The Day After Yesterday



Similar documents
Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Mitigating Information Security Risks of Virtualization Technologies

CompTIA Cloud+ 9318; 5 Days, Instructor-led

How To Install Eucalyptus (Cont'D) On A Cloud) On An Ubuntu Or Linux (Contd) Or A Windows 7 (Cont') (Cont'T) (Bsd) (Dll) (Amd)

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

VMware ESX Server 3 Configuration Guide

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;

ONE Cloud Services Secure Cloud Applications for E-Health

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

VMware: Advanced Security

Virtualization System Security

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Restricted Document. Pulsant Technical Specification

VMware vsphere-6.0 Administration Training


Learn the Essentials of Virtualization Security

Cloud Platform Comparison: CloudStack, Eucalyptus, vcloud Director and OpenStack

ArcGIS for Server: In the Cloud

Cloud Security Overview

CloudPlatform (powered by Apache CloudStack) Version 4.2 Administrator's Guide

vsphere Private Cloud RAZR s Edge Virtualization and Private Cloud Administration

Vmware VSphere 6.0 Private Cloud Administration

Virtualization Security Checklist

How To Extend Security Policies To Public Clouds

The Virtualization Practice

CloudPlatform (powered by Apache CloudStack) Version Administrator's Guide

Cloud computing: benefits, risks and recommendations for information security

Cloud Models and Platforms

How to Configure an Initial Installation of the VMware ESXi Hypervisor

Securely Moving Your Business Into the Cloud

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

VMware vsphere 4.1 with ESXi and vcenter

Learn the essentials of virtualization security

The growing importance of a secure Cloud environment

Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014

Virtual Computing and VMWare. Module 4

VMware vsphere 5.0 Boot Camp

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

Security Virtual Infrastructure - Cloud

Application Security Best Practices. Matt Tavis Principal Solutions Architect

Virtualization & Cloud Computing (2W-VnCC)

Virtualization and Cloud Computing

VMware vsphere 5.1 Advanced Administration

Table of Contents. vsphere 4 Suite 24. Chapter Format and Conventions 10. Why You Need Virtualization 15 Types. Why vsphere. Onward, Through the Fog!

Lecture 02b Cloud Computing II

VX 9000E WiNG Express Manager INSTALLATION GUIDE

Getting Started Hacking on OpenNebula

THE EUCALYPTUS OPEN-SOURCE PRIVATE CLOUD

Virtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE

Cloud Computing. Chapter 1 Introducing Cloud Computing

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Enterprise. ESXi in the. VMware ESX and. Planning Deployment of. Virtualization Servers. Edward L. Haletky

Effective End-to-End Cloud Security

Presentation for ISACA Chapter NL. Auditing Virtual Servers. VMware: Security and Operations. Gert-Jan Timmer 3. September, 2012

Security & Cloud Services IAN KAYNE

Identity and Access Management for the Cloud What You Need to Know About Managing Access to Your Clouds

The Virtualization Security Landscape: What's Changed?

Securing the Journey to the Private Cloud. Dominique Dessy RSA, the Security Division of EMC

Cloud Security:Threats & Mitgations

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

vsphere Security ESXi 6.0 vcenter Server 6.0 EN

Security Issues in Cloud Computing

Overcoming Security Challenges to Virtualize Internet-facing Applications

How To Install Vsphere On An Ecx 4 On A Hyperconverged Powerline On A Microsoft Vspheon Vsphee 4 On An Ubuntu Vspheron V2.2.5 On A Powerline

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

How to Create a Virtual Switch in VMware ESXi

VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER

Security Model for VM in Cloud

Cloud Computing. Adam Barker

OpenNebula Open Souce Solution for DC Virtualization

Introduction to Cloud Computing

Covering my IaaS: Security and Extending the Datacenter. Brian Bourne Tadd Axon

Network Access Control in Virtual Environments. Technical Note

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

Network Troubleshooting & Configuration in vsphere VMware Inc. All rights reserved

Cisco Hybrid Cloud Solution: Deploy an E-Business Application with Cisco Intercloud Fabric for Business Reference Architecture

Understanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

OpenNebula Open Souce Solution for DC Virtualization

Data Centers and Cloud Computing

CLOUD COMPUTING OVERVIEW

Unleash the IaaS Cloud About VMware vcloud Director and more VMUG.BE June 1 st 2012

Meeting the Challenges of Virtualization Security

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE

OpenNebula Open Souce Solution for DC Virtualization. C12G Labs. Online Webinar

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Boas Betzler. Planet. Globally Distributed IaaS Platform Examples AWS and SoftLayer. November 9, IBM Corporation

How To Create A Cloud Based System For Aaas (Networking)

Cisco Intercloud Fabric for Business

An Introduction to Cloud Computing Concepts

Deployment of Private, Hybrid & Public Clouds with OpenNebula

Virtualization and Cloud Computing

Virtualization Impact on Compliance and Audit

GE Measurement & Control. Cyber Security for NEI 08-09

Protecting Virtual Endpoints with McAfee Server Security Suite Essentials

Private Cloud for WebSphere Virtual Enterprise Application Hosting

Deploy XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 with Amazon VPC

Preparing an RFI for. This RFI has been updated to reflect the new requirements in Version 3.0 of the PCI DSS, which took effect January 2015.

Transcription:

The Day After Yesterday or: How I Learned to Stop Worrying About Securing the Cloud

Start at the Beginning Virtualization Security is easy once you understand how hard it is Cloud Security is a topic almost as controversial as the Healthcare Bill, but much more widely debated With all this topic encompasses, I m going to focus only on the practical, and leave theorizing and pontificating about the future of cloud to other pundits

The Next 54 Minutes My focus is on the enterprise My focus is largely on virtualization I m only going to talk specifics with regards to the most popular solutions My focus is on what can you do today

Topics Practical VirtSec Resources Hypervisor Management Interface Virtual Machines Virtual Networks Practical CloudSec Risks Mitigation EC2 Basics VPC Third-party

Virtualization is... Broad term, many uses Abstraction of characteristics of physical compute resources from systems, users, applications Typically: Resource (virtual memory, RAID, SAN) Platform (virtual machines)

Cloud is... A nebulous term ;) A collection of, comprised of, that can be rapidly Resources hosted Not a new technology!

Cloud is... Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. http://csrc.nist.gov/groups/sns/cloud-computing/

VirtSec is... Security of virtual infrastructure and the virtual machines running within it Many considerations the same in virtual and physical infrastructure, however Virtualization does introduce unique architecture and a few unique challenges

CloudSec is... Defined by individual interpretation and implementation of cloud More process than technology Subject to the same advantages and disadvantaged inherent in cloud

VirtSec in Practice

Simpler is Better Keep It Simple, Stupid (KISS) Make Your Architecture Simpler to Secure! (MYASS) More moving pieces means more time, effort and money required to implement security completely and effectively Don t let the capabilities of your platform fool you into believing you need all of them

Where the Wild Things Are Five primary [sub]systems: Compute, network and storage resources Hypervisor / VMM / vmkernel Virtual machines (guest OS) Service console (COS, dom0) Networking [layer]

Secure Your Resources Your virtual infrastructure is only as secure as the resources that comprise it! Securing your compute, network and storage infrastructure is as important as securing the hypervisor and guests

Storage and Network Zoning and masking Isolated [dedicated] IP storage networks Mutual CHAP for iscsi, restrict NFS by IP Firewalls throughout, forward and reverse proxies where possible Consider physical log and monitoring servers, IDS/IPS, load balancers

Secure Your Hypervisor Not generally user-serviceable Small(ish) attack surface Area of least control (and concern) See hyperjacking See redpill / bluepill The future? Hardware Root of Trust

Service Console In ESX, COS is based on RHEL/CentOS Moderately secure out of the box (only authenticated and encrypted management services on by default) Still, needs additional hardening to be considered secure ESXi has BusyBox, no real COS XenServer dom0 is also CentOS

ESX Minimum Required Hardening Limit use of su to members of wheel group Enforce use of sudo and use aliases Configure TCP wrappers (hosts.deny) Authenticate via AD or LDAP Replace the default self-signed SSL certs Configure NTP and remote logging

Further COS Hardening VMware s Hardening Guides (VI3, vsphere) CIS ESX server benchmark Tripwire s ConfigCheck, OpsCheck XenSource wiki

Configure NTP & remote logging Configure host to sync time via NTP Configure remote logging (consider Syslog- NG, Splunk, Mitre s CEE) Configure alarms and alerts via SNMP Archive logs to RO medium daily Keep your COS/dom0 patched!

Virtual Machines VMs are highly mobile and often short-lived VM sprawl results from creation of new VMs to suit every whim Most organizations have poor change control and/or patch management systems for virtual infrastructure Introspection mechanisms not widely available, deployed

The Malignant OS Needs to be hardened / secured just like on physical machines Principles of minimization will lead to smaller, faster, more secure vm s

Power. Respect. JEOS. How far will you go to get it? Just Enough Operating System Most effective way to ensure security of virtual infrastructure Difficult to achieve today, not impossible nlite, vlite, LitePC Ubuntu VM Builder, SuSE Studio, Rpath, Arch, Slackware, Gentoo, BSD

http://nliteos.com See the service guides at http://blackviper.com (ex. Windows 2008 R2 Service Configurations)

Guest OS Hardening Consider automated assessment tools, checklists and/or hardening scripts nmap, Nessus, Metasploit, CANVAS 15 Steps to Hardening WS2003 Microsoft Baseline Security Analyzer Bastille Linux

VM Introspection Examine and understand internal state of a running VM VMSafe XenAccess Virtual Introspection for Xen

Virtual Networking Built-in vswitches provide some protection Limit promisc mode Prevent mac changes / forgery Basic VLAN tagging, trunking No native ACLs or firewalling

Enhanced Virtual Networking New vswitches provide greatly enhanced functionality and security (Open vswitch, Cisco Nexus 1000v) You can also do a fairly effective job with: Vyatta, LRP, FreeSCO m0n0wall, pfsense, OpenBSD Astaro, IPcop, Untangle

Important Considerations Isolated, OOB management network Isolated, OOB ip storage networks Redundant NICs in NIC teams across redundant switches Physical separation between prod and dev Physical interfaces always preferred over VLANs for segmentation

UTM-in-a-VM? In addition to firewalls, consider that you may need to provide VM-based IDS / IPS, authentication, NAC, and/or malware protection and content filtering within your virtual networks Astaro and Untangle provide much of this functionality already

Configuration Management Configuration management and change control are two of the most critical elements in an effective security policy Also the two most frequently overlooked, and/or shoddily implemented processes There are tools available to help, you just have to use them!

http://veeam.com

http://racktables.org http://opennetadmin.com/

CloudSec in Practice

"Cloud computing is about gracefully losing control while maintaining accountability even if the operational responsibility falls upon one or more third parties. " From the CSA s Security Guidance for Critical Areas of Focus in Cloud Computing

Fundamentals K.I.S.S. (M.Y.A.S.S.) Define assets, understand trust models Understanding cloud key to securing cloud 5 cloud characteristics 3 service models 4 deployment models

4 8 15 16 23 42 Five characteristics On-demand self-service, Broad network access, Resource pooling, Rapid elasticity, Measured service Three service models SaaS, PaaS, IaaS Four deployment models Public, Community, Private, Hybrid

Cloud Security Alliance

What Do We Mean By Cloud Security? Infrastructure security? Virtualization security? Application security? Compliance? It s all about the assets

What Do You Mean What Do I Mean? Infrastructure, virtualization, application security no less important than before, but managed differently Compliance is important, but useless taken out of context (SAS 70 TII, but with which controls?) Compliance doesn t fully address governance, residency, access

The spot where we intend to fight must not be made known; for then the enemy will have to prepare against a possible attack at several different points; Sun Tzu

Predominant Risks From ENISA s Benefits, Risks and Recommendations for Information Security Loss of governance [Lack of transparency] Lock-in Isolation failure Compliance risks Management interface compromise Data protection Incomplete or insecure data deletion Malicious insider

Barriers Largely questions of governance, residency and compliancy Where is your data? Who has access? Who controls and manages it? How is the data accessed?

Mitigation Encrypt locally before storing in the cloud Ensure external key storage and management Keep private data out of cloud Build protection mechanisms directly into your resources in the cloud Host private cloud

Encourage Adoption of Open Standards Will help with transparency Will help avoid lock-in Will help in understanding governance Will help in achieving compliancy

Required Reading CSA s Security Guidance for Critical Areas of Focus in Cloud Computing ENISA s Benefits, Risks and Recommendations for Information Security CloudSecurity.org RationalSurvivability.com/blog

EC2 Security Basics Automate, orchestrate, standardize using RightScale, Puppet, Chef, etc Firewall rules / security groups SSH keys, AWS multi-factor auth Use modern, trusted AMI s, patch regularly Know what you re doing? Roll your own

Virtual Private Clouds Connect existing datacenter infrastructure to isolated cloud resources Private, overlay network Extend existing datacenter security and monitoring controls into the cloud Amazon VPC CohesiveFT VPN-Cubed CloudSwitch Google Secure Data Connector

More CloudSec EnStratus Extra-cloud key and credential storage and management PerspecSys Apps in the cloud, data at home More solutions coming every day, and I interested in hearing about those I neglected to include or mention!

In Conclusion VirtSec and CloudSec follow the same rules that the rest of our infrastructure follows, though they do introduce new surfaces, forms of exposure, and questions about governance and responsibility Secure your resources first, then focus on hardening your guests and instances -- the most likely sources of compromise and/or data loss / theft / manipulation Oh yeah, and don t forget to K.I.S.S. M.Y.A.S.S! ;)