Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data

Similar documents
REDUCE RISK WITH ORACLE SOLARIS 11

Securing Data in Oracle Database 12c

Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features

Oracle Solaris: Aktueller Stand und Ausblick

CISCO IOS NETWORK SECURITY (IINS)

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

System Administration: The Complete Reference

Basics of Internet Security

Oracle Database Security and Audit

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5

Oracle SuperCluster M7 Platform Security Principles and Capabilities O R A C L E T E C H N I C A L W H I T E P A P E R N O V E M B E R

An Oracle White Paper April How to Install the Oracle Solaris 10 Operating System on x86 Systems

Oracle Solaris 11 and PCI DSS Meeting PCI DSS Compliance with Oracle Solaris 11

MySQL Security: Best Practices

Where every interaction matters.

Security Overview of the Integrity Virtual Machines Architecture

6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Protecting Your Organisation from Targeted Cyber Intrusion

An Oracle White Paper June Exalogic Security

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Security Overview Enterprise-Class Secure Mobile File Sharing

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

An Oracle White Paper August Using Oracle Solaris 10 to Overcome Security Challenges

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

OnCommand Performance Manager 1.1

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

OCS Virtual image. User guide. Version: Viking Edition

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Best Practices on monitoring Solaris Global/Local Zones using IBM Tivoli Monitoring

OTM Security in an Evolving Threat Landscape. Anoop Jangamakote Ryan Haney

PARALLELS SERVER BARE METAL 5.0 README

Oracle Virtual Desktop Infrastructure. VDI Demo (Microsoft Remote Desktop Services) for Version 3.2

Setting Up a Unisphere Management Station for the VNX Series P/N Revision A01 January 5, 2010

SANS Institute First Five Quick Wins

An Oracle Technical White Paper May How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance

Using SmartOS as a Hypervisor

Virtualization System Security

End User Devices Security Guidance: Apple OS X 10.10

OracleAS Identity Management Solving Real World Problems

Secret Server Qualys Integration Guide

SonicWALL WAN Acceleration FAQ Document

SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC

Cloud Security:Threats & Mitgations

Cisco Certified Security Professional (CCSP)

ManageEngine (division of ZOHO Corporation) Infrastructure Management Solution (IMS)

Virtualization for Cloud Computing

5 Steps to Advanced Threat Protection

Configuring Security Features of Session Recording

Likewise Security Benefits

IINS Implementing Cisco Network Security 3.0 (IINS)

Safety measures in Linux

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

MEGA Web Application Architecture Overview MEGA 2009 SP4

BlackBerry 10.3 Work and Personal Corporate

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

BSA Best Practices Webinars Role Based Access Control Sean Berry Customer Engineering

Intel Enhanced Data Security Assessment Form

McAfee Network Security Platform Administration Course

Cisco Application Networking Manager Version 2.0

The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:

APIs The Next Hacker Target Or a Business and Security Opportunity?

OnCommand Performance Manager 1.1

White Paper Secure Reverse Proxy Server and Web Application Firewall

An Oracle Technical White Paper January How to Configure the Trend Micro IWSA Virus Scanner for the Oracle ZFS Storage Appliance

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Novell Access Manager SSL Virtual Private Network

Dionseq Uatummy Odolorem Vel Layered Security Approach

An Oracle White Paper April Network Isolation in Private Database Clouds

H Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments

6WRUP:DWFK. Policies for Dedicated SQL Servers Group

An Oracle White Paper June Security and the Oracle Database Cloud Service

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Shellshock Security Patch for X86

ACE Management Server Deployment Guide VMware ACE 2.0

UNCLASSIFIED Version 1.0 May 2012

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Network Security Guidelines. e-governance

Achieving PCI Compliance Using F5 Products

CEN 559 Selected Topics in Computer Engineering. Dr. Mostafa H. Dahshan KSU CCIS

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

McAfee Firewall Enterprise 8.3.1

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Quick Start - NetApp File Archiver

identity management in Linux and UNIX environments

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

Linux Operating System Security

HP A-IMC Firewall Manager

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Transcription:

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Will Fiveash presenter, Darren Moffat author Staff Engineer Solaris Kerberos Development

Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle.

Is this Risky/Scary? 2011 Oracle Corporation 4

More or less Risky/Scary? 2011 Oracle Corporation 5

Now? Solaris Global Zone 2011 Oracle Corporation 6

Solaris 11 Secured Cloud Hosting 2011 Oracle Corporation 7

Security Is An Arms Race Constant race between the attackers and defenders. Mostly the same old bugs for 20+ years More ways to exploit the bugs in new and old code Solaris needs to provide: Security features Solid runtime environment A lot of Solaris Security Engineering is small focused changes to other parts of the system to add more built in security assurance and features. We can and do change any part of Solaris for security features Cloud and Virtualization don't really add new problems But they do change the deployment threat model and assumptions around security... 2011 Oracle Corporation 8

A Cloud/Visualization Threat Model Hosting provider and the hosted environment have complementary but differing views of the threat model In a data centre these might be the same groups Both care about securing the system Client may be mostly concerned with: Unauthorized access to their data All disks/tapes leave the data centre eventually Attack on running system, eg website defacement Trojaned runtime environment Provider may be mostly concerned with Unauthorized access to hosting environment Resource utilization Reputation for providing a secure system 2011 Oracle Corporation 9

Key Messages Protect data at Rest and in Motion Prevent unauthorised access Delegation of control / Separation of Duty Reduce risk of damage or theft if unauthorised access does happen Audit trail of change for Compliance Highlights of some Solaris 11 security features

Mitigating the Risk Some Security Features Many levels of access control Traditional UNIX permissions ZFS has NFSv4/Windows NT style ACLs CIFS shares have ABE for share level restrictions Mandatory Access Control New Zone file-mac-profile Trusted Extensions labeling File System & block device encryption Application Sandboxes via Zones, privileges and resource controls

System Integrity Protection Get the right bits on disk and keep them right Network package installation over HTTPS Protect sensitive package content in transit Solaris 11 packages are cryptographically signed You can add additional signatures System policy to require and verify signatures YOU choose who to trust per system image ELF binaries are still cryptographically signed Know they came from Oracle RE process For non packaged files bart(1m) provides a passive manifest comparison system using cryptographic hashes

System Integrity Protection But some things are editable Solaris 10 sparse root zones partially read-only wasn't really a security feature Solaris 11 zone file-mac-profile Controls which parts of the zone are writeable even for root none, flexible-configuration,fixed-configuration,strict Underlying technology based on whitelist & blacklist, maybe extended to other sandboxing use cases in future releases ZFS checksums and self healing ZFS encryption for data file systems & ZVOLs Can encrypt Zone file systems

Isolating Applications Solaris Zones as an application fault boundary Service Management Framework Restart & notification (SMTP, SNMP), Per service firewall rule Resource Controls (CPU, Memory,...) File system name space isolation Solaris 11 per Zone administration delegation Privileges for sub-zone security boundary Including removing new basic privileges: net_access, file_write,file_read Zone system integrity via file-mac-profile

Remote User Authentication Solaris defaults to ONLY SSH remotely accessible No remote root login & root is a role by default SSH & Kerberos easier to manage centrally using X.509 certificate based authentication YOUR Certificate Authorities as Trust Anchors Kerberos protection for NFSv3 & NFSv4 traffic Active Directory/Kerberos authentication for CIFS/SMB network shares

Data in Motion Protection Zone file system security boundary now applies to NFS server as well. Each zone can serve a separate NFSv4 domain Each zone can be in a separate Kerberos Realm Per Zone IPsec policy Kernel SSL/TLS proxy Allows keeping private keys outside of the zone Hardware crypto acceleration on SPARC and Intel CPUs reduces overhead of encrypting network traffic SSH, IPsec/IKE, Kerberos, OpenSSL, KSSL

Data at Rest Protection Encryption for UFS & other legacy filesystems via lofi driver. ZFS data set encryption (file system & ZVOL) Comprehensive wrapping key management Delegation: key use vs key change vs key location/type Local or Centralised Integrated with Oracle Key Manager via pkcs11_kms 3 rd Party key management integration zfs(1m) key subcommand is scriptable Keys from any https:// location policy on server side Data encryption key change at clone or on demand

Unique in the Industry: Trusted Extensions (TX) Only enterprise OS that includes multilevel functionality as a bundled feature Full support of TX included in standard Solaris license TX benefits from all Solaris 11 enhancements Zones architecture makes labeling completely transparent to applications Only OS to ever achieve Common Criteria certification for security target including a multilevel desktop Unique integration with GNOME labeled workspaces Integrated with Oracle's Virtual Desktop Infrastructure 2011 Oracle Corporation 18

Data sensitivity labeling Tag the data everywhere At rest in the file system In motion in the network In the application Allows controlling the data flow between applications, hosts and users Trusted Extensions provides: Enhanced Zone based integrity & isolation boundary File system level tagging of data sensitivity IPsec based labeling of data in transit Multi-level GNOME desktop with robust lockdown

Solaris 11 New Trusted Extensions Features Automatic persistent labeling of ZFS datasets Labels are encrypted objects on disk NFS now provided by per label (zone) server Improved isolation of NFS server (per label IP address) Allows for separate NFSv4/Kerberos domains per label Improved CLI & GUI management tools tncfg (local & LDAP) Labelled IPsec PLUS Lots of generic Zone improvements: Exclusive IP stack, auto VNIC, Auto Installer integration, file-mac-profile... Infiniband support

Audit trail for Compliance and Reporting Comprehensive audit trail: 20+ years of development System service & system call level SMF is heavily audited any property or service change Auditing now ON by default Login/logout events No reboot to change audit policy Audit inside or outside the zone Can't see what auditing is happening or the audit trail Audit trail export to XML Client for transporting audit trail securely off the system Protected by GSS/Kerberos for authentication/integrity/confidentiality

But it is all too hard to use Some of this was traditionally hard to use Solaris 11 has much better scriptable CLI for user and RBAC management with support for LDAP Firewall rules integrated with services (svc.ipfd) 'zfs create -o encryption=on pool/data' Yes it can be that simple! Hardware encryption use is transparent Solaris, Java, OpenSSL, and Oracle RDBMS Even more so with SPARC T4 and Intel AES-NI

Solaris 11 Features Addressing Threats Multiple tenant application containment via Zones RBAC Delegated administration (i.e. give access to console & zone reboot only) Read Only Zone Root (Mandatory Access Control) ZFS data set encryption of zone & data Application Sandboxing More basic privileges - read/write files, network access (to become fine-grained in S11 updates) Read Only Zone Root Data at Rest Encryption (ZFS) With centralized & delegated key management Assurance that software hasn t been compromised Signed packages & secure package transport Signed binaries / libraries 2011 Oracle Corporation 23

Solaris 11 Features Addressing Threats Accountability / Audit Trail Now on by default (authentication events logged) Near zero performance overhead Audit trail off machine via secured transport Many more things audited (lots via SMF) and more still to come sudo is integrated with Solaris Audit trail Easier deployment of network security protocols: X.509 support in Solaris 11 for SSH & Kerberos simplifies deployment and provides centralised management NFS authentication, integrity, confidentiality via Kerberos Easier to user management tools CLIs now support LDAP backend & more comprehensive Fine grained delegation eg, change user but not root password 2011 Oracle Corporation 24

Built for clouds Best for enterprise applications Best for Oracle Solaris 11 Launch Event 9 th November http://oracle.com/goto/solaris11event