Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc. bstrongin@hytrust.com



Similar documents
H Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments

Mitigating Information Security Risks of Virtualization Technologies

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Private Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Business Values of Network and Security Virtualization

Drawbacks to Traditional Approaches When Securing Cloud Environments

Overcoming Security Challenges to Virtualize Internet-facing Applications

Control your corner of the cloud.

Learn the essentials of virtualization security

managing the risks of virtualization

Cisco Network Services Manager 5.0

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Virtualization Impact on Compliance and Audit

Virtualization, SDN and NFV

How To Protect Your Cloud From Attack

Enabling Multi-Tenancy with NetApp MultiStore

Securing the Virtualized Data Center With Next-Generation Firewalls

Netzwerkvirtualisierung? Aber mit Sicherheit!

Security Issues in Cloud Computing

A Look at the New Converged Data Center

QTS Leverages HyTrust to Build a FedRAMP Compliant Cloud

Making Data Security The Foundation Of Your Virtualization Infrastructure

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Virtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE

Journey to the Private Cloud. Key Enabling Technologies

Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments

Securing Virtual Applications and Servers

How to Achieve Operational Assurance in Your Private Cloud

Use Case Brief BORDERLESS DATACENTERS

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Effective End-to-End Cloud Security

Software-Defined Networks Powered by VellOS

Lecture 02b Cloud Computing II

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Security & Cloud Services IAN KAYNE

Implementing Multi-Tenanted Storage for Service Providers with Cloudian HyperStore. The Challenge SOLUTION GUIDE

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

Citrix XenServer 7 Feature Matrix

Take Control of Identities & Data Loss. Vipul Kumra

Use Case Brief CLOUD MANAGEMENT SOFTWARE AUTOMATION

Safeguarding the cloud with IBM Dynamic Cloud Security

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

How Network Virtualization can improve your Data Center Security

Always On Infrastructure for Software as a Ser vice

How To Protect Virtualized Data From Security Threats

Open Source Networking for Cloud Data Centers

How To Build A Software Defined Data Center

Whitepaper. What You Need to Know About Infrastructure as a Service (IaaS) Encryption

Virtualization Essentials

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment

Use Case Brief BUILDING A PRIVATE CLOUD PROVIDING PUBLIC CLOUD FUNCTIONALITY WITHIN THE SAFETY OF YOUR ORGANIZATION

The Open Cloud Near-Term Infrastructure Trends in Cloud Computing

Cloud Security: The Grand Challenge

PCI DSS Virtualization Guidelines. Information Supplement: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: June 2011

Foundations and Concepts

Enabling Storage Services in Virtualized Cloud Environments

Solution Guide Parallels Virtualization for Linux

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Security & Trust in the Cloud

Simplifying Private Cloud Deployments through Network Automation

Network Access Control in Virtual Environments. Technical Note

Het is een kleine stap naar een hybrid cloud

Enabling Database-as-a-Service (DBaaS) within Enterprises or Cloud Offerings

Cloud Services Catalog with Epsilon

TRANSFORMING DATA PROTECTION

PICO Compliance Audit - A Quick Guide to Virtualization

Learn the Essentials of Virtualization Security

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Security Virtual Infrastructure - Cloud

Strategies for assessing cloud security

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

CA Cloud Overview Benefits of the Hyper-V Cloud

Simplifying Storage Operations By David Strom (published 3.15 by VMware) Introduction

Protect Root Abuse privilege on Hypervisor (Cloud Security)

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

Virtualizing Apache Hadoop. June, 2012

場次: Track B-2 公司名稱: EMC 主講人: 藍基能

Shifting Roles for Security in the Virtualized Data Center: Who Owns What?

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

SOFTWARE DEFINED NETWORKING

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Making a Smooth Transition to a Hybrid Cloud with Microsoft Cloud OS

Security Issues in Cloud Computing

Use Case Brief NETWORK SECURITY

SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding

Transcription:

Secure Multi Tenancy In the Cloud Boris Strongin VP Engineering and Co-founder, Hytrust Inc. bstrongin@hytrust.com

At-a-Glance Trends Do MORE with LESS Increased Insider Threat Increasing IT spend on cloud IT budget remains almost flat 1H11 2H11 1H12 2H12 ~10-35% virtualized ~35-50% virtualized ~50-80% virtualized Major vendors: Repurpose and Aggregate Major vendors: Purpose-built Pain - Resource constraints - Lack of skills - Access control - Compliance - Loss of control - Lack of visibility - Many point solutions - Multi-tenancy - Data protection Buyer - Infrastructure/Platform (influenced by Security) - Ad-hoc - Business Application Owner (approval by Security/Compliance/Risk)

Virtualization Challenges and Opportunities The blurring line between Security and Management Need to manage the complexity also in Security Heterogeneous VM platforms create security complexity Vary in approach to security and management Unstructured physical boundaries make it harder to protect services and data VM mobility/distribution, copying/cloning, memory protection, etc. Where can my data migrate to? And who are my neighbors? Unstructured time dimension challenges integrity VM reversion can result in lost audit events, security configurations, security policies, etc. Virtualization Servers are subject to regulatory controls Physical systems are at greater risk as VMs share hardware Enhanced need for segregation of duties - New level of administration is introduced with the Hypervisor / Privileged Partitions Implication of VM mobility to privacy laws.

Virtualization Platform Effects on Security Abstraction and Consolidation Capital and Operational Cost Savings New infrastructure layer to be secured and subject to compliance Greater impact of attack or misconfiguration Collapse of switches and servers into one device Flexibility Cost-savings Lack of visibility and control for virtual network and storage No separation of church and state (network, security, storage administration) Faster deployment in shared environment IT responsiveness Inconsistencies in configuration Physical change processes ineffective Inadequate tenant segmentation

Virtualization Containers Effects on Security Fuzzy time boundaries Great availability / recovery mechanism Security and audit events can be lost Changes in time are not visible from inside the virtual server VM Mobility Improved Service Levels Identity divorced from physical location Policies may not follow virtual machine VM Encapsulation Ease DR Hardware Independence Outdated offline systems Unauthorized copy Reconfiguring virtual hardware and console access are over the network operations

New Security and Control Challenges in the Cloud Investment in Cloud is growing due to agility, economic and operational benefits Enterprises adopt private cloud first, with strategy to go to hybrid and public cloud in the future Tenants need to retain control and audit capabilities Tenants are ultimately responsible for compliance and standard of care of their workloads Automation and self-service capabilities are required Providers need to manage complexity and enforce security Infrastructure as a service management including hypervisor and VM containers Compliance and security management as a premium service public cloud enterprise datacenter app1 app2 app3 enterprise private cloud app 3 app 1 app 2 app 3 app 1 app 2 app 3 hyper visor app 3 app 3 app 3 app 3 app 1 customer 1 app 1 customer 2 hyper visor hardware app 2 customer n hardwar e hardwar e hardwar e hardware iam iam

Co-management Accountability Access rules per resource; identities, credentials, roles, groups Transparency Workload location, infrastructure segmentation and segregation Visibility Per-tenant audit logs and reporting

Secure Multi-Tenancy Logical infrastructure segregation to provide tenant-level separation for service providers as well as application and line-of-business multi-tenancy for enterprises Policy labels used to provide resource-level classification (tenant, application tier, security zone, etc.) which provide compute, network and resource segregation Persistent policy labels for mobile VM workloads (hybrid cloud) Self service tied to tenant- and resource-level policy labels Per-tenant audit logging for virtual infrastructure and VMlevel administrative changes

Security zones and multi-tenant policies in the shared model Security Requirements: Shared Model: User can select default security policy for each instance of sandbox/template within a shared compute pool. Security Zone (non-optional) has defined security policy. Compute, storage and network resources shared as a pool with ability to offer isolation. Security Policy Enforcement: Each sandbox and VM/server instance gets classified during provisioning by applying tags. a) Tenant/departmental ownership b) Zone requirements c) Custom security posture requirements d) Real-time tags based on internal VM metadata Security policy gets enforced by HyTrust Appliance in real time based on sandbox tags (policies are global and/or tenant specific). Policy includes segmentation of resource pool/zone and network.

Security zones and multi-tenant policies in the dedicated model Security Requirements: Dedicated Model: Each Compute Pool (configured on a per-tenant basis) has a Security Zone and Policy. Complete isolation between the tenants. Security Policy Enforcement: Dedicated Model (higher security) - Each compute pool gets labeled based on tenant ownership and security configuration. a) Policy includes segmentation by resource pool/zone and network. b) Security policy gets enforced by HyTrust Appliance in real time based on sandbox tags (policies are global and/or tenant specific). c) The policies enforce access control and compliance (controlling privileged access to the host, separation of duties, audit reporting, etc). d) Security policies (tags) are selected by a service consumer as a part of reservation management process (low, medium, high) for the type of workload (web, database, etc.) requested.