Security and Scalability Considerations Rodney Joffe SVP and - - PowerPoint PPT Presentation

security and scalability considerations
SMART_READER_LITE
LIVE PREVIEW

Security and Scalability Considerations Rodney Joffe SVP and - - PowerPoint PPT Presentation

Security and Scalability Considerations Rodney Joffe SVP and Senior Technologist, NeuStar Confidential and proprietary Introduction A Registry is much more than a database and software; it includes: Network infrastructure firewalls,


slide-1
SLIDE 1

Confidential and proprietary

Security and Scalability Considerations

Rodney Joffe SVP and Senior Technologist, NeuStar

slide-2
SLIDE 2

2

Confidential and proprietary

Introduction

A Registry is much more than a database and software; it includes:

  • Network infrastructure – firewalls, load balancers, routers, packet shapers
  • Protocol and application servers
  • DNS and WHOIS servers
  • Billing systems
  • Monitoring systems
  • Security and intrusion detection systems

Must be designed and managed with security, stability, and robustness in mind Must be supported by comprehensive security and contingency plans

slide-3
SLIDE 3

3

Confidential and proprietary

Data and Infrastructure Security

What does a Registry need to protect?

  • SRS Database
  • WHOIS Database
  • DNS Infrastructure
  • Billing and Financial Systems
  • Web Servers
  • Customer Relationship Management Systems
slide-4
SLIDE 4

4

Confidential and proprietary

Security Management

Areas of Consideration:

  • Security Policy
  • Security Organization
  • Personnel Security Policies
  • Physical and Environmental Security
  • Operations and Communications
  • Entitlements Management (Info access)
  • System development and Maintenance (Production Support)
  • Security Incident Management
  • Continuity of Business (COB)
  • Auditing
slide-5
SLIDE 5

5

Confidential and proprietary

Security Mitigation Strategies

  • Multiple Firewall Layers
  • Intrusion Detections Systems
  • No direct access to the database
  • Multiple control mechanisms to manage registrar connectivity – IP

addresses; passwords, and certificates

  • Registrar connections should be managed by dedicated packet

shaping hardware

  • File level access controls
  • Regular internal and third-party audits
slide-6
SLIDE 6

6

Confidential and proprietary

Registry Architecture

slide-7
SLIDE 7

7

Confidential and proprietary

Scalability – Areas of Consideration

  • Network Infrastructure
  • Internet Bandwidth
  • Database
  • Protocol and Application Servers
  • DNS Network
  • WHOIS Databases
  • Registrar Connectivity
  • Billing and Financial Systems
  • OT&E Environment
slide-8
SLIDE 8

8

Confidential and proprietary

Scalability Strategies

  • High availability, redundant network

– Hot stand-by data centers – No single points of failure

  • Architectural design that is scalable

– Load balanced server farms – Separate protocol and application server layers

  • Enterprise grade software (Oracle, etc)
  • Broad Global DNS Network
  • Multiple ISP Connections
  • Pre-established contingency plans
slide-9
SLIDE 9

9

Confidential and proprietary

System Monitoring

  • System and resource monitoring is necessary for proper planning
  • Critical resource monitoring includes:

– Storage capacity – CPU usage – Memory usage – Data throughput – Internet capacity – Power supply – Availabiliyt

  • 24 X 7 Network Operations Center and Network Monitoring System

– Monitor for Security Breaches – Detect infrastructure and hardware issues – Timely response and coordination

slide-10
SLIDE 10

10

Confidential and proprietary

DNS and Monitoring Infrastructure

10 UltraDNS Data Centers

  • Americas
  • California
  • Florida
  • Illinois
  • New York
  • Texas
  • Virginia
  • Brazil
  • Peru
  • Canada
  • Europe
  • Luxembourg
  • London
  • Amsterdam
  • Africa
  • Johannesburg
  • Asia-Pacific
  • Beijing
  • Hong Kong
  • Noida (India)
  • Sydney

Current Planned Webmetrics

slide-11
SLIDE 11

Confidential and proprietary