Cisco Cisco DWDM Transceiver Modules Livre blanc
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 8 of 19
Figure 3. Examples of Monitoring Views Provided by Cisco UCS Director
Security and Compliance
With the increased pace of infrastructure convergence with cloud models, it is increasingly common for multiple
tenant, organizations, and applications to share the same infrastructure. In such an environment, it is very
important to gain visibility across the entire infrastructure to help ensure not just the security goals of the
infrastructure team, but also the security and compliance expectations of the individual tenants and organizations.
The visibility and audit requirements from the network require the network to embody certain characteristics. The
network must be:
●
Observable: The network needs to provide visibility into resource use, secure resource segmentation,
statistics, and performance across tenants and organizations.
●
Controllable: The network should provide capabilities to change security parameters to meet security,
compliance, and visibility needs.
●
Automatable: The s
cale and complexity of today’s networks dictate automated collection and monitoring of
information for security and compliance needs. The same level of collection and monitoring cannot be
accomplished with manual intervention.
To meet these needs, networks need to expose a very large amount of very detailed configuration and operation
information to external tools and entities. A robust set of APIs, such as that exposed by Cisco NX-API, that tools
can use to query network information can be critical for a secure data center. Automation capabilities such as those
provided by Python scripting and Puppet and Chef integration, can help ensure that the network stays in
compliance throughout the duration of its operation, even in the event of new threats and requirements.