Application Storage, Data Storage
Article | July 12, 2023
The success of 5G technology is a function of both the infrastructure that supports it and the ecosystems that enable it. Today, the definitive focus in the 5G space is on enterprise use cases, ranging from dedicated private 5G networks to accessing edge compute infrastructure and public or private clouds from the public 5G network. As a result, vendor-neutral multitenant data center providers and their rich interconnection capabilities are pivotal in helping make 5G a reality. This is true both in terms of the physical infrastructure needed to support 5G and the ability to effectively connect enterprises to 5G.
Industry experts expect 5G to enable emerging applications such as virtual and augmented reality (AR/VR), industrial robotics/controls as part of the industrial internet of things (IIoT), interactive gaming, autonomous driving, and remote medical procedures. These applications need a modern, cloud-based infrastructure to meet requirements around latency, cost, availability and scalability. This infrastructure must be able to provide real-time, high-bandwidth, low-latency access to latency-dependent applications distributed at the edge of the network.
How Equinix thinks about network slicing
Network slicing refers to the ability to provision and connect functions within a common physical network to provide the resources necessary to deliver service functionality under specific performance constraints (such as latency, throughput, capacity and reliability) and functional constraints (such as security and applications/services). With network slicing, enterprises can use 5G networks and services for a wide variety of use cases on the same infrastructure.
Providing continuity of network slices with optimal UPF placement and intelligent interconnection
Mobile traffic originates in the mobile network, but it is not contained to the mobile network domain, because it runs between the user app on a device and the server workload on multi-access edge compute (MEC) or on the cloud. Therefore, to preserve intended characteristics, the slice must be extended all the way to where the traffic wants to go. This is why we like to say “the slicing must go on.”
The placement of network functions within the slice must be optimized relative to the intended traffic flow, so that performance can be ensured end-to-end. As a result, organizations must place or activate the user plane function (UPF) in optimal locations relative to the end-to-end user plane traffic flow.
We expect that hybrid and multicloud connectivity will remain a key requirement for enterprises using 5G access. In this case, hybrid refers to private edge computing resources (what we loosely call “MEC”) located in data centers—such as Equinix International Business Exchange™ (IBX®) data centers—and multicloud refers to accessing multiple cloud providers from 5G devices. To ensure both hybrid and multicloud connectivity, enterprises need to make the UPF part of the multidomain virtual Layer 2/Layer 3 interconnection fabric.
Because a slice must span multiple domains, automation of UPF activation, provisioning and virtual interconnection to edge compute and multicloud environments is critical.
Implementing network slicing for interconnection of core and edge technology
Equinix partnered with Kaloom to develop network slicing for interconnection of core and edge (NICE) technology within our 5G and Edge Technology Development Center (5G ETDC) in Dallas. NICE technology is built using cloud-native network fabric and high-performance 5G UPF from Kaloom. This is a production-ready software solution, running on white boxes built with P4 programmable application-specific integrated circuits (ASICs), allowing for deep network slicing and support for high-performance 5G UPF with extremely fast data transfer rates.
With NICE technology in the 5G ETDC, Equinix demonstrates:
5G UPF deployment/activation and traffic breakout at Equinix for multiple slices.
Software-defined interconnection between the 5G core and MEC resources from multiple providers.
Software-defined interconnection between the 5G core and multiple cloud service providers.
Orchestration of provisioning and automation of interconnection across the 5G core, MEC and cloud resources.
Architecture of NICE technology in the Equinix 5G ETDC
The image above shows (from left to right):
The mobile domain with radio access network (RAN), devices (simulated) and mobile backhaul connected to Equinix.
The Equinix domain with:
Equinix Metal® supporting edge computing servers and a fabric controller from Kaloom.
Network slicing fabric providing interconnection and Layer 2/Layer 3 cloud-native networking to dynamically activate UPF instances/interfaces connected with MEC environments and clouds, forming two slices (shown above in blue and red).
Equinix Fabric™ and multicloud connectivity.
This demonstrates the benefit of having the UPF as a feature of the interconnection fabric, effectively allowing UPF activation as part of the virtual fabric configuration. This ultimately enables high-performance UPF that’s suitable for use cases such as high-speed 5G fixed wireless access.
Combining UPF instances and MEC environments into an interconnection fabric makes it possible to create continuity for the slices and influence performance and functionality. Equinix Fabric adds multicloud connectivity to slices, enabling organizations to directly integrate network slicing with their mobile hybrid multicloud architectures.
Successful private 5G edge deployments deliver value in several ways. Primarily, they offer immediate access to locally provisioned elastic compute, storage and networking resources that deliver the best user and application experiences. In addition, they help businesses access a rich ecosystem of partners to unlock new technologies at the edge.
Secure, reliable connectivity and scalable resources are essential at the edge. A multivendor strategy with best-of-breed components complemented by telemetry, advanced analytics with management and orchestration—as demonstrated with NICE in Equinix data centers—is a most effective way to meet those requirements. With Equinix’s global footprint of secure, well-equipped facilities, customers can maximize benefits.”
- Suresh Krishnan, CTO, Kaloom
Equinix and its partners are building the future of 5G
NICE technology is just one example of how the Equinix 5G and Edge Technology Development Center enables the innovation and development of real-world capabilities that underpin the edge computing and interconnection infrastructure required to successfully implement 5G use cases. A key benefit of the 5G ETDC is the ability to combine cutting-edge innovations from our partners like Kaloom with proven solutions from Equinix that already serve a large ecosystem of customers actively utilizing hybrid multicloud architectures.
Read More
Hyper-Converged Infrastructure, Windows Systems and Network
Article | July 11, 2023
Containers have emerged as a choice for deploying and scaling applications, owing to their lightweight, isolated, and portable nature. However, the absence of robust security measures may expose containers to diverse threats, thereby compromising the confidentiality and integrity of data and apps.
Contents
1 Introduction
2 IaaS Container Security Techniques
2.1 Container Image Security
2.2 Host Security
2.3 Network Security
2.4 Data Security
2.5 Identity and Access Management (IAM)
2.6 Runtime Container Security
2.7 Compliance and Auditing
3 Conclusion
1. Introduction
Infrastructure as a Service has become an increasingly popular way of deploying and managing applications, and containerization has emerged as a leading technology for packaging and deploying these applications. Containers are software packages that include all the necessary components to operate in any environment. While containers offer numerous benefits, such as portability, scalability, and speed, they also introduce new security challenges that must be addressed.
Implementing adequate IaaS container security requires a comprehensive approach encompassing multiple layers and techniques. This blog explores the critical components of IaaS container security. It provides an overview of the techniques and best practices for implementing security measures that ensure the confidentiality and integrity of containerized applications. By following these, organizations can leverage the benefits of IaaS and containerization while mitigating the security risks that come along.
2. IaaS Container Security Techniques
The increasing IAAS security risks and security issues associated with IAAS these days are leading to a massive data breach. Thus, IAAS security concerns are taken into consideration, and seven best techniques are drafted below.
2.1. Container Image Security:
Container images are the building blocks of containerized applications. Ensuring the security of these images is essential to prevent security threats. The following measures are used for container image security:
Using secure registries: The registry is the location where container images are stored and distributed. Usage of centrally managed registries on campus, the International Organization for Standardization (ISO) can scan them for security issues and system managers may simply assess package gaps, etc.
Signing images: Container images can be signed using digital signatures to ensure their authenticity. Signed images can be verified before being deployed to ensure they have not been tampered with.
Scanning images: Although standard AppSec tools such as Software Composition Analysis (SCA) can check container images for vulnerabilities in software packages and dependencies, extra dependencies can be introduced during the development process or even at runtime.
2.2. Host Security:
Host security is a collection of capabilities that provide a framework for implementing a variety of security solutions on hosts to prevent attacks. The underlying host infrastructure where containers are deployed must be secured. The following measures are used for host security:
Using secure operating systems: The host operating system must be safe and up-to-date with the latest high severity security patches within 7 days of release, and others, within 30 days to prevent vulnerabilities and security issues.
Applying security patches: Security patches must be applied to the host operating system and other software packages to fix vulnerabilities and prevent security threats.
Hardening the host environment: The host environment must be hardened by disabling unnecessary services, limiting access to the host, and applying security policies to prevent unauthorized access.
2.3. Network Security:
Network security involves securing the network traffic between containers and the outside world. The following measures are used for network security:
Using Microsegmentation and firewalls: Microsegmentation tools with next-gen firewalls provide container network security. Microsegmentation software leverages network virtualization to build extremely granular security zones in data centers and cloud applications to isolate and safeguard each workload.
Encryption: Encryption can protect network traffic and prevent eavesdropping and interception of data.
Access control measures: Access control measures can restrict access to containerized applications based on user roles and responsibilities.
2.4. Data Security:
Data stored in containers must be secured to ensure its confidentiality and integrity. The following measures are used for data security:
Using encryption: Data stored in containers can be encrypted, using Transport Layer Security protocol version 1.1. (TLS 1.1) or higher, to protect it from unauthorized access and prevent data leaks. All outbound traffic from private cloud should be encrypted at the transport layer.
Access control measures: Access control measures can restrict access to sensitive data in containers based on user roles and responsibilities.
Not storing sensitive data in clear text: Sensitive data must not be stored in clear text within containers to prevent unauthorized access and data breaches. Backup app data, atleast weekly.
2.5. Identity and Access Management (IAM):
IAM involves managing access to the container infrastructure and resources based on the roles and responsibilities of the users. The following measures are used for IAM:
Implementing identity and access management solutions: IAM solutions can manage user identities, assign user roles and responsibilities, authenticate and provide access control policies.
Multi-factor authentication: Multi-factor authentication can add an extra layer of security to the login process.
Auditing capabilities: Auditing capabilities can monitor user activity and detect potential security threats.
2.6. Runtime Container Security:
To keep its containers safe, businesses should employ a defense-in-depth strategy, as part of runtime protection.
Malicious processes, files, and network activity that deviates from a baseline can be detected and blocked via runtime container security.
Container runtime protection can give an extra layer of defense against malicious code on top of the network security provided by containerized next-generation firewalls.
In addition, HTTP layer 7 based threats like the OWASP Top 10, denial of service (DoS), and bots can be prevented with embedded web application and API security.
2.7. Compliance and Auditing:
Compliance and auditing ensure that the container infrastructure complies with relevant regulatory and industry standards. The following measures are used for compliance and auditing:
Monitoring and auditing capabilities: Monitoring and auditing capabilities can detect and report cloud security incidents and violations.
Compliance frameworks: Compliance frameworks can be used to ensure that the container infrastructure complies with relevant regulatory and industry standards, such as HIPAA, PCI DSS, and GDPR.
Enabling data access logs on AWS S3 buckets containing high-risk Confidential Data is one such example.
3. Conclusion
IaaS container security is critical for organizations that rely on containerization technology for deploying and managing their applications. There is likely to be an increased focus on the increased use of AI and ML to detect and respond to security incidents in real-time, the adoption of more advanced encryption techniques to protect data, and the integration of security measures into the entire application development lifecycle.
In order to stay ahead of the challenges and ensure the continued security of containerized applications, the ongoing process of IaaS container security requires continuous attention and improvement. By prioritizing security and implementing effective measures, organizations can confidently leverage the benefits of containerization while maintaining the confidentiality and integrity of their applications and data.
Read More
Hyper-Converged Infrastructure, IT Systems Management
Article | September 14, 2023
The rollout of 5G networks coupled with edge compute introduces new security concerns for both the network and the enterprise. Security at the edge presents a unique set of security challenges that differ from those faced by traditional data centers. Today new concerns emerge from the combination of distributed architectures and a disaggregated network, creating new challenges for service providers.
Many mission critical applications enabled by 5G connectivity, such as smart factories, are better off hosted at the edge because it's more economical and delivers better Quality of Service (QoS). However, applications must also be secured; communication service providers need to ensure that applications operate in an environment that is both safe and provides isolation. This means that secure designs and protocols are in place to pre-empt threats, avoid incidents and minimize response time when incidents do occur.
As enterprises adopt private 5G networks to drive their Industry 4.0 strategies, these new enterprise 5G trends demand a new approach to security. Companies must find ways to reduce their exposure to cyberattacks that could potentially disrupt mission critical services, compromise industrial assets and threaten the safety of their workforce. Cybersecurity readiness is essential to ensure private network investments are not devalued.
The 5G network architecture, particularly at the edge, introduces new levels of service decomposition now evolving beyond the virtual machine and into the space of orchestrated containers. Such disaggregation requires the operation of a layered technology stack, from the physical infrastructure to resource abstraction, container enablement and orchestration, all of which present attack surfaces which require addressing from a security perspective. So how can CSPs protect their network and services from complex and rapidly growing threats?
Addressing vulnerability points of the network layer by layer
As networks grow and the number of connected nodes at the edge multiply, so do the vulnerability points. The distributed nature of the 5G edge increases vulnerability threats, just by having network infrastructure scattered across tens of thousands of sites. The arrival of the Internet of Things (IoT) further complicates the picture: with a greater number of connected and mobile devices, potentially creating new network bridging connection points, questions around network security have become more relevant.
As the integrity of the physical site cannot be guaranteed in the same way as a supervised data center, additional security measures need to be taken to protect the infrastructure. Transport and application control layers also need to be secured, to enable forms of "isolation" preventing a breach from propagating to other layers and components. Each layer requires specific security measures to ensure overall network security: use of Trusted Platform Modules (TPM) chipsets on motherboards, UEFI Secure OS boot process, secure connections in the control plane and more. These measures all contribute to and are integral part of an end-to-end network security design and strategy.
Open RAN for a more secure solution
The latest developments in open RAN and the collaborative standards-setting process related to open interfaces and supply chain diversification are enhancing the security of 5G networks. This is happening for two reasons. First, traditional networks are built using vendor proprietary technology – a limited number of vendors dominate the telco equipment market and create vendor lock-in for service providers that forces them to also rely on vendors' proprietary security solutions. This in turn prevents the adoption of "best-of-breed" solutions and slows innovation and speed of response, potentially amplifying the impact of a security breach.
Second, open RAN standardization initiatives employ a set of open-source standards-based components. This has a positive effect on security as the design embedded in components is openly visible and understood; vendors can then contribute to such open-source projects where tighter security requirements need to be addressed.
Aside from the inherent security of the open-source components, open RAN defines a number of open interfaces which can be individually assessed in their security aspects. The openness intrinsically present in open RAN means that service components can be seamlessly upgraded or swapped to facilitate the introduction of more stringent security characteristics, or they can simultaneously swiftly address identified vulnerabilities.
Securing network components with AI
Monitoring the status of myriad network components, particularly spotting a security attack taking place among a multitude of cooperating application functions, requires resources that transcend the capabilities of a finite team of human operators. This is where advances in AI technology can help to augment the abilities of operations teams. AI massively scales the ability to monitor any number of KPIs, learn their characteristic behavior and identify anomalies – this makes it the ideal companion in the secure operation of the 5G edge. The self-learning aspect of AI supports not just the identification of known incident patterns but also the ability to learn about new, unknown and unanticipated threats.
Security by design
Security needs to be integral to the design of the network architecture and its services. The adoption of open standards caters to the definition of security best practices in both the design and operation of the new 5G network edge. The analytics capabilities embedded in edge hyperconverged infrastructure components provide the platform on which to build an effective monitoring and troubleshooting toolkit, ensuring the secure operation of the intelligent edge.
Read More
Application Infrastructure
Article | June 6, 2022
Introduction
It is hard to manage a modern firm without a convenient and adaptable IT infrastructure. When properly set up and networked, technology can improve back-office processes, increase efficiency, and simplify communication. IT infrastructure can be utilized to supply services or resources both within and outside of a company, as well as to its customers. IT infrastructure when adequately deployed aids organizations in achieving their objectives and increasing profits.
IT infrastructure is made up of numerous components that must be integrated for your company's infrastructure to be coherent and functional. These components work in unison to guarantee that your systems and business as a whole run smoothly.
Enterprise IT Infrastructure Trends
Consumption-based pricing models are becoming more popular among enterprise purchasers, a trend that began with software and has now spread to hardware. This transition from capital to operational spending lowers risk, frees up capital, and improves flexibility. As a result, infrastructure as a service (IaaS) and platform as a service (PaaS) revenues increased by 53% from 2015 to 2016, making them the fastest-growing cloud and infrastructure services segments. The transition to as-a-service models is significant given that a unit of computing or storage in the cloud can be quite cheaper in terms of the total cost of ownership than a unit on-premises.
While businesses have been migrating their workloads to the public cloud for years, there has been a new shift among large corporations. Many companies, including Capital One, GE, Netflix, Time Inc., and others, have downsized or removed their private data centers in favor of shifting their operations to the cloud.
Cybersecurity remains a high priority for the C-suite and the board of directors. Attacks are increasing in number and complexity across all industries, with 80% of technology executives indicating that their companies are unable to construct a robust response. Due to lack of cybersecurity experts, many companies can’t get the skills they need on the inside, so they have to use managed security services.
Future of Enterprise IT Infrastructure
Companies can adopt the 'As-a-Service' model to lower entry barriers and begin testing future innovations on the cloud's basis. Domain specialists in areas like healthcare and manufacturing may harness AI's potential to solve some of their businesses' most pressing problems.
Whether in a single cloud or across several clouds, businesses want an architecture that can expand to support the rapid evolution of their apps and industry for decades. For enterprise-class visibility and control across all clouds, the architecture must provide a common control plane that supports native cloud Application Programming Interfaces (APIs) as well as enhanced networking and security features.
Conclusion
The scale of disruption in the IT infrastructure sector is unparalleled, presenting enormous opportunities and hazards for industry stakeholders and their customers. Technology infrastructure executives must restructure their portfolios and rethink their go-to-market strategies to drive growth. They should also invest in the foundational competencies required for long-term success, such as digitization, analytics, and agile development.
Data center companies that can solve the industry's challenges, as well as service providers that can scale quickly without limits and provide intelligent outcome-based models. This helps their clients achieve their business objectives through a portfolio of 'As-a-Service' models, will have a bright future.
Read More