Database Security in Virtualization and Cloud Computing Environments



Similar documents
Database Security, Virtualization and Cloud Computing

GOOD PRACTICE GUIDE 13 (GPG13)

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

Encryption Made Simple

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

Not All Database Security Solutions Are Created Equal

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Total Protection for Compliance: Unified IT Policy Auditing

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

McAfee Server Security

How To Buy Nitro Security

McAfee Security Architectures for the Public Sector

Securing the Intelligent Network

Building A Secure Microsoft Exchange Continuity Appliance

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS

Meeting the Challenges of Virtualization Security

IBM Security Intrusion Prevention Solutions

Technical Note. ForeScout CounterACT: Virtual Firewall

WildFire. Preparing for Modern Network Attacks

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

McAfee Next Generation Firewall

Solutions Brochure. Security that. Security Connected for Financial Services

Technology Blueprint. Protect Your VoIP/SIP Servers. Insulating your voice network and its servers from attacks and disruption

Encryption Made Simple

5 Best Practices to Protect Your Virtual Environment

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Achieve Deeper Network Security

Network Intrusion Prevention Systems Justification and ROI

Achieve Deeper Network Security and Application Control

How To Create An Intelligent Infrastructure Solution

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

In-Band Security Solution // Solutions Overview

Data Loss Prevention Best Practices for Healthcare

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere

White Paper. Scalable Network Security for the Virtualized Data Center

Beyond the Hype: Advanced Persistent Threats

Overcoming Security Challenges to Virtualize Internet-facing Applications

Moving Beyond Proxies

White Paper. McAfee Multi-Link. Always-on connectivity with significant savings

A Look at the New Converged Data Center

Improving the Microsoft enterprise. network for public cloud connectivity

McAfee Total Protection Reduce the Complexity of Managing Security

Introduction of Intrusion Detection Systems

Bypassing CAPTCHAs by Impersonating CAPTCHA Providers

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

Power, Patch, and Endpoint Managers Expand McAfee epo Platform Capabilities While Cutting Endpoint Costs

White Paper. Network Management and Operational Efficiency

V1.4. Spambrella Continuity SaaS. August 2

SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES

Out-of-Band Management: the Integrated Approach to Remote IT Infrastructure Management

VMware vcloud Networking and Security Overview

What Do You Mean My Cloud Data Isn t Secure?

Netzwerkvirtualisierung? Aber mit Sicherheit!

Web Request Routing. Technical Brief. What s the best option for your web security deployment?

McAfee epolicy Orchestrator

Securing Virtual Applications and Servers

The Advantages of a Firewall Over an Interafer

Cisco Cyber Threat Defense - Visibility and Network Prevention

Analyzing HTTP/HTTPS Traffic Logs

Cloud Computing for SCADA

WHITE PAPER. AirGap. The Technology That Makes Isla a Powerful Web Malware Isolation System

White Paper. Architecting the security of the next-generation data center. why security needs to be a key component early in the design phase

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform

White Paper. Emergency Incident Response: 10 Common Mistakes of Incident Responders

WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Segmentation Firewall (ISFW)

Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Segmentation Firewall (ISFW)

The Global Attacker Security Intelligence Service Explained

Technology Blueprint. Protect Your . Get strong security despite increasing volumes, threats, and green requirements

The Role of the Operating System in Cloud Environments

Next-Generation Firewalls: Critical to SMB Network Security

Network Immunity Solution. Technical White paper. ProCurve Networking

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

The Benefits of an Integrated Approach to Security in the Cloud

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

Safeguarding the cloud with IBM Dynamic Cloud Security

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1

Virtualizing the SAN with Software Defined Storage Networks

Brocade Solution for EMC VSPEX Server Virtualization

Zone Labs Integrity Smarter Enterprise Security

Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT

Network Instruments white paper

FROM PRODUCT TO PLATFORM

Stopping secure Web traffic from bypassing your content filter. BLACK BOX

Cloud and Data Center Security

Transcription:

White Paper Database Security in Virtualization and Cloud Computing Environments Three key technology challenges in protecting sensitive data

Table of Contents Securing Information in Virtualization and Cloud Computing Architectures Business as Usual? 3 IT Security Trends The Era of Appliance-Based Solutions 3 Database Activity Monitoring and Attack Prevention A Case in Point 4 Challenge 1: Visibility into Virtual Machine-to-Virtual Machine Transactions 4 Challenge 2: The Dynamic Systems Environment 5 Challenge 3: Performance Over Wide Area Networks 5 Distributed Host-Based Software Solutions Is the Only Efficient Approach 6 Ready for Virtualization and the Cloud Today 7 2

Securing Information in Virtualization and Cloud Computing Architectures Business as Usual? Since virtualization is now in use by nearly all enterprises and future plans to move some applications to cloud computing are also in the making it s time to ask whether we need to update our IT security methodologies or continue to rely on the same tools we have relied on in the past. Many would agree that these computing models require an entirely different approach. Sometimes, it seems that network security models lag behind the technology changes occurring in the systems and software environment they are intended to protect. For example, it took firewall vendors a long time to realize that applications are no longer easily protected by simply opening and blocking ports. As enterprises began deploying VoIP and other complex protocols, they typically had to wait years before their firewall vendor allowed them to do so securely by analyzing the session initiation protocol (SIP) and other protocols. With the recent shift in computing architecture from dedicated servers in the data center to virtualization and cloud computing, we need to rethink our IT security methodologies. And, while we focus on database security here, many of our recommendations are applicable to securing most enterprise applications. IT Security Trends The Era of Appliance-Based Solutions In the last few years, many IT security challenges centered on two major technological developments: high-performance networks and complex applications. In a short time, we moved from 10Base-T networks with SMTP, FTP, HTTP, and a few other relatively simple protocols to multigigabit networks with SIP, RPC, SOAP, various tunneling protocols, and more. Some applications (in particular email and web applications) were subject to many types of security threats and the result was that the same applications had to be checked multiple times by multiple products. To meet the challenges of high-performance complex applications with relatively simple implementations, security companies introduced a range of network appliances machines that could be positioned somewhere in the network and inspect the traffic for either protocol violations, malicious code, viruses, or spam. Even traditional software-oriented companies understood that often the easiest way to cope with complex, high-performance networks was to deploy network-based appliances. Enterprises typically found themselves implementing multiple types of appliances, each aimed at mitigating a specific threat vector and often multiple quantities of each type to handle requirements for scalability, performance, or network topology. This approach resulted in a security environment where customers were concerned about the sheer number of appliances they needed to maintain and manage in order to inspect their traffic for all threats. In this era of security appliances, solutions that met security threats using host-based software models were by and large neglected. Network-based intrusion detection systems (IDS) and intrusion prevention systems (IPS) won the battle against host-based solutions, and most enterprises did not add much to the simple endpoint security provided by the operating system (one noteworthy exception is thirdparty antivirus software that most enterprises continue to deploy on PCs even though they may have appliances at the perimeter providing protection). The concept of simply placing an appliance (or even a few appliances for that matter) in a rack and attaching it with a wire or two to a switch is very attractive, especially when resources available for security are limited. And for the first generation of systems architectures, the assumptions surrounding security persuaded enterprises that network appliances were an acceptable solution. However, for many applications today, especially those implemented in a distributed model, capturing application transactions on the network only identifies the majority of external threats. Driven by an increasing number of breaches by privileged insiders and greater sophistication of external hackers, regulations are now requiring broader coverage of these threat vectors. Enterprises concerned with insider transactions (for example, administrators working directly on servers or users abusing authorized access to applications) have been leading the adoption of host-based solutions, either in conjunction with network appliances or as their primary approach. 3

In addition to the increasing concerns about insider threats, now that more and more applications are collapsing into virtual machines (and, in the case of cloud computing, outside the enterprise perimeter), it undermines the past assumptions that led to appliance-based security deployments. Even more challenging from a security perspective, these new databases may dynamically appear in new locations over the course of time, based on an organization s changing capacity requirements. These new architectures beg the questions of whether the network appliance approach will still be relevant when many transactions will not make it to the network and whether a network monitoring approach is efficient when the application network moves from LAN to WAN. Database Activity Monitoring and Attack Prevention A Case in Point Perhaps owing to the fact that even networks apparently secured at the perimeter were still suffering breaches of sensitive data, in recent years, enterprises started to look at providing another layer of protection on their internal infrastructure. Whether to provide a safety net in the case of a perimeter breach, or to protect from malicious insiders, something more was needed. Previously, databases, in most cases, were not monitored or protected. For a number of reasons, including the prevalence of database breaches and stricter regulations regarding prevention and notification, customers are now investing a lot more time and effort on securing their databases. It is not surprising that when IT security professionals were first faced with the challenge of protecting their databases, they looked for the same solution they used for protecting their other assets: a network appliance. And indeed, several vendors quickly brought out appliances that inspected database network protocols and allowed auditing and protection of the database when accessed via the network. Enterprises were at first willing to forego the lack of visibility into database transactions occurring locally and from within the database servers. Later, because of the potential for damage that could be done on local machines (via a secure shell [SSH] connection), it became clear to enterprises that to fully understand the threats to their databases, monitoring must also cover local and intra-database attacks. At this point, appliance vendors were forced to add local agents to their solutions, making many of today s network-based solutions hybrid network appliance and host-based solutions. In most cases, these agents send local traffic back to the appliance for analysis, where each transaction that was originally done on the local host is measured against the appliance s policy. The hybrid approach is not ideal (for example, local access in breach of the security policy cannot be efficiently blocked because by the time it reaches the appliance, it has already been processed by the database). But as long as most applications run on the network in plain sight of the appliance, some enterprises were willing to accept the risks. These hybrid solutions lose many of the benefits of a pure network-based solution by introducing significantly more complex implementation requirements such as kernel-level installation of the agent, for example, requiring reboots to the database server. And, as noted above, they still miss the sophisticated attacks generated from within the database itself those based on stored procedures, triggers, and views. However, more importantly, they also fail to address several key technical challenges when implemented in either a virtualized environment or in the cloud. The next sections will introduce these challenges and demonstrate how an architecture designed for distributed monitoring at the database memory level instead of network monitoring can best address them. Challenge 1: Visibility into Virtual Machine-to-Virtual Machine Transactions As organizations deploy applications and the databases that support them on virtual servers and in the cloud, a new complication frequently arises. In the past, an application was typically provisioned on one or more servers, and the databases housing the application were installed on separate networked servers. One of the benefits of virtualization (in a private data center or in the cloud) is the ability to share resources, resulting in environments where both the application and the databases are migrating to virtual machines, in many cases running on the same physical servers. In the diagram below, note that communication from the customer relationship management (CRM) application to the database storing customer data occurs entirely within the same physical server. In such a case, there is little to no network traffic, as the transactions between the application and the database occur from virtual machine to virtual machine within the server. Network monitoring appliances will not see these transactions. 4

-to- Traffic Communications from to never crosses the network CRM 1 CRM 1 CRM 1 DB 1 DB 2 Hypervisor Physical Server Figure 1. Resource sharing in a virtual machine environment means that there is virtually no network traffic. What can be done in such a case? Clearly, the only solution is to bring the security inspection closer to its target. One solution is dubbed the virtual appliance. In this scenario, a virtual machine that runs the software formerly run by a dedicated appliance is installed on virtual servers and the servers are re-architected to send traffic through the virtual machine. This approach has two severe drawbacks: performance and architecture complications. The performance problem of virtual appliances is as follows: dedicated appliances have the advantage of being able to cope with the enormous volumes of back-office traffic (using dedicated network interface controllers [NICs], dedicated hardware, and optimization of the software to fully utilize the dedicated hardware). When the software is running on a virtual machine, all the advantages are lost, and the result more often than not is either a bottleneck that slows down databases when positioned inline (all database transactions pass through the virtual appliance) or missing a large percentage of the transactions when positioned outside the transaction path. Challenge 2: The Dynamic Systems Environment Architecture complications arise from the fact that instead of creating a dynamic environment on virtual servers, enterprises need to plan ways in which all access to databases will pass through the virtual appliance. This is a complication of a problem that exists in standard (that is, not virtual) networks as well. In most enterprises, networks are not architected in a way where transactions to all databases can be monitored in a single location, so enterprises face three difficult choices: re-architect their network, use multiple security appliances, or protect only some of their databases. If virtual security appliances are far from an ideal solution for enterprise networks that run on virtual machines, they are even less relevant in cloud-based applications where networks are dynamic, hosts come and go, and adding virtual appliances to the mix is virtually impossible. The only solution that works in all environments, including the cloud environment, is a solution that comes up (and goes down) with every database a solution that is based on sensors that run side by side with the database on every host machine that runs one database or more. Challenge 3: Performance Over Wide Area Networks Especially in cloud computing deployments, but also in geographically distributed private clouds based on virtualization, network bandwidth and, more importantly, network latency will render off-host processing too inefficient. The basic concept of cloud computing prevents you from being able to colocate a server close to your databases you simply won t know where they are. Therefore, the time and resources spent sending every transaction to a necessarily remote server for analysis will bog down network performance and prevent timely interruption of malicious activity. 5

To be efficient, the agent or sensor must be capable of implementing the necessary protection and alerting locally. This will ensure that the network doesn t become the gating factor for application or performance. For cloud computing (or, in fact, for remote management of distributed data centers), you ll also want to ensure that the system is designed to support wide area network (WAN) topologies. To limit exposure of sensitive data, it should encrypt all traffic between the management console and sensors, and for optimum performance compression techniques should be implemented so that policy updates and alerts are efficiently transmitted. Any architecture that requires off-host processing of database transactions to determine policy violations is unlikely to be responsive enough to prevent attacks. Distributed Host-Based Software Solutions Is the Only Efficient Approach The only way to secure databases on virtual machines or cloud environments, without sacrificing the huge benefits of these new architectures, is to use software-based solutions that share the elasticity of virtual machines and cloud computing. The challenge is creating host-based solutions that do not suffer the same drawbacks that made old host-based solutions irrelevant. Namely, intrusive implementations, performance issues, and the need to quickly adapt to new and changing environments (new operating system versions, new application versions, and more). Next-generation host-based solutions must not be based on kernel-level implementations and other risky/intrusive approaches, as this presents obstacles for deployment and management (machine restarts, sensitivity to environment changes, and others). Instead, the solutions have to be lightweight, use software that can be easily added to the virtual machine where needed, and be installed in parallel to the first database that is installed on a machine. This means that adding a layer of security does not require changes in architecture and does not rely on the virtualization technology in use. Moreover, as virtual machines running your database are provisioned (and deprovisioned) to balance capacity needs, no manual intervention is required at the management console. Dynamic Provisioning in the Cloud Firewall Enterprise S Sensor S Sensor Internet Cloud Computing Infrastructure Database Monitoring Server S Sensor Administrative Console Figure 2. The distributed sensor-based security architecture of McAfee Database Activity Monitoring is an ideal fit for cloud-based deployments where resources are not physically fixed and can be deprovisioned at a moment s notice. 6

The McAfee solution is designed to meet these database security needs by using a software-based sensor, a lightweight add-on that gets installed on the same virtual machine where the database or databases are installed. The sensor adds a process that monitors the database transactions as they occur in the memory. The memory-based sensors cover all the security requirements without the drawbacks, running with insignificant performance impact and no changes in the way the network is architected or how the databases function. In addition, by monitoring memory, the sensor protects against all attacks. Whether originating on the network, from a local privileged user, or even from inside the database itself via a sophisticated intra-database attack, in the end, the McAfee local sensor will see the attempted exploit and take action. While the sensors are lightweight, they have all the logic required to make split-second decisions on the legitimacy of databases transactions and can monitor, prevent attacks, and audit database transactions in very much the same way they protect databases on regular servers. A sophisticated central management server controls and receives information from all sensors. The only information that a new sensor needs is the location of the central management server. Whether the database is on a virtual machine, directly on a physical server, or somewhere in the cloud, as long as a sensor is installed on the same machine and the sensor has logical access to the central management server, enterprises can enjoy a monitoring and attack prevention system that is not influenced by the underlying network or servers. Ready for Virtualization and the Cloud Today Many organizations have found themselves drawn to virtualization and cloud computing architectures for the many benefits, only to find that the complexity of ensuring adequate data security was simply too great an obstacle. But the adoption of these technologies by enterprises is inevitable. By deploying memory-based solutions for distributed database monitoring, enterprises will find that it is not only possible to protect sensitive information in these emerging computing models, but that the same architecture also provides both more effective and more efficient data security across their dedicated database servers as well. About McAfee McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), is the world s largest dedicated security technology company. McAfee delivers proactive and proven solutions and services that help secure systems, networks, and mobile devices around the world, allowing users to safely connect to the Internet, browse, and shop the web more securely. Backed by its unrivaled global threat intelligence, McAfee creates innovative products that empower home users, businesses, the public sector, and service providers by enabling them to prove compliance with regulations, protect data, prevent disruptions, identify vulnerabilities, and continuously monitor and improve their security. McAfee is relentlessly focused on constantly finding new ways to keep our customers safe. http://www.mcafee.com 7

2821 Mission College Boulevard Santa Clara, CA 95054 888 847 8766 www.mcafee.com McAfee and the McAfee logo are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other marks and brands may be claimed as the property of others. The product plans, specifications and descriptions herein are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied. Copyright 2012 McAfee, Inc. 49300wp_virtualization-cloud_0812_fnl_ETMG