How To Protect Virtualized Data From Security Threats



Similar documents
Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

PICO Compliance Audit - A Quick Guide to Virtualization

Security Virtual Infrastructure - Cloud

Preparing an RFI for. This RFI has been updated to reflect the new requirements in Version 3.0 of the PCI DSS, which took effect January 2015.

How To Protect Your Cloud From Attack

Virtualization Impact on Compliance and Audit

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Virtualization Journey Stages

H Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments

CloudControl Support for PCI DSS 3.0

Virtualization Security Checklist

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Netzwerkvirtualisierung? Aber mit Sicherheit!

Virtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE

Security in the Software Defined Data Center

Mitigating Information Security Risks of Virtualization Technologies

What is Virtualization and How Do I Audit It? Rick Schnierer and Chris Tennant

Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc.

2010 State of Virtualization Security Survey

Trend Micro Deep Security

Palo Alto Networks Cyber Security Platform for the Software Defined Data center. Zekeriya Eskiocak Security Consultant Palo Alto Networks

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Automating Cloud Security Control and Compliance Enforcement for PCI DSS 3.0

UAB Cyber Security Ini1a1ve

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE

Network Access Control in Virtual Environments. Technical Note

PCI DSS Virtualization Guidelines. Information Supplement: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: June 2011

Pervade Software. Use Case PCI Technical Controls. PCI- DSS Requirements

Virtualization Essentials

Thoughts on PCI DSS 3.0. September, 2014

HyTrust Logging Solution Brief: Gain Virtualization Compliance by Filling Log Data Gaps

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Can You be HIPAA/HITECH Compliant in the Cloud?

雲 端 發 展 與 安 全 趨 勢. 陳 建 宏 Jovi Chen 技 術 顧 問 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone

The first agentless Security, Virtual Firewall, Anti- Malware and Compliance Solution built for Windows Server 2012 Hyper-V

STREAM FRBC

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

Cloud and VM Based Security

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

How Does Virtualization Change Your Approach to Enterprise Security and Compliance?

Agentless Security for VMware Virtual Data Centers and Cloud

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Shifting Roles for Security in the Virtualized Data Center: Who Owns What?

Effective End-to-End Cloud Security

Network Segmentation in Virtualized Environments B E S T P R A C T I C E S

Business Values of Network and Security Virtualization

Making Data Security The Foundation Of Your Virtualization Infrastructure

VMware Solution Guide for. Payment Card Industry (PCI) September v1.3

PCI DSS 3.0 Compliance

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

5 Best Practices to Protect Your Virtual Environment

Learn the essentials of virtualization security

How to Achieve Operational Assurance in Your Private Cloud

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Before we can talk about virtualization security, we need to delineate the differences between the

IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet

Learn the Essentials of Virtualization Security

Virtualization System Security

CloudCheck Compliance Certification Program

Total Cloud Protection

Overcoming Security Challenges to Virtualize Internet-facing Applications

Best Practices For Department Server and Enterprise System Checklist

Proactively Secure Your Cloud Computing Platform

Secure your Virtual World with Cyberoam

Meeting the Challenges of Virtualization Security

End-user Security Analytics Strengthens Protection with ArcSight

Private Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)

How RSA has helped EMC to secure its Virtual Infrastructure

VDI Security for Better Protection and Performance

The Top 8 Questions to ask about Virtualization in a PCI Environment

The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:

Data Center Evolu.on and the Cloud. Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

Best Prac*ces for Deploying Oracle So6ware on Virtual Compute Appliance

Security Compliance in a Virtual World

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Shavlik NetChk Protect 7.1

PCI Requirements Coverage Summary Table

The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments

Achieving Compliance with the PCI Data Security Standard

Whitepaper. What You Need to Know About Infrastructure as a Service (IaaS) Encryption

Transcription:

S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust November 7-9, 2011

Agenda Virtualiza.on Overview & Security Challenges Industry Best Prac.ces ISACA/CObIT Virtualiza.on Security Checklist Center for Internet Security (hardening best prac.ces) Payment Card Industry (Data Security Standard & Virtualiza.on Informa.on Supplement) NIST Virtualiza.on Guidance End- to- End Security and Compliance Guidance Q & A Resources h 2

Agenda Virtualiza.on Overview & Security Challenges h 3

What is Virtualiza2on? Physical Machine Virtualization is highly compelling: 60% reduction in capital expenditure per app* Half as many human resources require per app* 80% reduction in Datacenter outage costs * Key to implementation of cloud computing * VMware Analysis 2010 Application Application Operating System Server Hardware Virtual Machine Virtual Machine Application Application Virtual Machine Application Application Operating System Application Application Operating System Operating System Hypervisor Server Hardware Physical Machine Physical Machine h 4

Virtualiza2on Progression 100% Dynamic Private Cloud % Workloads Virtualized 0% Server Consolidation Mission Cri.cal Workloads Non-Mission Critical, Non-Compliance Workloads Non- Compliant Compliant Secure Infrastructure Progression Best Prac.ce Despite high ROI, barriers to adop.on remain 46% cite security as primary reason that adop.on can be slowed* 35% worry about insider threats 28% very or extremely concerned with security in virtual environment * Jeff Burt, eweek Ar.cle, Sept. 2009 Prism Microsystems Survey of 300 orgs, 2010 Info Pro 2010 Security Study r 5

Challenge: Not All Hypervisors are Equal Virtual Machine Virtual Machine Application Application Virtual Machine Application Application Operating System Application Application Operating System Operating System App App VM App OS App VM OS App Type II (Hosted) Hypervisor Type I (Bare Metal) Hypervisor Server Hardware Physical Machine Host Operating System Server Hardware Physical Machine h 6

Security Challenge: Resource Conten2on 1 Resource Conten.on Typical AV Console 3:00am Scan Antivirus Storm Antivirus scans & updates overburden the Hypervisor & SAN d 7

Security Challenge: Instant- on Gaps 1 Resource Conten.on Active Dormant New VMs 2 Instant- on Gaps Dormant VMs will be missing critical patches and contain out-of-date security controls and are subject to exploitation and compromise d 8

Security Challenge: Inter- VM AIacks 1 Resource Conten.on 2 Instant- on Gaps 3 Inter- VM Ajacks / Blind Spots Attacks can spread across VMs d 9

Security Challenge: Management 1 Resource Conten.on Provisioning new VMs VM Migration Patching Complexity Private Cloud 2 Instant- on Gaps 3 Inter- VM Ajacks / Blind Spots 4 Complexity of Management VM sprawl inhibits compliance d 10

Agenda Industry Best Prac.ces ISACA/CObIT Virtualiza.on Security Checklist Center for Internet Security (hardening best prac.ces) Payment Card Industry (Data Security Standard & Virtualiza.on Informa.on Supplement) NIST Virtualiza.on Guidance h 11

CObIT ISACA Checklist Mapping To 1. Securing the virtualiza2on plasorm a. Plakorm and installa.on requirements 1.a.1 Limit physical access to the host: only authorized administra.ve personnel should have physical access to the host system to prevent unauthorized changes. 1.a.2 Verify integrity of files prior to installa.on: verify the hash values of system files, as provided by the vendor, prior to installa.on to ensure integrity. 1.a.3 Load and enable only required opera.ng system components and services: no unnecessary opera.ng systems components (e.g., drivers) should be loaded, and no unnecessary services should be enabled (e.g., prin.ng services, file sharing services). 1.a.4 BIOS, bootloader passwords: passwords should be used for BIOS and bootloaders (e.g., GRUB) for both hosts and guests. CObIT Control Objec2ve(s) PO4.9, DS12.3 PO2.4, AI3.2 AI3.2 DS5.3 Source: ISACA Virtualiza.on- Security- Checklist- 26Oct2010- Research.pdf h 12

Center for Internet Security (CIS) Working on VMware vsphere 4.1 benchmark, schedule dependent on volunteers vsphere 5 already released, no hardening guide from vendor or CIS or NSA or DISA s.gs Use vendor supplied benchmark: more current and vendor aligned with CIS and government requirements d 13

Automate Configura2on Compliance Repor2ng h 14

Automate Comprehensive Compliance Repor2ng h 15

PCI Data Security Standard PCI Data Security Standard for protec.ng Cardholder Data Changes in PCI Data Security Standard version 2.0 Released October 2010; all assessments from Jan. 1, 2012 must be against 2.0 Explicitly states that System components include any virtualiza.on components Detailed virtualiza.on guidance released as an Informa.on Supplement in July 2011 Source: PCI DSS 2.0 Quick Reference Guide r 16

Challenges & Concerns When Virtualizing CDE Virtualized Datacenter Administrators Scope: iden.fy & consider included in or connected to Segmenta.on of different security/trust zones and workload.ers Use of the hypervisor & its management systems/interfaces/ consoles Storage of cardholder data Access control & separa.on of du.es Logging and aler.ng r 17

CDE Virtualiza2on Checklist Take a risk- based approach: iden.fy all CDE system components and note if virtual or physical, and their primary func.on and owner Consider the risk aggregated when running mul.ple in- scope virtual machines/appliances/security appliances on a single or cluster of hypervisors and implement adequate PCI DSS controls Secure the hypervisor as it is most cri.cal system component (including its management system/interfaces/consoles) Manage complete life- cycle of in- scope VMs Secure VM- to- VM traffic that remains within the hypervisor(s) Ensure in- scope VMs or other objects are not moved to non- compliant environments Leverage op.mized, virtualiza.on- aware firewall and an.- virus solu.ons Update processes to account for the greater management flexibility Pay ajen.on to roles defini.on, access control and logging Privileged access to the hypervisor h 18

NIST SP 800-125: Virtualiza2on and Security Concerns Addi.onal layers of technology Many systems on a physical system Sharing pool of resources Lack of visibility Dynamic environment May increase the ajack surface d 19

Recommenda2ons for Security for Full Virtualiza2on Technologies Risk- based approach Secure all elements of a full virtualiza.on solu.on and perform con.nuous monitoring Restrict and protect administrator access to the virtualiza.on solu.on Ensure that the hypervisor is properly secured Carefully plan the security for a full virtualiza.on solu.on before installing, configuring, and deploying it r 20

Summary of Threats and Countermeasures Intra- guest vulnerabili.es Hypervisor par..oning Lack of visibility in the guest OS Hypervisor instrumenta.on and monitoring Hypervisor management Protect management interface, patch management, secure configura.on Virtual workload security Management of the guest OS, applica.ons, data protec.on, patch management, secure configura.on, etc Virtualized infrastructure exposure Manage access control to the hardware, hypervisors, network, storage, etc. d 21

Agenda End- to- End Security and Compliance Guidance h 22

Compliance Challenge: Moving Workloads PCI Network Segment VM App OS VM App OS VM App OS PCI Compliant Other Network Segment VM App OS VM App OS VM App OS VM App OS Not PCI Compliant PCI Workload Dynamically Moved VM App OS PCI = Payment Card Industry Data Security Standard r 23

Non- Compliant VM Movement r 24

VM is now moved to the wrong cluster! Require Policy- based Controls for all Change Management Ac;vity r 25

VM reconfigura2on: network change Require Policy- based Controls to ensure that authorized users do not accidentally/ inten;onal break compliance Changing Network adapter 1 From ecommerce Network To Infrastructure Network h 26

Compliance Challenge: Insufficient Logging Missing IP address and no indica.on that the network adapter was reconfigured r 27

Insufficient Logging Confusing host logs with insufficient details to iden.fy specific ac.on, no IP address or user Require log records with sufficient details for all virtual admin ac7ons to allow for monitoring/ inves7ga7on/forensics r 28

Compliance Challenge: Insufficient Log Records Require Log Records of all Change Management Ac7vity (denied/failed and allowed) No log message is recorded. Violates most policies and standards. d 29

End- to- End Security & Compliance Guidance Virtualization increases the risk and complexity of compliance so engage your auditors early to streamline the audit process Look beyond traditional security vendors for solutions that address virtualization specific requirements (hypervisor/vm controls) View virtualization as an opportunity to improve your current processes reporting, monitoring, inter-vm controls, etc. achieve objectives that you always wanted in physical environments but could not afford or were restricted by legacy infrastructure Embrace virtualization with a virtualization by default approach and build compliance into the default mode of operation h 30

Ques2ons? h 31

Resources ISACA Virtualiza.on Checklist - hjp://www.isaca.org/knowledge- Center/Research/Documents/ Virtualiza.on- Security- Checklist- 26Oct2010- Research.pdf hjp://www.isaca.org/knowledge- Center/Research/ResearchDeliverables/ Pages/Virtualiza.on- Benefits- and- Challenges.aspx PCI Security Standards Council: hjps://www.pcisecuritystandards.org/index.php NIST: hjp://csrc.nist.gov/publica.ons/index.html Adap.ve Compu.ng: hjp://www.adap.vecompu.ng.com HyTrust: hjp://www.hytrust.com/resources/main Trend Micro: hjp://us.trendmicro.com/us/solu.ons/enterprise/security- solu.ons/ compliance/ r 32