SECURE APPLICATION MIGRATION · 2020. 4. 17. · Secure Application Migration 1 SECURE APPLICATION...

5
illumio.com SOLUTION BRIEF Secure Application Migration 1 SECURE APPLICATION MIGRATION TRAFFIC VISIBILITY AND UNIFORM SECURITY—ACROSS ANY INFRASTRUCTURE All enterprises undertake application migration projects, ranging from moving new or existing applications to public clouds, consolidating data centers, or building new data centers. The Illumio Adaptive Security Platform (ASP)™ helps enterprises secure their applications before, during, and after migration efforts. Securing a New Application in a Public Cloud PCI201903 After Illumio Security moves with every workload to any public cloud (e.g., Amazon Web Services, Microsoft Azure) Gain live, interactive visibility into cloud workloads and their traffic flows Integrate security with orchestration tools (e.g., Chef, Puppet, Ansible) Figure 1: Organizations have limited visibility into workload interactions in public clouds, and security offerings from public cloud providers aren’t fine-grained enough to recreate the security posture in private data centers. Figure 2: Illumio ASP securing an HRM application in a public cloud with visibility of all traffic flows. EC2 Instance Region Subnet 2 10.0.1.0/24 VPC 1 10.0.1.0/16 Availability Zone A Availability Zone B AWS Router Router 10.0.0.5 10.0.0.6 10.0.0.7 EC2 Instance Subnet 1 10.0.0.0/24 10.0.1.5 10.0.1.6 10.0.1.7 TARGET DESTINATION local 10.0.0.0/16 Main Route Table Before Illumio Lack of network control in public clouds only permits coarse-grained security Lack of application visibility limits security posture Non-uniform security strategies across different cloud providers limits portability

Transcript of SECURE APPLICATION MIGRATION · 2020. 4. 17. · Secure Application Migration 1 SECURE APPLICATION...

Page 1: SECURE APPLICATION MIGRATION · 2020. 4. 17. · Secure Application Migration 1 SECURE APPLICATION MIGRATION TRAFFIC VISIBILITY AND UNIFORM SECURITY—ACROSS ANY INFRASTRUCTURE All

illumio.com

SOLUTION BRIEFSecure Application Migration

1

SECURE APPLICATION MIGRATIONTRAFFIC VISIBILITY AND UNIFORM SECURITY—ACROSS ANY INFRASTRUCTUREAll enterprises undertake application migration projects, ranging from moving new or existing applications to public clouds, consolidating data centers, or building new data centers. The Illumio Adaptive Security Platform (ASP)™ helps enterprises secure their applications before, during, and after migration efforts.

Securing a New Application in a Public Cloud

PCI201903

After Illumio�� Security moves with every workload to any public

cloud (e.g., Amazon Web Services, Microsoft Azure)

�� Gain live, interactive visibility into cloud workloads and their traffic flows

�� Integrate security with orchestration tools (e.g., Chef, Puppet, Ansible)

Figure 1: Organizations have limited visibility into workload interactions in public clouds, and security offerings from public cloud providers aren’t fine-grained enough to recreate the security posture in private data centers.

Figure 2: Illumio ASP securing an HRM application in a public cloud with visibility of all traffic flows.

EC2 Instance

Region

Subnet 210.0.1.0/24

VPC 110.0.1.0/16

Availability Zone A

Availability Zone B

AWS

RouterRouter

10.0.0.510.0.0.610.0.0.7

EC2 InstanceSubnet 1

10.0.0.0/24

10.0.1.510.0.1.610.0.1.7

TARGETDESTINATION

local10.0.0.0/16

Main Route Table

Before Illumio�� Lack of network control in public clouds only

permits coarse-grained security

�� Lack of application visibility limits security posture

�� Non-uniform security strategies across different cloud providers limits portability

Page 2: SECURE APPLICATION MIGRATION · 2020. 4. 17. · Secure Application Migration 1 SECURE APPLICATION MIGRATION TRAFFIC VISIBILITY AND UNIFORM SECURITY—ACROSS ANY INFRASTRUCTURE All

illumio.com

SOLUTION BRIEFSecure Application Migration

2

Moving policy and enforcement to cloud

After Illumio�� Enforce uniform security policies across all data

center and cloud workloads

�� Instantly encrypt data in motion (IPsec) between any Linux/Windows workloads across any environment

�� Ensure application workloads auto scale securely in the cloud or data center

Figure 3: Organizations don’t have control over the network in a public cloud, making it difficult to implement security and keep it uniform across their environments.

Figure 4: Illumio ASP securing an ordering application deployed across a hybrid environment with complete visibility of traffic flows.

FPO: Create a graphic from slide #27 of Secure App

Migration sales play pitch deck (v18 currently).

Private: 10.0.1.5

EC2 Instance

Subnet 210.0.1.0/24

Availability Zone A

Availability Zone B

Internet Gateway

AWS

VPGVPG

V2

VPN CorporateNetworkCustomer

GatewayCustomerGateway

RouterRouter

Private: 10.0.0.5

EC2 Instance

Subnet 110.0.0.0/24

EIP : 198.51.100.1 V1 TARGETDESTINATION

local

igw-id

10.0.0.0/16

0.0.0.0/0

Custom Route Table

TARGETDESTINATION

local10.0.0.0/16

Main Route Table

Before Illumio�� No control over the network in public cloud—

network-centric security doesn’t work

�� Risk of breaking applications without visibility to traffic flows

�� Non-uniform security policies between data center and public cloud make security hard to set up and maintain

Page 3: SECURE APPLICATION MIGRATION · 2020. 4. 17. · Secure Application Migration 1 SECURE APPLICATION MIGRATION TRAFFIC VISIBILITY AND UNIFORM SECURITY—ACROSS ANY INFRASTRUCTURE All

illumio.com

SOLUTION BRIEFSecure Application Migration

3

Securely consolidating or expanding data centers

RELATED ASSETSFor additional information on securely migrating your enterprise applications, visit www.illumio.com/use-case-overview. You can also download white papers on this and other topics at www.illumio.com/resources.

After Illumio�� Visually discover and understand the topology of

all applications and their interactions

�� Security adapts to workload migrations, which reduces operational costs by eliminating manual changes

�� Build and test policies to enforce security with confidence, reducing application outages application changes

Figure 5: Securing applications using complex, static network constructs (e.g., IP addresses, subnets, VLANs, zones) makes data center consolidation and expansion efforts complex and time-intensive.

Figure 6: Illumio ASP discovering and securing an ordering application (US-EAST data center) migrated to the US-WEST data center.

Both Apps Secured in US-West Data Center

US-East Data Center

Before Illumio�� Requires manual processes to reconcile firewall

rules in a consolidated data center

�� Risk of breaking migrated applications when enforcing policies without visibility into traffic flows

�� Lack of security automation and integration with DevOps tools slows migration efforts

Page 4: SECURE APPLICATION MIGRATION · 2020. 4. 17. · Secure Application Migration 1 SECURE APPLICATION MIGRATION TRAFFIC VISIBILITY AND UNIFORM SECURITY—ACROSS ANY INFRASTRUCTURE All

illumio.com

SOLUTION BRIEFSecure Application Migration

4

The Illumio ASP architecture consists of lightweight Virtual Enforcement Nodes (VENs) installed on workloads residing in any data center or cloud. The VENs act as antennas and send telemetry information about the workloads to a Policy Compute Engine (PCE) that acts as the central brain of the platform. The PCE builds a graph of all dependencies between workloads and their applications and computes precise security policies that are instrumented into the native security capabilities (iptables or Windows Filtering Platform) in every workload. Anytime applications or environments change, Illumio ASP automatically adapts by recomputing and updating the policies.

Virtual Enforcement Node (VEN)Like an antenna

Policy Compute Engine (PCE)The central brain

Instructions

Context &Telemetry

Data Center

Cloud

NaturalLanguage

Policy

ApplicationDependency

Map

Page 5: SECURE APPLICATION MIGRATION · 2020. 4. 17. · Secure Application Migration 1 SECURE APPLICATION MIGRATION TRAFFIC VISIBILITY AND UNIFORM SECURITY—ACROSS ANY INFRASTRUCTURE All

illumio.com

SOLUTION BRIEFSecure Application Migration

5

CONTACT USFor more information about Illumio ASP and how it can be used to achieve environmental separation, email us at [email protected] or call 855-426-3983 to speak to an Illumio representative.

ABOUT ILLUMIOIllumio, the leader in micro-segmentation, prevents the spread of breaches inside data center and cloud environments. Enterprises such as Morgan Stanley, BNP Paribas, Salesforce, and Oracle NetSuite use Illumio to reduce cyber risk and achieve regulatory compliance. The Illumio Adaptive Security Platform® uniquely protects critical information with real-time application dependency and vulnerability mapping coupled with micro-segmentation that works across any data center, public cloud, or hybrid cloud deployment on bare-metal, virtual machines, and containers. For more information about Illumio, visit www.illumio.com/what-we-do or follow @Illumio.

�� Engage with Illumio on Twitter

�� Follow Illumio on LinkedIn

�� Like Illumio on Facebook

�� Subscribe to the Illumio YouTube Channel

Illumio, Inc. 920 De Guigne Drive, Sunnyvale, CA 94085 Tel (669) 800-5000 www.illumio.com

Copyright © 2018 Illumio, Inc. All rights reserved. This document is protected by U.S. and international copyright and intellectual property laws. Illumio’s products and services are protected by one or more U.S. and international patents listed at https://www.illumio.com/patents. Illumio® is a trademark or registered trademark of Illumio, Inc. or its affiliates in the U.S. and other countries. To review a list of Illumio’s trademarks, go to https://www.illumio.com/trademarks. Third-party trademarks mentioned in this document are the property of their respective owners.