Protect Root Abuse privilege on Hypervisor (Cloud Security)



Similar documents
1518 Best Practices in Virtualization & Cloud Security with Symantec

How to Achieve Operational Assurance in Your Private Cloud

HyTrust Logging Solution Brief: Gain Virtualization Compliance by Filling Log Data Gaps

SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5

QTS Leverages HyTrust to Build a FedRAMP Compliant Cloud

Netzwerkvirtualisierung? Aber mit Sicherheit!

Drawbacks to Traditional Approaches When Securing Cloud Environments

H Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments

#ITtrends #ITTRENDS SYMANTEC VISION

managing the risks of virtualization

CloudControl Support for PCI DSS 3.0

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

2010 State of Virtualization Security Survey

Can You be HIPAA/HITECH Compliant in the Cloud?

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5

PICO Compliance Audit - A Quick Guide to Virtualization

RSA Security Solutions for Virtualization

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

VMware Integrated Partner Solutions for Networking and Security

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief

Best Practices in Virtualization & Cloud Security with Symantec DCS

Symantec Control Compliance Suite Standards Manager

How To Protect A Data Center From A Hacker Attack

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

How RSA has helped EMC to secure its Virtual Infrastructure

A Look at the New Converged Data Center

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

Meeting the Challenges of Virtualization Security

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

Mitigating Information Security Risks of Virtualization Technologies

VULNERABILITY MANAGEMENT

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Security Solution Architecture for VDI

The first agentless Security, Virtual Firewall, Anti- Malware and Compliance Solution built for Windows Server 2012 Hyper-V

McAfee Server Security

CA ControlMinder for Virtual Environments May 2012

How To Build A Software Defined Data Center

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

IT Security at the Speed of Business: Security Provisioning with Symantec Data Center Security

Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc.

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

VMware's Cloud Management Platform Simplifies and Automates Operations of Heterogeneous Environments and Hybrid Clouds

Control your corner of the cloud.

Copyright 11/1/2010 BMC Software, Inc 1

Preparing an RFI for. This RFI has been updated to reflect the new requirements in Version 3.0 of the PCI DSS, which took effect January 2015.

Ecom Infotech. Page 1 of 6

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5

Secure Administration of Virtualization - A Checklist ofVRATECH

Limiting the Spread of Threats: A Data Center for Every User

Trusted Geolocation in The Cloud Technical Demonstration

Security Virtual Infrastructure - Cloud

How Network Virtualization can improve your Data Center Security

Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments

Data center fo the future software defined DC

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud

Secure Cloud-Ready Data Centers Juniper Networks

CSA Virtualisation Working Group Best Practices for Mitigating Risks in Virtualized Environments

Security & Cloud Services IAN KAYNE

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

McAfee MOVE AntiVirus (Agentless) 3.6.0

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Protecting Virtual Endpoints with McAfee Server Security Suite Essentials

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Implementing Software- Defined Security with CloudPassage Halo

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

SDDC: A New Architecture for a New Era of Ed IT

Cloud and Data Center Security

Making Data Security The Foundation Of Your Virtualization Infrastructure

The Cloud App Visibility Blindspot

WHITEPAPER. PHD Virtual Monitor: Unmatched Value. of your finances. Unmatched Value for Your Virtual World

How to Keep a Cloud Environment Current, Secure and Available October 16, 2014

Virtualization Essentials

Data Center Connector for vsphere 3.0.0

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization

SOFTWARE DEFINED NETWORKING

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

Bitdefender GravityZone Sales Presentation

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Moving beyond Virtualization as you make your Cloud journey. David Angradi

Transcription:

Protect Root Abuse privilege on Hypervisor (Cloud Security) Nantharat Puwarang, CISSP Senior Technical Consultant Protect Software Defined Data Center 1

The Road to Software Defined Data Centers: Virtualization & Cloud Adoption Source: VMware 2013 Journey to IT-as-a-Service Survey 2

Changing Risk Profile: Virtualization and Cloud Concentrates Compute and Access Significant Risk of Catastrophic Failure 2013, HyTrust, Inc. www.hytrust.com 3

Threats from Abuse of Privilege Access Remains High 43% Percentage of security breaches due to trusted insiders and business partners Forrester survey, June 2011 56% Percentage of execs who say their most serious fraud was due to a privileged user PricewaterhouseCoopers, Wall Street Journal, April 2012 50-80% Percentage of outages and availability/ performance problems related to misconfiguration Gartner (>50%), Enterprise Management Assoc. (60%), IT Process Institute (80%), 2005-12 2013, HyTrust, Inc. www.hytrust.com

our view The SDDC The data center of the future is software-defined. It is dynamic and application-centric. Our mission is to support our customers as they evolve to the SDDC. Software-Defined Data Center Applications and Policies Software Defined Services Network Virtualization Compute and Storage Virtualization On-Prem/Private/Public Cloud Resources Data Center Security Automation and Management Drivers Cost Speed Flexibility Inhibitors Security Tax Complexity Compliance 5

Transitioning Our Security Controls and Architectures VM VM VM VM Maximum Guest Security Maximum Guest Security Advanced Security Advanced Security SVA Baseline Security Host Security Host Security Hardened Virtual Infrastructure Traditional Security Security controls specific to underlying infrastructure Security deployed at perimeter to reduce cost/effort of deployment at each workload Scales up to meet additional workload demand SDDC Security Delivered as a service by the virtualization infrastructure Security deployed on virtualization host (closer to workload) through an SVA, i.e. Agentless Scales out to meet additional workload demand (more SVAs) 1518 Best Practices in Virtualization & Cloud Security with Symantec 6

Need Security? A dynamic, application-centric data center needs dynamic, application-centric security. By 2015, 40% of security controls used in Enterprise data centers will be virtualized, up from less than 5% in 2010 Neil MacDonald Software-Defined Data Center Applications and Policies Software Defined Services Network Virtualization Compute/Storage Virtualization On-Prem/Private/Public Cloud Resources Dynamic, contextbased, policycentric security Integrated security orchestration Security for hybrid networks Security for leading hypervisors Support for key standards for private clouds e.g. Openstack and partner with vendors delivering those standards e.g. Amazon, VMWare, Openstack How to control/audit on hypervisors? Data Center Security Automation and Management Roadmap: The Evolution of Data Center Security, Risk and Compliance - 1640 7

Software-Defined Data Center Security & Compliance Challenges Management & oversight of privilege users Enforce separation of duties Identity & Access Governance Catastrophic Fail: Material & Regulatory Impact Enforce regulatory mandates for data and network Separation. Data & Network Segregation Harden the virtual and physical infrastructure Patching and maintenance Infrastructure Resilience & Integrity Audit, Monitoring, Reporting & Prioritization Pass compliance audits Identify and prioritize risks Effective resource allocation 8

Six Ways Symantec Protects Your Software-Defined Data Center Management Clients Virtual Infrastructure 1 1. Two-Factor AuthN vcenter Virtualization Management Clients Guest Traffic Uninterrupted 3 3. Logging and Real-time Alerting 2 2. Role-Based Access and Secondary Approval (2 Man Rule) Tag-based Policies ESXi Hosts 4 4. Hypervisor Hardening / Platform Integrity 5 5. Guest Hardening* and Assessment 6 6. Malware Protection 9

CCS Virtualization Security Manager: Oversight & Control of Privileged Users in Virtual Environments Secure the hypervisor from threats Granular access control including secondary approval Manage hypervisor and VM configuration settings Automate configuration assessment and reporting Enforce instance separation to isolate assets and limit scope Detailed logging for forensics & audit VSM Dashboard VMware Hardening Guidelines Detailed logging Symantec Data Center Security & Compliance 2013 10

Showcase - Demo Presentation Identifier Goes Here 11

Denied change of Network interfaces 12

2 Man Rules Secondary Approval Presentation Identifier Goes Here 13

Visibility You Get From VMware Symantec Virtualization Security Manager 14

CCS VSM Delivers Audit-Quality Log Detail Needed 15

Visibility You Get From VMware Symantec Virtualization Security Manager 16

Security for the Data Centre Email : Nantharat_Puwarang@Symantec.com CCS Dashboard & Reports CCS Vulnerability Manager CCS Standards Manager Critical System Protection VM1 VM2 VM3 Harden & protect guest VM s with same protection policies as physical servers Server Monitor & protect hypervisor configuration CCS Assessment Manager Admin VMware Admins ESX/ESXi vcenter Physical Harden vcenter based on VMware hardening guidelines CCS Virtual Security Manager Virtual