Date post: | 05-Jan-2016 |
Category: |
Documents |
Upload: | evan-elliott |
View: | 216 times |
Download: | 0 times |
L . A . S . E . RLocal Authority Security Enterprise Reporting
System Architecture
L . A . S . E . RLocal Authority Security Enterprise Reporting
DEVELOPMENT MACHINE ARCHITECTUREVirtual (top) and Physical (bottom)
L . A . S . E . RLocal Authority Security Enterprise Reporting
DEVELOPMENT MACHINE ARCHITECTURE
Windows Server 2008
Windows Server 2008
Windows Server 2008
Windows Server 2008
Windows Server 2008
Windows Server 2008
Windows 7
VMWare ESXi X.X
VMWare ESXi X.X
VMWare ESXi X.X
VMWare ESXi X.X
Windows 2008 R2
SUSE LINUX
L . A . S . E . RLocal Authority Security Enterprise Reporting
DEVELOPMENT MACHINES IN PLACE
An Important Key in the Layered Approach to
Security
L . A . S . E . RLocal Authority Security Enterprise Reporting
DEVELOPMENT MACHINES IN PLACE
L . A . S . E . RLocal Authority Security Enterprise Reporting
DEVELOPMENT MACHINES IN PLACE
The LASER switch
Virtualisation
Less Hardware One Server can host
multiple Virtual Machines
Scalable. The Project Team may add VMs to replicate a
live environment as and when required
ESXi
Bare Metal Hypervisor VMs efficiently work on
underlying Hardware through ESXi
SnapshotsvSphere snapshots
allows us implement and rollback changes to machines in a quick and
efficient manner
Network Virtualisation
Software TestingDuring development we
can put in place a full network architecture
for testing
CommunicationAllows communication internally among VMs and other ESXi hosts
L . A . S . E . RLocal Authority Security Enterprise Reporting
WHY DID WE SELECT A VIRTUALISED DEVELOPMENT INFRASTRUCTURE
Virtualisation
Hardware The hardware is
expensive
Skills Virtualisation
requires a particular skill
set
ESXi
Licence The product must have a
licence
Technology Overload
Network Virtualisation
SkillsRequires a
particular skill set
CommunicationIf it goes wrong
our network goes down and we cant work
L . A . S . E . RLocal Authority Security Enterprise Reporting
THE NEGATIVES OF A VIRTUALISED DEVELOPMENT INFRASTRUCTURE
L . A . S . E . RLocal Authority Security Enterprise Reporting
SYSTEM ARCHITECTURE – DATABASES & PROGRAMMING
L . A . S . E . RLocal Authority Security Enterprise Reporting
SYSTEM ARCHITECTURE – CUSTOM BUILT / OFF THE SHELF
L . A . S . E . RLocal Authority Security Enterprise Reporting
SYSTEM ARCHITECTURE – INFORMATION FLOW
AlienVault
Unified Security Management Platform
Full Visibility
Large Scale. Community-sourced information security
threat intelligence feed and database
NagiosUniversal Monitoring Plug ins available to various servers and
devices
SecureNagios is a thoroughly
tested and reviewed open source network
monitoring solution
L . A . S . E . RLocal Authority Security Enterprise Reporting
WHY DID WE SELECT OPEN SOURCE BASED DEVELOPMENT
AlienVault
ServerRequires a standalone
server
Technology Overload
Nagios
Usability Basic network
monitoring system
TimeGood deal of time
required to implement
L . A . S . E . RLocal Authority Security Enterprise Reporting
THE NEGATIVES OF A OPEN SOURCE BASED SOLUTION
L . A . S . E . RLocal Authority Security Enterprise Reporting
DEVELOPMENT & LIVE AUTHENTICATION TOOLS
L . A . S . E . RLocal Authority Security Enterprise Reporting
WHAT IS OFF THE SHELF IN LASER
L . A . S . E . RLocal Authority Security Enterprise Reporting
WHY BUILD SO MUCH?
Open SourcePublic Collaboration behind all our source tools
Suited to Our NeedsThe software we are developing is suited to the needs of our sponsors, we are extending and building upon that software to make an effective and easy to understand Security System
TestedThe source code that we are building upon has been tested and reviewed by the open source community so we can build with confidence
CostProprietary software bought off the shelf and implemented will not do exactly what we want but it will also cost more.