Changing the Open Hybrid Cloud Game: Deploying OpenShift to Azure

A presentation at GovLoop Webinar in July 2017 in by Shawn Wells

Slide 1

Slide 1

Changing the Open Hybrid Cloud Game Deploying OpenShift to Azure Harold Wong Cloud Architect Commercial Software Engineering harold.wong@microsoft.com ADD NAME (View > Master > Slide master)

Slide 2

Slide 2

Red Hat OpenShift Container Platform ADD NAME (View > Master > Slide master)

Slide 3

Slide 3

ADD NAME (View > Master > Slide master)

Slide 4

Slide 4

ADD NAME (View > Master > Slide master)

Slide 5

Slide 5

ADD NAME (View > Master > Slide master)

Slide 6

Slide 6

ADD NAME (View > Master > Slide master)

Slide 7

Slide 7

ADD NAME (View > Master > Slide master)

Slide 8

Slide 8

ADD NAME (View > Master > Slide master)

Slide 9

Slide 9

ADD NAME (View > Master > Slide master)

Slide 10

Slide 10

ADD NAME (View > Master > Slide master)

Slide 11

Slide 11

ADD NAME (View > Master > Slide master)

Slide 12

Slide 12

ADD NAME (View > Master > Slide master)

Slide 13

Slide 13

ADD NAME (View > Master > Slide master)

Slide 14

Slide 14

ADD NAME (View > Master > Slide master)

Slide 15

Slide 15

ADD NAME (View > Master > Slide master)

Slide 16

Slide 16

ADD NAME (View > Master > Slide master)

Slide 17

Slide 17

ADD NAME (View > Master > Slide master)

Slide 18

Slide 18

ADD NAME (View > Master > Slide master)

Slide 19

Slide 19

ADD NAME (View > Master > Slide master)

Slide 20

Slide 20

ADD NAME (View > Master > Slide master)

Slide 21

Slide 21

ADD NAME (View > Master > Slide master)

Slide 22

Slide 22

ADD NAME (View > Master > Slide master)

Slide 23

Slide 23

ADD NAME (View > Master > Slide master)

Slide 24

Slide 24

ADD NAME (View > Master > Slide master)

Slide 25

Slide 25

ADD NAME (View > Master > Slide master)

Slide 26

Slide 26

ADD NAME (View > Master > Slide master)

Slide 27

Slide 27

ADD NAME (View > Master > Slide master)

Slide 28

Slide 28

ADD NAME (View > Master > Slide master)

Slide 29

Slide 29

ADD NAME (View > Master > Slide master)

Slide 30

Slide 30

Accrediting OpenShift On Azure Shawn Wells Office of the Chief Technologist U.S. Public Sector shawn@redhat.com || 443-534-0130 ADD NAME (View > Master > Slide master)

Slide 31

Slide 31

Azure receives FedRAMP High, DoD Impact Level 4, FBI CJIS certifications March ‘16 Oct. ‘16 RHEL7 + Containers Common Criteria Certification 31 OpenShift on Azure FedRAMP Security Blueprint May ‘17 June ‘17 OpenShift on Azure Reference Architecture July ‘17 Microsoft & Red Hat Government Partnership

Slide 32

Slide 32

Azure for Government Certifications DoD Impact Level 4 ITAR Readiness FedRAMP High ● Allows all DoD and mission partners to leverage Azure for “Controlled Unclassified Information” ● aka “FOUO” 32

Slide 33

Slide 33

Azure for Government Certifications DoD Impact Level 4 ITAR Readiness FedRAMP High 33 ● Store and process regulated data. ● Azure facilities and personnel US-based.

Slide 34

Slide 34

Azure for Government Certifications DoD Impact Level 4 ITAR Readiness FedRAMP High 34 ● Focus for today. ● GSA-estimated 50% of $80B Federal IT budget falls under ‘FedRAMP High’

Slide 35

Slide 35

Red Hat Certifications Common Criteria ● RHEL 7.1 certified to EAL4+. ● 3rd party lab verifies security functionality. ● Certified multi-tenancy capabilities. 35

Slide 36

Slide 36

RHEL meets General Purpose Operating System Protection Profile Requirement Deficiencies There are no missing requirements Design Deficiencies There are no errors of design that lead to vulnerabilities Coding Defects There are no implementation defects that create vulnerabilities Operational Guidance The security features are well explained Prevention and Detection Processes are in place, staff trained, runtime defenses mitigate latent problems 36 Code Physically Secure The code is kept in a SCC system with access limited to essential personnel Code Correctness Discuss different classes of errors and how they are detected Runtime Protections The use of stack protector, FORTIFY SOURCE, RELRO, and kernel sysctls are effective Independent 3rd Party Code reviews are performed and defects corrected Static Analysis Tools All code is scanned and important defects are corrected Test Suite Code exercised by test suite shows no unexpected errors Trained Programmers The staff is trained and follows procedures

Slide 37

Slide 37

RHEL meets General Purpose Operating System Protection Profile Design Deficiencies There are no errors of design that lead to vulnerabilities Requirement Deficiencies There are no missing requirements 37 Coding Defects There are no implementation defects that create vulnerabilities US Gov. Protection Profiles Prevention and Detection Processes are in place, staff trained, runtime defenses mitigate latent problems Code Physically Secure The code is kept in a SCC system with access limited to essential personnel Code Correctness Discuss different classes of errors and how they are detected Runtime Protections The use of stack protector, FORTIFY SOURCE, RELRO, and kernel sysctls are effective Independent 3rd Party Code reviews are performed and defects corrected Static Analysis Tools All code is scanned and important defects are corrected Test Suite Code exercised by test suite shows no unexpected errors Operational Guidance The security features are well explained Trained Programmers The staff is trained and follows procedures

Slide 38

Slide 38

RHEL meets General Purpose Operating System Protection Profile Requirement Deficiencies There are no missing requirements 38 Design Deficiencies There are no errors of design that lead to vulnerabilities Coding Defects There are no implementation defects that create vulnerabilities FIPS 140-2 Cryptography Certification Prevention and Detection Processes are in place, staff trained, runtime defenses mitigate latent problems Code Physically Secure The code is kept in a SCC system with access limited to essential personnel Code Correctness Discuss different classes of errors and how they are detected Runtime Protections The use of stack protector, FORTIFY SOURCE, RELRO, and kernel sysctls are effective Independent 3rd Party Code reviews are performed and defects corrected Static Analysis Tools All code is scanned and important defects are corrected Test Suite Code exercised by test suite shows no unexpected errors Operational Guidance The security features are well explained Trained Programmers The staff is trained and follows procedures

Slide 39

Slide 39

RHEL meets General Purpose Operating System Protection Profile Requirement Deficiencies There are no missing requirements Design Deficiencies There are no errors of design that lead to vulnerabilities Coding Defects There are no implementation defects that create vulnerabilities Prevention and Detection Processes are in place, staff trained, runtime defenses mitigate latent problems 39 Code Physically Secure The code is kept in a SCC system with access limited to essential personnel Code Correctness Discuss different classes of errors and how they are detected Runtime Protections The use of stack protector, FORTIFY SOURCE, RELRO, and kernel sysctls are effective Independent 3rd Party Code reviews are performed and defects corrected Static Analysis Tools All code is scanned and important defects are corrected Test Suite Code exercised by test suite shows no unexpected errors Operational Guidance The security features are well explained USGCB, STIGs Trained Programmers The staff is trained and follows procedures

Slide 40

Slide 40

PUTTING IT TOGETHER: OpenShift On Azure Reference Architecture + Security Blueprint

Slide 41

Slide 41

OpenShift on Azure Reference Architecture Provides a comprehensive, stepby-step build of an enterprise deployment of OpenShift v3.5 on Azure. ● Public documentation ● Automation scripts on GitHub 41

Slide 42

Slide 42

42

Slide 43

Slide 43

43

Slide 44

Slide 44

OpenShift on Azure Security Blueprint ● ATO paperwork required for all cloud systems ● We went through the ~300pg GSA SSP template and pre-populated answers 44

Slide 45

Slide 45

OpenShift on Azure Security Blueprint Some controls are implemented in whole or in part by Microsoft Azure 45

Slide 46

Slide 46

OpenShift on Azure Security Blueprint Others are inherently met by use of Red Hat, e.g. FIPS for disk encryption 46

Slide 47

Slide 47

OpenShift on Azure Security Blueprint For customer responsibilities, we documented what a successful response would be: 47

Slide 48

Slide 48

48

Slide 49

Slide 49

49

Slide 50

Slide 50

click 50

Slide 51

Slide 51

THANK YOU