THE PROCESS OF DEPLOYMENT OF CLOUD ENVIRONMENT OF AN EDUCATIONAL INSTITUTION: NETWORK SECURITY

Similar documents
Chapter 11 Cloud Application Development

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Network Security Topologies. Chapter 11

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Recommended IP Telephony Architecture

SECURING SAP NETWEAVER DEPLOYMENTS WITH SAFE-T RSACCESS

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

THE ROLE OF IDS & ADS IN NETWORK SECURITY

Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Keyword: Cloud computing, service model, deployment model, network layer security.

Achieving PCI Compliance Using F5 Products

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

74% 96 Action Items. Compliance

CONTENTS. PCI DSS Compliance Guide

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

Building Energy Security Framework

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

CS5008: Internet Computing

The Bomgar Appliance in the Network

Web App Security Audit Services

STERLING SECURE PROXY. Raj Kumar Integration Management, Inc.

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

Owner of the content within this article is Written by Marc Grote

New Systems and Services Security Guidance

Security Information & Policies

Building A Secure Microsoft Exchange Continuity Appliance

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Fundamentals of Network Security - Theory and Practice-

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

Altus UC Security Overview

Service Manager and the Heartbleed Vulnerability (CVE )

DMZ Gateways: Secret Weapons for Data Security

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Network Security Administrator

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

CTS2134 Introduction to Networking. Module Network Security

Security Technology: Firewalls and VPNs

Ranch Networks for Hosted Data Centers

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Directory and File Transfer Services. Chapter 7

IT Networking and Security

IBX Business Network Platform Information Security Controls Document Classification [Public]

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

A Practical Approach to Threat Modeling

1B1 SECURITY RESPONSIBILITY

LOGIIC Remote Access. Final Public Report. June LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

Basics of Internet Security

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

John Essner, CISO Office of Information Technology State of New Jersey

information security and its Describe what drives the need for information security.

Passing PCI Compliance How to Address the Application Security Mandates

MCSA Security + Certification Program

Mirantis OpenStack Express: Security White Paper

IBM Managed Security Services Vulnerability Scanning:

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Online Backup by Mozy. Common Questions

TOP SECRETS OF CLOUD SECURITY

DiamondStream Data Security Policy Summary

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Deploy Remote Desktop Gateway on the AWS Cloud

LBSEC.

Securing SIP Trunks APPLICATION NOTE.

Avaya TM G700 Media Gateway Security. White Paper

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Avaya G700 Media Gateway Security - Issue 1.0

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

INTRUSION DETECTION SYSTEMS and Network Security

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Implementing Microsoft Azure Infrastructure Solutions

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

MIGRATIONWIZ SECURITY OVERVIEW

PCI Compliance Considerations

Linux Network Security

Intro to Firewalls. Summary

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at

The Benefits of SSL Content Inspection ABSTRACT

Business Values of Network and Security Virtualization

Network Security and Firewall 1

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Transcription:

THE PROCESS OF DEPLOYMENT OF CLOUD ENVIRONMENT OF AN EDUCATIONAL INSTITUTION: NETWORK SECURITY Olena Grybiuk, National Pedagogical Dragomanov University Institute of Information Technologies and Learning Tools National Academy of Pedagogical Sciences, Ukraine

The process of deployment of cloud environment of an educational institution: problems... Problems that arise between physical infrastructure of information and communication technologies and cloud environment can be partly solved by using outsourcing services and services of SRM provider. While using / working with cloud services, a user can experience an emotional challenge that is connected with inability to visually scan the server which contains data. An essential problem is limited access to educational materials (data), for instance, when a chosen cloud provider fails to protect its infrastructure components. The measures to be taken: data encryption and remote backup execution (including backup encryption and network communications on another cloud service, encryption of network traffic together with web traffic).

The following is recommended: Connect to an additional cloud provider for executing automated backup procedures, which guarantees recovery of all data and their history, even with the main cloud provider being physically destroyed. Settings of the level of control on using own data in cloud environment and data processing centre. While bundling data for backup, to encrypt using strong cryptography, for example Pretty Good Privacy, which enables us to store messages (data) even in insecure environment.

Сервери додатків Балансу вальни ки наванта ження Внутрішні бази даних

Network security support: While developing cloud environment it is essential to have a possibility to mount ephemeral storage devices when virtual server is used, although in EC2 environment the failure to encrypt ephemeral storage devices poses a risk because the system zeros the storage out when your instance terminates. Encrypting filesystems with caution helps to avoid conflicts regarding requirements to the performance level of certain applications and data security. Security of using data in cloud environment is provided by mounting block storage devices and ephemeral storage devices with using encrypted filesystems.

Internet Xen Групові правила Групові правила Групові правила

The process of deployment of cloud environment of an educational institution: network security support... Managing the start up a cloud server with using encrypted filesystems in cloud environment is simplified and requires advanced security level. It is more reasonable to store system security passwords in an unencrypted root filesystem than in a cloud environment. Such password storing is problematic, because the objective of filesystem encryption is to protect against physical access to disk image. The process of starting up a virtual server with using access passwords is shown here.

Інст рум ент и ЕС 2 із зашифрованим ключем (паролем) ЕС 2 Вір туа льн ий сер вер launch() getparameters() Бло чни й при стрі й розшифровка (ключ з паролем) mount(key)

The process of deployment of cloud environment of an educational institution: Specification of developing the system in cloud environment is possible with implementing mixed architecture, which consists of physical elements and some virtual elements. Cloud infrastructure, specializing in hybrid solutions, is the optimal option. In a mixed environment, no sensitive data are hosted in the cloud infrastructure, because they are processed on servers of physical data centre which is under a user s control. The perimeter of one or more network segments is protected by a firewall. A firewall protects the outermost perimeter, allowing in only http, https, ftp.

Internet Балансувальник навантажень NIDS Балансувальник навантажень Сервер додатків Додаток Сервер додатків Додаток

The process of development of cloud environment of educational establishment: Between the protected network segment and outermost perimeter there are border systems, such as load balancer, that route traffic into a special area, where there are application servers. They make requests to the database across another firewall into internal protected network with internal sensitive database. The proposed structure is used for gaining access to increasingly sensitive data, and there are several layers of network protection in the form of firewalls. The disadvantage of this infrastructure is that once any internal server is compromised inside any given segment, full access is provided to other servers in this segment.

It is essential! In cloud environment there are no perimeters and segments. All virtual servers are on the same level in the network, and the traffic is managed through security groups.

There are many factors which define how effective the network security system in a cloud environment can be: 1. It is reasonable to run only one network service and services, aimed for administration on each virtual server. 2. Sticking several services on one server can lead to attack vectors for accessing the data on that server or using the server as a buffer zone to receive network s access rights.

The process of deployment of cloud environment of an educational institution: It is not reasonable to open direct access to most sensitive data, and attackers will need to exploit three different attack vectors before they can get to that data. Obviously, protection of each server requires using a certain port for the support of a service given.it is appropriate to limit access of third parties to servers. It is recommended to use a reverse proxy even when load balancer using is limited. A reverse proxy forwards a user s requests from external environment to one or several servers, logically located in internal network.

Thank you for your attention! Good luck!