Security & Cloud Services IAN KAYNE



Similar documents
Security Issues in Cloud Computing

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

A Survey on Cloud Security Issues and Techniques

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Cloud Computing Security Issues And Methods to Overcome

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Security Issues in Cloud Computing

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Virtualization Impact on Compliance and Audit

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

Effective End-to-End Cloud Security

Architecture Guidelines Application Security

EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Cloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

FACING SECURITY CHALLENGES

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Realizing the Benefits of Hybrid Cloud. Anand MS Cloud Solutions Architect Microsoft Asia Pacific

Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc.

Top 10 Cloud Risks That Will Keep You Awake at Night

Security & Trust in the Cloud

Cloud-Security: Show-Stopper or Enabling Technology?

CLOUD COMPUTING OVERVIEW

Cloud Security. DLT Solutions LLC June #DLTCloud

VMware vcloud Powered Services

How To Protect Your Cloud Computing Resources From Attack

Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Secure Cloud Computing

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

Swisscom Cloud. Building a secure cloud. SIGS, Christof Jungo

Cloud Computing. Bringing the Cloud into Focus

SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

Sichere Virtualisierung mit VMware

Cloud Courses Description

Commercial Software Licensing

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

How to Create a Simple Content Management Solution with Joomla! in a vcloud Environment. A VMware Cloud Evaluation Reference Document

What Cloud computing means in real life

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE

Securing The Cloud. Russ Fellows, Managing Partner - Evaluator Group Inc.

Data Protection: From PKI to Virtualization & Cloud

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

Lecture 02b Cloud Computing II

Security in the Software Defined Data Center

C a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l t e r r e m a r k. c o m

Public Cloud Security: Surviving in a Hostile Multitenant Environment

Managing Cloud Computing Risk

White Paper. Cloud Vademecum

VMware Workspace Portal Reference Architecture

Architecting the Cloud

Intel IT Cloud 2013 and Beyond. Name Title Month, Day 2013

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Making Data Security The Foundation Of Your Virtualization Infrastructure

Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments


QNAP in vsphere Environment

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

Oracle s Cloud Computing Strategy

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Cloud Security:Threats & Mitgations

Understanding Enterprise Cloud Governance

PRIVACY, SECURITY AND THE VOLLY SERVICE

Infrastructure for more security and flexibility to deliver the Next-Generation Data Center

6 Cloud computing overview

Learn the essentials of virtualization security

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

Building an Internal Cloud that is ready for the external Cloud

APS Connect Denver, CO

Dell World Software User Forum 2013

Cloud Computing; What is it, How long has it been here, and Where is it going?

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

Safeguarding the cloud with IBM Dynamic Cloud Security

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Consumption IT. Michael Shepherd Business Development Manager. Cisco Public Sector May 1 st 2014

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

Cloud computing: benefits, risks and recommendations for information security

Cloud Models and Platforms

Virtualization Essentials

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

Transcription:

Security & Cloud Services IAN KAYNE

CloudComponents CLOUD SERVICES Dynamically scalable infrastructure, services and software based on broad network accessibility NETWORK ACCESS INTERNAL ESTATE

CloudComponents Public Private CLOUD SERVICES Hybrid (Single & Multi Tenant) Private WAN NETWORK ACCESS Internet Hybrid INTERNAL ESTATE User Devices, BYO IT Estate Data

Cloud Services Customer Provider SaaS Software As A Service Managed Messaging Applications Web Services Least control Most control Abstraction of Environment - End User Application Provision Platform As A Service PaaS Operating Systems Middleware Database Abstraction of Infrastructure Tool and Service Provision Infrastructure As A Service IaaS Compute Power Storage & Backup Networking Automated Scalability & Resilience Virtual Datacenter Most control Least control

Virtualization Resource Pool VMware Hypervisor ESX VMware Hypervisor ESX VMware Hypervisor ESXi Physical Servers

Virtualization Virtual Switch Virtual Storage Network Hypervisor VMware ESXi Shared Storage Physical Host

Virtualization Zone Zone Hypervisor VMware ESXi Hypervisor VMware ESXi

Virtualization Attack Vectors App level attacks (especially legacy apps) O/S level attacks Infrastructure attacks Hypervisor breakout VENOM flaw (2015) Escalation from VM via flaw in legacy disk driver Remote DoS VMWare ESXi Hypervisor (2012) No authentication/credentials required Breaks vsphere SOAP API Infrastructure management tools lose all connectivity

Cloud Attack Vectors All the Virtualization attack vectors, plus: Insecure web app design (OWASP top 10) API flaws Platform service flaws (middleware, databases etc) Management systems flaws DoS(resource exhaustion) Access anywhere credentials theft Plus the attacker gets free access!

Security Principles Integrity Confidentiality Availability Security Principles

Cloud Provider -Security Standard security practices, OWASP top 10 Customer / Environment isolation (zoning) Enhanced auditing Service& architecture based on customer need (eg:pci) Security Info & Event Management Collation of monitoring data from multiple sources Agent / SNMP based Centralized storage & assessment Trend analysis, deviation from norm alerting (tuning required)

Cloud Customer -Considerations Regulatory compliance challenges Unknown risk profiles, black box service Low data and service portability Vendor tool and service restrictions Visibility Loss of hands on control of valuable data Privacy cloud provider has access to data Education Identity management islands BYOD Network Reliance Multi-tenant interference Enforced change to environment Inaccessibility on network or vendor outage (DDoS)

Security Design Principles Cloud customers must protect both internal and cloud services shared responsibility Defence in depth DMZ / Bastion / Perimeter security controls Least privilege Fail secure, fail closed, default deny Simplify ( economy of mechanism ) Avoid shared access mechanisms ( least common ) and a few more (no security through obscurity etc)

More Security Design Principles Human Factor & usable security Password Policies People are often the weakest link Cloud services reduce the control over systems & data

Data Classification Data in Cloud Services Customer internal infrastructure Cloud customer security challenge is data classification knowing the value of your data

Data Classification Know the value of data Understand the impact of data aggregation Understand the impact of a security breach Understand data states: In Use in memory (stack, heap) In Motion in transit (network) At Rest in storage (disk) Data protection = encryption?

Encryption Any encryption keys must exist as long as the encrypted data exists. And storing those keys becomes as important as storing the unencrypted data was. In a way, encryption doesn't reduce the number of secrets that must be stored securely; it just makes them much smaller. - Bruce Schneier Data at rest -encryption plays a supporting role, keeps data confidentiality from cloud service provider, but you don t attack the encryption Encryption has a cost time and processing Access and end point control is critical

Convenience > Security Every website. Every web browser. Convenient apps (e.g.: LastPass).

Encryption Keys We suffered a security breach, but our confidential customer data was encrypted How was the data used? Where were the keys stored? All sensitive data is encrypted and decrypted locally before syncing with LastPass. Your key never leaves your device, and is never shared with LastPass. Your data stays accessible only to you.

Cloud Encryption Appliances Encryption happens on premises before transmission to cloud service Separates key storage from data at rest Requires two pronged attack to breach data Plain text Encrypted Encryption appliance

Data Loss Prevention Proactive detection & prevention Network egress points End point protection Detects sensitive information in transit based on policy Used by organizations with critical confidential data that s widely accessible to internal staff (e.g.: banks)

Identity Access Management the security discipline that enables the right individuals to access the right resources at the right times for the right reasons. Gartner Key to (regulatory) compliance Centralized control of data and app access was hard for internal IT systems local accounts, shadow IT Becomes critical in cloud environments

Federated SSO & SAML Provides single source of authentication and authorization to multiple service providers Security Assertion Markup Language Requires preset trust 3: Identity Provider requests information (credentials) from Principle 1: Principle (user) accesses resource (can be any directory) 2: Service Provider requests assertion from Identity Provider

Secure Architecture Design No one size fits all Dependent on customer need, cloud service (SaaSis different to IaaS) Dependent on risk profile & data classification BYOD & cloud access anywhere creates challenges

Architecture OOB Management

Foundations Security is much more than just devices & config: Governance Policies Auditing Processes Design patterns Cloud security is a shared responsibility between consumers and providers

Open Security Architecture Group

Thank you Q&A This document was created using the official VMware icon and diagram library. Copyright 2012 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware does not endorse or make any representations about third party information included in this document, nor does the inclusion of any VMware icon or diagram in this document imply such an endorsement.