F5 Networks

Improving Security Outcomes with F5 SSLO in Equinix

1 min. read
F5

Share

Over the years we've seen a lot of industry trends come and go. Two - cloud and mobility - fall into what we might call "megatrends." These are movements within the industry that have been disruptive and ultimately changed the face of computing.

Mobility was first, and it opened the eyes of consumers to the possibility of computing on the go. Our phones became our constant companions. The apps we relied on for entertainment and collaboration, however, were not as mobile.

Public cloud provided an answer to that, offering new locations and ways of deploying applications. Today, nearly nine in ten (87%) of organizations maintain an application presence in multiple public cloud properties. With so many applications in the public cloud, application traffic patterns have shifted. Our customers now see traffic increasingly destined for a public cloud, whether that traffic is generated by employees or their customers. What hasn't changed is the need to secure that traffic. Indeed, that need may be more pronounced now than it ever has been.

According to Sophos in its State of Cloud Security 2020 report, "multi-cloud organizations reported more security incidents in the last 12 months. Seventy-three percent (73%) of the organizations surveyed were using two or more public cloud providers and reported more security incidents than those using a single platform."

The challenge facing business today is that the corporate perimeter at which security controls are traditionally operated is gone. New control points must be implemented because security is not optional.

The challenge is combatting complexity. With some applications remaining in the data centre and others moving to multiple cloud properties, one solution is to deploy the appropriate security controls in every cloud as well as within the data centre. These multiple implementations lead to inconsistent policies, lack of full visibility of security threats, and significant operational overhead. As a result, many organizations abandon such a strategy, which leaves them open to attack.

Deploying these new security control points at a central location where users, public clouds, and data intersect is a winning strategy. It offers better visibility, consistent policy control, less operational overhead and more efficient use of resources. One such location is Equinix, which offers lightning fast, ultra-low latency connections to the public clouds already used by most organizations via their virtual interconnection solution, Equinix Cloud Exchange (ECX).

F5 has previously established the general benefits of BIG-IP as a cloud gateway co-located in Equinix. Today we're going to dig into the specific use case for SSLO (SSL Orchestration) to improve business outcomes.

BIG-IP and SSLO in Equinix

The challenge organizations face with a multi-cloud application portfolio is significant. Moreover, F5's research indicates the most pressing challenge for the past three years with respect to multi-cloud has been enforcing consistent security policies across all applications, anywhere. Privacy and security concerns mean nearly all traffic today is encrypted. Mary Meeker notes that the share of encrypted traffic was already at 87% at the beginning of 2019, and Google’s latest transparency report shows nearly 90% of all web-based traffic is using encryption.

Most organizations use, on average, ten different application services to secure, deliver, and optimize applications. Choosing only one is not really an option. Security dominates the most frequently deployed services: DNSSEC, bot defence, and anti-fraud. There is no single application service that provides all the security capabilities an organization needs to protect its infrastructure and applications against extant and emerging threats. The need for these services across all environments leads to significant challenges with integration and orchestration in a seamless, easy to use fashion.

While you could chain multiple security services together, not all applications and traffic need to be evaluated by the same set of security services. Hand-crafting is great for gifts, not so much for managing security flows for every one of your applications.

Using BIG-IP as a cloud gateway deployed on the Equinix Platform enables organizations to create a security control point while employing the capabilities of multiple security application services without the operational overhead of manually integrating and orchestrating security services on a per application basis. BIG-IP SSL Orchestrator (SSLO) ensures that traffic is correctly routed to the appropriate security services before that traffic is deemed safe to send on to its destination in a public cloud or in the data centre. BIG-IP SSLO decrypts encrypted traffic and then, based on the type and source of traffic, steers it to the appropriate security services for inspection. This means dynamic service chaining that's based on logic and not manual directives. The result is enhanced visibility to mitigate threats while preserving existing security investments in malware, data-loss prevention, next-gen firewalls, and other security devices.

BIG-IP SSLO also integrates with Equinix SmartKeyTM, which provides a cloud-hardware security module (HSM) as a service to ensure dependable, multi-cloud security for sensitive cryptographic keys.

The benefits of using BIG-IP SSLO in Equinix to enforce centralized security policies include:

  1. Optimized Cost Efficiency. Cloud resources are not consumed unless the user and request has been inspected and cleared of malicious content/intent. Cloud costs are kept under control by refusing service to bad actors and bots.
  2. Simplified Operations. A single security control point along with a consistent set of security services reduce operational overload caused by multiple dashboards, consoles, logs, and policy languages.
  3. Improved Security Outcomes. The centralization of security while supporting a multi-cloud reality enables consistent security policies that cover all applications. Consistency of policy and enforcement is key to improving the security posture of the business and avoiding those all-too-common cloud security incidents.

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.

Updates

More updates