Subscribe to our Newsletter

By subscribing, you’ll get exclusive invites to webinars, events by security experts, threat alerts and cybersecurity tips delivered to your inbox.

We are committed to your privacy and won't ever share your information with 3rd parties

Thank you for subscribing to our newsletter.

August 30, 2018 9:56 am | Leave your thoughts
August 30, 2018 9:56 am | Leave your thoughts

Best Practices to Secure Multi-Tenant Environments

Authors

Avatar Surya Kollimarla

Most of today’s organization’s data center deployment and operations are incredibly complex, as they not only have their own business-critical applications but also host their customer’s data. This presents a critical challenge in securing both their own and their customers IP.

To add to this complexity, these data centers will be a combination of on-premises, shared, or outsourced to a third-party data center for management and operations. Many customers host horizontal applications that are tenants of a larger data center that need to be separated from other workloads and customer environments.

For example, PCI-compliant credit card or POS machines in a retail corporation are horizontal applications that are unique tenants sharing the same infrastructure. Although in this multi-tenant environment, these machines reside in the same infrastructure, it is critical that each pod/machine/environment is isolated from corporate business applications and other customer environments.

environment separation in multi-tenant enterprise

How Environment Separation Happens Today

Today, most customers will separate environments by creating a physical or virtual pod environment for their own and their customers’ needs. The environments are then typically segmented using VLANs, but as the environments and workloads scale you will run into one of the following scenarios:

  1. Sharing the pod and adding policies for network controls – leading to a greater number of ACL rules making it extremely hard to manage
  2. Build an entirely new rack or the virtual environment from scratch

In both scenarios, you face an incredible operational expense, and the ongoing management of the configuration will be painful.

Operational Challenges for Security Teams

  • Lack of real-time visibility into workload traffic – can I see all the traffic between and across my environment and customers pods?
  • Inadequate controls to separate environments to ensure there is no cross-environment traffic – how do I ensure traffic from POD 1 is not seen in POD 3?
  • Inability to verify that policies are consistently enforced across workloads and move dynamically with the workload
  • For real-time compliance monitoring – how can I prove that there is no cross-pollination between PODs or deviation from the corporate policies?
  • Incredible operational expenses, as every time a new pod is being spun-up, the security team has to define a new set of policies, hindering the efficiency of implementing a new pod with appropriate policies.
  • Inability to secure user access to a specific pod environment and make sure all other pod environments are undiscoverable to the user. How can I ensure that the user doesn’t have access to everything on the subnet?

Qualities of an Effective Solution

To achieve micro-segmentation in multi-tenant scenarios, your solution should be easy to implement and operate and provide you with the following:

  • Real-time visibility into all environments and workloads and the traffic between them
  • Enable you to create consistent and reusable policies that are independent of IP constructs and network infrastructure.
  • Quickly validate policies against real-time traffic, and then enforce
  • Secure DevOps with workload security right away from the time of birth
  • Continuous traffic monitoring and policy auto-correction
  • Alert and auto-correct any deviation from the corporate policies
  • Seamless and consistent policy enforcement across hybrid environments such as AWS, Azure, VMware, and GCP.

See how ColorTokens’ award-winning security solutions can help improve your organization’s security posture. Register for a free demo today!

Categorized in: Micro-segmentation

Leave A Comment