14
Case Study Migration to a de-perimeterised environment Paul Dorey BP & Jericho Forum Board

Case Study Migration to a de-perimeterised environment Paul Dorey BP & Jericho Forum Board

  • View
    217

  • Download
    3

Embed Size (px)

Citation preview

Page 1: Case Study  Migration to a de-perimeterised environment  Paul Dorey BP & Jericho Forum Board

Case Study

Migration to ade-perimeterised environment

Paul DoreyBP & Jericho Forum Board

Page 2: Case Study  Migration to a de-perimeterised environment  Paul Dorey BP & Jericho Forum Board

Desktop Migration Strategy

Previous Environment Drivers for Change

– Business– Technology– Security

Migration strategy

Page 3: Case Study  Migration to a de-perimeterised environment  Paul Dorey BP & Jericho Forum Board

Current Architecture FIREWALL Outsiders BP Partners

Internet

Extranet

Flat Architecture Heterogeneous Barriers &

Chokepoints “Us” and

“Them” Solutions?WirelessVPNs IDS/IPSDiscoveryPush Patch/Cfg.

NAC/NAP

Page 4: Case Study  Migration to a de-perimeterised environment  Paul Dorey BP & Jericho Forum Board

Business Drivers (BP)

Significant operations in 135+ countries Many users ‘on the road’, globally Large and increasing home-working Much use of outsourcers & contractors Many JVs, often with competitors Opening up to customers

The architypical ‘virtual enterprise’

Wasting money on private networks Create barriers to legitimate 3rd parties Hard to define what is inside vs. outside?

Page 5: Case Study  Migration to a de-perimeterised environment  Paul Dorey BP & Jericho Forum Board

Technology Drivers …

Exploding connectivity and complexity (embedded Internet, IP convergence)

Peer to peer,sensory networks, mesh,grid, mass digitisation

Machine-understandable information(Semantic Web)

De-fragmentation of computersinto networks of smaller devices

Wireless, wearable computing

Page 6: Case Study  Migration to a de-perimeterised environment  Paul Dorey BP & Jericho Forum Board

Security Drivers

Insiders Outsiders inside Port 80 and Mail traffic get in anyway Hibernating or ‘rogue’ devices Firewall rule chaos VOIP & P2P Stealth attackers Black list vs. white list False sense of security

Page 7: Case Study  Migration to a de-perimeterised environment  Paul Dorey BP & Jericho Forum Board

Migration to the new model

Net

Net1

2

1. Internal Managed. 2. Managed VPN 3. Self Managed & Gateway 4. Commodity/Allowance

1. 2.

4.

? Net

Net

4

Net

Net

33.

Page 8: Case Study  Migration to a de-perimeterised environment  Paul Dorey BP & Jericho Forum Board

“In the Cloud” Security Services

Automated Patching Anti-malware - heuristic Trusted Device Certification “Clean” mail, IM, Web Federated Identity/Access Provisioning Alert (“Shields Up”) Protection of ‘atomic’ data Trusted agent introduction

– (White Listing)

Net

Net

4

Can be ‘in the cloud’ or provided internally to ‘cloud resident

'devices

Page 9: Case Study  Migration to a de-perimeterised environment  Paul Dorey BP & Jericho Forum Board

“In the Cloud” Security Services

Automated Patching Anti-malware - heuristic Trusted Device Certification “Clean” mail, IM, Web Federated Identity/Access Provisioning Alert (“Shields Up”) Protection of ‘atomic’ data Trusted agent introduction

– (White Listing)

Net

Net

4

Can be ‘in the cloud’ or provided internally to ‘cloud resident

'devices

Page 10: Case Study  Migration to a de-perimeterised environment  Paul Dorey BP & Jericho Forum Board

DCT Global Infrastructure

Desktop Strategy – Vision

Apps

PassPortPassPort

• goodapps access

Beyond PassPortBeyond PassPort

• seamless,secure access

ExplorerExplorer

• internet based• simplify client

• wireless access

= $

Apps

Apps

Apps

x450

Net

Net

BP

BP

MDC

Apps

BP maintainedBP provided

BP supported

• choice ofDevice

ConnectivitySupport

• full networkaccess

• expose app not network

• wired &wireless access

User maintainedBP provided

Self supported

Applications & Access Strategy

• Simplify client, apps and access

<< $

Auto-maintainingUser providedSupport choice

• 450Data Centres

• consolidatedData Centres

Apps

VirtualBus Apps

InternetaccessibleBus Apps

< $

2006 DeliveryMaximise value during

transition to vision

Internethosted

services

Page 11: Case Study  Migration to a de-perimeterised environment  Paul Dorey BP & Jericho Forum Board

DCT Global Infrastructure= $

BP maintainedBP provided

BP supported

AppsApps

BPBPBPBP

Desktop Strategy – Delivery of Vision

Beyond PassPortBeyond PassPort

• seamless,secure access

Apps

Apps

Apps

x450MDC

Apps • consolidatedData Centres

• choice ofDevice

ConnectivitySupport

• expose appnot network

BP

BP

<< $

Auto-maintainingUser providedSupport choice

“Living onthe web”

Net

Net

BP

BP

StrategicTactical

Delivery of VisionDelivery of Vision

• Single, consumer-style client environment

• Seamless, secure

connectivity• Enhanced

functionality, freedom and

choice

Device &NetworkSecurity

AccessSecurity

Internethosted

services

VirtualBus Apps

InternetaccessibleBus Apps

• no localservers

Page 12: Case Study  Migration to a de-perimeterised environment  Paul Dorey BP & Jericho Forum Board

DCT Global Infrastructure

Access Strategy

SSL

no client softwaredevice and location agnosticfirewall friendlyconnects at the application layeronly requires access securityno direct contribution to single sign-onRequires generic Infrastructure Access Service (ie. SSL gateway or per app ISA)clientless and/or on-demand client software

device and location agnosticfirewall friendlyconnects at the application layerin-built device and access securitydirect contribution to single sign-onRequires generic Infrastructure Access Service (ie. SSL gateway)

IPSecVPN

installed client softwaredevice and location specificnon-firewall friendlyconnects at the network layerrequires additional device and access securityno direct contribution to single sign-onRequires proprietary Infrastructure Access Services (ie. VPN gateway)

Strategic

Tactical

Current

Access to applications

from the Internet

SSLVPN

New businessapplication

Legacy businessapplication

RemoteVirtual App

SharePoint

Outlook 2003(RPC/HTTP)

- Scenarios

BP Services- File

~2008(SRA)

~Q207(RDP/HTTP)

BP Services- Intranet

- WTS

Timeframe is now unless otherwise

stated

Timeframe stated is Microsoft native

feature

per app

Legacy businessapplication(offline use)

LocalVirtual App

Shrink-wrapapplication(offline use)

~ LocalVirtual App

Page 13: Case Study  Migration to a de-perimeterised environment  Paul Dorey BP & Jericho Forum Board

DCT Global Infrastructure

Application Strategy

ThickClient

Browser

RemoteClient

SmartClient

browser client onlydirect SSL access to web app

smart client, self-updating clientdirect SSL access to Smart application

remote client, self-updating client, no offline capabilityaccess via Infrastructure Access Service

eliminate compatibility issuesprovide software update capability

on-demand client, self-updating client, offline capabilityaccess via Infrastructure Access Services

eliminate compatibility issuesprovide software update capability

ThickClient

full thick client, non-self-updating, compatibility testing required = $access via Infrastructure Access Services (ie. VPN gateway)

Strategic

Tactical

Current virtualisationtechnology

virtualisationtechnology

Exposure of applications to

clients

(independent of underlying

access mechanism)

= < $

= < $

Legacy businessapplication

Outlook 2003(RPC/HTTP)

RemoteVirtual App

~ LocalVirtual App

- Scenarios

SharePointNew business

application

Legacy businessapplication(offline use)

LocalVirtual App

Shrink-wrapapplication(offline use)

~ LocalVirtual App

Page 14: Case Study  Migration to a de-perimeterised environment  Paul Dorey BP & Jericho Forum Board

DCT Global Infrastructure

‘Beyond PassPort’ – The Activities

BP PassPortBP PassPort

Explorer

Beyond

PassPort

Backup and restoreas a service

Internet connectivity

Vendor updatesBusiness Apps

Virtual (scripted/tested)Shrink-wrapped Apps

Local (not scripted/tested)

User provided device

Choice of SupportDevice/Network/

AccessSecurity

Backup to file serveror no backup solutionBP network & Internet

connectivityControlled updates

and policiesBusiness Apps

Local (scripted/tested)Shrink-wrapped AppsLocal (scripted/tested)

BP provided device

BP proviided support

Perimeter / DeviceSecurity

Backup to local device

Internet connectivity

Vendor updatesBusiness Apps

Remote (scripted/tested)Shrink-wrapped Apps

Local (not scripted/tested)

BP provided device

Self Support

Device / NetworkSecurity

Activity set prioritisedin terms of

• ITStrategy• Business Strategy

Virtualise Business Applications

Internet Hosted Services

Expose BP Services to the Internet

Expose BP Applications to the Internet

Software Self Provisioning

Remove Machine Domain

Membership

In the Cloud Security Services