+ All Categories
Home > Documents > ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that...

ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that...

Date post: 22-May-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
29
Copyright 2018 ONUG. All Rights Reserved Confidential Not For Distribution ONUG SPRING 2018 MAY 8 & 9 | HOSTED BY UCSF MISSION BAY CONFERENCE CENTER, SAN FRANCISCO, CA
Transcript
Page 1: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

Copyright 2018 ONUG. All Rights Reserved Confidential Not For Distribution

ONUG SPRING 2018MAY 8 & 9 | HOSTED BY

UCSF MISSION BAY CONFERENCE CENTER, SAN FRANCISCO, CA

Page 2: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

ONUG Spring 2018 PoC Guidelines

● In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring

● They are “aggregated” use cases sourced from IT executive community members & developed in the ONUG Working Groups

● For a use case to become a working group, its use case is voted upon by IT executives & receives the largest number of votes

● Many IT exes are in search of options & choices, & have a propensity to buy & budget development stages for these use cases

● But note, these PoCs are suggestions & are not required

Page 3: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

Structure● All PoCs are based upon the hybrid/multi-cloud use case,

detailed in the next slide

● The 3 remaining PoCs are focused upon how one may ● Connect via SD-WAN● Secure via Software-Defined Security Services● Monitor & perform Analytics

● Each sponsor receives 15 minutes to demonstrate in the PoCTheater

● Only the Software-Defined Security Services will issue the ONUG Innovation Award at ONUG Spring

Page 4: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

ONUG Spring Hybrid/Multi-Cloud PoC Configuration

Public Cloud A Public Cloud B

On-Prem Data Center

Analytics

(containers)

Database

(bare metal)

Web Layer

(VMs)

Caching Layer

(bare metal or VMs)

Internet

ETL

Users

Database Admins

Data Scientists

Page 5: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

PoC Environment Set-Up Description• Hybrid/multi-cloud infrastructure deployment

• Web layer in “public cloud A” running on VMs

• Caching layer in on-prem data center running on VMs

• Database running in on-prem data center on bare metal servers

• Analytics cluster in “public cloud B” running as containers

• ETL (Extract, Transform, Load) from DBs to Analytics

• Communication needed to make things work

• Web layer uses caching layer to serve the content

• Caching layer uses database for persistent storage

• Users on the internet access the web layer

• Database Admins (DBAs – internal users) need administrative access to databases

• ETL process loads data from databases and uploads it to analytics cluster

Page 6: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

PoC Options

● Based upon the hybrid/multi-cloud PoC configuration, vendors may choose to demonstrate the following ONUG Working Group Use Cases

● Connectivity via SD-WAN or the ONUG Open SD-WAN Exchange

● Secure via Software-Defined Security Services

● Monitor & perform Analytics

● The next 3 sections detail the above 3 PoC options

Page 7: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

Open SD-WAN Exchange Working Group

Page 8: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

OSE Outline

•SD-WAN PoC Options

•SD-WAN PoC Requirements

Page 9: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

SD-WAN PoC Options

• Based upon the hybrid/multi-cloud PoC configuration, slide 4/5:

• Cloud A/B may be public cloud providers, SaaS providers, IaaS vendors, etc.

• Demonstrating configuration & workload movement between

• Public-Private Cloud, Public Clouds, Remote Access, etc.

• The next slide offers use case requirements to consider highlighting in your PoC

Page 10: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

SD-WAN PoC Requirements 1. Remote site to leverage public WAN only - via broadband (if available) or via bring your own 4G LTE, remotely connect to demo, or record demo from lab to show at ONUG

2. CPE in a virtual form factor on commodity h/w

3. A secure hybrid WAN architecture allowing dynamic traffic eng specified by app policy, availability, etc. (see slide 4 & 5); vendor to either arrange for multiple WAN access at ONUG, use 4G LTE, remotely connect to demo, or record demo from its lab to show at ONUG

4. Visibility, prioritization & steering of biz critical & RT apps as per security & corp. governance & compliance policies

5. A highly available & resilient hybrid WAN, see 3 above for wide access options

6. Site, Application & VPN performance level dashboard reporting, assume no encryption for this requirement

7. Open northbound API for controller access & mgmt.: log events to net event co-relation mgr, SIEM

8. Zero touch for remote vm provisioning & deployment

Page 11: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

Software-Defined Security Services Working Group

Page 12: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

SDSS Outline

•S-DSS Position Statement

•ONUG PoC Innovation Awards

•PoC Environment Setup

•PoC Environment Security Services

•PoC Environment: Visibility & Analytics

•Judging Criteria

Page 13: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

S-DSS Position Statement

“The S-DSS working group’s framework consists of an intent-based security architecture that ties

policies to workloads, independent upon of host model that is bare metal, hypervisor, container and

serverless. Policy enforcement is local to the workload and independent upon its physical

location be it on or off premises”

Page 14: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

ONUG PoC Innovation AwardsTo celebrate vendor dedication to the development of “innovative” open cloud-based

solutions, ONUG will present Innovation Awards to those companies that best address the

Working Group Proof of Concept guidelines at ONUG Spring 2018

A panel of independent industry analysts will act as judges using criteria developed by

working group members

WHY? The ONUG Community views hybrid

multi-cloud as a fundamental building block

for digital transformation, & it’s our hope that

the ONUG Innovation Awards will foster an

encouraging & collaborative environment for

the vendor community to build the solutions IT

executives are looking for to increase options,

choices & agility

WHEN? 15-minute Proof of Concept (PoC) presentations will take place within the PoC

Theater throughout the 2-day ONUG Spring Conference, & the Innovation Awards will be

distributed on May 9, 2018

Tom Hollingsworth

Tech Field Day

Page 15: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

How to PARTICIPATETo be considered, your company must be participating at ONUG

Spring. All interested vendors, cloud providers & service providers, as

well as end users interested in contributing to the PoC

guidelines, should be signed up to participate in the ONUG Working

Group no later than April 1, 2018

The PoC guidelines will be distributed & posted on the ONUG website

by end of day April 9, 2018

• For current members, email Jeannette Tibbetts

([email protected]) to be considered for an ONUG Innovation

Award

• If you are not currently participating in the ONUG Working Groups,

sign up on our website

(https://t.e2ma.net/click/e2yudb/a7r9up/angf0m) to get involved &

be eligible to be considered for an ONUG Innovation Award

• For FAQ, please visit here: http://www.onug.net/onug-right-stuff-

innovation-awards/

Innovation Award

Your Company

Logo

Page 16: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

S-DSS PoC Environment Setup

Public Cloud A Public Cloud B

On-Prem Data Center

Analytics

(containers)

Database

(bare metal)

Web Layer

(VMs)

Caching Layer

(bare metal or VMs)

Internet

ETL

Users

Database Admins

Data Scientists

Page 17: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

PoC Environment Setup - Description• Hybrid infrastructure deployment

• Web layer in “public cloud A” running on VMs• Caching layer in on-prem data center running on VMs• Database running in on-prem data center on bare metal servers• Analytics cluster in “public cloud B” running as containers• ETL (Extract, Transform, Load) from DBs to Analytics

• Communication needed to make things work• Web layer uses caching layer to serve the content• Caching layer uses database for persistent storage• Users on the Internet access the Web layer• Database Admins (DBAs – internal users) need administrative access to

databases• ETL process loads data from databases & uploads it to analytics cluster• Data Scientist (internal users) need access to analytics cluster

Page 18: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

PoC Environment Security Services• Access Control / Firewall / Microsegmentation Policies

• Web workloads provides “http/https” service to the any user on the Internet

• Caching workloads provide “caching” service to the Web workloads

• Database workloads provide “database” service to the Caching workloads

• Database workloads provide “database” service to Database Admins (internal users)

• Database workloads provide “database” service to ETL workloads

• Analytics workloads provide “analytics” service to Analytics workloads

• Analytics workloads provide “https” service to Data Scientists (internal users)

• Other policies for allowing core services & monitoring the applications

• All other communication except the above needs to be blocked!

• Visibility & Analytics

• Demonstrate the ability to support visibility, analytics & reporting for security (e.g., telemetry to a SIEM, report of all the connections going into a PCI application for compliance)

Page 19: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

PoC Environment Security Services

• Encryption policies for data-in-transit

• Traffic between Web layer & Caching layer needs to be encrypted

• Traffic between ETL & Analytics cluster needs to be encrypted

There are a broad range of other security services including, but not limited to, IDS/IPS, Deception, Data Loss Detection/Prevention, & User Behavioral Analytics

Vendors are encouraged to showcase any of these services during the PoC

Page 20: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

PoC Environment: Visibility & Analytics – New to Spring 2018

• Demonstrate the ability to support visibility, analytics & reporting for security (e.g., telemetry to a SIEM, report of all the connections going into a PCI application for compliance)

• Demonstrate the ability to detect user-defined security threats

• Reporting workloads being attacked by user-defined threats

• Ability to quarantine threats and mitigate the threats

• Demonstrate the ability to detect & report the “Command-and-control servers” events

• Provide statistics of DCs being infected, statistics on the source of attacks, etc.

• Demonstrate the ability to categorize various attacks by domains, sources, etc.

• Such as phishing files downloaded to workloads

• Malicious C&C flows, DGA domain name requests

• Demonstrate an ability to monitor compliance to policy enforcements for application workload state changes

Page 21: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

Judging Criteria• S-DSS Framework Alignment 70%

– Are policies bound to workloads? Does the solution enable a workload to reference, attach or embed a security policy & then enforce that policy at run-time within its execution environment? 15%

– Workload policy definition & deployment - Does the solution enable a workload policy to be centrally defined and then securely deployed to designated workloads? Does the solution enable the use of existing orchestration methods & tools to deploy a policy definition to a workload? 15%

– Protection effectiveness measures - Does the solution provide a measure of the effectiveness of the protections (controls) guarding the confidentiality, integrity & availability of the workload? If so, then what are the measures, how are they taken & confirmed, & how are they reported? 15%

– Are core security requirements satisfied? Does the solution satisfy any of the core security requirements needed to support the confidentiality, integrity, &/or availability of the solution? If so, which ones & how are they satisfied? 15%

– Are policies elastic? Are the policies applied to a workload as soon as it spins up? Do the policies continue to be enforced when an application auto scales up/down? 10%

• How Well Is a Security Service Delivered 20%

– What security service solution is delivered & how well is it delivered (access control, authentication/encryption, IDS/IPS, etc.)?

• Ease of Deployment & Management 10%

– How easy/hard is it to deploy & manage the solution?

Award Threshold – In order to receive the “Innovation Award,” a vendor must get at least 70% score

Page 22: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

Monitoring & Analytics Working Group

Page 23: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

M&A Outline

•M&A Position Statement

•Scope of M&A PoC

•PoC Area of Focus – Application Assurance

•PoC Area of Focus – Infrastructure Assurance

•PoC Area of Focus – Network Assurance

Page 24: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

M&A Position Statement

“The M&A Working Group’s framework consists of a Monitoring and Analytics architecture that collects and

derives information from physical and virtual infrastructure (e.g., compute, storage, network, management systems)

and applications, independent upon physical location be it on or off premises (e.g., public cloud). Data is ingested into

a data warehouse or data lake so that data and event visualization and correlation, monitoring and other

operational use cases are possible in the operationalizing of the infrastructure.”

Page 25: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

Scope of M&A PoC• PoCs are encouraged to address one, or ideally, more of the following M&A Working

Group areas of focus:

• Application Assurance

• Infrastructure Assurance

• Network Assurance

• Each of these is defined further in the following slides

• PoCs should demonstrate how their solution is relevant to hybrid environments

• Optionally, PoCs may include legacy physical, virtualized, private & public cloud platforms.

• Participants are encouraged to read: “An Introduction to Monitoring & Analytics Requirements,” ONUG 2017 M&A Working Group https://www.onug.net/wp-content/uploads/2018/02/2017-Spring_Monitoring-and-Analytics.pdf

Page 26: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

The Modern Enterprise

Page 27: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

PoC Area of Focus – Application Assurance• Application Assurance

• For the purposes of this PoC, application assurance is the task of ensuring that an application is available, responsive & functioning as expected

• Application optimization & debugging features may be included, but are of secondary focus

• Example approaches include: synthetic transactions, wire data analytics, application & database agents, applications logs

• Example KPIs include:

• Application response time (excluding network delay)

• Number & type of any errors returned by the application

• Dependencies between components of the service, shared enabling services, e.g., DNS & NTP, & upon third-party services

• Is the application reachable?

Page 28: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

PoC Area of Focus – Infrastructure Assurance

• Infrastructure Assurance

• For the purposes of this PoC, infrastructure assurance is the task of ensuring that network and application infrastructure is available, responsive & functioning as expected

• Infrastructure includes compute, storage, network devices, management systems (physical & virtual)

• Example approaches include: device APIs, controller APIs, agents, logs

• Example KPIs & metadata include:

• Hypervisor, container & cloud information

• CPU, memory, storage usage

• Errors

• Environmental factors

• State tables

Page 29: ONUG SPRING 2018 · ONUG Spring 2018 PoC Guidelines In this deck are PoCs use case guidelines that sponsors may choose to demonstrate at ONUG Spring They are “aggregated” use

PoC Area of Focus – Network Assurance

• Network Assurance

• For the purposes of this PoC, network assurance is the task of ensuring that an network is available, delivering expected performance & correctly configured

• Network Assurance can be considered as a subset of Infrastructure Assurance

• Example approaches include: passive wire data analytics, flow information

• Example KPIs include:

• Profile of traffic on a link

• Network delay contribution to application response time

• Metrics related to quality of service markings

• Virtual network identifiers, e.g., VLAN, VRF ID, VNI, VSID

• Microbursts, packet loss and jitter

• Is the site reachable?


Recommended