Cloud Security. Securing what you can t touch. Presentation to Malaysia Government Cloud Computing Forum 2012-04-05 HUAWEI TECHNOLOGIES CO., LTD.



Similar documents
Securing Virtual Applications and Servers

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

雲 端 發 展 與 安 全 趨 勢. 陳 建 宏 Jovi Chen 技 術 顧 問 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone

Secure Cloud-Ready Data Centers Juniper Networks

Mitigating Information Security Risks of Virtualization Technologies

Cloud and VM Based Security

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Security Issues in Cloud Computing

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Securing the private cloud

Securing Virtualization with Check Point and Consolidation with Virtualized Security

74% 96 Action Items. Compliance

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

PICO Compliance Audit - A Quick Guide to Virtualization

Huawei Network Edge Security Solution

Security in the Software Defined Data Center

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Cloud Security:Threats & Mitgations

How To Protect Your Cloud Computing Resources From Attack

Data Storage Security, Cloud Computing and Virtualization

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Securing the Virtualized Data Center With Next-Generation Firewalls

United Security Technology White Paper

Cloud Security Framework (CSF): Gap Analysis & Roadmap

Jort Kollerie SonicWALL

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Security Virtual Infrastructure - Cloud

How Network Virtualization can improve your Data Center Security

Public Cloud Security: Surviving in a Hostile Multitenant Environment

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

VMware vcloud Air Security TECHNICAL WHITE PAPER

Deploying Firewalls Throughout Your Organization

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Security Controls for the Autodesk 360 Managed Services

Achieving PCI-Compliance through Cyberoam

Introduction to Cyber Security / Information Security

Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Netzwerkvirtualisierung? Aber mit Sicherheit!

CSA Virtualisation Working Group Best Practices for Mitigating Risks in Virtualized Environments

Proactively Secure Your Cloud Computing Platform

Virtualization, SDN and NFV

Cloud Security. DLT Solutions LLC June #DLTCloud

Cyber Security for NERC CIP Version 5 Compliance

Cloud Security Framework (CSF): Gap Analysis & Roadmap

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

PCI Requirements Coverage Summary Table

Cloud Security. Are you on the train or the tracks? ISSA CISO Executive Forum April 18, Brian Grayek CISSP, CCSK, ITILv3

Huawei One Net Campus Network Solution

Achieving PCI Compliance Using F5 Products

AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II

Lecture 02b Cloud Computing II

Cloud Design and Deployment on Intel Xeon Processor-based Platforms

Trend Micro Deep Security

Security from a customer s perspective. Halogen s approach to security

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Security Solution Architecture for VDI

Security & Cloud Services IAN KAYNE

JUNIPER. One network for all demands MICHAEL FRITZ CEE PARTNER MANAGER. 1 Copyright 2010 Juniper Networks, Inc.

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

Private Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Data Protection: From PKI to Virtualization & Cloud

Overcoming Security Challenges to Virtualize Internet-facing Applications

SOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT

Cloud Security Overview

Solutions as a Service N.Konstantinidis Technical Director - MNG

Securing the Physical, Virtual, Cloud Continuum

The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:

THE BLUENOSE SECURITY FRAMEWORK

Remote Voting Conference

Cloud Computing Governance & Security. Security Risks in the Cloud

Intel IT Cloud 2013 and Beyond. Name Title Month, Day 2013

SERENA SOFTWARE Serena Service Manager Security

GoodData Corporation Security White Paper

How To Protect Your Cloud From Attack

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

Secure networks are crucial for IT systems and their

Citrix XenServer 7 Feature Matrix

Log Audit Ensuring Behavior Compliance Secoway elog System

Proven LANDesk Solutions

Application-Centric WLAN. Rob Mellencamp

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

Eudemon8000 High-End Security Gateway HUAWEI TECHNOLOGIES CO., LTD.

VMware NSX A Perspective for Service Providers part 2

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

The Protection Mission a constant endeavor

Firewall Environments. Name

13 Ways Through A Firewall

Modular Network Security. Tyler Carter, McAfee Network Security

Transcription:

2012-04-05 Cloud Security Securing what you can t touch www.huawei.com www.huawei.com Presentation to Malaysia Government Cloud Computing Forum HUAWEI TECHNOLOGIES CO., LTD.

Why worry about cloud security? HUAWEI TECHNOLOGIES CO., LTD. Huawei proprietary. No copying without permission. Page 2

Yesterday, security was easy LAN HUAWEI TECHNOLOGIES CO., LTD. Huawei proprietary. No copying without permission. Page 3

Today, security is more complicated Internet LAN HUAWEI TECHNOLOGIES CO., LTD. Huawei proprietary. No copying without permission. Page 4

Cloud brings new security challenges Virtualization FOR Security Blurring perimeter Geo-Fencing Unmanaged Endpoints Security of Virtualization Geo dispersion Data location Local Regulations Multi-Tenancy Trend Challenges Source: Huawei Forensics Virtualization OF Security Inter-VM attacks Isolation Compliance Virtual Security Appliances Dormant VMs Introspection APIs Consolidated Workloads Loss of control Compliance Data-Centric Security Forensics Data Privacy & Integrity VIRTUALIZED DATACENTER PUBLIC CLOUD HUAWEI TECHNOLOGIES CO., LTD. Huawei proprietary. No copying without permission. Page 5

Security Challenge: Find the Gaps HUAWEI TECHNOLOGIES CO., LTD. Huawei proprietary. No copying without permission. Page 6 Source: Cloud Security Alliance

Top Threats to Cloud Computing Abuse and Nefarious Use of Cloud Computing Insecure Application Programming Interfaces Malicious Insiders Shared Technology Vulnerabilities Data Loss/Leakage Account, Service & Traffic Hijacking Unknown Risk Profile HUAWEI TECHNOLOGIES CO., LTD. Huawei proprietary. No copying without permission. Page 7 Copyright 2010 Cloud Security Alliance

Understanding risk is difficult HUAWEI TECHNOLOGIES CO., LTD. Huawei proprietary. No copying without permission. Page 8

Security: Sorting out the risks Regulation Compliancy OAM Security Meet government/industry requirements Protection against for administration actions Data Security Network Security Virtualization Security Basic platform Security Physical Security Securing critical information storage Establishing trusted network connections Isolating virtualization problems Protecting hardware and network Ensuring the security of the data center against intrusion HUAWEI TECHNOLOGIES CO., LTD. Huawei proprietary. No copying without permission. Page 9

Huawei Layered Approach Physical Security Infrastructure Network Management Virtualization Application Regulatory Application Security HUAWEI TECHNOLOGIES CO., LTD. Huawei proprietary. No copying without permission. Page 10

First: Create a security plan Find an experienced partner Define requirements Document attack vectors Plan defense-in-depth Test on paper Implement 3 rd Party black box test HUAWEI TECHNOLOGIES CO., LTD. Huawei proprietary. No copying without permission. Page 11

Data Center Security Protect the Jewels Secure location Diverse, protected utilities Robust building construction Site entry control Building entry control Data center entry control Biometrics Man trap 2-Factor authentication Source: CSO Online HUAWEI TECHNOLOGIES CO., LTD. Huawei proprietary. No copying without permission. Page 12

Cloud Environment Security Network Security Security Domain Division and Network Isolation.(vLAN, vfirewall ) Border Protection.(anti-DDOS,IDS/IPS ) Transmission Security.(SSL/VPN ) Data Security Isolation of User Data Data Access Control Information Protection Computing Storage LB L2 Switch L3 Switch FW Internet storage Storage Server IPSec/SSL IDS/IPS Edge Router Anti-DDoS Encode Decode Encode Token Token management Virtualization Security VM isolation. Hypervisor security. VM protection.(antispoofing ) App/OS App/OS App/OS vstorage vstorage vlan APP APP OS OS User Security Identify and Access Control. Priority Management. Operation Log. OS/DB security enhancement/anti-virus App/OS vswitch HUAWEI TECHNOLOGIES CO., LTD. Huawei proprietary. No copying without permission. Page 13

Application security: Must be Built in Data separation dedicated databases for applications User authentication two-factor identification Role-based access limit user and admin capabilities Exploit protection ensure compliance with Open Web Application Security Project (OWASP) Top 10 Application patching automated and monitored Data encryption by the application with secure control of user keys Application Security HUAWEI TECHNOLOGIES CO., LTD. Huawei proprietary. No copying without permission. Page 14

Huawei SingleCLOUD Security Perimeter Eudemon firewalls, IDS/IPS, Anti-span, Anti-virus, Security Zones Cloud Software Network VM Protection: vfirewall, vids/ips, inter-vm protection, security zones OS Protection: pre-hardened, central patching Storage Protection: VM association, clearing, encryption Admin Protection: role-based security, multi-factor ID, logging HUAWEI TECHNOLOGIES CO., LTD. Huawei proprietary. No copying without permission. Page 15 VLANs, SSL, VPC

Huawei Security Products Security Service... Software Security Management Secospace Suite Terminal Security Asset Management Access Control Software Distribution Patch Management Log Audit Authentication Service Employee Behavior Management Firewall/VPN... Intrusion Detection System... USG 50 SVN 3000 SSL VPN NIP100 Eudemon 100E/200/200S USG 3030/ 3040 NIP200 Eudemon 300/500/1000 Eudemon 8080/8040 NIP1000 Service Inspection... Gateway SIG 1000 SIG 9280 HUAWEI TECHNOLOGIES CO., LTD. Huawei proprietary. No copying without permission. Page 16

Security Fabric in Huawei R&D Cloud Top-secret Zone R&D Zone Non-R&D Zone Cloud Data Center AD SPES DNS AD SPES DNS Internet / Intranet Shanghai R&D Shenzhen R&D T6000 T6000 Specification: 2 Blades / 2U 2 CPUs / Blade 18 DIMMs / Blade 4-6 HDDs / Blade 2*10GE / Blade VM Specification: Vcpu: 2GHz RAM: 2G vstorage: 160G HUAWEI TECHNOLOGIES CO., LTD. Huawei proprietary. No copying without permission. Page 17

Summary IT security is complicated Cloud increases complexity Solution is a systems problem Good partners are key to successful security HUAWEI TECHNOLOGIES CO., LTD. Huawei proprietary. No copying without permission. Page 18

Thank you www.huawei.com Copyright 2011 Huawei Technologies Co., Ltd. All Rights Reserved. The information in this document may contain predictive statements including, without limitation, statements regarding the future financial and operating results, future product portfolio, new technology, etc. There are a number of factors that could cause actual results and developments to differ materially from those expressed or implied in the predictive statements. Therefore, such information is provided for reference purpose only and constitutes neither an offer nor an acceptance. Huawei may change the information at any time without notice.