{"id":106090,"date":"2020-02-11T16:00:50","date_gmt":"2020-02-12T00:00:50","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=106090"},"modified":"2020-02-12T10:16:19","modified_gmt":"2020-02-12T18:16:19","slug":"cloud-sdn-security","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/02\/cloud-sdn-security\/","title":{"rendered":"Holistic SDN Security Makes Security Comprehensive Everywhere"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">It\u2019s always a good idea to look up and down \u2013 as well as from side to side \u2013 when threats abound. Ask any horror film protagonist or big-city pedestrian. Yet even the threats these folks confront seem insignificant compared to the alarming challenges network security architects face. They\u2019re trying to manage \u2013 all at once \u2013 software-defined networking (SDN) environments, tools and platforms such as private clouds, VMware NSX-T, VMware NSX for VSphere and Nutanix Flow. How do you stay vigilant in several places simultaneously and stay calm?\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While people fighting monsters (or avoiding maniacs behind the wheel) usually have the luxury of taking on their challenges in one surrounding at a time, network security teams responsible for SDN environments defend against threats all over the place: In private clouds and virtual networks, as well as in on-prem data centers and public cloud environments. Understanding how these environments interact can go a long way in helping network pros manage security with confidence.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Because network traffic flows inside and between all of these settings, network security professionals need to think about <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-microsegmentation\"><span style=\"font-weight: 400;\">managing overlapping boundaries and environment-specific trust zones<\/span><\/a><span style=\"font-weight: 400;\"> \u2013 not just the traditional north-south traffic challenges now found on increasingly blurred perimeters and east-west traffic hazards that can span environments.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This makes a holistic approach to security critical within and beyond SDN environments. Data, workloads and applications will continue to be dispersed, which increases the odds that threats will proliferate and hijack network traffic everywhere \u2013 and from every direction.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Complex SDN Environments Require Both Flexibility and Vigilance<\/b><\/p>\n<p><span style=\"font-weight: 400;\">SDN environments are a good place to start thinking holistically, because there\u2019s usually a lot going on and things can get complicated fast. To stay vigilant in several virtualized places at once, network security teams leverage SDN platforms and tools such as <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/techbriefs\/vm-series-for-nsx-solution-brief\"><span style=\"font-weight: 400;\">VMware NSX-T, VMware NSX for VSphere<\/span><\/a><span style=\"font-weight: 400;\">, and <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/techbriefs\/palo-alto-networks-and-nutanix\"><span style=\"font-weight: 400;\">Nutanix Flow<\/span><\/a><span style=\"font-weight: 400;\"> to implement <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-microsegmentation\"><span style=\"font-weight: 400;\">microsegmentation<\/span><\/a><span style=\"font-weight: 400;\">. This isolates individual workloads within SDN trust zones and helps reduce an organization\u2019s attack surface.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But as important as microsegmentation is for locking down virtual environments, it can also create a false sense of security.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Yes, microsegmentation effectively isolates workloads from each other, which closes the door on some malicious traffic. However, many workloads still need to interact with other workloads or particular network services to function properly, which means that network security teams routinely punch holes between microsegmented boundaries to make sure the business stays in business. It\u2019s risky, though, because attackers can take advantage of these allowed connections to move laterally in the environment.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That necessary risk can be found, for example, in financial applications that need to communicate with DNS servers located in a different trust zone. Other applications can also reside in different trust zones. A web-based ordering system might send and receive sensitive customer information to and from a database in a high-trust segment, as shown below:\u00a0<\/span><\/p>\n<figure id=\"attachment_106104\" aria-describedby=\"caption-attachment-106104\" style=\"width: 610px\" class=\"wp-caption alignright\"><div style=\"max-width:100%\" data-width=\"610\"><span class=\"ar-custom\" style=\"padding-bottom:70%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-106104 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/02\/image1-2.png\" alt=\"This conceptual image illustrates the concept of virtual firewalls in relation to SDN security.\" width=\"610\" height=\"427\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/02\/image1-2.png 726w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/02\/image1-2-230x161.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/02\/image1-2-500x350.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/02\/image1-2-429x300.png 429w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/02\/image1-2-57x40.png 57w\" sizes=\"auto, (max-width: 610px) 100vw, 610px\" \/><\/span><\/div><figcaption id=\"caption-attachment-106104\" class=\"wp-caption-text\">Enterprise infrastructure showing different trust zones<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Unfortunately, microsegmentation by itself doesn\u2019t detect or respond to threats. Additional protection is needed to inspect traffic for threats that can move laterally throughout allowed connections in NSX and other SDN environments \u2013 and that\u2019s critical when communications between microsegmented workloads are opened up so traffic can flow between between trust zones.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>What Does it Take to Hit Moving Targets in an Expanding Universe?\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Intrusions are inevitable in SDN environments, but damage can be limited by deploying security tools that limit and detect threat movement. This allows security teams to respond quickly and effectively and prevent data loss. These security tools must also provide protection beyond SDN environments. In addition to virtualized workloads, data center and campus perimeters must be secured and physical networks segmented while trust boundaries need to be established between physical, virtual and public cloud workloads.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Network security teams are best served when they can enforce t<\/span><span style=\"font-weight: 400;\">he same threat prevention policies consistently throughout the enterprise environment. Communication across different workload types residing in different trust zones is increasingly common, as are trust zones themselves being located on physical, virtual, and public cloud networks.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Advanced threat prevention, including intrusion prevention, is a must to secure traffic that moves between trust zones, especially when the levels of trust differ. Intrusion prevention systems (IPS) help security teams monitor the network for malicious traffic to ensure that only known, acceptable services are running.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>VM-Series Virtual Firewalls Get in the Zone to Detect, Inspect and Prevent Threats<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Deploying next-generation firewalls is a best practice for securing traffic between a trusted zone and a completely untrusted zone \u2013 if those firewalls come with capabilities such as <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/datasheets\/dns-security-service\"><span style=\"font-weight: 400;\">DNS Security<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/infographics\/supercharge-with-url-filtering\"> <span style=\"font-weight: 400;\">URL Filtering<\/span><\/a><span style=\"font-weight: 400;\">\u2014to help guard against data exfiltration.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And that\u2019s where <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/vm-series-virtual-next-generation-firewall\"><span style=\"font-weight: 400;\">VM-Series virtual firewalls<\/span><\/a><span style=\"font-weight: 400;\"> play a large role in securing boundaries and trust zones. These virtualized instances of the Palo Alto Networks Next-Generation Firewall provide a full suite of threat prevention and exfiltration prevention services, including intrusion prevention, DNS security and anti-malware capabilities. By taking a Zero-Trust approach, they identify and block exploits, stop malware, and prevent previously unknown threats from infecting sensitive information and critical systems.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, a unique single-pass architecture ensures that VM-Series firewalls inspect every packet to prevent attacks from circumventing the built-in Layer 7 protections NSX provides. And because SDN security must consider other environments as well as its own trust zones, these virtual firewalls can be automatically and repeatedly deployed on a wide range of private and public cloud environments, such as Cisco ACI and ENCS, KVM, OpenStack<\/span><span style=\"font-weight: 400;\">\u00ae<\/span><span style=\"font-weight: 400;\">, Amazon Web Services (AWS<\/span><span style=\"font-weight: 400;\">\u00ae<\/span><span style=\"font-weight: 400;\">), Microsoft Azure<\/span><span style=\"font-weight: 400;\">\u00ae<\/span><span style=\"font-weight: 400;\">, Oracle Cloud<\/span><span style=\"font-weight: 400;\">\u00ae<\/span><span style=\"font-weight: 400;\"> Infrastructure, and Google Cloud Platform (GCP&#x2122;).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What\u2019s more, a <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/products\/new\/new-panos9-1\"><span style=\"font-weight: 400;\">single pane of glass<\/span><\/a><span style=\"font-weight: 400;\"> ensures consistent management of policies and activities so network security teams can see all their environments holistically \u2013 and protect their NSX investments along with other components of their networking infrastructure.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To find out more about how VM-Series virtual firewalls secure overlapping boundaries and trust zones, see these <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/vm-series-virtual-next-generation-firewall-for-nsx\"><span style=\"font-weight: 400;\">specific SDN security resources<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Virtual firewalls safeguard SDN platforms like NSX to secure trust zones, boundaries, and microsegmentation for security that spans environments.<\/p>\n","protected":false},"author":670,"featured_media":106091,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6768,6765],"tags":[614,3687,309],"coauthors":[6949],"class_list":["post-106090","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-cloud","category-secure-the-enterprise","tag-micro-segmentation","tag-virtualized-next-generation-firewall","tag-vm-series"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/02\/SDN-Firewall.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/106090","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/670"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=106090"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/106090\/revisions"}],"predecessor-version":[{"id":106202,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/106090\/revisions\/106202"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/106091"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=106090"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=106090"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=106090"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=106090"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}