Covering my IaaS: Security and Extending the Datacenter. Brian Bourne Tadd Axon



Similar documents
Proactively Secure Your Cloud Computing Platform

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

Deployment Options for Microsoft Hyper-V Server

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

vcloud Air Disaster Recovery Technical Presentation

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

How To Extend Security Policies To Public Clouds

WINDOWS AZURE NETWORKING

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

New hybrid cloud scenarios with SQL Server Matt Smith 6/4/2014

Server & Cloud Management

Lecture 02b Cloud Computing II

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Bridging the gap between local IT and Cloud services, keeping you in control

Realizing the Benefits of Hybrid Cloud. Anand MS Cloud Solutions Architect Microsoft Asia Pacific

vsphere 6.0 Advantages Over Hyper-V

Availability for the modern datacentre Veeam Availability Suite v8 & Sneakpreview v9

Implementing Microsoft Azure Infrastructure Solutions

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Microsoft Azure for IT Professionals 55065A; 3 days

WELKOM Cloud met Azure

Cloud Models and Platforms

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera VERSION May, 2015

IT as a Service. Transforming IT with the Windows Azure Platform. November 2010

vcloud Suite Architecture Overview and Use Cases

MANAGED SERVICE PROVIDERS SOLUTION BRIEF

Mitigating Information Security Risks of Virtualization Technologies

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Before we can talk about virtualization security, we need to delineate the differences between the

Netzwerkvirtualisierung? Aber mit Sicherheit!

ILLUMIO ADAPTIVE SECURITY PLATFORM TM

Cloud IaaS Migration Roadmap

KEMP LoadMaster. Enabling Hybrid Cloud Solutions in Microsoft Azure

HP Integration with Veeam Backup and Replication. Mark Hambelton Veeam EMEA Alliances SE

Questions for Vermont Hosting RFI

Third Party Cloud Services Its Adoption in the New Age

VMware vcloud Networking and Security Overview

ILLUMIO ADAPTIVE SECURITY PLATFORM TM

Data Protection & Cloud. Corradino Milone PreSales Commvault Italia

Hybrid Cloud: Overview of Intercloud Fabric. Sutapa Bansal Sr. Product Manager Cloud and Virtualization Group

雲 端 發 展 與 安 全 趨 勢. 陳 建 宏 Jovi Chen 技 術 顧 問 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone

A Comparison of Clouds: Amazon Web Services, Windows Azure, Google Cloud Platform, VMWare and Others (Fall 2012)

Availability for your modern datacenter

APS Connect Denver, CO

How To Run A Modern Business With Microsoft Arknow

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

Cloud OS. Philip Meyer Partner Technology Specialist - Hosting

How Data-Centric Protection Increases Security in Cloud Computing and Virtualization

Securing the private cloud

Time to Value: Successful Cloud Software Implementation

Active Directory Domain Services on the AWS Cloud: Quick Start Reference Deployment Mike Pfeiffer

Veeam Summer School. Thomas Zaatman Veeam Software

HP OpenStack & Automation

CLOUD COMPUTING. When It's smarter to rent than to buy

AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II

Secure Bridge to the Cloud

Building Private & Hybrid Cloud Solutions

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone

Cisco Cloud Architecture for the Microsoft Cloud Platform. Building Multi-Tenant Service Provider Clouds and Driving a Profitable Joint GTM

Building High Growth Services on the Microsoft Cloud Platform. Rich Cannon Senior Director, US Partner Hosting and Cloud Services

How To Protect Your Cloud From Attack

VMware vcloud Air. Enterprise IT Hybrid Data Center TECHNICAL MARKETING DOCUMENTATION

STRATEGIC WHITE PAPER. The next step in server virtualization: How containers are changing the cloud and application landscape

Implementing Multi-Tenanted Storage for Service Providers with Cloudian HyperStore. The Challenge SOLUTION GUIDE

Security in the Software Defined Data Center

SteelFusion with AWS Hybrid Cloud Storage

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Safeguarding the cloud with IBM Dynamic Cloud Security

Swisscom Cloud. Building a secure cloud. SIGS, Christof Jungo

SharePoint 2013 on Windows Azure Infrastructure David Aiken & Dan Wesley Version 1.0

VMUG - vcloud Air Deep Dive VMware Inc. All rights reserved.

Microsoft Azure. Microsoft Azure Security, Privacy, & Compliance

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

Availability for the modern datacentre Veeam Availability Suite v8. Henk Arts Senior System Engineer (teamlead), Veeam Software

Building Blocks of the Private Cloud

GoodData Corporation Security White Paper

Transcription:

Covering my IaaS: Security and Extending the Datacenter Brian Bourne Tadd Axon

About Us Tadd Axon - Holds a Bachelor of Business Administration with a minor in Spanish from Wilfrid Laurier University. Went to school with every intention of becoming an accountant (CMA, if you re curious) Brian Bourne A management guy still trying to be technical.

Cloud Basics

Cloud Defined Applications delivered to the consumer running from the provider s infrastructure. Used by business users for email, office automation, CRM, ERP, etc. IDC Numbers: $993M in 2013 growing to $2.04B in 2017 Software as a Service SaaS A computing platform typically including operating system, programming language execution environment, database and web services. Used by developers and application providers. IDC Numbers: $105M in 2013 growing to $554M in 2017 Platform as a Service - PaaS The provisioning of processing, storage, networks or other fundamental computer resources where the consumer can run arbitrary software Used by IT administrators IDC Numbers: $62M in 2013 growing to $372M in 2017 Infrastructure as a Service - IaaS * Also note that private hosted solutions were $170M in 2013 growing to $554M in 2017

Cloud Defined Public: Shared services or resources provided by a third party and available to many participants or tenants. Community Cloud Participation limited to specific demographic. Private: Cloud computing resources open to just the owner. Can be hosted on-premise or off. Hybrid: Cloud computer resources spread between your own systems and a third party s resources.

Infrastructure as a Service Detailed IAAS is three building blocks Storage Network Compute All IaaS services fit into one of these buckets Operational SLAs backed by contract Certain levels of regulatory compliance and security backed by contract

Typical IaaS Deployment Scenarios Bottomless storage (NetApp, StorSimple, etc) Backup (CommVault, Veeam, etc) DR Plans (Hot-Hot, Hot-Cold, HyperV Recover Manager, VMWare vcloud Hybrid Service) Extended Datacenter Treat the cloud provider like another one of your own datacenters

Network

Network Architecture Networks are all virtual (Software Defined) VPN Connectivity Optional MPLSlike connectivity Site to Cloud Multi-Site to Cloud Point to Cloud Cloud to Cloud (Within Cloud and Cross-Provider) Load Balancing Traffic Management Content Delivery Network *

Security Considerations Traditional data in transit concerns Traditional end point attack vector concerns Egress Monitoring Traditional security zones that you have in your current DC are not simple to implement in cloud Getting progressively simpler Short list of supported on premise hardware for VPN scenarios Can always be made to work but you better understand IKE proposals and possibly BGP

Security Mitigations Manual ACLs on host or network layers as supported Host-based controls such as IPS and local firewall Network isolation (varies by provider) Protect data in transit (VPN or host IPSec rules) Pick your algorithms carefully Careful management of cloud to Internet gateways and endpoint mapping

Storage

Storage Architecture Bottomless pit of storage How much do you want to spend (this billing cycle)? Highly Available Storage Great for availability (varying degrees of redundancy) Marginally increased attack surface At rest protection: Base physical layer crypto by cloud provider Managed destruction All your storage are belong to API Encryption of your data (file, blob, VHD, whatever) is another matter

Security Considerations Access to tenant = (usually) unfettered access to storage Data sovereignty / regulatory requirements Spoiler: Really a BC only problem Contract wording and commitments Data remnants, replicas and backups (who knows where they go)

Mitigations Management of API keys and certs is paramount Role based access control models are evolving Third Party products and services to encrypt workload data Volume-level Crypto Leveraging O/S features or vendor specific toolkits Item Level Crypto Traditional encryption options Digital rights management solutions Application Containerization Worry about: Who has access to keys (on premise or in cloud)

Compute

Compute Virtual machines Multiple OSes available Some with pre-loaded software DBMS, ERP, Configuration Management Official and Community contributed images Bring/Brew your own image Virtual appliances Load balancers, application proxies, firewall Available in (nearly) any flavour and any size

Compute Considerations Who built that image? Who manages patch level? Traditional firewall solutions will not work Multiple network connections can be difficult or impossible VM to VM attacks and Hypervisor to VM attacks Normal considerations for any internet connected machine Provider side attacks Provider initiated Fallout from a provider hack

Compute Mitigations Normal protections (AV, HIDS/HIPS, etc) Host hardening is critical Domain isolation and network isolation Careful care of image management for VMs Service-level ACLs on VM endpoints End point monitoring Single NIC, WAF and reverse proxy solutions

Control Plane

Control Plane Realities Overall lack of granularity of delegation Remember the unix all or nothing problem? Major players are making moves to enable RBAC Maturing Serious degree of trust required for cloud admin At the VM level, normal controls for O/S, application platform are still available

Summary

In Summary IaaS brings many advantages operationally IaaS also brings some security challenges Some of these are old Some of these are new The extended datacenter model makes traditional security good practices even more important Encryption becomes a more interesting proposition Key management practices become more critical

Questions & Answers Contact Us: Tadd Axon @grey_area tadd.axon@softchoice.com Brian Bourne @brianbourne brian@sector.ca THE END