Security of Information Systems hosted in Clouds: SLA Definition and Enforcement in a Dynamic Environment



Similar documents
Security Issues in Cloud Computing

Software Defined Network (SDN)

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

Software Define Storage (SDs) and its application to an Openstack Software Defined Infrastructure (SDi) implementation

Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

How To Protect Your Cloud From Attack

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

Third Party Cloud Services Its Adoption in the New Age

Lecture 02b Cloud Computing II

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Time to Value: Successful Cloud Software Implementation

Cloud Security:Threats & Mitgations

Overview - Snort Intrusion Detection System in Cloud Environment

Virtualization Impact on Compliance and Audit

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

STeP-IN SUMMIT June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)

Gatekeeper: Supporting Bandwidth Guarantees for Multi-tenant Datacenter Networks

OpenNebula Open Souce Solution for DC Virtualization

SDN Architecture and Service Trend

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)

Managing Cloud Computing Risk

Project Documentation

Network Security Demonstration - Snort based IDS Integration -

OpenNebula Open Souce Solution for DC Virtualization

Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc.

Security & Cloud Services IAN KAYNE

Intel IT Cloud 2013 and Beyond. Name Title Month, Day 2013

How To Understand Cloud Computing

Analysis of Network Segmentation Techniques in Cloud Data Centers

Journey to the Private Cloud. Key Enabling Technologies

SDN PARTNER INTEGRATION: SANDVINE

OpenNebula Open Souce Solution for DC Virtualization. C12G Labs. Online Webinar

Managing Office 365 Identities and Services 20346C; 5 Days, Instructor-led

Course 20346: Managing Office 365 Identities and Services

CoIP (Cloud over IP): The Future of Hybrid Networking

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Intrusion Detection from Simple to Cloud

Proactively Secure Your Cloud Computing Platform

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

Hyper-V Network Virtualization Gateways - Fundamental Building Blocks of the Private Cloud

Cisco Network Services Manager 5.0

Container-based Network Function Virtualization for Software-Defined Networks

GUJARAT TECHNOLOGICAL UNIVERSITY

IAAS CLOUD EXCHANGE WHITEPAPER

The High Availability and Resiliency of the Pertino Cloud Network Engine

Infrastructure as a Service (IaaS)

Using to embed an Energetic Cloud Simulator in a MAPE-K Loop. Edouard Outin October 16, 2014

CSC BizCloud VPE Service Offering Summary. CSC i

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

Global Headquarters: 5 Speen Street Framingham, MA USA P F

The OpenNebula Cloud Platform for Data Center Virtualization

SDN v praxi overlay sítí pro OpenStack Daniel Prchal daniel.prchal@hpe.com

Cloud Courses Description

Securing Virtual Applications and Servers

Commercial Software Licensing

Government Opensource Cloud

JUNIPER NETWORKS CLOUD SECURITY

IDSaaS: Intrusion Detection System as a Service in Public Clouds

Lecture 02a Cloud Computing I

Cloud Computing Security Issues And Methods to Overcome

An overwhelming majority of IaaS clouds leverage virtualization for their foundation.

Cloud Essentials for Architects using OpenStack

Data Center Virtualization and Cloud QA Expertise

Network Security Policy: Best Practices White Paper

Windows Server 2012 Hyper-V Virtual Switch Extension Software UNIVERGE PF1000 Overview. IT Network Global Solutions Division UNIVERGE Support Center

5 Best Practices to Protect Your Virtual Environment

MANAGED SERVICE PROVIDERS SOLUTION BRIEF

A Mock RFI for a SD-WAN

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

PRIVATE CLOUD SECURITY CHALLENGES, AFFORDABILITY AND ANSWER TO A RELIABLE AND MODERNIZED MULTI-BIOMETRICS IDENTIFICATION SOLUTIONS

Effective End-to-End Cloud Security

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure

Build and Manage Private and Hybrid Cloud. Urban Järund, Sr Regional Services Manager Nordics, Red Hat

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

A.Prof. Dr. Markus Hagenbuchner CSCI319 A Brief Introduction to Cloud Computing. CSCI319 Page: 1

Managed Cloud Services

CLOUD COMPUTING, SECURITY IMPLICATIONS AND BEST PRACTICES

Installing Intercloud Fabric Firewall

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Security of Cloud Computing

Security Policy JUNE 1, SalesNOW. Security Policy v v

Use Case Brief BUILDING A PRIVATE CLOUD PROVIDING PUBLIC CLOUD FUNCTIONALITY WITHIN THE SAFETY OF YOUR ORGANIZATION

Cloud Virtualization Specialist Certification Self-Study Kit Bundle

Transcription:

Security of Information Systems hosted in Clouds: SLA Definition and Enforcement in a Dynamic Environment Christine Morin Inria Joint work with Louis Rilling (DGA-MI), Anna Giannakou (Inria), Jean-Louis Pazat (Insa Rennes) Myriads project-team, IRISA / Inria Rennes - Bretagne Atlantique

Myriads Research Activities: Design and Implementation of Autonomous Distributed Systems Distributed clouds Security monitoring in clouds Resource and application management in IaaS & PaaS clouds SLA Green cloud computing 2

Incentive to Host Information Systems in Clouds Resources on demand Acquire and release resources according to the needs Large pool of resources Virtually infinite amount of resources Pay as you go pricing model Pay only for what you use 3

IaaS Cloud VM migration VM 1 VM 2 VM 3 VM 4 VM 6 VM 5 VM creation/destruction Portal 4 User

Hosting Information Systems in IaaS Clouds 5

Clouds: a Target of Choice for Attackers 6

Models of Attacker External to the datacenter (network access only) VM (from another tenant) inside the datacenter Corrupted VM in the virtual infrastructure Malicious datacenter operator (hypervisor, switch) 7

Security as a Service Needed More and more organizations host their information system in clouds Lack of security monitoring services offered by providers to their customers 8

Security Monitoring of a Traditional Information System 9

Security Monitoring of Information Systems Hosted in Clouds 10

Security Monitoring in Clouds What kind of SLAs for security monitoring? How to configure security monitoring services according to SLAs? How to limit the cost of security monitoring for customers and providers? How to cope with the dynamic nature of virtual infrastructure? How much control can be given to tenants on the security monitoring services? 11

Definition of Measurable SLA Terms 12

From SLAs to Security Monitoring Setup Accuracy Size, complexity, and required capacity of the set of rules Probes location Detection delay Priority of client s rules in a shared component Load/capacity of detection components Location of detection components Performance degradation Capacity borrowed from production components 13

Dynamic Events in Clouds Servers added or removed in cloud physical infrastructure VM creation, destruction, migration in tenant virtual infrastructure Evolving set of services in virtual infrastructures Fluctuating traffic load 14

Dynamic Events Impact Security Monitoring Security monitoring involves components outside the tenant virtual infrastructures VM introspection, IDS Several components in different locations need to be reconfigured when the virtual infrastructure is evolving IDS, firewall, log collectors Impossible to manually reconfigure the security monitoring components when facing frequent changes Self-adaptable security monitoring needed 15

Requirements for Security Monitoring in Clouds Self-adaptation Scalability Customization Isolation Cost minimization Security 16

On-going Work: SAIDS Self-adaptable Intrusion Detection Framework Designed in the context of Anna Giannakou s PhD thesis started in March 2014 Prototype experimented on G5K OpenStack IaaS, OpenvSwitch for virtual networks, Snort NIDS Internet rule update manager adaptation driver 3 3 Remote connection Presented later this afternoon Rule server Virtual Switch rule repo lids mirrored traffic rule repo lids Virtual Switch mirrored traffic Management Network Adaptation Manager 2 VM info SLA info 17 Web Email DNS Infrastructure Monitoring Probe Compute node Compute node 1 Networking Compute Cloud Controller

Future Work Self-adaptable security monitoring framework Several kinds of IDS, distributed IDS Other components: firewall, collector, aggregator Security monitoring SLA management DSL for SLA definition Dimensioning/(re-)configuring security monitoring in large multi-tenant systems for SLA enforcement 18