Security and Privacy Aspects in Cloud Computing



Similar documents
Security and Privacy Aspects in Cloud Computing

Security and Cloud Computing

Cloud Security: The Grand Challenge

Session Title: Cloud Computing 101 What every z Person must know

Security and Cloud Computing

Healthcare: La sicurezza nel Cloud October 18, IBM Corporation

CLOUD SECURITY: THE GRAND CHALLENGE

Security as Architecture A fine grained multi-tiered containment strategy

Cloud Computing with xcat on z/vm 6.3

Cloud Security - Risiken und Chancen Dr. Matthias Schunter, MBA IBM Research Zürich, schunter@acm.org

How To Write An Architecture For An Bm Security Framework

Title. Click to edit Master text styles Second level Third level

IBM Systems and Technology Group Technical Conference

How to Deliver Measurable Business Value with the Enterprise CMDB

Cloud computing is a new consumption and delivery model. Yesterday Today

Safeguarding the cloud with IBM Security solutions

Accelerate with ATS DS8000 Hardware Management Console (HMC) Best practices and Remote Support Configuration September 23rd, 2014.

Cloud computing White paper November IBM Point of View: Security and Cloud Computing

New Risks in the New World of Emerging Technologies

Managed Services - A Paradigm for Cloud- Based Business Continuity

How To Manage Energy At An Energy Efficient Cost

Energy Management in a Cloud Computing Environment

IBM Security in the Cloud

Backups in the Cloud Ron McCracken IBM Business Environment

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

The zevent Mobile Application

The Consolidation Process

Virtualization with VMware and IBM: Enjoy the Ride, but Don t Forget to Buckle Up!

Forecasting Performance Metrics using the IBM Tivoli Performance Analyzer

Cloud Computing Expanding IT flexibility and agility

Safeguarding the cloud with IBM Dynamic Cloud Security

Arwed Tschoeke, Systems Architect IBM Systems and Technology Group

IBM MOBILE SECURITY SOLUTIONS - Identity and Access Management Focus

SMP/E V3.5 Hands-on Lab: Learning to use SMP/E FIXCATs

Maximo Business Intelligence Reporting Roadmap Washington DC Users Group

IBM Systems Director Navigator for i5/os New Web console for i5, Fast, Easy, Ready

z/osmf Software Deployment Application- User Experience Enhancement Update

System z Batch Network Analyzer Tool (zbna) - Because Batch is Back!

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Why Finance Should Automate Management & Regulatory Reporting Processes

Strategies for assessing cloud security

Intelligent Management Università di Bologna 02 marzo 2009

How To Protect Your Cloud From Attack

IBM Tivoli Federated Identity Manager

Securing the Service Desk in the Cloud

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Consolidated security management for mainframe clouds

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

Security Officer s Checklist in a Sourcing Deal

Ubiquitous Computing, Pervasive Risk: Securely Deploy and Manage Enterprise Mobile Devices

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

Security Issues in Cloud Computing

Strengthen security with intelligent identity and access management

Positioning the Roadmap for POWER5 iseries and pseries

Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL).

CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)

IBM QRadar Security Intelligence April 2013

IBM EXAM QUESTIONS & ANSWERS

The use of Accelerator Appliances on zenterprise

Proven LANDesk Solutions

Java Application Performance Analysis and Tuning on IBM System i

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Mitigating Information Security Risks of Virtualization Technologies

Cloud Security - Risiken und Chancen

IBM Software Services for Collaboration

Security of Cloud Computing for the Power Grid

GoodData Corporation Security White Paper

Tip and Technique on creating adhoc reports in IBM Cognos Controller

Assessing Risks in the Cloud

Securing the Cloud through Comprehensive Identity Management Solution

Address IT costs and streamline operations with IBM service request and asset management solutions.

Java auf IBM z13 Ein Performance Update

THE BLUENOSE SECURITY FRAMEWORK

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Big Data & Analytics. A boon under certain conditions. Dr. Christian Keller General Manager IBM Switzerland IBM Corporation

Implement a unified approach to service quality management.

Security management solutions White paper. Extend business reach with a robust security infrastructure.

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

SAP Cloud Strategy - Timeless Software. Frank Stienhans on behalf of Kaj van de Loo SAP

IBM Smart Business Storage Cloud

Total Cost of Ownership (TCO): Comparing System z and Distributed Platforms

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

When millions need access: Identity management in an increasingly connected world

IBM PowerSC. Security and compliance solution designed to protect virtualised data centres. Highlights. IBM Systems and Technology Data Sheet

Cloud Security Who do you trust?

The Cloud, Virtualization, and Security

Session 1494: IBM Tivoli Storage FlashCopy Manager

Version 8.2. Tivoli Endpoint Manager for Asset Discovery User's Guide

Security and Cloud Compunting - Security impacts, best practices and solutions -

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system

Determining which Solutions are the Best Fit for Linux on System z Workloads

Securing Virtual Applications and Servers

IBM Service Management solutions White paper. Make ITIL actionable with Tivoli software.

IBM WebSphere Data Interchange V3.3

SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1

PICO Compliance Audit - A Quick Guide to Virtualization

Information Security: Why is it important for the Healthcare Industry?

Transcription:

Frank Hebestreit, CISA, CIPP/IT IBM Security Services, IBM Global Technology Services frank.hebestreit@de.ibm.com Security and Privacy Aspects in Cloud Computing 17.11.2010

Outline Brief Introduction to Cloud Computing Security and Privacy: Grand Challenges for the Adoption of Cloud Computing Mitigating cloud computing risks

Brief Introduction to Cloud Computing

Cloud: Consumption & Delivery Models Optimized by Workload Cloud is a new consumption and delivery model inspired by consumer Internet services. Enabled by Universal network access Pooling and virtualization of resources Automation of service management Standardization of workloads Cloud Services Cloud enables: Self-service Location independence Sourcing options Flexible payment models Economies-of-scale Cloud represents: The industrialization of delivery for IT supported services

Cloud Computing is Delivering Measurable Results

How is security different in the Cloud Model?? Today s data center We have control It s located at X. It s stored in servers Y and Z. We have backup plans. Our administrators control access. Our uptime meets our service level agreements. The auditors are happy. Our security team is engaged. Tomorrow s cloud Who has control? Where is it located? Where is it stored? Who backs it up? Who has access? How resilient is it? How do auditors observe it? How is our security team engaged?

Spectrum of Deployment Options for Cloud Computing Private IT capabilities are provided as a service, over an intranet, within the enterprise and behind the firewall Public IT activities / functions are provided as a service, over the Internet Enterprise data center Enterprise data center Enterprise A Enterprise B A Users B Private cloud Managed private cloud Hosted private cloud Shared cloud services Public cloud services Third-party operated Third-party hosted and operated Hybrid Internal and external service delivery methods are integrated through hybrid cloud gateways

Workloads may be at Different Levels of Cloud Readiness Ready for Cloud Analytics Information intensive Sensitive Data May not yet be ready for migration... Market bias: Private cloud Public cloud Isolated workloads Highly Customized Not yet virtualized 3 rd party SW Collaborative Care Medical Imaging Infrastructure Storage Financial Risk Industry Applications Mature workloads Complex processes & transactions Regulation sensitive Collaboration Preproduction systems Workplace, Desktop & Devices Batch processing New workloads made possible by clouds... Energy Management Business Processes Disaster Recovery Development & Test Infrastructure Compute

Security and Privacy Grand Challenges for the Adoption of Cloud Computing

Different cloud workloads have different risk profiles High Need for Security Assurance Analysis & simulation with public data Mission-critical workloads, personal information Tomorrow s high value / high risk workloads need: Quality of protection adapted to risk Direct visibility and control Significant level of assurance Low Training, testing with nonsensitive data Low-risk Mid-risk High-risk Business Risk Today s clouds are primarily here: Lower risk workloads One-size-fits-all approach to data protection No significant assurance Price is key

What is information security risk? Information Security Risks are potential damages to information assets. Risk can be quantified by the expected (average) damage: Value of asset: What are your valuable information assets? Vulnerabilities: What vulnerabilities exist in your systems that may be exploited and lead to damage to your assets? Threats: The level of threats that aim at exploiting vulnerabilities Security controls are safeguards or countermeasures to avoid or minimize information security risks: Must be effective: Mitigate the given risk Should be adaptive: Adapt to changing risks Three main types of controls: Preventive: Prevent security incidents (e.g., patching a vulnerability) Detective: Detect a security incident (e.g., monitoring) Corrective: Repair damages (e.g., virus removal)

Risk Based Approach Successful organizations take a risk-based approach to information security. Nothing can be 100% secure but by knowing your current state, you can take a risk-based approach You can focus on implementing mitigating controls to address your most significant risks The remaining minimized risk is accepted because the likelihood of exploit and severity of exploit vs. cost of mitigation does not have a positive cost/benefit Successful organizations recognize risks, implement the appropriate mitigating controls, and innovate / grow their business Mitigating controls Accepted risk Current state Acceptable state Utopian state

Categories of Cloud Computing Risks Control Many companies and governments are uncomfortable with the idea of their information being located on systems they do not control. Data Migrating workloads to a shared network and compute infrastructure increases the potential for unauthorized exposure. Providers must offer a high degree of security transparency to help put customers at ease. Reliability High availability will be a key concern. IT departments will worry about a loss of service should outages occur. Authentication and access as well as protection along the data life-cycle become increasingly important. Compliance Complying with SOX, HIPAA and other regulations may prohibit the use of clouds for some applications. Comprehensive auditing capabilities are essential. Mission-critical applications may not run in the cloud without strong availability guarantees. Security Management Even the simplest of tasks may be behind layers of abstraction or performed by someone else. Providers must supply easy controls to manage security settings for application and runtime environments.

Cloud Computing and Privacy Issues Location matters Information must physically exist somewhere, sometimes multiple simultaneously Privacy laws assume data resides in one place Different laws may apply depending on where information exists Putting data in the cloud may impact privacy rights, obligations and status May make it impossible to comply with some laws Health records privacy Privacy Act May impact attorney-client privilege May impact trade secrets May reduce protections for personal information Information has strongest protections when it remains in possession of its owner Much legal uncertainty about privacy rights in the cloud Law is way behind technology Hard to predict what will happen when old laws are applied Cloud providers may be compelled to build data centers in every country where they do business

Mitigating cloud computing risks

Coordinating information security is the responsibility of BOTH the provider and the consumer Who is responsible for security at the level? Datacenter Infrastructure Middleware Application Process Collaboration CRM/ERP/HR Financials Industry Applications Software as a Service Provider Consumer Middleware Web 2.0 Application Runtime Java Runtime Database Development Tooling Platform as a Service Provider Consumer Data Center Servers Networking Storage Fabric Shared virtualized, dynamic provisioning Infrastructure as a Service Provider Potential Security Gaps Consumer Challenge: Ensuring the tight integration of provider and subscriber security controls and governance

IBM's Approach to Providing Secure Clouds Client Services (Customized by Client) Base Services (Offered by IBM) Client's responsibility IBM does not touch client resources IBM provides guidance for customization and management of client services IBM's responsibility IBM provides tested base services IBM Cloud Computing Platform IBM Global Cloud Data Centers Hardened management interfaces and cloud service management State-of-the-art data center service management Cloud subscriber management based on IBM Web Identity State-of-the-art data-center security (physical, organizational, system, network) Strict policies and extensive monitoring to control privileged users IBM's responsibility Base operated and managed according to IBM's internal technical and organizational security standards Extensive regular internal legal, geo-specific, data privacy, technical reviews Regular ethical hacking/security testing Based on IBM's strategic outsourcing practices and the IBM Common Cloud Reference Architecture

Sources for cloud computing security best practices IBM Cloud Security Strategy Roadmap draws on references from a number of sources including: The IBM Cloud Security Guidance Redpaper ISO 27005 IBM Cloud Computing Management Platform Reference Architecture IBM Security Framework Cloud Security Alliance The Open Group

Gartner s security risks of cloud computing map directly to the IBM Security Framework Privileged User Access Data Segregation Data Recovery Investigative Support Regulatory Compliance Data Location Disaster Recovery Gartner: Assessing the Security Risks of Cloud Computing

IBM as Provider of Security Products for Clouds, and IBM as Provider of Cloud-based Security Services = Professional Services GRC Security Governance, Risk and Compliance SIEM and Log Management = Cloud-based & Managed Services = Products Identity and Access Management Identity Management Access Management Data Security Data Loss Prevention Encryption and Key Lifecycle Management Messaging Security E-mail Security Database Monitoring and Protection Data Masking Application Security App Vulnerability Scanning Web Application Firewall App Source Code Scanning Web / URL Filtering Access and Entitlement Management SOA Security Infrastructure Security Vulnerability Assessment Mainframe Security Threat Assessment Web/URL Filtering Intrusion Prevention System Firewall, IDS/IPS, MFS Mgmt. Security Event Management Virtual System Security Physical Security

Security Governance, Risk Management and Compliance IBM Security Framework Customers require insight into the security posture of their cloud. Implement a governance and audit management program IBM Cloud Security Guidance Document Establish third-party audits (SAS 70, ISO27001, PCI) Provide access to tenant-specific log and audit data Create effective incident reporting for tenants Insight into change, incident, image management, etc. Support for forensics and e-discovery Supporting IBM products, services and solutions IBM Security Products and Services IBM Cloud Security Assessment Assessing security to create a roadmap to reduced risk A comprehensive evaluation of an organization's existing security policies, procedures, controls and mechanisms.

People and Identity IBM Security Framework Customers require proper authentication of cloud users. Implement strong identity and access management Privileged user monitoring, including logging activities, physical monitoring and background checking Utilize federated identity to coordinate authentication and authorization with enterprise or third-party systems IBM Cloud Security Guidance Document A standards-based, single-sign-on capability can help simplify user logons for both internally hosted applications and the cloud. Role Based Access Control (RBAC) reduces the risk associated with persons being assigned inappropriate access and retaining access. Supporting IBM products, services and solutions IBM Security Products and Services IBM Tivoli Federated Identity Manager Securely manage cloud identities Employ user-centric federated identity management to increase customer satisfaction and collaboration

Data and Information IBM Security Framework Customers cite data protection as their most important concern. Ensure confidential data protection IBM Cloud Security Guidance Document Use a secure network protocol when connecting to a secure information store. Implement a firewall to isolate confidential information, and ensure that all confidential information is stored behind the firewall. Sensitive information not essential to the business should be securely destroyed. Supporting IBM products, services and solutions IBM Security Products and Services IBM Data Security Services Protect data and enable business innovation Solutions for network data loss prevention, endpoint encryption, endpoint data loss prevention, and log analysis

Application and Process IBM Security Framework Customers require secure cloud applications and provider processes. Establish application and environment provisioning IBM Cloud Security Guidance Document Implement a program for application and image provisioning. A secure application testing program should be implemented. Ensure all changes to virtual images and applications are logged. Develop all web-based applications using secure coding guidelines. Supporting IBM products, services and solutions IBM Security Products and Services IBM WebSphere CloudBurst Appliance Secure cloud application deployments Easily, securely and repeatedly create application environments deployed and managed in a cloud

Network, Server and End Point IBM Security Framework IBM Cloud Security Guidance Document Customers expect a secure cloud operating environment.. Maintain environment testing and vulnerability/intrusion management Isolation between tenant domains Trusted virtual domains: policy-based security zones Built-in intrusion detection and prevention Vulnerability management Protect machine images from corruption and abuse Supporting IBM products, services and solutions IBM Security Products and Services IBM Virtual Server Security for VMware Protection of cloud-based infrastructure Provides market-leading intrusion prevention, firewall and visible security for virtual environments

Physical Security IBM Security Framework IBM Cloud Security Guidance Document Customers expect cloud data centers to be physically secure.. Implement a physical environment security plan Ensure the facility has appropriate controls to monitor access. Prevent unauthorized entrance to critical areas within facilities. Ensure that all employees with direct access to systems have full background checks. Provide adequate protection against natural disasters. Supporting IBM products, services and solutions IBM Security Products and Services IBM Physical Security Services Defend and help secure physical environments A full suite of digital security solutions and site assessments that can be integrated with your network and IT systems

IBM s point of view: Security and cloud computing SOA Security + Secure Virtualized Runtime = Cloud Security

Example for SOA-style Security applied to Cloud: IBM Tivoli Federated Identity Manager Centralized user access management to on- and off-premise apps and services TFIM BG SAML 1.0 / 1.1 / 2.0 WS-Federation Liberty ID-FF 1.1/ 1.2 Information Card Profile 1.0 OpenID Tools for user enrollment, WS-Trust based security token services, web access management TFIM TFIM & TSPM TFIM = Tivoli Federated Identity Manager TFIM BG = TFIM Business Gateway for SMB deployment TSPM = Tivoli Security Policy Manager for data entitlement management

Example for Securing the Virtualized Runtime: IBM Security Virtual Server Protection for VMware vsphere 4 VMsafe Integration Firewall and Intrusion Prevention Rootkit Detection / Prevention Inter-VM Traffic Analysis Automated Protection for Mobile VMs (VMotion) Virtual Network Segment Protection Virtual Network-Level Protection This is an example where virtualization enables an approach to security that would not be possible in a non-virtualized infrastructure! Virtual Infrastructure Auditing (Privileged User) Virtual Network Access Control

How Privacy Rights are Protected By policy Protection through laws and organizational privacy policies Must be enforced Often requires mechanisms to obtain and record consent Transparency facilitates choice and accountability Technology facilitates compliance and reduces the need to rely solely on trust and external enforcement Technology reduces or eliminates any form of manual processing or intervention by humans Violations still possible due to bad actors, mistakes, government mandates By architecture Protection through technology Reduces the need to rely on trust and external enforcement Violations only possible if technology fails or the availability of new data or technology defeats protections Often viewed as too expensive or restrictive Limits the amount of data available for data mining, R&D, targeting, other business purposes May require more complicated system architecture, expensive cryptographic operations

Cloud computing also provides the opportunity to SIMPLIFY security controls and defences People and Identity Information and Data Process & Application Network Server and Endpoint Physical Infrastructure Cloud Enabled Control(s)/Defense(s) Defined set of cloud interfaces Centralized repository of Identity and Access Control policies Computing services running in isolated domains as defined in service catalogs Default encryption of data in motion & at rest Virtualized storage providing better inventory, control, tracking of master data Service Oriented Enterprise Architecture Autonomous security policies and procedures Personnel and tools with specialized knowledge of the cloud ecosystem SLA-backed availability and confidentiality Automated provisioning and reclamation of hardened runtime images Dynamic allocation of pooled resources to mission-oriented ensembles Closer coupling of systems to manage physical and logical identity / access. Benefit Reduced risk of user access to unrelated resources. Improved accountability, Reduced risk of data leakage / loss Reduced attack surface and threat window Less likelihood that an attack would propagate Improved protection of assets and increased accountability of business and IT users Reduced attack surface Improved forensics with ensemble snapshots Improved ability to enforce access policy and manage compliance

Trusted Advisor Solution Provider Security Company The Company Security for the Cloud Security from the Cloud Security & Privacy Leadership

Thank you! For more information, please visit: ibm.com/cloud Ibm.com/security Or send me an email: frank.hebestreit@de.ibm.com

Trademarks The following are trademarks of the International Business Machines Corporation in the United States, other countries, or both. Not all common law marks used by IBM are listed on this page. Failure of a mark to appear does not mean that IBM does not use the mark nor does it mean that the product is not actively marketed or is not significant within its relevant market. Those trademarks followed by are registered trademarks of IBM in the United States; all others are trademarks or common law marks of IBM in the United States. For a complete list of IBM Trademarks, see www.ibm.com/legal/copytrade.shtml: *, AS/400, e business(logo), DBE, ESCO, eserver, FICON, IBM, IBM (logo), iseries, MVS, OS/390, pseries, RS/6000, S/30, VM/ESA, VSE/ESA, WebSphere, xseries, z/os, zseries, z/vm, System i, System i5, System p, System p5, System x, System z, System z9, BladeCenter The following are trademarks or registered trademarks of other companies Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used under license therefrom. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. UNIX is a registered trademark of The Open Group in the United States and other countries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. ITIL is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office. IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency, which is now part of the Office of Government Commerce. * All other products may be trademarks or registered trademarks of their respective companies. NOTES: Performance is in Internal Throughput Rate (ITR) ratio based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput improvements equivalent to the performance ratios stated here. IBM hardware products are manufactured from new parts, or new and serviceable used parts. Regardless, our warranty terms apply. All customer examples cited or described in this presentation are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics will vary depending on individual customer configurations and conditions. This publication was partly produced in the United States. IBM may not offer the products, services or features discussed in this document in other countries, and the information may be subject to change without notice. Consult your local IBM business contact for information on the product or services available in your area. All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Information about non-ibm products is obtained from the manufacturers of those products or their published announcements. IBM has not tested those products and cannot confirm the performance, compatibility, or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. Prices subject to change without notice. Contact your IBM representative or Business Partner for the most current pricing in your geography.