Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud



Similar documents
Mitigating Information Security Risks of Virtualization Technologies

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Visions of Clouds and Cloud Security. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

The growing importance of a secure Cloud environment

Security in the Software Defined Data Center

vshield Quick Start Guide

Shifting Roles for Security in the Virtualized Data Center: Who Owns What?

Business Values of Network and Security Virtualization

VMware vcloud Networking and Security Overview

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Potecting your business assets in The Cloud, with. Secure Multitency Environment from CloudHPT.

Netzwerkvirtualisierung? Aber mit Sicherheit!

How Network Virtualization can improve your Data Center Security

VMware Solution Guide for. Payment Card Industry (PCI) September v1.3

VMware vcloud Networking and Security

vshield Quick Start Guide

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

Security Issues in Cloud Computing

vshield Quick Start Guide vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint 1.0

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

VMware NSX A Perspective for Service Providers part 2

Learn how to build Enterprise Hybrid Clouds for your customers using VMware vcloud

Cloud and VM Based Security

Sichere Virtualisierung mit VMware

VMware vshield App Design Guide TECHNICAL WHITE PAPER

Securing the private cloud

Security Solution Architecture for VDI

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Journey to the Private Cloud. Key Enabling Technologies

Virtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE

Expert Reference Series of White Papers. vcloud Director 5.1 Networking Concepts

ENTERPRISE IT SECURITY ARCHITECTURE SECURITY ZONES: NETWORK SECURITY ZONE STANDARDS. Version 2.0

Lecture 02b Cloud Computing II

Virtualization Impact on Compliance and Audit

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

雲 端 發 展 與 安 全 趨 勢. 陳 建 宏 Jovi Chen 技 術 顧 問 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone

The Top 8 Questions to ask about Virtualization in a PCI Environment

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Virtualization and Cloud Computing

End to End Security do Endpoint ao Datacenter

Product Description. Product Overview

The Virtualization Practice

Secure networks are crucial for IT systems and their

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;

Software Defined Data Centers Network Virtualization & Security. Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security

Hardening and Hacking vsphere and Private Cloud Everything you need to know about vsphere Security

Securing the Physical, Virtual, Cloud Continuum

Understanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led

How To Protect A Data Center From A Hacker Attack

How To Build A Software Defined Data Center

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.

How To Extend Security Policies To Public Clouds

Intel IT Cloud 2013 and Beyond. Name Title Month, Day 2013

Building an Enterprise Hybrid Cloud with the VMware vcloud Solution

Itex VMware NSX Network Virtualization Presentation

vshield Installation and Upgrade Guide

Secure Cloud Computing

Unleash the IaaS Cloud About VMware vcloud Director and more VMUG.BE June 1 st 2012

VMware vcloud Director for Service Providers

Implementing and Troubleshooting the Cisco Cloud Infrastructure **Part of CCNP Cloud Certification Track**

JUNIPER NETWORKS CLOUD SECURITY

What Cloud computing means in real life

How To Protect Virtualized Data From Security Threats

Network Access Control in Virtual Environments. Technical Note

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

How To Protect Your Cloud From Attack

Effective End-to-End Cloud Security

OVERVIEW OF VIRTUAL FIREWALLS ON VBLOCK INFRASTRUCTURE PLATFORMS

VMUG - vcloud Air Deep Dive VMware Inc. All rights reserved.

Secure Cloud-Ready Data Centers Juniper Networks

Network Segmentation in Virtualized Environments B E S T P R A C T I C E S

RE Cloud from Richardson Eyres

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Software Defined Network (SDN)

NEC SigmaSystemCenter 3.0 highlights

VMware vsphere: Fast Track [V5.0]

RSA Security Solutions for Virtualization

Securing the Cloud. A Review of Cloud Computing, Security Implications and Best Practices W H I T E P A P E R

Cloud Security. Securing what you can t touch. Presentation to Malaysia Government Cloud Computing Forum HUAWEI TECHNOLOGIES CO., LTD.

Advancing Security with Software Defined Datacenter. Karen Law Senior Systems Consultant VMware Hong Kong Ltd

H Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments

Restricted Document. Pulsant Technical Specification

Presentation for ISACA Chapter NL. Auditing Virtual Servers. VMware: Security and Operations. Gert-Jan Timmer 3. September, 2012

Palo Alto Networks. Security Models in the Software Defined Data Center

Security & Cloud Services IAN KAYNE

VMware vsphere 5.0 Evaluation Guide

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

VMware NSX Network Virtualization Design Guide. Deploying VMware NSX with Cisco UCS and Nexus 7000

Transcription:

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist

Agenda What is the Cloud? Virtualization Basics How Virtualization and Cloud Affect Datacenter Security How to Secure our Cloud and Make it Compliant Network Security and Secure Multi-tenancy in the Cloud

What is the Cloud and What Does it Means To Security SaaS Salesforce.com, Google Apps, etc The lower down the stack the Cloud provider stops, the more security you are tactically responsible for implementing & managing yourself. PaaS Vmforce, Google AppEngine, etc IaaS Terremark, Rackspace, Savvis, etc *Graphics Courtesy of Chris Hoff and the Cloud Security Alliance

Security Considerations of Each Type of Cloud Software (SaaS) Least extensibility and greatest amount of security responsibility taken on by the cloud provider Infrastructure (IaaS) Greatest extensibility and least amount of security responsibility taken on by the cloud provider Platform (PaaS) Lies somewhere in the middle, with extensibility and security features which must be leveraged by the customer

Infrastructure as a Service Hardware Virtualization is the basis of the IaaS Model Examples include: VMware vsphere MS HyperV Citrix XenServer Redhat KVM

Virtualization Basics

Next Step is to Leverage Virtualization to Provide Pools of Shared Resources Traditional View Virtual Datacenter Exchange Operating VMware Infrastructure System PCI Operating VMware Infrastructure System VMware vsphere DNS Operating VMware Infrastructure System CRM Operating VMware Infrastructure System CPU Pool Memory Pool Storage Pool Interconnect Pool

Platform Sec.

Secure the Underlying Platform 1st Use the Principles of Information Security Hardening and Lockdown Defense in Depth Authorization, Authentication, and Accounting to enforce Separation of Duties and Least Privileges Administrative Controls For virtualization this means: Harden the Virtualization layer Setup Access Controls Secure the Guests Leverage Virtualization Specific Administrative Controls What Auditors Want to See: Network Controls Change Control and Configuration Management Access Controls & Management Vulnerability Management

Protection of Management Interfaces is Key vnic vnic vnic VMkernel Production vswitch1 Mgmt Storage vswitch2 vmnic1 2 3 4 Segment out all non-production networks Use VLAN tagging, or Use separate vswitch (see diagram) Strictly control access to management network, e.g. RDP to jump box, or VPN through firewall Prod Network Mgmt Network VMware vsphere 4 Hardening Guidelines http://www.vmware.com/resources/techresources/10109 vcenter Other ESX/ESXi hosts IP-based Storage 10

Separation of Duties Must Be Enforced More Power Super Cloud Admin Cloud Networking Admin Cloud Server Admin Cloud Storage Admin Less Power Tenant A Admin Tenant B Admin Tenant C Admin VM Admin VM Admin VM Admin VM Admin VM Admin VM Admin

Security Perspective On Customer Deployment Architectures 0 PHYSICAL AIR GAPPED PODS MIXED TRUST CLUSTERS ON-PREMISE PRIVATE CLOUD DEDICATED PRIVATE CLOUD (ebay, CSC) 1 2 3 4 5 PUBLIC MULTI-TENANT CLOUD (Terremark, EC2) 0 1 2 3 4 5 Physical deployments are still considered to be most secure and remain in all enterprises Air gapped pods are preferred by security teams for virtualized high risk assets (SOX, PCI, DMZ) Mixed trust clusters typically have the M&M security model, blocking important asset migration to them Private cloud is an extension of the mixed trust deployment, with more automation and self service Dedicated Private Cloud SLAs make it virtually the same risk level as the on-premise deployments Multi-tenant Public Cloud is just emerging, with concerns around visibility, audit, control and compliance

The Datacenter needs to be secured at different levels Perimeter Security Sprawl: hardware, FW rules, VLANs Rigid Perimeter FW rules security device (s) at the edge Performance Firewall, VPN, bottlenecks Intrusion Prevention Load balancers Cost & Complexity Keep the bad guys out At the vdc Edge Internal Security VLAN 1 VLANs VLAN or subnet based policies Interior or Web application Firewalls DLP, application identity aware policies Segmentation of applications, servers End Point Security Desktop AV agents, Host based intrusion DLP agents for privacy End Point Protection 13

Simple Definition of a Virtual Datacenter The isolated and secured share of a virtualized multitenant environment. Like a physical datacenter shares the Internet for interconnectivity, the tenants of a cloud (public or private) share the local network within the private datacenter or in the service providers network, and also like a physical datacenter, each tenant also has their own private, isolated, and secured virtual networking infrastructure. DMZ Tenant 1 Tenant 2 Tenant App1 App2 DMZ App1 App2 DMZ App1 App2 14

Securing virtual Data Centers (vdc) with legacy security solutions Internet PERIMETER SECURITY WEB ZONE INTERNAL SECURITY APPLICATION ZONE DATABASE ZONE ENDPOINT SECURITY Air Gapped Pods with dedicated physical hardware Mixed trust clusters without internal security segmentation Configuration Complexity vsphere vsphere vsphere o VLAN sprawl VIRTUALIZED DMZ WITH FIREWALLS o Firewall rules sprawl o Rigid network IP rules without resource context Private clouds (?) Legacy security solutions do not allow the realization of true virtualization and cloud benefits 15

Air Gapped Design Costly and Inefficient Internet Remote Access VPN Gateway VPN Gateway VPN Gateway L2-L3 Switch L2-L3 Switch L2-L3 Switch Aggregation Firewall Firewall Firewall Load Balancer Load Balancer Load Balancer Access Switch Switch Switch vsphere vsphere vsphere vsphere vsphere vsphere Company X Company Y Company Z 16

Multi-tenancy Physical Firewall and VLAN Internet Access- Aggregation L2-L3 Switch VLAN1000 VLAN 1001 VLAN 1002 Firewalls VLAN 1002 VLAN 1001 VLAN 1000 Legend : PG-X PG-Y PG-Z Port group Company X n/w Port group Company Y n/w Port group Company Z n/w VLAN 1000 VLAN 1001 VLAN 1002 vds/vss Port group to VM Links PG-X (vlan1000) PG-Y (vlan 1001) PG-Z (vlan 1002) Virtual to Ext. Switch Links VMware vsphere + vshield Company X Company Y Company Z 17

Multi-tenancy Virtualization Aware Internet Access- Aggregation L2-L3 Switch Infrastructure VLAN (VLAN 1000) Legend : Provider VLAN (VLAN 100) PG-X PG-Y PG-Z PG-C Port group Company X n/w Port group Company Y n/w Port group Company Z n/w External uplink Port group VLAN1000 VLAN1000 VLAN1000 Internal Company Links External Up Link vds vds to Ext. Switch Links PG-X(vlan1000) PG-C(vlan100) PG-Y(vlan1000) PG-Z(vlan1000) VMware vsphere + vshield vshield Edge VM Traffic flow not allowed Company X Company Y Company Z 18

Enforce Microsegmentation Inside the vdc Protect applications against Network Based Threats Application-Aware Full Stateful Packet Inspection FW Control on per-vm/per vnic level Web Virtual Datacenter 1 App See VM-VM traffic within the same host Security groups enforced with VM movement Database DISA & PCI Virtual Datacenter 2 CIS & PCI VMware vsphere + vcenter ESX Hardening Cluster B Cluster A 19

Offload Endpoint Based Security Functions with VM Introspection Techniques Improves performance and effectiveness of existing endpoint security solutions Offload Functions AV File Integrity Monitoring Application Whitelisting 20

Virtualized Security and Edge Services Cloud Aware Security Elastic Logical Efficient Automated Programmable Security as a Service Edge/Perimeter Protection Secure the edge of the virtual datacenter Security and Edge networking services gateway Internal Security and Compliance Micro-segmentation Discover and report regulated data in the Datacenter and Cloud Endpoint Security Efficient offload of endpoint based security into the cloud infrastructure i.e.- anti-virus and file integrity monitoring 21

Continuous and Automated Compliance Ongoing Change and Compliance Management Understand Pervasive Change Capture in-band and out-of-band changes Are you still Compliant? Remediate Exceptions Fit within current enterprise change mgmt workflow process Protect against vulnerabilities Hypervisor-based anti-virus provides superior protection Patch Management guards against known attacks Software provisioning tied to compliance Day to day vulnerability checks Remediate (RFC Optional) Compliant State Deployed from Gold Standard Compliant State Noncompliant State Planned Change Unplanned Change Mark as Exception 22

Conclusion The Cloud Had Great Benefits and like any Technology its Associated Risks These Risks Can Be Mitigated With Proper Controls The Classic Principles of Information Security Should be Applied Key Architecture Decisions must be made for Security Tools Designed for the Cloud Must Be Utilized 23 Confidential

Questions? Rob Randell, CISSP Senior Security and Compliance Specialist