Data Storage Security, Cloud Computing and Virtualization What You Think You Know Can Hurt You 1
The 8 Fallacies of Distributed Computing 1. The network is reliable 2. Latency is zero 3. Bandwidth is infinite 4. The network is secure 5. Topology doesn't change 6. There is one administrator 7. Transport cost is zero 8. The network is homogeneous 2
The 8 White Lies? of Distributed Computing (circa 2010) 1. The network is reliable enough 2. Latency is almost zero 3. Bandwidth is infinite mostly enough 4. The network is secure enough 5. Topology doesn't change too much 6. There is one administrator and so are you! 7. Transport cost is almost zero 8. The network is homogeneous enough. IP everywhere! 3
The SNIA Storage Model, v2 4
The SNIA Storage Model, v2 and security Authentication Authorization Integrity Encryption Auditing Availability 5
Storage Security: We Know How to Encrypt data at rest (array and endpoint) Segregate data at Layer 2 (VSAN, VLANs, Zoning, etc.) Restrict data access via ACLs (LUN masking, SID lockdown, etc.) Authenticate peers and encrypt data transmission (FC-SP, iscsi, IPsec) Authorize access to shared file systems (NFS, CIFS) Secure (remote) backups and archives (BURA) Secure BC/DR via encryption & replication Network Information Security Storage 6
What about (Secured) Storage and Virtualization (V12n)? Ultimately, V12n storage gravitates towards SANs User data (SAN) vs. v12n data VMFS VM images ISOs The death of local In v12n, everything is distributed File systems, memory, network devices (vswitch, vnic) Solution? Segregate traffic along multiple dimensions (user, management, virtualized storage & VMM management) Key management is ever more critical (maybe harder?) 7
What s the Difference Between the Cloud and Co-location? Web hosting? Remote D/R sites (using replication?) BURA? Did we worry about storage security? Why (not)? 8
Storage, V12n and Cloud: Which Hat is IT Wearing? Question: is IT the provider ( IT provides the service?) the procurer ( IT manages the relationship with 3 rd part CSP)? the consultant? (business units go it alone) V12n is an enabling technology for Cloud computing (versus distributed computing) If cost is the cloud driver, where does security fit? Cost Security? Usability 9
Things We Maybe Don t Know How to Do So Well (still) 1. Classify our data What s sensitive, critical, toxic, secret? Should IT per se be expected to know about it? 2. Keep track of our data 1. There is no defined perimeter. What s yours? 2. Tiering within storage. It s 11pm. Do you know where your data is? (are?) 3. Provide location transparency 1. Is Starbucks part of your corporate LAN? 2. Foreign borders still matter 3. Service levels matter 10
Things We Know We Can t Do (now?) 1. Provide both consistency (data integrity) and availability in the Cloud (Brewer s Conjecture) 2. Guarantee 100% availability of resources nor access times to those resources (see #1) 3. Guarantee data provenance 4. Achieve certain kinds of compliance (e.g. PCI level 1) 5. [Your thoughts here ] 11
But We ve Got To Start Somewhere We know enough at the network layer We can secure communication links, authenticate devices, etc. We know enough at the storage layer, but We can encrypt disks, SAN links, file systems, WAN links, etc. Tiering mechanisms adds randomness to storage location (sub-lun FAST) VMotion adds randomness to services We know enough at the system layer to be dangerous Securing PHI, PII, corporate secrets, etc. with fluid perimeter Where do all the security pieces go? If it s in the Cloud, we give up availability or consistency Giving up possession without losing confidentiality If we can t explain it to the auditors, it won t fly 12
A Plea for a Holistic Approach High High Technical Technical Roles Technical Roles Business Roles Business Technical Roles Business Roles Low The distinctions between security, privacy and compliance are becoming so blurred as to ultimately be meaningless. Like it or not, it all must be dealt with holistically, at the same time, and with expertise from multiple fronts. Low 13
How can EMC Help? EMC Consulting Services: Virtual Data Center EMC Consulting Services: Private Cloud Strategy EMC Information Security Services Training: EMC Data Storage Security Workshop 14
Threat Landscape CSA - Top Threats to Cloud Computing V1.0 1. Abuse and Nefarious Use of Cloud Computing 2. Insecure Application Programming Interfaces 3. Malicious Insiders 4. Shared Technology Vulnerabilities 5. Data Loss/Leakage 6. Account, Service & Traffic Hijacking 7. Unknown Risk Profile ENISA. Cloud Computing Top Security Risks. Loss of governance Lock-in Isolation failure (VMM) Compliance Risks Management Interface Compromise Data Protection Unsecure or incomplete data deletion Malicious Insider 16