The growing importance of a secure Cloud environment



Similar documents
Mitigating Information Security Risks of Virtualization Technologies

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Sichere Virtualisierung mit VMware

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE

vshield Quick Start Guide vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint 1.0

Hardening and Hacking vsphere and Private Cloud Everything you need to know about vsphere Security

Virtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE

Virtual Computing and VMWare. Module 4

Security in the Software Defined Data Center

vshield Quick Start Guide

Network Segmentation in Virtualized Environments B E S T P R A C T I C E S

VMware vsphere Design. 2nd Edition

vsphere Private Cloud RAZR s Edge Virtualization and Private Cloud Administration

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

vshield Quick Start Guide

Vmware VSphere 6.0 Private Cloud Administration

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;

Business Values of Network and Security Virtualization

Managed Object - PerformanceManager

RSA Security Solutions for Virtualization

VirtualclientTechnology 2011 July

Potecting your business assets in The Cloud, with. Secure Multitency Environment from CloudHPT.

VMware vcloud Networking and Security Overview

The best platform for building cloud infrastructures. Ralf von Gunten Sr. Systems Engineer VMware

Migrating to ESXi: How To

vsphere 6.0 Advantages Over Hyper-V

Meeting the Challenges of Virtualization Security

Expert Reference Series of White Papers. vcloud Director 5.1 Networking Concepts

VMware for SMB environments(min st year)

Netzwerkvirtualisierung? Aber mit Sicherheit!

Learn the Essentials of Virtualization Security

VMware Integrated Partner Solutions for Networking and Security

VMware: Advanced Security

VMware ESXi 3.5 update 2

Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc.

What s New with VMware Virtual Infrastructure

VMware vsphere: Fast Track [V5.0]

The Virtualization Practice

Devising a Server Protection Strategy with Trend Micro

VMware End User Computing Horizon Suite

Devising a Server Protection Strategy with Trend Micro

VMware Virtualization. Garrett Hartney VMware Evangelist

Secure Cloud-Ready Data Centers Juniper Networks

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

Trend Micro Deep Security

VMware Solution Guide for. Payment Card Industry (PCI) September v1.3

Table of Contents. vsphere 4 Suite 24. Chapter Format and Conventions 10. Why You Need Virtualization 15 Types. Why vsphere. Onward, Through the Fog!

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

VMware vsphere-6.0 Administration Training

Network Access Control in Virtual Environments. Technical Note

Khóa học dành cho các kỹ sư hệ thống, quản trị hệ thống, kỹ sư vận hành cho các hệ thống ảo hóa ESXi, ESX và vcenter Server

Desktop Virtualization. The back-end

VMware vsphere 5.1 Advanced Administration

Building an Enterprise Hybrid Cloud with the VMware vcloud Solution

VMware Virtual Infrastucture From the Virtualized to the Automated Data Center

BEST PRACTICES. DMZ Virtualization with VMware Infrastructure

Shifting Roles for Security in the Virtualized Data Center: Who Owns What?

How To Protect Your Cloud From Attack

VMware vcloud Networking and Security

Agentless Security for VMware Virtual Data Centers and Cloud

Learn how to build Enterprise Hybrid Clouds for your customers using VMware vcloud

Install Guide for JunosV Wireless LAN Controller

Oracle Solutions on Top of VMware vsphere 4. Saša Hederić VMware Adriatic

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5

TGL VMware Presentation. Guangzhou Macau Hong Kong Shanghai Beijing

Network Troubleshooting & Configuration in vsphere VMware Inc. All rights reserved

VMware vsphere 4.1. Pricing, Packaging and Licensing Overview. E f f e c t i v e A u g u s t 1, W H I T E P A P E R

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

Networking for Caribbean Development

VMware vsphere 4. Pricing, Packaging and Licensing Overview W H I T E P A P E R

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

The Top 8 Questions to ask about Virtualization in a PCI Environment

Presentation for ISACA Chapter NL. Auditing Virtual Servers. VMware: Security and Operations. Gert-Jan Timmer 3. September, 2012

Cloud Optimize Your IT

vshield Administration Guide

VMware vsphere 5.0 Boot Camp

Automating Cloud Security Control and Compliance Enforcement for PCI DSS 3.0

CloudCore. cloudcore infrastructure 4 100% SOLID STATE STORAGE 4 TRUE SCALE-OUT ARCHITECTURE 5 RAID-LESS DATA PROTECTION 5

Building an Internal Cloud that is ready for the external Cloud

Enterprise. ESXi in the. VMware ESX and. Planning Deployment of. Virtualization Servers. Edward L. Haletky

VDI Security for Better Protection and Performance

VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER

VMware vsphere: Install, Configure, Manage [V5.0]

Security Compliance in a Virtual World

WHITE PAPER. VMware vsphere 4 Pricing, Packaging and Licensing Overview

App App App App App App App App. VMware vcenter Suite. VMware vsphere 4. Availability Security Scalablity. vshield Zones VMSafe

Cloud Infrastructure Licensing, Packaging and Pricing

Transcription:

The growing importance of a secure Cloud environment Jan Tiri jtiri@vmware.com System Engineer, VMware BeLux 2009 VMware Inc. All rights reserved

Cloud components Enterprises Cloud Service Providers Private Cloud Operated solely for an organization, typically within the firewall Low total cost of ownership Greater control over security, compliance, QoS Easier integration Support existing applications Hybrid Cloud Composition of 2 or more interoperable clouds, enabling data and application portability VMware focus to deliver the best of both worlds Public Cloud Accessible over the Internet for general consumption Low acquisition costs Less administrative burden On-demand capacity Limited offerings

Gartner: VMware is the Clear Market Leader VMware stands alone as a leader in this Magic Quadrant VMware is clearly ahead in : Understanding the market Product strategy Business model Technology innovation, Product capabilities Sales execution VMware Strengths : Far-reaching virtualization strategy enabling cloud computing, new application architectures and broader management Technology leadership and innovation High customer satisfaction Large installed base (especially Global 2000), and rapid growth of service providers planning to use VMware (vcloud)

VMware Approach to Security Platform Security Secure hypervisor architecture Platform hardening features Secure Development Lifecycle Secure Operations Prescriptive guidance for deployment and configuration Enterprise controls for security and compliance Virtualization of Security Virtualizationaware security Unique Advantage of virtualization

VMware Approach to Security Platform Security Secure hypervisor architecture Platform hardening features Secure Development Lifecycle Secure Operations Prescriptive guidance for deployment and configuration Enterprise controls for security and compliance Virtualization of Security Virtualizationaware security Unique Advantage of virtualization

Architecture: Types of Server Virtualization Hosted (Type 2) Bare-Metal (Type 1) Virtualization Layer APP Windows, Linux, Mac VMware Workstation VMware Server VMware Player VMware Fusion Host OS changes security profile VMware ESX/ESXi

Isolation by Design CPU & Memory Virtual Network Virtual Storage VMs have limited access to CPU Memory isolation enforced by Hardware TLB Memory pages zeroed out before being used by a VM No code exists to link virtual switches Virtual switches immune to learning and bridging attacks Virtual Machines only see virtual SCSI devices, not actual storage Exclusive virtual machine access to virtual disks enforced by VMFS using SCSI file locks 7

ESXi Security Model Physical / Console Management Network Production Network CIM Client VM VM VM vsphere API vsphere Client vcli vsphere SDK VC hostd vpxa vmkernel CIM Broker Tech Support Mode DCUI BIOS VMM VMM Network Stack Storage Stack VMM Trust Boundary IP-based Storage Inter-ESX network Fibre Channel Storage Keyboard or ilo/equivalent Confidential - INTERNAL ONLY 8

VMware Secure Development Lifecycle Process Training Protect Customer Data & Infrastructure Security Response Architecture Risk Analysis Enable Policy Compliance Security Testing Product Security Policy Best Practice and Compliance Requirements 3 rd party experts continually involved at various points Code Analysis & Inspection VMworld 2009 Session TA2543: VMware s Secure Software Development Lifecycle

VMware Product Security Policy Baseline requirements for the entire software development life cycle Requirements being prioritized by customers Chief Security Officers; Drives products to comply to customer security expectations Derived from Customer policies, SOX, PCI, HIPPA, FIPS, ISO 17799, NIST security standards, OWASP, CWE, CERT vulnerabilities Timely revisions tracking industry advances and feedback from the field Architecture & Design Serviceability Product Development Testing & Assurance 67 Mandatory and 25 Recommended Requirements

Independently validated Common Criteria EAL 4+ Certification Highest internationally recognized level Achieved for ESX 3.0 and 3.5; in process for vsphere 4 DISA STIG for ESX Approval for use in DoD information systems NSA Central Security Service guidance for both datacenter and desktop scenarios 11

NSA Secure Workstation Solution http://www.gdc4s.com/tve Source: VMworld 2009, Session TA3353 12

VMware Approach to Security Platform Security Secure hypervisor architecture Platform hardening features Secure Development Lifecycle Secure Operations Prescriptive guidance for deployment and configuration Enterprise controls for security and compliance Virtualization of Security Virtualizationaware security Unique Advantage of virtualization

How Virtualization Affects Datacenter Security Abstraction and Consolidation Capital and Operational Cost Savings New infrastructure layer to be secured Greater impact of attack or misconfiguration Collapse of switches and servers into one device Flexibility Cost-savings Lack of virtual network visibility and control No separation-by-default of administration 14

How Virtualization Affects Datacenter Security Faster deployment of servers IT responsiveness Inconsistencies in configuration Poorly-defined procedures VM Mobility Improved Service Levels Identity divorced from physical location VM Encapsulation Ease of business continuity Consistency of deployment Hardware Independence Outdated offline systems Unauthorized Copy 15

How do we secure our Virtual Infrastructure? Use the Principles of Information Security Secure the Guests Harden the Virtualization layer Access Controls Administrative Controls

Securing Virtual Machines Provide Same Protection as for Physical Servers Host Anti-Virus Patch Management Network Intrusion Detection/Prevention (IDS/IPS) Edge Firewalls 17

vnic vnic vnic Isolation in the Architecture Segment out all non-production networks VMkernel Use VLAN tagging, or Production Mgmt Storage Use separate vswitch (see diagram) vswitch1 vmnic1 2 3 4 Prod Network Mgmt Network vswitch2 Strictly control access to management network, e.g. RDP to jump box, or VPN through firewall vcenter Other ESX/ESXi hosts IP-based Storage 18

vsphere Security Hardening Guide (13/4/2010) http://communities.vmware.com/docs/doc-12306 This document provides guidance on how to securely deploy vsphere 4.0 in a production environment. The focus is on initial configuration of the virtualization infrastructure layer, which covers the following: The virtualization hosts (both ESX and ESXi) Configuration of the virtual machine container Configuration of the virtual networking infrastructure, including the management and storage networks as well as the virtual switch vcenter Server, its database, and client components VMware Update Manager 19 Confidential

Separation of Duties with vsphere Broad scope Super Admin Networking Admin Server Admin Storage Admin Narrow scope Operator Operator VM Owner VM Owner

Administrative Controls for Security and Compliance Requirement VMware Solutions Partner Solutions Configuration management, monitoring, auditing Auditable and repeatable procedures Updating of offline VMs Virtual network security VMware vcenter Server VMware vsphere Host Profiles VMware vcenter ConfigControl VMware vsphere event logging VMware Ionix VMware vcenter Orchestrator VMware vcenter Lifecycle Manager VMware Update Manager VMware vshield Manager vnetwork Distributed Switch Configuresoft ECM for Virtualization NetIQ Secure Configuration Manager Tripwire Enterprise for Vmware Hyperix Shavlik NetChk Protect Cisco, Checkpoint, Reflex, Third Brigade Diverse and growing ecosystem of products to help provide secure VMware Infrastructure

VMware Approach to Security Platform Security Secure hypervisor architecture Platform hardening features Secure Development Lifecycle Secure Operations Prescriptive guidance for deployment and configuration Enterprise controls for security and compliance Virtualization of Security Virtualizationaware security Unique Advantage of virtualization

Management vshield Manager Security Solutions 2010 Plan Endpoint Seraph Thin A/V enablement McAfee, Trend Thin A/V Joint GTM with next release of View Cloud vshield Edge Port Firewall, NAT, DHCP Site-2-site VPN*, Load Balancer* Joint GTM with Service Director Mgr Application vshield Zones Distributed vnic firewall, monitor App Zones, Isolation Joint GTM with KL.next Endpoint, Cloud, App security realized via vshield security VMs Management unifies security VMs; provides REST APIs Management integrated with vcenter, Service Director Manager 23 Confidential

Endpoint protection: Seraph Issues AV storms can cause brownouts in shared compute (virtualization) and storage (SAN/NAS) environments SVM VM VM VM Traditional agents are resource intensive - not optimized for high utilization, efficient clouds Up to 6 GB on VMware View desktops Opportunities Leverage hypervisor to offload AV functions from agents into a dedicated security VM AV OS Hardened Introspection APP OS Kernel BIOS APP OS Kernel BIOS VMware vsphere APP OS Kernel BIOS Deploy security in a more agile, service-driven manner to both private and public cloud environments

Cloud protection: vshield Edge vcloud Service Director vshield Manager 2.0 DMZ APPS DB Edge net/sec services VPN with overlay enables extending local L2/IP to cloud Web Load Balancer enables scaling web server farms vcloud APIs extended to include VPN, WLB services vshield Edge Firewall, NAT, DHCP, VPN/overlay, Web LB vcenter VMware vsphere Network REMOTE SITE INTERNET SITE 2 SITE VPN

Application protection: vshield Zones vapps Isolated Zones vsphere CLUSTER DMZ APP DB VDI vshield Zones vsphere vshield Zones vsphere vshield Zones vsphere vshield Zones vsphere Capabilities Define VM zones based on familiar VI containers Monitor allowed and disallowed activity by application-based protocols One-click flow-tofirewall blocks precise network traffic Benefits Pervasive: well-defined security posture for inter-vm traffic anywhere and everywhere in virtual environment Persistent: monitoring and assured policies for entire VM lifecycle, including VMotion live migrations Simple: Zone-based rules reduces policy errors

VDC Key Building Block of the Infrastructure 1. Encapsulate secure, auto-wired VDC Edge Zones EndPoint vmsafe Sales 2. Standup VDC per Org, on demand 3. Migrate, burst, federate VDC to vcloud EndPoint vmsafe Zones Edge Finance EndPoint vmsafe Zones Edge Intranet EndPoint vmsafe Security & Network vservices Secure Edge Zones Corp Web Vmware vsphere

Where to Learn More Security Hardening Best Practices Implementation Guidelines http://vmware.com/go/security Compliance Partner Solutions Advice and Recommendation http://vmware.com/go/compliance Operations Peer-contributed Content http://viops.vmware.com

Thank You 2009 VMware Inc. All rights reserved