SlideShare una empresa de Scribd logo
1 de 25
Descargar para leer sin conexión
Virtualization Streamlines
Regulatory Compliance
Kacee Bui: Sr. Manager, IT Compliance
and Governance, VMware
Iben Rodriguez: Technical Operations,
VMware
This presentation may contain
VMware confidential information.
Copyright © 2005 VMware, Inc. All rights reserved.
All other marks and names mentioned herein may be trademarks
of their respective companies.
What Led Us Here?
Growing complexity of Technology
Business Environment changing
What Led Us Here, cont.
Certification and Accreditation – C & A:
Internal controls
Risks are mitigated
Increased legislations as a result of various
corporate scandals (Enron, WorldCom)
Regulatory Rules and Standards
Sarbanes-Oxley (SOX 302 & 404)
HIPPA
California SB1386
Graham-Leach-Bliley (GLB)
Federal Info. Security Mgmt (FISMA)
Internal audits
ISO17799, ITIL
Etc., etc., etc.
How Does Compliance Affect You?
You have to follow regulations
Increase IT resource and cost requirements
High demands on IT organization:
Control Activities
Documentation & Maintenance
Testing / quarterly audit
How Does Virtualization
Streamline Regulatory Compliance?
Reduces resource & cost requirements
Unify IT Controls
Provides efficient audit trails
Reduces compliance administrative effort
Examples
Example 1– Access Controls
Risk: The security architecture for the
network (LAN) and servers is not
configured to properly prevent
inappropriate and/or unauthorized access
Control:
With Virtualization: Virtual machines can be
ISOLATED from each other
Exchange
Windows
2000
Console
NIC
CD, Floppy,
Serial, etc
Intel Processor Virtualization
Service Console
SNMP
Agent
Perl
Scripting
Remote
KVM
Security
Mgmt
Web Server
CPUCPUOther
devices
SQL Server
Windows
NT4
Apache
Red Hat
7.2
Scheduler
CPU
Memory
Mgmt.
Memory
SCSI/FC
Storage
Ethernet
Network
Other
Devices
What Is Virtualization?
Isolation
CPU hardware / protection
Fault, performance and
security isolation
CPU, RAM, Disk, and network
resource controls
Resource allocations can be
changed “on the fly”
Guaranteed service levels
If one virtual machine
“crashes”, it has no negative
effect on any other running
virtual machines
Virtualization Reduces Resource
Requirements
Your production and development instances
must be separated
Without virtualization, you would need to obtain
additional machines for each production and
development instance
With virtualization, you will have fewer physical
machines and software controls are used to
isolate machines
Example 2 – Change Mgmt Controls
Risks:
Incomplete, inaccurate, or unauthorized development is
introduced into the Production environment, impacting
system integrity and availability
Key business processes and/or IT assets may be
unavailable because of unauthorized changes to the
infrastructure and/or job schedules
Control:
With virtualization, events and changes are captured
automatically
Virtual Controls: Audit Trails
Incidents and changes must be
logged and documented accurately
Without virtualization this is a
manual process and subject to error
With virtualization events and
changes are captured automatically
Examples
Adding drive space
DB Schema changes
Adding network interface
Change Control Examples
Virtual network
interfaces:
Virtual NICs plug into
virtual switches
Two or more: Bonded
external links for fault
tolerance and bandwidth
aggregation
VLAN A
VLAN B
Virtual
VLAN
Switch
Uplink NIC
To physical switch
VLAN trunk ports
Uplink NIC
Example 3 – IT Operations Controls
Risk:
Segregation of duties – unauthorized access, shared functions
Control:
With virtualization: Minimizes discrepancies and
exceptions
Virtual Controls: Segregation
Separate roles for system and
database administrators, software
developers and business analysts. Use
Role Based Access Control lists to
authorize who can make what changes
Without virtualization, this requires
more training, oversight and manual
auditing
With virtualization, only members of
hardware support team can upgrade
physical hardware
Example 4 – IT Operations, cont.
Risk:
Backup and Recovery: Inability to recover and restore critical
business data accurately, completely and in a timely manner
in the event of a failed system or disaster.
Control:
With virtualization: Recovery time is minimized
Virtualization: Recovery
Many of you will leverage SOX to ensure
proper recovery plans are in place and tested
Typically standby data center and hardware
Replacement servers do not need to be
identical hardware
Virtual machines can be consolidated
during recovery
Virtual machines can be replicated, and
standby site can be brought up quickly
Virtualization: Encapsulation
Entire state of the virtual
machine is stored in a
computer controlled file
Administrators can now use
software and not screwdrivers
when working on machines
Virtual machine state can be
transferred through space
and time
Time: stored on a DVD-ROM
Space: Transfer over a network
Recovery Example
Architecture
Hypervisor
App
OS
Architecture
Hypervisor
Virtualization Layer
App
OS
App
OS
Virtualization Simplifies Changes
Hardware upgrades
happen in virtual world.
Requires 1 - 3 hour
maintenance window
Hardware
maintenance
A few minutes with virtual
machine management
console
4 - 6 hours for migration
Service interrupted for
duration of maintenance
window
Requires days/weeks of
change management
preparation
Moving an
application to a
new server or
Repurposing a
server
A few minutes to provision
a new virtual machine.
Standard templates are
used.
3 - 10 days hardware
procurement
1 - 4 hours provisioning new
server
Provision a new
server
With Server
VirtualizationTraditional ApproachKey Task
Summary - Virtualization and
Compliance
Regulatory compliance is complex
Virtualization is a complex tool
Careful planning, implementation and
monitoring are essential
Questions
Vmworld 2005-sln241

Más contenido relacionado

La actualidad más candente

Configuration Mgt Quick Start
Configuration Mgt Quick StartConfiguration Mgt Quick Start
Configuration Mgt Quick Start
nivekeh
 
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Perficient
 
End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007
Amit Gatenyo
 
Session #107 - AMSI Hosting Options
Session #107 - AMSI Hosting OptionsSession #107 - AMSI Hosting Options
Session #107 - AMSI Hosting Options
webhostingguy
 

La actualidad más candente (20)

Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
 
Fisma FedRAMP Drupal
Fisma FedRAMP DrupalFisma FedRAMP Drupal
Fisma FedRAMP Drupal
 
6 mis-availability
6 mis-availability6 mis-availability
6 mis-availability
 
Configuration Mgt Quick Start
Configuration Mgt Quick StartConfiguration Mgt Quick Start
Configuration Mgt Quick Start
 
Cogent Consutlting Case Study
Cogent Consutlting Case StudyCogent Consutlting Case Study
Cogent Consutlting Case Study
 
SCCM 2007 Presentation
SCCM 2007 PresentationSCCM 2007 Presentation
SCCM 2007 Presentation
 
Workflow Manager Datasheet
Workflow Manager DatasheetWorkflow Manager Datasheet
Workflow Manager Datasheet
 
FlexNet Manager Suite Cloud
FlexNet Manager Suite CloudFlexNet Manager Suite Cloud
FlexNet Manager Suite Cloud
 
Webinar: Application Explosion - Rediscovering the Lost Art of Protection Ser...
Webinar: Application Explosion - Rediscovering the Lost Art of Protection Ser...Webinar: Application Explosion - Rediscovering the Lost Art of Protection Ser...
Webinar: Application Explosion - Rediscovering the Lost Art of Protection Ser...
 
Nerc Version 3 vs Version5 changes
Nerc Version 3 vs Version5  changesNerc Version 3 vs Version5  changes
Nerc Version 3 vs Version5 changes
 
Why Agentless Backup is More Secure
Why Agentless Backup is More SecureWhy Agentless Backup is More Secure
Why Agentless Backup is More Secure
 
IBM Endpoint Manager V9.0
IBM Endpoint Manager V9.0IBM Endpoint Manager V9.0
IBM Endpoint Manager V9.0
 
Hydra connect2015 security-accessibility-changemanagement-final
Hydra connect2015 security-accessibility-changemanagement-finalHydra connect2015 security-accessibility-changemanagement-final
Hydra connect2015 security-accessibility-changemanagement-final
 
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
 
Enterprise network management
Enterprise network managementEnterprise network management
Enterprise network management
 
End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007
 
System Center Endpoint Protection
System Center Endpoint ProtectionSystem Center Endpoint Protection
System Center Endpoint Protection
 
Projects and Achievements at GosNIIAS - Victor Berenshteyn
Projects and Achievements at GosNIIAS - Victor BerenshteynProjects and Achievements at GosNIIAS - Victor Berenshteyn
Projects and Achievements at GosNIIAS - Victor Berenshteyn
 
Session #107 - AMSI Hosting Options
Session #107 - AMSI Hosting OptionsSession #107 - AMSI Hosting Options
Session #107 - AMSI Hosting Options
 

Destacado

Fine grained monitoring
Fine grained monitoringFine grained monitoring
Fine grained monitoring
Iben Rodriguez
 

Destacado (8)

Verigraph
VerigraphVerigraph
Verigraph
 
A world beneath the waves
A world beneath the wavesA world beneath the waves
A world beneath the waves
 
Re-Engineering Engineering
Re-Engineering EngineeringRe-Engineering Engineering
Re-Engineering Engineering
 
Lois Soaxe
Lois SoaxeLois Soaxe
Lois Soaxe
 
A world beneath the waves
A world beneath the wavesA world beneath the waves
A world beneath the waves
 
A world beneath the waves
A world beneath the wavesA world beneath the waves
A world beneath the waves
 
Fine grained monitoring
Fine grained monitoringFine grained monitoring
Fine grained monitoring
 
Sl sulinetwork
Sl sulinetworkSl sulinetwork
Sl sulinetwork
 

Similar a Vmworld 2005-sln241

Cio Breakfast Roundtable 05142009 Final Virtualization
Cio Breakfast Roundtable 05142009 Final VirtualizationCio Breakfast Roundtable 05142009 Final Virtualization
Cio Breakfast Roundtable 05142009 Final Virtualization
guestc900809
 
Enterprise Management with Microsoft Technologies
Enterprise Management with Microsoft TechnologiesEnterprise Management with Microsoft Technologies
Enterprise Management with Microsoft Technologies
Amit Gatenyo
 

Similar a Vmworld 2005-sln241 (20)

VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
 
Puppet on a string
Puppet on a stringPuppet on a string
Puppet on a string
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
 
Cio Breakfast Roundtable 05142009 Final Virtualization
Cio Breakfast Roundtable 05142009 Final VirtualizationCio Breakfast Roundtable 05142009 Final Virtualization
Cio Breakfast Roundtable 05142009 Final Virtualization
 
Virtualization Business Case
Virtualization Business CaseVirtualization Business Case
Virtualization Business Case
 
V center configuration manager customer facing technical presentation
V center configuration manager   customer facing technical presentationV center configuration manager   customer facing technical presentation
V center configuration manager customer facing technical presentation
 
Gain Insights, Make Decisions, and Take Action Across a Streamlined and Autom...
Gain Insights, Make Decisions, and Take Action Across a Streamlined and Autom...Gain Insights, Make Decisions, and Take Action Across a Streamlined and Autom...
Gain Insights, Make Decisions, and Take Action Across a Streamlined and Autom...
 
Enterprise Management with Microsoft Technologies
Enterprise Management with Microsoft TechnologiesEnterprise Management with Microsoft Technologies
Enterprise Management with Microsoft Technologies
 
Virtualization 101 for Everyone
Virtualization 101 for EveryoneVirtualization 101 for Everyone
Virtualization 101 for Everyone
 
Compliance in Virtualized Environments
Compliance in Virtualized EnvironmentsCompliance in Virtualized Environments
Compliance in Virtualized Environments
 
Capito Ardoe House VMWare Presentation
Capito Ardoe House VMWare PresentationCapito Ardoe House VMWare Presentation
Capito Ardoe House VMWare Presentation
 
T3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of ExcellenceT3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of Excellence
 
Virutalization and the Future of Datacenter Security
Virutalization and the Future of Datacenter SecurityVirutalization and the Future of Datacenter Security
Virutalization and the Future of Datacenter Security
 
Vazata Federal IaaS
Vazata Federal IaaSVazata Federal IaaS
Vazata Federal IaaS
 
Yongsan presentation 3
Yongsan presentation 3Yongsan presentation 3
Yongsan presentation 3
 
ScaleFast Grid And Flow
ScaleFast Grid And FlowScaleFast Grid And Flow
ScaleFast Grid And Flow
 
Servicing Financial Services Applications
Servicing Financial Services ApplicationsServicing Financial Services Applications
Servicing Financial Services Applications
 
AutomationWorld Webinar - Tacoma Power Turned to Virtualization to Reduce Cos...
AutomationWorld Webinar - Tacoma Power Turned to Virtualization to Reduce Cos...AutomationWorld Webinar - Tacoma Power Turned to Virtualization to Reduce Cos...
AutomationWorld Webinar - Tacoma Power Turned to Virtualization to Reduce Cos...
 
The Data lake hidden in your backups - Big Data Expo 2019
The Data lake hidden in your backups - Big Data Expo 2019The Data lake hidden in your backups - Big Data Expo 2019
The Data lake hidden in your backups - Big Data Expo 2019
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
 

Más de Iben Rodriguez

New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersNew Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data Centers
Iben Rodriguez
 

Más de Iben Rodriguez (6)

Ipv6 test plan for opnfv poc v2.2 spirent-vctlab
Ipv6 test plan for opnfv poc v2.2 spirent-vctlabIpv6 test plan for opnfv poc v2.2 spirent-vctlab
Ipv6 test plan for opnfv poc v2.2 spirent-vctlab
 
CENIC Conference agenda 2017_v1
CENIC Conference agenda 2017_v1CENIC Conference agenda 2017_v1
CENIC Conference agenda 2017_v1
 
Incident Handling in a BYOD Environment
Incident Handling in a BYOD EnvironmentIncident Handling in a BYOD Environment
Incident Handling in a BYOD Environment
 
New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersNew Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data Centers
 
Iben from Spirent talks at the SDN World Congress about the importance of and...
Iben from Spirent talks at the SDN World Congress about the importance of and...Iben from Spirent talks at the SDN World Congress about the importance of and...
Iben from Spirent talks at the SDN World Congress about the importance of and...
 
Getput suite
Getput suiteGetput suite
Getput suite
 

Vmworld 2005-sln241

  • 1. Virtualization Streamlines Regulatory Compliance Kacee Bui: Sr. Manager, IT Compliance and Governance, VMware Iben Rodriguez: Technical Operations, VMware
  • 2. This presentation may contain VMware confidential information. Copyright © 2005 VMware, Inc. All rights reserved. All other marks and names mentioned herein may be trademarks of their respective companies.
  • 3. What Led Us Here? Growing complexity of Technology Business Environment changing
  • 4. What Led Us Here, cont. Certification and Accreditation – C & A: Internal controls Risks are mitigated Increased legislations as a result of various corporate scandals (Enron, WorldCom)
  • 5. Regulatory Rules and Standards Sarbanes-Oxley (SOX 302 & 404) HIPPA California SB1386 Graham-Leach-Bliley (GLB) Federal Info. Security Mgmt (FISMA) Internal audits ISO17799, ITIL Etc., etc., etc.
  • 6. How Does Compliance Affect You? You have to follow regulations Increase IT resource and cost requirements High demands on IT organization: Control Activities Documentation & Maintenance Testing / quarterly audit
  • 7. How Does Virtualization Streamline Regulatory Compliance? Reduces resource & cost requirements Unify IT Controls Provides efficient audit trails Reduces compliance administrative effort
  • 9. Example 1– Access Controls Risk: The security architecture for the network (LAN) and servers is not configured to properly prevent inappropriate and/or unauthorized access Control: With Virtualization: Virtual machines can be ISOLATED from each other
  • 10. Exchange Windows 2000 Console NIC CD, Floppy, Serial, etc Intel Processor Virtualization Service Console SNMP Agent Perl Scripting Remote KVM Security Mgmt Web Server CPUCPUOther devices SQL Server Windows NT4 Apache Red Hat 7.2 Scheduler CPU Memory Mgmt. Memory SCSI/FC Storage Ethernet Network Other Devices What Is Virtualization?
  • 11. Isolation CPU hardware / protection Fault, performance and security isolation CPU, RAM, Disk, and network resource controls Resource allocations can be changed “on the fly” Guaranteed service levels If one virtual machine “crashes”, it has no negative effect on any other running virtual machines
  • 12. Virtualization Reduces Resource Requirements Your production and development instances must be separated Without virtualization, you would need to obtain additional machines for each production and development instance With virtualization, you will have fewer physical machines and software controls are used to isolate machines
  • 13. Example 2 – Change Mgmt Controls Risks: Incomplete, inaccurate, or unauthorized development is introduced into the Production environment, impacting system integrity and availability Key business processes and/or IT assets may be unavailable because of unauthorized changes to the infrastructure and/or job schedules Control: With virtualization, events and changes are captured automatically
  • 14. Virtual Controls: Audit Trails Incidents and changes must be logged and documented accurately Without virtualization this is a manual process and subject to error With virtualization events and changes are captured automatically Examples Adding drive space DB Schema changes Adding network interface
  • 15. Change Control Examples Virtual network interfaces: Virtual NICs plug into virtual switches Two or more: Bonded external links for fault tolerance and bandwidth aggregation VLAN A VLAN B Virtual VLAN Switch Uplink NIC To physical switch VLAN trunk ports Uplink NIC
  • 16. Example 3 – IT Operations Controls Risk: Segregation of duties – unauthorized access, shared functions Control: With virtualization: Minimizes discrepancies and exceptions
  • 17. Virtual Controls: Segregation Separate roles for system and database administrators, software developers and business analysts. Use Role Based Access Control lists to authorize who can make what changes Without virtualization, this requires more training, oversight and manual auditing With virtualization, only members of hardware support team can upgrade physical hardware
  • 18. Example 4 – IT Operations, cont. Risk: Backup and Recovery: Inability to recover and restore critical business data accurately, completely and in a timely manner in the event of a failed system or disaster. Control: With virtualization: Recovery time is minimized
  • 19. Virtualization: Recovery Many of you will leverage SOX to ensure proper recovery plans are in place and tested Typically standby data center and hardware Replacement servers do not need to be identical hardware Virtual machines can be consolidated during recovery Virtual machines can be replicated, and standby site can be brought up quickly
  • 20. Virtualization: Encapsulation Entire state of the virtual machine is stored in a computer controlled file Administrators can now use software and not screwdrivers when working on machines Virtual machine state can be transferred through space and time Time: stored on a DVD-ROM Space: Transfer over a network
  • 22. Virtualization Simplifies Changes Hardware upgrades happen in virtual world. Requires 1 - 3 hour maintenance window Hardware maintenance A few minutes with virtual machine management console 4 - 6 hours for migration Service interrupted for duration of maintenance window Requires days/weeks of change management preparation Moving an application to a new server or Repurposing a server A few minutes to provision a new virtual machine. Standard templates are used. 3 - 10 days hardware procurement 1 - 4 hours provisioning new server Provision a new server With Server VirtualizationTraditional ApproachKey Task
  • 23. Summary - Virtualization and Compliance Regulatory compliance is complex Virtualization is a complex tool Careful planning, implementation and monitoring are essential