Trusted Geolocation in The Cloud Technical Demonstration



Similar documents
Control your corner of the cloud.

How RSA has helped EMC to secure its Virtual Infrastructure

The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief

Index. BIOS rootkit, 119 Broad network access, 107

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

Accelerate OpenStack* Together. * OpenStack is a registered trademark of the OpenStack Foundation

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

Building Trust and Compliance in the Cloud with Intel Trusted Execution Technology

Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms

Intel Service Assurance Administrator. Product Overview

Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments

RSA ARCHER OPERATIONAL RISK MANAGEMENT

Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP

HyTrust Logging Solution Brief: Gain Virtualization Compliance by Filling Log Data Gaps

1. VMware is part technology and part sales and marketing genius. As a result of their marketing efforts many people in IT (especially the newer

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

QTS Leverages HyTrust to Build a FedRAMP Compliant Cloud

RED HAT CLOUDFORMS ENTERPRISE- GRADE MANAGEMENT FOR AMAZON WEB SERVICES

VMware Integrated Partner Solutions for Networking and Security

VBLOCK GRC SOLUTION WITH RSA (GOVERNANCE, RISK, AND COMPLIANCE)

Service Automation to implement and operate your Cloud initiatives

Security in the Cloud

HP Virtualization Performance Viewer

SUSE Cloud 2.0. Pete Chadwick. Douglas Jarvis. Senior Product Manager Product Marketing Manager

RSA Security Solutions for Virtualization

Comprehensive security platform for physical, virtual, and cloud servers

Simplifying. Single view, single tool virtual machine mobility management in an application fluent data center network

SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Compliance

Ubuntu OpenStack on VMware vsphere: A reference architecture for deploying OpenStack while limiting changes to existing infrastructure

Conquering the Continuous Monitoring Challenge

RightScale mycloud with Eucalyptus

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

xstream Datasheet The Enterprise-Class Cloud

Welcome to Modulo Risk Manager Next Generation. Solutions for GRC

Cloud Computing: Elastic, Scalable, On-Demand IT Services for Everyone. Table of Contents. Cloud.com White Paper April Executive Summary...

REDEFINE SIMPLICITY TOP REASONS: EMC VSPEX BLUE FOR VIRTUALIZED ENVIRONMENTS

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment

The Open Cloud Near-Term Infrastructure Trends in Cloud Computing

Netzwerkvirtualisierung? Aber mit Sicherheit!

Trend Micro. Advanced Security Built for the Cloud

Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments

Improving OpenStack* Hybrid Cloud Security

HyTrust Addendum to the VMware Product Applicability Guide. For. Federal Risk and Authorization Management Program (FedRAMP) version 1.

EMA Radar for Private Cloud Platforms: Q1 2013

7/15/2011. Monitoring and Managing VDI. Monitoring a VDI Deployment. Veeam Monitor. Veeam Monitor

OPNFV Summit 2015 Presentation. Coexistence of Commercial Solutions with OpenSource OPNFV Platform

Continuous Network Monitoring

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Understanding Oracle Certification, Support and Licensing for VMware Environments

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

CA Virtual Assurance/ Systems Performance for IM r12 DACHSUG 2011

vcloud Automation Center Support Matrix vcloud Automation Center 5.2

xstream 2.0 Datasheet

ScienceLogic Offers Unified Infrastructure Monitoring and Analytics for Hybrid IT

Protect Root Abuse privilege on Hypervisor (Cloud Security)

An enterprise- grade cloud management platform that enables on- demand, self- service IT operating models for Global 2000 enterprises

QRadar SIEM 6.3 Datasheet

I D C T E C H N O L O G Y S P O T L I G H T

VirtualclientTechnology 2011 July

Veeam ONE What s New in v9?

RSA, The Security Division of EMC. Zamanta Anguiano Sales Manager RSA

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

IT-AS-A-SERVICE SOLUTIONS FOR HEALTHCARE PROVIDERS

EMC Data Protection Advisor 6.0

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

CLOUD SECURITY: Secure Your Infrastructure

RSA Archer Training. Governance, Risk and Compliance. Managing enterprise-wide governance, risk and compliance through training and education

How To Use Ibm Tivoli Monitoring Software

IT Security & Compliance. On Time. On Budget. On Demand.

MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS

Private/hybrid cloud management platform: HP Cloud Service Automation

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

Virtualization Essentials

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

OPEN CLOUD INFRASTRUCTURE BUILT FOR THE ENTERPRISE

Building Private Cloud on

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

The Virtualization Practice

Data Center Connector for vsphere 3.0.0

Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc.

Intelligent Operations Management from Applications to Storage. VMware vrealize Operations

VMware Virtualization and Cloud Management Solutions. A Modern Approach to IT Management

Vistara Lifecycle Management

Nokia Networks. Nokia Networks. telco cloud is on the brink of live deployment

Managing Multi-Hypervisor Deployments With VMware vcenter

Data Center Manager (DCM)

About the VM-Series Firewall

Transcription:

Trusted Geolocation in The Cloud Technical Demonstration NIST Interagency Report 7904 - Trusted Geolocation in the Cloud: Proof of Concept Implementation

Trusted Geolocation in the Cloud Business Business Opportunities Opportunity Cloud benefits Agility Flexibility Dynamic Resources Cloud Challenges Multi-tenancy and shared hosted infrastructure Lack of physical boundaries Lack of visibility of workloads Integrity of the hosted virtualized compute environment Compliance requirement for restricting workload in a physical location or within a restricted regulated resource pool Technical enforcement mechanism

Trusted Geolocation in the Cloud Use Case Business Opportunity

Trusted Geolocation in the Cloud Security Requirements Trusted resource pool based on hardware-based secure technical measurement capability Platform attestation and safer hypervisor launch - Provide integrity measurement and enforcement for the compute nodes Trust-based secure migration - Provide geolocation measurement and enforcement for the compute nodes Workloads instantiation in a trusted resource pool Dynamic workloads migration and enforcement between trusted resource pools Visibility and transparency in periodic measurement, reporting, and auditing of the workloads to support governance, risk, and compliance requirements Industry recommended practices for deploying a secure virtualized infrastructure

www.intel.com/txt Intel TXT and Hardware Root of Trust Intel Trusted Execution Technology (Intel TXT) enforces control of the platform, measures launch components A hardware based security foundation (Root of Trust) to build and maintain a chain of trust, to protect the platform from software based attacks Trusted and verifiable systems Implement policies/controls on top of a foundation of trust beginning in HW and up the stack VMware, SUSE, Redhat and others have products that support HW roots of trust and attestation

Trusted Cloud Solution Trusted Cloud Solution NIST Reference Design Solution Architecture Build Portal and Cloud Mgt Basic Policy Mgt Workload Placement & Migration Control Basic Trust Attestation Basic Geo-Location Attestation Verifier/ Attestation ConfigMgr + SIEM Intel TXT Plug-in (Reference Implementation) Policy Engines APIs Vmware vcenter GRC Virtual Management Services RSA Archer VCenter 4.1 Intel TXT APIs VMM VMware vsphere ESX4.1 U2 BIOS BIOS BIOS Intel Intel Server Server w/ w/ Intel Intel TXT TXT Intel Server w/ Intel TXT Dell Servers (w/ Intel TXT) TPM TPM TPM Platform Integrity Measurements (Intel TXT) Geo-Tag Commercial Solutions In-flight based on this Reference Design. 6

Trusted Compute Pools Solution Stacks Trusted Policy Management Trusted Security Event Monitoring (SIEM) Trusted Audit and Compliance (Reporting and Compliance (GRC)) RSA Archer Any Commercial GRC Any Commercial SIEM Any Commercial SIEM Any Commercial SIEM Any Commercial SIEM Any Commercial SIEM Any Commercial SIEM i i i Linux w/ KVM Hypervisor Canonical Ubuntu VMware vsphere 5.1 Intel TXT enabled Intel Xeon processor-based servers Intel Trusted Execution Technology Server Platforms Availability Matrix Contact Your Favorite Provider for More Details 7

Cloud Portal Trusted Cloud Architecture Commercial Solutions Orchestrator/Scheduler (vcloud, OpenStack) GRC (ex: RSA) SIEM (ex: McAfee ESM, HP ArcSight) Citrix Xen ESXi Host ESXi Host Linux/KVM CUSTOMER A Trust Agent CUSTOMER B Trust Agent VMware vcenter ssl https RESTful API Trust Attestation Authority (Virtual Appliance) https Citrix Xen Trust Agent ESXi Host ESXi Host VMware vcenter Gather platform status (TCG,XML) Provide platform Trust & Location Attestation for trusted pools, Compliance, etc Monitor & Control 8

Trust Cloud Architecture Commercial Solutions xstream GRC (xgrc) Event Data Cloud Provider Portal xstream SIEM (xsiem) Cloud Subscriber Portal Event Data Event Data Visibility & Monitoring Placement policy Geo tagging PII Compliance Decisions TXT Provider Trust Attestation Authority VMWare 5.1 Provider vcenter xsiem Provider All Syslog/Events High/Med/Low KVM ESX ESX

10 Trusted Cloud Infrastructure Commercial Solutions

About Archer Award-Winning Enterprise Governance, Risk and Compliance Framework and Solutions Flexible GRC Programs to meet unique agency needs Enabling Federal Continuous Monitoring Initiatives Automate FISMA Audit and Compliance Cloud and dedicated environments NIST Geolocation Trusted Cloud

Enabling the Cycle of Risk & Compliance Document Your Control Framework and Identify Risks Map to any compliance source such as FISMA & NIST 800-53 Break information silos and holistically view your environment Consolidate and Visualize Compliance Efforts Prioritize Deficiencies and Risks Automate the remediation process to create an efficient system with accountability Remediate Findings and Manage Exceptions Make sense of your data: analyze and contextualize to determine where to focus remediation efforts

RSA Archer Core egrc Solutions Audit Management Centrally manage the planning, prioritization, staffing, procedures and reporting of audits to increase collaboration and efficiency. Policy Management Centrally manage regulations and frameworks (FISMA, NIST, COSO, etc.), policies and control standards, map them to objectives and guidelines, and promote awareness across your agency. Business Continuity Management Manage the creation, review, testing and activation of business continuity plans to ensure rapid recovery of your business processes. Risk Management Identify risks to your business, evaluate them through online assessments and metrics, and respond with remediation or acceptance. Threat Management Track threats through a customizable early warning system to help prevent attacks before they affect your enterprise. Compliance Management Evaluate the effective design and operation of your internal controls, and respond to issues of noncompliance with remediation or waivers. Vendor Management Centralize vendor data, manage relationships, assess vendor risk, and ensure compliance with your policies and controls. Incident Management Report cyber, physical and other incidents, manage their escalation, track investigations and analyze resolutions. Enterprise Management Manage relationships and dependencies within your enterprise hierarchy and infrastructure to support risk and compliance initiatives.

Flexible Platform Enabling Governance, Risk and Compliance RSA Archer egrc Platform User Experience Brand the interface with your corporate colors, graphics, icons and text to facilitate enduser adoption. Application Builder Build and tailor on-demand applications and package them into solutions to solve business problems. Integration Seamlessly integrate crossdepartmental and enterprise data systems with the Archer SmartSuite Framework. Reports and Dashboards Gain a real-time view of your enterprise through actionable reports and graphical dashboards. Notifications Automatically notify users via email when content changes, tasks enter their queue or deadlines approach. Access Control Enforce access controls at the system, application, record and field level to ensure a streamlined user experience. 14 Business Workflow Define and automate business processes to streamline the management of content, tasks, statuses and approvals.

Maximize Compliance Information

Leverage Agency Information Sources Risk Content Regulatory Content Vulnerability Scanners Continuous Controls Monitoring Patch Management Databases CMDB s Emergency Notifications Security Event and Information Management

Holistic & Consistent Views of egrc

Virtual Compliance Dashboards & Reports

Detailed Agency Dashboard Views

Trusted Geolocation in the Cloud Next Business Steps Opportunity Engage with the experts in the room Understand the capabilities/limitations Learn how to participate If you haven t, read NIST IR 7904 (comments by 1/31/13) Ask for the technology from COTS providers and integrators Give us feedback and help drive standardization

Trusted Geolocation in the Cloud Next Business Steps Opportunity Engage SDO s to cover gaps Revision 1 of NIST IR 7904: vsphere 5.1 with COTS attestation components (HyTrust Appliance) Integrate with other hypervisors, cloud management software, GRCs, etc. Extend trust beyond the hypervisor