vSecurity Control Center
The operational console and central processing hub
It provides a single enterprise-wide view of the security and compliance state of the virtual infrastructure. In typical organizations, the Control Center resides in the Security Operations Center (SOC).
The Control Center VM is responsible for VMA mesh management including all software, rule and signature updates. It is based on a Linux/Apache/PHP/Database appliance.
In the simplest terms, vSecurity’s protection process automatically discovers assets, automatically drops these assets into logical containers determined by policy, automatically configures the appropriate controls associated with the policy, automatically measures the compliance status of the zone, automatically quarantines assets in violation of policy (if desired) and then automatically reports and alerts.
The Control Center consists of three management components: Logical Zoning, Policy and Compliance.
- Logical Zoning (TrustZones®): At the heart of Catbird’s segmentation and enforcement architecture, the Control Center’s automated zoning mechanism continuously detects and assigns all VMs into groups, called TrustZones®. TrustZones are logical policy envelopes. TrustZones ensure that all VMs are identified, appropriately grouped and assigned a policy. Catbird’s Control Center ensures that security controls are synchronized within each zone and across zones. TrustZones are independent of network topology and can span multiple logical or physical data centers. Visualization and workflow is provided on both a TrustZone and individual VM level.
- Policy-based Controls: Security controls are defined by policy for each TrustZone. Technical control components are orchestrated at both TrustZone level and individual VM level. Policy templates define the technical control components residing on the VMA. Controls and events are correlated and orchestrated to the VM hypervisor ID to ensure consistency.
- Compliance:The Control Center delivers expert visualization of compliance posture against the leading standards (e.g., PCI, FISMA, HIPAA et al) grouped by TrustZone as well as vis a vis individual VMs. Compliance workflow provides rapid mitigation. Compliance status is reported in seven compliance categories: Auditing, Inventory Management, Access Controls, Configuration Management, Change Management, Incident Response and Vulnerability Management.