Improving OpenStack* Hybrid Cloud Security

Similar documents
CLOUD SECURITY: Secure Your Infrastructure

Intel Service Assurance Administrator. Product Overview

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms

Integrated OpenStack Cloud Solution with Service Assurance

新 一 代 軟 體 定 義 的 網 路 架 構 Software Defined Networking (SDN) and Network Function Virtualization (NFV)

Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms

Control your corner of the cloud.

Accelerate OpenStack* Together. * OpenStack is a registered trademark of the OpenStack Foundation

Overcoming Security Challenges to Virtualize Internet-facing Applications

Vendor Update Intel 49 th IDC HPC User Forum. Mike Lafferty HPC Marketing Intel Americas Corp.

Intel Embedded Virtualization Manager

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Trusted Geolocation in the Cloud. Based on NIST Interagency Report Trusted Geolocation in the Cloud: Proof of Concept Implementation

Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP

Ubuntu OpenStack on VMware vsphere: A reference architecture for deploying OpenStack while limiting changes to existing infrastructure

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Trusted Geolocation in The Cloud Technical Demonstration

How To Use An Ibm Cloud Server For Business

VMware Hybrid Cloud. Accelerate Your Time to Value

Outline. Why Neutron? What is Neutron? API Abstractions Plugin Architecture

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems

Solution Recipe: Improve Networked PC Security with Intel vpro Technology

A Superior Hardware Platform for Server Virtualization

Mirantis OpenStack Express: Security White Paper

Life With Big Data and the Internet of Things

Building Trust and Compliance in the Cloud with Intel Trusted Execution Technology

ORACLE OPS CENTER: VIRTUALIZATION MANAGEMENT PACK

KVM, OpenStack and the Open Cloud SUSECon November 2015

An Enterprise Private Cloud Architecture and Implementation Roadmap

VNF & Performance: A practical approach

Adopting Software-Defined Networking in the Enterprise

Leading Virtualization 2.0

Different NFV/SDN Solutions for Telecoms and Enterprise Cloud

Securing the Intelligent Network

Architectural Implications of Cloud Computing

An Enterprise Private Cloud Architecture and Implementation Roadmap

VIRTUALIZED SERVICES PLATFORM Software Defined Networking for enterprises and service providers

cloud functionality: advantages and Disadvantages

CloudCenter Full Lifecycle Management. An application-defined approach to deploying and managing applications in any datacenter or cloud environment

Master Hybrid Cloud Management with VMware vrealize Suite. Increase Business Agility, Efficiency, and Choice While Keeping IT in Control

Vblock Systems hybrid-cloud with Cisco Intercloud Fabric

opportunity Mechanisms to Protect Data in the Open Cloud

One-Stop Intel TXT Activation Guide

Intel Trusted Platforms Overview

Developing a Highly Available, Dynamic Hybrid Cloud Environment

Pluribus Netvisor Solution Brief

Intel Trusted Execution Technology

IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet

How To Get A Client Side Virtualization Solution For Your Financial Services Business

Cloud based Holdfast Electronic Sports Game Platform

Isaku Yamahata CloudOpen Japan May 22, 2014

CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

KVM, OpenStack, and the Open Cloud

SUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack. Gábor Nyers Sales gnyers@suse.com

RED HAT OPENSTACK PLATFORM A COST-EFFECTIVE PRIVATE CLOUD FOR YOUR BUSINESS

Getting More Performance and Efficiency in the Application Delivery Network

Intel IT Cloud 2013 and Beyond. Name Title Month, Day 2013

JANUARY Industry Brief

One-Stop Intel TXT Activation Guide

Boas Betzler. Planet. Globally Distributed IaaS Platform Examples AWS and SoftLayer. November 9, IBM Corporation

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

SoftLayer Offerings. What s Inside

Solution Recipe: Remote PC Management Made Simple with Intel vpro Technology and Intel Active Management Technology

SUSE Cloud 2.0. Pete Chadwick. Douglas Jarvis. Senior Product Manager Product Marketing Manager

Intel, Cisco, and Red Hat deliver a proven solution that reduces risk. Advance Your Cloud Strategy with OpenStack

Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments

Cloud for Your Business

Easily deploy and move enterprise applications in the cloud

Index. BIOS rootkit, 119 Broad network access, 107

Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms

Enabling Database-as-a-Service (DBaaS) within Enterprises or Cloud Offerings

Application Migration & Management

Protecting VMs in a Multi-Tenancy Environment

Taking control of the virtual image lifecycle process

MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS

VMware vcloud Networking and Security

Windows Server Virtualization An Overview

IBM PowerSC. Security and compliance solution designed to protect virtualised data centres. Highlights. IBM Systems and Technology Data Sheet

Imagine What Fitness Can Look Like in the Future

The Open Cloud Near-Term Infrastructure Trends in Cloud Computing

Cisco and Red Hat: Application Centric Infrastructure Integration with OpenStack

Creating Overlay Networks Using Intel Ethernet Converged Network Adapters

OpenStack Introduction. November 4, 2015

KVM, OpenStack, and the Open Cloud

IBM SmartCloud Monitoring

Dell Client. Take Control of Your Environment. Powered by Intel Core 2 processor with vpro technology

Getting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide

With Red Hat Enterprise Virtualization, you can: Take advantage of existing people skills and investments

Safeguarding the cloud with IBM Dynamic Cloud Security

Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage

Virtualization, SDN and NFV

Intel Identity Protection Technology (IPT)

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family

Ericsson Introduces a Hyperscale Cloud Solution

Transcription:

SOLUTION BRIEF Intel Trusted Execution Technology Hybrid Security Improving OpenStack* Hybrid Security Together, Intel, Mirantis, and IBM SoftLayer demonstrate how Intel Trusted Execution Technology, attestation, and automation can enhance hybrid cloud security. Private Hybrid Public Solution Provided By: Private data centers strive to optimize efficiency and improve utilization. However, when utilization peaks, it can diminish the data center s ability to absorb bursts of demand or to accommodate workloads of an indeterminate lifespan or unknown viability. To address this problem these workloads are often deployed in a public cloud. Intel believes that a secure hybrid cloud a mixture of public and private deployments is an important component of its effectiveness and efficiency. Even with public deployments, we must have transparent oversight of the deployment s location and security to meet our fiduciary and efficiency goals. Therefore our cloud platform strategy stresses uncompromising security and control in both public and private deployments, while prioritizing three long-term objectives: Open, interoperable software infrastructure. Help avoid vendor lock-in, accelerate component development, and facilitate collaboration with other largescale enterprises. Automated cloud resource management. Address rapidly changing end-user demands, multitenancy, and utilization without compromising security or service-level agreements. Hybrid private/public architecture. Establish a high-utilization, private cloud to run trusted, secure, missioncritical services and enable continuous operations, complemented by an ondemand public cloud for bursting and scaling under a predictable, pay-peruse cost model. Intel took an agile, DevOps approach to building our hybrid cloud, basing our work on OpenStack*. Internal reference OpenStack deployments have helped us evolve our data center roadmap and business objectives. At the same time, we have used these deployments as platforms for proving the business value of Intel s innovations and contributions to OpenStack open source projects in real-world environments. The next logical step was to create a reference hybrid deployment to demonstrate that a hybrid cloud environment can support enterprise-level security.

Meet the Team Intel Intel s work on cloud initiatives spans multiple groups. One group may test and benchmark new technologies, another group may make key contributions to the open source community, and other groups may develop marketable technologies and help integrate them into the open cloud computing market. Examples of such activities include the development of Intel Trusted Execution Technology and Intel Service Assurance Administrator (part of the Intel Datacenter Software family), participation in the Open Attestation project, and contributions to OpenStack* projects such as Nova. Our cloud initiatives are based on OpenStack, whose flexible nature can make rapid iteration challenging. However, we have found that rapid iteration instead of lengthy planning and implementation cycles can provide the best business benefits through agility and innovation. Mirantis With years of experience spanning multiple, large-enterprise OpenStack projects and numerous contributions to the OpenStack code base, Mirantis is a recognized leader in the OpenStack ecosystem. Mirantis OpenStack a close-to-trunk OpenStack distribution featuring one-click deployment with Fuel* solved important parts of the deployment puzzle for Intel and shortened the project timeline. Developed by Mirantis, Fuel is an open source, template-driven deployment engine. Fuel discovers hardware resources and rapidly and automatically creates robust OpenStack deployments based on tested reference architectures, drawn from real-world use cases. IBM SoftLayer Founded in 005 and acquired by IBM in 013, SoftLayer provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. Products and services include bare metal and virtual servers, networking, turnkey big data solutions, and private cloud solutions. SoftLayer s Network-Within-a-Network topology provides true out-of-band access, enabling enterprises to deploy infrastructure off-premises but completely within the enterprise s security profile. Other aspects of SoftLayer include an easy-to-use customer portal and robust API for full remote access of all product and service management options. Proof of Concept Running enterprise applications on a hybrid cloud presents several challenges. An enterprise wants assurance that workloads are running on trusted infrastructure, isolated from other cloud subscribers. It also wants to know whether the required compute cycles are guaranteed and whether the service and the workload portability are reliable (see Figure 1). To demonstrate that a hybrid cloud can address many of these challenges using today s technology, Intel, Mirantis, and IBM SoftLayer designed a series of tests to validate that secure workloads were deployed only on virtual machines (VMs) located on physical hosts where their trust was validated through Measured Launch Environment (MLE) and attestation. Throughout Intel s cloud initiatives, we have learned that agility pays off. Go ahead and build it is a good plan as long as rapid iteration does not compromise the principles of stability, availability, and security. Although the team did not expect to build the perfect solution, the proof of concept demonstrated the viability of building a secure OpenStack hybrid cloud using Private Enterprise Challenges: Trust Performance Reliability Portability heterogeneous hardware managed through a single management platform. Intel Trusted Execution Technology (Intel TXT) 1 enhanced infrastructure integrity and security in both the public and private components of the cloud: Public cloud component. The externally hosted cloud component was hosted on IBM SoftLayer, using server platforms with Trusted Platform Modules (TMPs) and the appropriate BIOS to utilize Intel TXT. The TPM, Intel TXT, and attestation created an MLE, within which externally hosted VM workloads could be securely executed. Private cloud component. The internally hosted cloud component used servers enabled with Intel TXT that were similarly measured, providing the attestation server with the ability to ensure a comparable trusted configuration. To facilitate private management communication between Intel and SoftLayer, a virtual private network (VPN) was established between the internal and external sites. A single Horizon dashboard and attestation service was hosted on the internal OpenStack cluster and was enabled to manage both locations. Public Figure 1. Trust, performance, reliability, and portability are major challenges when running enterprise workloads in a hybrid cloud.

Methodology We followed these steps to build our proof-of-concept hybrid cloud: 1. Deploy OpenStack on private and public cloud infrastructures. In both cases we used server hardware equipped to support Intel TXT for infrastructure integrity.. Link public and private clouds across a VPN, under a single cloud control plane (OpenStack) hosted on the internal cluster. Internal hosting of the control plane prevented us from having to reconfigure the deployment if the public cloud became unavailable or was disabled to reduce capacity. 3. Deploy and configure operating system support for Intel TXT to obtain trusted compute and storage nodes on public and private clouds. 4. Configure the OpenStack management plane (Nova Scheduler) so that it is aware of the host trust measurement. 5. Install and configure the attestation service using the Open Attestation SDK for Intel TXT on the internal cluster. 6. Define OpenStack flavors of workloads that require trust validation. 7. Execute tests to validate full functionality of public and private clusters trusted by Intel TXT. For the public cloud, the team selected SoftLayer, whose hardware base uses Intel TXT. SoftLayer was willing to collaborate to make changes to cluster networking to accommodate the recommended networking plan for scalability, security, and convenience. Figure shows the SoftLayer environment, including the traffic routing from users to the SoftLayer data center and server communication within the data center. SoftLayer s network architecture consists of separate interfaces for public, private, and management networks a unique approach in the industry. This network of networks delivers a high level of scalability and control, segregating and securing traffic while streamlining management. In addition, SoftLayer s global network features more than,000 Gbps of connectivity between data centers and network points of presence (PoPs). Each location has multiple 10-Gbps transit connections as well as peering links to additional service providers and access networks. Networking Plan Requirements Four networks for administration and deployment OpenStack* management shared between internal and external clusters through a VPN Local virtual machine connectivity Public network access SoftLayer Data Center FCR PUBLIC Network PoP SLR Load Balancer (optional) Firewalls (optional) BBR DAR VPN Servers MBR Users Transit Peering BCR Public Private Management To IBM SoftLayer Network PoP Block File Object OS Update PRIVATE API Servers DNS Transcoding Images BBR backbone/border router; DAR Data center aggregation router; FCR front-end customer router; MBR Master back-end router; PoP Point of Presence; SLR SoftLayer router Figure. In the IBM SoftLayer environment, network traffic routes from users to the SoftLayer data center, which features a network of networks. Public, private, and management traffic is segregated and secured. 3

Intel Trusted Execution Technology Intel Trusted Execution Technology (Intel TXT) is an extension to the Intel Xeon processor and is designed to harden platforms against attacks to the hypervisor and BIOS, malicious rootkit installations, and other firmware and software attacks. Intel TXT establishes a root of trust, a hardware-based security foundation that is used to verify the integrity of other system components, such as the hypervisor. Intel TXT helps protect virtualized server environments through isolation and attestation. As shown below, at startup, Intel TXT measures the hash value of the hypervisor and compares it with a known good value. If the measurements do not match, indicating that the hypervisor may have been compromised, Intel TXT alerts IT to the situation. IT staff can then define policies to respond to these alerts, such as blocking the launch. This enables the cloud service provider or the private cloud to establish pools of compute resources with proven integrity of server infrastructure on which tenant virtual machines run. Deployment The team first deployed the Mirantis OpenStack distribution on the private cloud, using the open source Fuel* deployment tool for OpenStack (see the Meet the Team sidebar for more information on Fuel). Fuel automated the deployment and validated the initial internal cluster. Next, the team set up the public cloud cluster using the same distribution and release process that was used for the private cloud, working with SoftLayer to configure the remotely hosted equipment. Enabling this process required SoftLayer to create a network that allowed preboot execution environment (PXE) network communication. Post-deployment, Mirantis configured system-wide networking to use GRE (generic routing encapsulation) tunnels in place of the more common VLANs. Using GRE tunnels enabled both clusters to grow more gracefully, accommodating more tenants or VMs. Once installed and configured, the two clouds appeared as regions in the Horizon dashboard (located on the private cluster), so that they could be uniformly administered from the same management platform. We assumed that the public cloud implementation provided cost-effective (lower servicelevel agreement) burst capacity that could be relinquished, or even absorb failure, without affecting the usability of the private cluster. Whole-Stack Security For Multitenant s The team used Intel TXT as a resourceefficient way to make a heterogeneous, multitenant cloud more secure. A critical complement to Intel TXT is an attestation server, which during the boot process anchors and revalidates the trusted state of the BIOS, host operating system, and hypervisor against a predetermined known-good configuration. This procedure lets automated network facilities and human operators know when the trust state of an underlying server infrastructure has changed (perhaps because of a tenant workload s rogue behavior). Once notified, the affected nodes are isolated and, if possible, restarted in an attempt to reestablish trust. Meanwhile, Intel TXT provides information to prevent the deployment of sensitive workloads on untrusted hosts through integration with the OpenStack Nova Scheduler service. This service determines the placement of VMs based on a set of criteria, called filters, combined with weighting factors (see Figure 3). 3 No Match WITH Intel TXT 1 System powers on and Intel TXT verifies system BIOS/firmware Match Hosts sorted by number HOST Available Hosts after filtering HOST Host Priority after filtering and weighting factors applied IT staff blocks or allows launch, depending on whether a match exists APPS APPS OS OS HOST 4 HOST 4 Figure 3. The OpenStack* Nova Scheduler service uses a set of criteria, called filters, combined with weighting factors to help place virtual machines on the appropriate host. 4

The team configured Intel TXT to provide two trusted compute pools: one in the private cluster, the other in the public cluster. The Nova-compute service determined through the use of filters whether an available host had a trust measurement and that the attestation server had matched that trust measurement to a preestablished good MLE. The system allowed deployment of sensitive workloads only on trusted hosts and notified administrators about changes that might compromise trust or make it indeterminate. The virtualization stack uses Intel Virtualization Technology (Intel VT) 4 for hardware-supported virtualization and involves the following primary software applications: Kernel-based Virtual Machine (KVM). A hypervisor that allows an application to take advantage of Intel VT. QEMU (Quick EMUlator). A generic and open source machine emulator and virtualizer. QEMU can make use of KVM when running a target architecture that is the same as the host architecture. Libvirt. A virtualization API that interacts with the virtualization capabilities of the operating system. Results The proof of concept validated several aspects of improving security in a hybrid cloud environment, including the following: Visibility into the trust level of different VMs or workloads A way to tag and differentiate which workloads required additional security The ability to use common credentials and authentication and authorization across both public and private clouds The combination of trust measurement and the security specifications on the workloads made it much simpler to determine which workloads could run and where they should not run. The entire process could be automated, with no manual intervention to place the workloads, because placement of workloads was handled in the background by the OpenStack Nova Scheduler service with the help of the trust filter. Conclusion This collaborative proof of concept is an important step on the road to fullfeatured hybrid cloud computing. It validates important aspects of Intel s vision for the future of OpenStack and cloud computing. The results highlight OpenStack capabilities in linked private and public cluster configurations and illustrate how rapid, multi-platform deployment efficiencies delivered by Mirantis OpenStack and Fuel on Intel architecture-based hardware offered by SoftLayer can shorten time-to-benefit. For more information on Mirantis, visit www.mirantis.com For more information on IBM SoftLayer, visit www.softlayer.com For more information on Intel s cloud computing initiatives, visit www.intel.com/ Solution Provided By: 1 No computer system can provide absolute security under all conditions. Intel Trusted Execution Technology (Intel TXT) requires a computer with Intel Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, visit www.intel.com/technology/security. This proof of concept used Intel s derivative of the Open Attestation SDK, code-named Mt. Wilson. 3 The Open Attestation SDK is available at www.github.com/openattestation. 4 Intel Virtualization Technology requires a computer system with an enabled Intel processor, BIOS, and virtual machine monitor (VMM). Functionality, performance or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all operating systems. Consult your PC manufacturer. For more information, visit www.intel.com/go/virtualization. THE INFORMATION PROVIDED IN THIS PAPER IS INTENDED TO BE GENERAL IN NATURE AND IS NOT SPECIFIC GUIDANCE. RECOMMENDATIONS (INCLUDING POTENTIAL COST SAVINGS) ARE BASED UPON INTEL S EXPERIENCE AND ARE ESTIMATES ONLY. INTEL DOES NOT GUARANTEE OR WARRANT OTHERS WILL OBTAIN SIMILAR RESULTS. INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS AND SERVICES. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS AND SERVICES INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. Intel, the Intel logo, Look Inside., the Look Inside. logo, and Xeon are trademarks of Intel Corporation in the U.S. and/or other countries. *Other names and brands may be claimed as the property of others. Copyright 014 Intel Corporation. All rights reserved. Printed in USA Please Recycle 0914/GSEA/KC/PDF