Virtualization Demystified



Similar documents
CJIS in the Cloud. Oregon State Police CJIS Statewide Training September 23 & 24, 2015

CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS.

CA Technologies Solutions for Criminal Justice Information Security Compliance

Alan Ferretti CJIS Information Security Officer

Connecticut Justice Information System Security Compliance Assessment Form

Alan Ferretti CJIS Information Security Officer

CJIS Information Technology Security Audit (ITSA) 2015 Program Update

NC CJIN Governing Board. 13 October, George A. White

VMware vcloud Air Security TECHNICAL WHITE PAPER

Quantum Hyper- V plugin

Cisco Intercloud Fabric Security Features: Technical Overview

ADM:49 DPS POLICY MANUAL Page 1 of 5

Is Your Vendor CJIS-Certified?

Lawrence Police Department Administrative Policy. August A. Access to CJIS sensitive data is only available to authorized users.

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Virtualization System Security

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

STREAM FRBC

Cloud Security. Are you on the train or the tracks? ISSA CISO Executive Forum April 18, Brian Grayek CISSP, CCSK, ITILv3

Physical Protection Policy Sample (Required Written Policy)

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Play IT Safe. I love that everything just works with Unitrends. Unitrends Disaster Recovery as a Service. Backup, Archiving & Disaster Recovery

Aerohive Networks Inc. Free Bonjour Gateway FAQ

Campus VPN. Version 1.0 September 22, 2008

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition

Deployment Guide: Unidesk and Hyper- V

IBX Business Network Platform Information Security Controls Document Classification [Public]

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

Network Access Control in Virtual Environments. Technical Note

Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October Page 1 of 9

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Virtualization Security Checklist

Criminal Justice Information Services (CJIS) Security Policy

Windows Server 2008 R2 Hyper V. Public FAQ

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Best Practices For Department Server and Enterprise System Checklist

THE BLUENOSE SECURITY FRAMEWORK

Lecture 02b Cloud Computing II

Virtualization Impact on Compliance and Audit

Compliance and Industry Regulations

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

USING GENIE REMOTELY

PCI Compliance in a Virtualized World

Criminal Justice Information Services (CJIS) Security Policy

MS-6422A - Implement and Manage Microsoft Windows Server Hyper-V

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

M6422A Implementing and Managing Windows Server 2008 Hyper-V

Security Overview Enterprise-Class Secure Mobile File Sharing

Information security controls. Briefing for clients on Experian information security controls

Criminal Justice Information Services (CJIS) Security Policy

Preparing an RFI for. This RFI has been updated to reflect the new requirements in Version 3.0 of the PCI DSS, which took effect January 2015.

Securing the Intelligent Network

Learn the Essentials of Virtualization Security

Basics of Internet Security

An overwhelming majority of IaaS clouds leverage virtualization for their foundation.

The Virtual Digital Forensics Lab: Expanding Law Enforcement Capabilities

Information Technology Branch Access Control Technical Standard

SAN Conceptual and Design Basics

I believe. Satya Nadella CEO, Microsoft. History of making big bets

How to configure Failover Clustering for Hyper-V hosts on HP ProLiant c-class server blades with All-in-One SB600c storage blade

CJIS Division Update

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

Securing the Physical, Virtual, Cloud Continuum

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

雲 端 發 展 與 安 全 趨 勢. 陳 建 宏 Jovi Chen 技 術 顧 問 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Before we can talk about virtualization security, we need to delineate the differences between the

How To Protect Your Cloud From Attack

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

ClearPass Policy Manager 6.3

Locking down a Hitachi ID Suite server

Information Technology Security Guideline. Network Security Zoning

Connecting your Virtual Machine to the Internet. BT Cloud Compute. The power to build your own cloud solutions to serve your specific business needs

PCI DSS Virtualization Guidelines. Information Supplement: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: June 2011

This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.

1.1.1 Introduction to Cloud Computing

Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc.

Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.

An Analysis of Propalms TSE and Microsoft Remote Desktop Services

Information Blue Valley Schools FEBRUARY 2015

Virtualization and Cloud Computing

Overcoming Security Challenges to Virtualize Internet-facing Applications

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, :32 pm Pacific

Designing Virtual Network Security Architectures Dave Shackleford

Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Using LISP for Secure Hybrid Cloud Extension

05.0 Application Development

Building A Secure Microsoft Exchange Continuity Appliance

STORMY WEATHER SECURING CLOUD COMPUTING. Russell Skingsley Director of Advanced Technology Data Centre and Cloud, APAC Juniper Networks

Transcription:

Virtualization Demystified Oregon State Police CJIS Statewide Training September 24, 2015 Stephen Exley, CISSP Senior Consultant/Technical Analyst FBI CJIS ISO Program

Virtualization Demystified

What is Virtualization? Defined by the CJIS Security Policy as: A methodology of dividing the resources of a computer (hardware and software) into multiple execution environments, by applying one or more concepts or technologies such as hardware and software partitioning, time sharing, partial or complete machine simulation or emulation allowing multiple operating systems, or images, to run concurrently on the same hardware.

What is Virtualization (cont.)? Hardware

A Simple Virtualized Environment

What can I use Virtualization for?

Virtualization in the CJIS Security Policy The CSP covers the concept of virtualization in the following areas: Section 5.10.3 Partitioning and Virtualization Section 5.10.3.2 Virtualization Appendix G Best Practices; G.1 Virtualization

Virtualization in the CJIS Security Policy (cont.) There are four general requirements for virtual environments: 1. Isolate the host from the virtual machine. In other words, virtual machine users cannot access host files, firmware, etc. 2. Maintain audit logs for all virtual machines and hosts and store the logs outside the hosts virtual environment. 3. Virtual Machines that are Internet facing (web servers, portal servers, etc.) shall be physically separate from Virtual Machines (VMs) that process CJI internally or be separated by a virtual firewall. 4. Drivers that serve critical functions shall be stored within the specific VM they service. In other words, do not store these drivers within the hypervisor, or host operating system, for sharing. Each VM is to be treated as an independent system secured as independently as possible.

Virtualization in the CJIS Security Policy (cont.) The following additional requirements must be applied in virtual environments where CJI is comingled with non CJI: 1. Encrypt CJI when stored in a virtualized environment where CJI is comingled with non CJI or segregate and store unencrypted CJI within its own secure VM. 2. Encrypt network traffic within the virtual environment

Virtualization in the CJIS Security Policy (cont.) The following are technical security industry best practices and should be implemented wherever feasible: Implement IDS and/or IPS monitoring within the virtual machine environment. Virtually or physically firewall each virtual machine from each other to ensure that only allowed protocols will transact. Segregate the administrative duties for the host.

Use Case #1 Logical Separation A PD network was incorporated within a virtualized network as part of a county network consolidation effort. The virtual network consists of both CJI and non CJI processing virtual machines (VM). So, the VMs are segregated (CJI processing VMs from non CJI VMs) and separated via virtual firewalls. This is a comingled environment, so the agency does encrypt network traffic within the virtual environment. The virtual network resides completely within a physically secure location (no remote connections) and CJI is stored within its own VM, so encryption is not a requirement for CJI at rest.

Logical Separation Example Logical Separation

Logical Separation Example (cont.) No CJI No CJI CJI No CJI CJI CJI

Use Case #2 Physical & Logical Separation The state police (SP) recently transitioned to a virtualized network. The CJI and non CJI are stored in separate VMs within a physically secure location no encryption requirement for CJI at rest. The SP manages the state switch and will allow remote connections to from the virtual network via a web portal interface link is protected via encryption (FIPS 140 2 certified, 128 bit) Internet facing VM (web portal interface) is physically separated from non Internet facing VMs. This is a comingled environment, so the agency does encrypt network traffic within the virtual environment. This agency has also segregated VMs using virtual firewalls.

Physical & Logical Separation Example Logical and Physical Separation

Physical Separation in a Virtualized Environment Example of Physical Separation

Virtualized Environments FAQ #1 Question: In section 5.10.3.2 Virtualization, item number 2 in the first paragraph states: Maintain audit logs for all virtual machines and hosts and store the logs outside the host s virtual environment." Does this mean that I have to pull the event and content logs from the virtual environment to save them? Answer: Yes. There is a CSP requirement for retaining audit logs for 1 year (Section 5.4.6). Also, know that many virtual environments are ephemeral and therefore is set to delete/erase everything when taken down, whether intentionally or by malicious means this includes log data within the virtual environment.

Virtualized Environments FAQ #2 Question: In section 5.10.3.2 Virtualization, item number 2 in the third paragraph states: "Virtually or physically firewall each virtual machine from each other (or physically firewall each virtual machine from each other with an application layer firewall) and ensure that only allowed protocols will transact." So, is this a requirement? Will this be audited? Answer: No. This is not an auditable requirement. It is simply industry best practice guidance. Appendix G.1 provides some additional best practice guidance to provide better security for your virtualized environment.

Questions?

ISO RESOURCES ISO Resources

ISO RESOURCES State CJIS Representatives State CJIS CSO/ISO should be the first stop for any questions or concerns Responsible for CJIS systems in their state/agency State CJIS requirements may differ from the CSP CSO/ISO should be kept in the loop with the CJIS issues in their state/agency Forwards requests for changes to the CJIS Security Policy to the CJIS ISO Program

ISO RESOURCES CJIS ISO Program Steward the CJIS Security Policy for the Advisory Policy Board Draft and present topic papers at the APB meetings Provide Policy support to state ISOs and CSOs Policy Clarification Solution technical analysis for compliance with the Policy Operate a public facing web site on FBI.gov: CJIS Security Policy Resource Center Provide training support to ISOs Provide policy clarification to vendors in coordination with ISOs

ISO RESOURCES The CJIS Security Policy!!!

ISO RESOURCES CSP Requirements Document Companion document to the CSP Lists every requirement, shall statement, and corresponding location and effective date Updated annually in conjunction with the CSP

ISO RESOURCES CSP Resource Center Publically Available http://www.fbi.gov/about us/cjis/cjis security policy resourcecenter/view Features: Search and download the CSP Download the CSP Requirements Document 2014 ISO Symposium Presentations Use Cases (Advanced Authentication and others to follow) Cloud Computing Report & Cloud Report Control Catalog Mobile Appendix Submit a Question (question forwarded to CJIS ISO Program) Links of Importance

ISO RESOURCES CSP Resource Center http://www.fbi.gov/about us/cjis/cjis security policy resource center/view Step #1 Select About Us Step #2 Select Criminal Justice Information Services

ISO RESOURCES CSP Resource Center http://www.fbi.gov/about us/cjis/cjis security policy resource center/view Step #3 Select Security Policy Resource Center

ISO RESOURCES CSP Resource Center http://www.fbi.gov/about us/cjis/cjis security policy resource center/view iso@leo.gov

ISO RESOURCES CSP Resource Center http://www.fbi.gov/about us/cjis/cjis security policy resource center/view iso@leo.gov

CJIS ISO CONTACT INFORMATION George White, CJIS ISO (304) 625 5849 george.white@ic.fbi.gov Chris Weatherly, CJIS ISO Program Manager (304) 625 3660 john.weatherly@ic.fbi.gov Jeff Campbell, CJIS Assistant ISO (304) 625 4961 jeffrey.campbell@ic.fbi.gov Steve Exley, Senior Consultant/Technical Analyst (304) 625 2670 stephen.exley@ic.fbi.gov iso@ic.fbi.gov

QUESTIONS? Stephen Exley, CISSP Senior Consultant/Technical Analyst FBI CJIS ISO Program (304) 625 2670 stephen.exley@ic.fbi.gov iso@ic.fbi.gov