YOU
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for Security Services in the SDDC
Introducing NSX Service Composer:
The New Consumption Model for Security Services
in the SDDC
Merritte Stidston, McKesson
James Wiese, VMware
SEC5749
#SEC5749
34
Background Slides
35
Concept – Service Profiles
Comprises One or More Services
At least one service is required to define a
service profile.
Container 1
Container 2
Container 3
Container Can Have Multiple
Service Profiles
Different profiles may need to apply to a single
container.
Precedence Must Be Enforced on
Service Profiles
Ultimately, these services manifest in real
security services so in the case of overlapping
services or conflicts, precedence must be
enforced.
36
Container 1
Concept – Containers
Contain VMs
Including machines, networks…anything that
could comprise an application But it could also
be empty, perhaps waiting for a state change.
Can Contain Other Containers
Nesting is a powerful concept that allows you
to group applications and resources more
flexibly.
Can Contain Object Defined by
Security Tags
Services have intelligence in the form of
visibility and control. They can find an issue
with a machine and tag it to identify the issue.
The mere act of tagging can add the machine
to a container.
Container 2 Container 3
37
VMware SDN & Security: Composite Policy Management
• Minimize Dedicated
Hardware
• Optimize Utilization
Security By Virtual Service
• Always Connected Security
• Scale Applications On-
demand
• Simplify Operations
VM Protection
• Integrated Management
• 3rd Party Extensible
Attach Services
• Dynamic Provisioning
• Detect & Remediate
Enable Policy-based
Automation
VMware Network & Security Virtualization
38
39
Introducing NSX Service Composer:
The New Consumption Model for Security Services
in the SDDC
Merritte Stidston, McKesson
James Wiese, VMware
SEC5749
#SEC5749

More Related Content

PDF
VMworld 2013: Security Automation Workflows with NSX
PDF
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
PPT
Why Security Teams should care about VMware
PDF
Protect Your End-of-Life Windows Server 2003 Operating System
PDF
Cloud Native Security: New Approach for a New Reality
PDF
VMware vRealize Network Insight Frequently Asked Questions FAQ
PPTX
Server update management optimization
PPTX
Virtualization Security
VMworld 2013: Security Automation Workflows with NSX
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
Why Security Teams should care about VMware
Protect Your End-of-Life Windows Server 2003 Operating System
Cloud Native Security: New Approach for a New Reality
VMware vRealize Network Insight Frequently Asked Questions FAQ
Server update management optimization
Virtualization Security

What's hot (20)

PPTX
Security for cloud native workloads
PPTX
VMware vRealize Network Insight 3.5 - Whats New
PPTX
Azure Security Overview
PPTX
Virtualization: Security and IT Audit Perspectives
PPT
Cloud Security
PPTX
VMworld 2016 Recap
PPTX
CLOUD NATIVE SECURITY
PPT
Net scaler appfw customer technical presentation dec 2012f
PDF
Cloud Security Introduction
PPTX
VMware vRealize Network Insight 3.4 whats new
PPTX
Securing your Windows Network with the Microsoft Security Baselines
PPTX
VMware overview presentation by alamgir hossain
PDF
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
PDF
AWS Cloud Security From the Point of View of the Compliance
PDF
Moving Forward with Network Virtualization (VMware NSX)
PPTX
VMware Technical Overview (2012)
PPTX
Security at the Speed of the Network
PDF
Azure for beginners series session 4
PDF
Cloud security introduction
PPTX
Vmug birmingham mar2013 trendmicro
Security for cloud native workloads
VMware vRealize Network Insight 3.5 - Whats New
Azure Security Overview
Virtualization: Security and IT Audit Perspectives
Cloud Security
VMworld 2016 Recap
CLOUD NATIVE SECURITY
Net scaler appfw customer technical presentation dec 2012f
Cloud Security Introduction
VMware vRealize Network Insight 3.4 whats new
Securing your Windows Network with the Microsoft Security Baselines
VMware overview presentation by alamgir hossain
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
AWS Cloud Security From the Point of View of the Compliance
Moving Forward with Network Virtualization (VMware NSX)
VMware Technical Overview (2012)
Security at the Speed of the Network
Azure for beginners series session 4
Cloud security introduction
Vmug birmingham mar2013 trendmicro
Ad

Viewers also liked (15)

PDF
VMworld 2013: vCloud Powered HPC is Better and Outperforming Physical
PPTX
vCloud Architecture BrownBag
PDF
VMware vSphere vMotion: 5.4 times faster than Hyper-V Live Migration
PDF
Zerto - Software Defined Disaster Recovery
PDF
Case Study: EVO SDDC Powered Private Cloud
PDF
Migrating to the Cloud: Lessons Learned from Federal Agencies
PDF
Infographic: Why Businesses are Adopting Network Virtualization
PPTX
ZERTO Introduction to End User Presentation
PDF
47 restore scenarios from Veeam Backup & Replication v8
PDF
(SCALE 12x) OpenStack vs. VMware - A System Administrator Perspective
PDF
Network Virtualization with VMware NSX
PDF
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
PDF
An Introduction to VMware NSX
PPTX
VMworld 2016: vSphere 6.x Host Resource Deep Dive
PPT
VMware Presentation
VMworld 2013: vCloud Powered HPC is Better and Outperforming Physical
vCloud Architecture BrownBag
VMware vSphere vMotion: 5.4 times faster than Hyper-V Live Migration
Zerto - Software Defined Disaster Recovery
Case Study: EVO SDDC Powered Private Cloud
Migrating to the Cloud: Lessons Learned from Federal Agencies
Infographic: Why Businesses are Adopting Network Virtualization
ZERTO Introduction to End User Presentation
47 restore scenarios from Veeam Backup & Replication v8
(SCALE 12x) OpenStack vs. VMware - A System Administrator Perspective
Network Virtualization with VMware NSX
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
An Introduction to VMware NSX
VMworld 2016: vSphere 6.x Host Resource Deep Dive
VMware Presentation
Ad

Similar to VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for Security Services in the SDDC (20)

PPTX
Nsx security deep dive
PDF
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
PDF
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
PPTX
#PCMVision: VMware NSX - Transforming Security
 
PDF
VMware NSX for vSphere - Intro and use cases
PPTX
nsx overview with use cases 1.0
PDF
VMworld 2014: Introduction to NSX
PDF
vSEC pro VMware NSX
PDF
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
PDF
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
PDF
VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
PDF
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
PPTX
VMware 2015: Next Horizon for Cloud Networking and Security
PPTX
NSX 9 Core Use Cases
PDF
VMware NSX @ VMUG.IT 20150529
PDF
VMworld Europe 2014: Advanced Network Services with NSX
PPTX
Avi v20.1 — What’s New in Scalable, Multi-Cloud Load Balancing
PPTX
New Threats, New Approaches in Modern Data Centers
PPTX
Securing virtual workload and cloud
PDF
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
Nsx security deep dive
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
#PCMVision: VMware NSX - Transforming Security
 
VMware NSX for vSphere - Intro and use cases
nsx overview with use cases 1.0
VMworld 2014: Introduction to NSX
vSEC pro VMware NSX
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMware 2015: Next Horizon for Cloud Networking and Security
NSX 9 Core Use Cases
VMware NSX @ VMUG.IT 20150529
VMworld Europe 2014: Advanced Network Services with NSX
Avi v20.1 — What’s New in Scalable, Multi-Cloud Load Balancing
New Threats, New Approaches in Modern Data Centers
Securing virtual workload and cloud
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks

More from VMworld (20)

PPTX
VMworld 2016: Troubleshooting 101 for Horizon
PPTX
VMworld 2016: Advanced Network Services with NSX
PPTX
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
PPTX
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
PPTX
VMworld 2016: What's New with Horizon 7
PPTX
VMworld 2016: Virtual Volumes Technical Deep Dive
PPTX
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
PPTX
VMworld 2016: The KISS of vRealize Operations!
PPTX
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
PPTX
VMworld 2016: Ask the vCenter Server Exerts Panel
PPTX
VMworld 2016: Virtualize Active Directory, the Right Way!
PPTX
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
PPTX
VMworld 2015: Troubleshooting for vSphere 6
PPTX
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
PPTX
VMworld 2015: Advanced SQL Server on vSphere
PPTX
VMworld 2015: Virtualize Active Directory, the Right Way!
PPTX
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
PPTX
VMworld 2015: Building a Business Case for Virtual SAN
PPTX
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
PPTX
VMworld 2015: Virtual Volumes Technical Deep Dive
VMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Advanced Network Services with NSX
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: What's New with Horizon 7
VMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Virtual Volumes Technical Deep Dive

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Machine learning based COVID-19 study performance prediction
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Electronic commerce courselecture one. Pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Empathic Computing: Creating Shared Understanding
Encapsulation theory and applications.pdf
Network Security Unit 5.pdf for BCA BBA.
Machine learning based COVID-19 study performance prediction
MYSQL Presentation for SQL database connectivity
Electronic commerce courselecture one. Pdf
Understanding_Digital_Forensics_Presentation.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Approach and Philosophy of On baking technology
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Unlocking AI with Model Context Protocol (MCP)
Diabetes mellitus diagnosis method based random forest with bat algorithm
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
The AUB Centre for AI in Media Proposal.docx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Digital-Transformation-Roadmap-for-Companies.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
NewMind AI Monthly Chronicles - July 2025
Empathic Computing: Creating Shared Understanding

VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for Security Services in the SDDC

  • 1. Introducing NSX Service Composer: The New Consumption Model for Security Services in the SDDC Merritte Stidston, McKesson James Wiese, VMware SEC5749 #SEC5749
  • 2. 2 Agenda  Cloud Security: The Challenge  Customer Example: McKesson  Introducing - NSX Service Composer  Product Examples
  • 3. 3 Problems with Security Products in a Virtual Environment  End Users Blame IT for being ‘Slow’ • Focus generally is only on Storage, Network, Compute but Security can drag deployments – Need mechanism to apply policy to VM provisioning (make it stick)  Bigger Datacenter Threat: Rapid Deployment From the Inside (Drift) • Users Create Servers Instantly – Snapshot of a golden image used to provision many instances of server instantly, New VMs are not connected to protection service • Servers have stale configurations & vulnerable software which introduces threat  Security Product Can Not “See” the VM • VLANs can also segment out the network scanning services • Is the VM on the right network? Is the right version of the agent there? Does the VM agent have access to the security product console? What are the credentials?  Security Products Do Not Interoperate • No Ability to Detect Issue & Remediate without complicated scripts & process • Many Ways to Identify a VM – Requires correlation for management (SID, IP, VMID)
  • 4. 4 Overall Challenge: Security in the SDDC Cumbersome Provisioning Complicated deployment and troubleshooting processes make it difficult to maintain service levels for security. Manual, Cross-Service Workflows Security and cloud admins volley back and forth to identify, assess, plan, implement security risks…a very inefficient process. Security Policy ≠ Security Operations Expecting cloud operators to manage security policies is unrealistic and unfair. Security architects define policy. Cloud operators implement policy. Cloud Operator ✔ ?
  • 5. 5 Challenge: Firewall Roulette: Which VM is behind Which Wire? CISO: We need to make sure the Firewall is protecting the RED VMs appropriately. Can you confirm this?
  • 6. 6 Challenge: Detection Services Not Interoperable & Increase Process Web Servers Services Monitor Events Identify Threat Report File Ticket With NetBios ID Receive Ticket Notification Correlate to IP (Attempt) Ask for VLAN Tag Determine VM -> Subnet -> Tag Realize NAT Issue? Create Rule Verify RuleClose Ticket Open Ticket To Patch Machine
  • 7. 7 7 Challenge: 9-Dashboards of Wonder & Making Security Stick Agile security is possible in 2012… …if you identify workloads and connect the system – by IP, by SID, by subnet, by host, by user, and don’t change anything… Vulnerability System Antivirus System Firewall vCenter IDS System DLP System
  • 8. 8  No knowledge of internal traffic and potential threats  Most breaches are not discovered by the breached party.  Common point of purchase Current state — head in the sand "I know I am wearing rose-colored glasses; we just haven't looked into this."
  • 9. 9
  • 10. 10 Agenda  Cloud Security: The Challenge  Customer Example: McKesson  Introducing - NSX Service Composer  Product Examples
  • 11. 11 Architectural Complexity: Securing Virtualization within the IT Infrastructure
  • 12. 12 Architectural Complexity: Securing Virtualization within the IT Infrastructure Management & Admin Network Zone PCI Internal Service Networks CoLo Internal Service Network ASP-MSP Internal Service Network McKIT Shared Service Network Network Core Layer McKIT WAN-MPLS B2B Extranet Internet McKesson CareBridge Edge Perimeter Zone Edge Router ISP 1 F/W F/W F/WF/W F/W F/W CoLo’s External HostingASP MPS Partners, Vendors, Sub-Contractors McKIT Shared DMZ PCI DMZ VPN Remote Access Core Edge Firewall Layer O/S Build VM Build VM Repository HyTrust Gateway vCenter vShield App Edge Endpoint Crypto AV Agent Auth-LDAP Logs VM1…n Hypervisor Layer B/U Mngt. Agent Hosts 1…n vNet Fabric vSwitch1 vSwitch2 vSwitch3 vSwitchn Management & Security Services (Physical) Patch Secure VMs B.U.R.N VTLVTL De-Dup Back-up/Restore Solution Tape * DASD * SAN * NAS -NSF -ISCI -SMB vSafe 1.6/API vShield 1.6/API ISP 2 Internal Router Infrastructure Distribution Layer External Untrusted Layer McK Remote Offices McK Remote Sites Internal Trusted Layer ESXi Mngt YF vShield Endpoint Patching HP CSA SEIM EKMDE Directory Services Central Logging Key Management vShield Edge Backup & Recovery Nessus Vulnerability Scan DLPIDS / IPS Anti-virus Inventory
  • 13. 13 What is Secure Lab?  What were some of the business problems that prompted you to pick up the security baton? • A fundamental belief that security is everyone's responsibility • Our business units requested it and our customers expect it • Build infrastructure with a security 1st approach was a challenge  What technical challenges made this an urgent need? • No roadmap to help guide the way • Multiple tools to integrate • Common framework with common goals • Decoupled software & hardware stack (Allows for future changes)
  • 14. 14 SecureLab McKesson Imaging VDC Developers & App Support ESXi INTEL TXT INTEL TXT VCD ESXiESXiESXi View 5 VDI (hardened) McKesson SecureLab: NGDC Architecture Physical desktops & laptops VDI “bastion host” only access App A Web MW DB VDI VDI VDI VDI WebDBMW App B vShield App All VDI instances automatically firewalled from one another vShield Edge Network Gateway and Secure Multi-tenancy vShield App VDI “group” to App access allowed by vShield App ESXi Trusted boot with Intel TPM/TXT TPM/TXT Horizon Clinicals VDC App C WebDB MW App D DB
  • 15. 15 Agenda  Cloud Security: The Challenge  Customer Example: McKesson  Introducing - NSX Service Composer  Product Examples
  • 16. 16 NSX Service Composer Security services can now be consumed more efficiently in the software-defined data center. Apply. Apply and visualize security policies for workloads, in one place. Automate. Automate workflows across different services, without custom integration. Provision. Provision and monitor uptime of different services, using one method.
  • 17. 17 Concept – Apply Policies to Workloads Security Groups WHAT you want to protect Members (VM, vNIC…) and Context (user identity, security posture) HOW you want to protect it Services (Firewall, antivirus…) and Profiles (labels representing specific policies) APPLY Define security policies based on service profiles already defined (or blessed) by the security team. Apply these policies to one or more security groups where your workloads are members.
  • 18. 18 NSX Service Composer – Canvas View
  • 19. 19 Introducing – NSX Service Composer Policies – collection of service profiles - assigned to this container…to define HOW you want to protect this container e.g. “PCI Compliance” or “Quarantine Policy’ Nested containers – other groupings within the container e.g. “Quarantine Zone” is a sub group within “My Data Center” VMs (workloads) that belong to this container. e.g. “Apache-Web-VM”, “Exchange Server- VM” Containers – Grouping of VMs, IPs, and more…to define WHAT you want to protect. e.g. “Financial Applications”, “Desktop Users”, “Quarantine Zone” Service profiles for *deployed* services, assigned to these policies Services supported today: • Distributed Virtual Firewall • Anti-virus • Vulnerability Management • Network IPS • Data Security (DLP scan) • User Activity Monitoring • File Integrity Monitoring
  • 20. 20 NSX Service Composer – Canvas View Members: Apps and workloads that belong to this container. e.g. “Apache-Web-VM”, “Exchange Server-VM”
  • 21. 21
  • 22. 22 Agenda  Cloud Security: The Challenge  Customer Example: McKesson  Introducing - NSX Service Composer  Product Examples
  • 23. Corp Cust Svc Desktop Engineering Domain Controllers Sales Desktop Sales SAPSalesWeb Extranet (DMZ) External FTP Servers Corp External Web Eng Desktop P1 – Corp Policy Block Telnet, SSH from * P2 – Department Policy Block HTTP P3 – Web App Policy Allow 8080 from Desktops Allow 443 from * Block All Other P4 – Eng Department Policy Allow 80 HTTP from Internet P5 – Desktop Policy Block * to these from these P6 – Sales Desktop Policy Allow * from Sales/SAP P7 – AD Policy Allow * , TCP/UDP on port 137,445 Example: Firewall By Policy
  • 24. 24 Example: Orchestrating Security Between Multiple Services SG: QuarantineSG: Web Servers 1.Web Server VM running IIS is deployed, unknowingly having a vulnerability 2.Vulnerability Scan is initiated on web server (e.g. Rapid7’s Nexpose product) 3.VM is tagged in NSX Manager with the CVE and CVSS Score 4.NSX Manager associates the VM with the Quarantine (VSM F/W Deny) 5.[Externally] Admin applies patches, Nexpose re-scans VMs, clears tag 6.NSX Manager removes the VM from Quarantine ; VM returns to it’s normal duties VSM F/W VSM F/W Services Services Membership: Include VMs which have CVSS score >= 9Membership: Include VMs which have been provisioned as “WebServer” NSX Manager
  • 25. 25 Confidential Example: Deploying Security Services On Demand 1. ESX Host added to cluster 2. Service Composer: Deploys Security VMs (Partner & VMW) 3. VM brought up on host 4. Service Composer: Appropriate Security Services applied 5. VM vMotions to different host 6. Service Composer: Appropriate Security Services applied
  • 26. 26 “Dev” “Test” “Stage” wire FW wire FW “Production” wire LB FW IDS FIM SVM AV LOG wire LB FW IDS FIM SVM AV LOG Example: Precedence Enforced for Dev/Test to Production Service Policy for App
  • 27. 27 NSX Integrated Partners NSX Controller & NSX Manager NSX API Partner Extensions L2 Gateway FirewallADC/LB IDS/IPS + Cloud Management Platforms AV/FIM Vulnerability Management Security Services
  • 28. 28 VM Based Group Policy For Services App Consumer Cloud Operations Infrastructure (NOC)
  • 29. 29 NSX Service Composer Benefits Streamline Service Provisioning Fewer steps to deploy VMware and partner content. Service outages are easy to identify and troubleshoot. Automate Workflows Across Services Workflows between different services are easily automated on this platform Apply Policies in the SDDC Workloads are easily organized (WHAT you want to protect) and services can be easily mapped to resources (HOW you want to protect them), for consumption in the SDDC AVFW IPS DLP Vuln. Mgmt AVFWIPS DLPVuln. Mgmt ✔ ✔
  • 30. 30 Related Sessions  SEC-5750: Security Automation Workflows with NSX  SEC-5253: Get on with Business: Vmware Reference Architectures Help Streamline Compliance Efforts  HOL: HOL-SDC1303: VMware NSX Network Virtualized Platform
  • 33. Introducing NSX Service Composer: The New Consumption Model for Security Services in the SDDC Merritte Stidston, McKesson James Wiese, VMware SEC5749 #SEC5749
  • 35. 35 Concept – Service Profiles Comprises One or More Services At least one service is required to define a service profile. Container 1 Container 2 Container 3 Container Can Have Multiple Service Profiles Different profiles may need to apply to a single container. Precedence Must Be Enforced on Service Profiles Ultimately, these services manifest in real security services so in the case of overlapping services or conflicts, precedence must be enforced.
  • 36. 36 Container 1 Concept – Containers Contain VMs Including machines, networks…anything that could comprise an application But it could also be empty, perhaps waiting for a state change. Can Contain Other Containers Nesting is a powerful concept that allows you to group applications and resources more flexibly. Can Contain Object Defined by Security Tags Services have intelligence in the form of visibility and control. They can find an issue with a machine and tag it to identify the issue. The mere act of tagging can add the machine to a container. Container 2 Container 3
  • 37. 37 VMware SDN & Security: Composite Policy Management • Minimize Dedicated Hardware • Optimize Utilization Security By Virtual Service • Always Connected Security • Scale Applications On- demand • Simplify Operations VM Protection • Integrated Management • 3rd Party Extensible Attach Services • Dynamic Provisioning • Detect & Remediate Enable Policy-based Automation VMware Network & Security Virtualization
  • 38. 38
  • 39. 39
  • 40. Introducing NSX Service Composer: The New Consumption Model for Security Services in the SDDC Merritte Stidston, McKesson James Wiese, VMware SEC5749 #SEC5749