SecureView Overview. Click to Edit Master Title Style. Click to Edit Master Subtitle Style. Updated 7 Oct 2013



Similar documents
SecureView & XenClient XT Security. Dr. Ryan Durante Chief, Cross Domains Solutions & innovation AFRL/RIEB

SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications

Desktop Virtualization. The back-end

Start building a trusted environment now... (before it s too late) IT Decision Makers

RED HAT ENTERPRISE VIRTUALIZATION

9/26/2011. What is Virtualization? What are the different types of virtualization.

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions

Implementing Hardware Roots of Trust: The Trusted Platform Module Comes of Age Sponsored by the Trusted Computing Group (TCG)

Windows Server Virtualization & The Windows Hypervisor

VMware End User Computing Horizon Suite

Factory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp.

Networking for Caribbean Development

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Using the TPM to Solve Today s Most Urgent Cybersecurity Problems

XEBHRA: A Virtualized Platform for Cross Domain Information Sharing

Red Hat VDI. David Simmons

Before we can talk about virtualization security, we need to delineate the differences between the

Server-centric client virtualization model reduces costs while improving security and flexibility.

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

Deputy Secretary for Information Technology Date Issued: November 20, 2009 Date Revised: December 20, Revision History Description:

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE

Top 10 Myths of Desktop Virtualization

How To Get The Most Out Of Redhat.Com

Intel Embedded Virtualization Manager

YOUR STRATEGIC VIRTUALIZATION ALTERNATIVE. Greg Lissy Director, Red Hat Virtualization Business. James Rankin Senior Solutions Architect

Hardware + Software Solutions for The Best in Client Management & Security. Malcolm Hay Intel Technology Manager

How to Secure Infrastructure Clouds with Trusted Computing Technologies

SCO Virtualization Presentation to Customers

Dell Client. Take Control of Your Environment. Powered by Intel Core 2 processor with vpro technology

Taking Virtualization to the Next Level: Private Cloud and Bring Your Own Device (BYOD)

Citrix XenServer 7 Feature Matrix

How To Get A Client Side Virtualization Solution For Your Financial Services Business

Next Generation Now: Red Hat Enterprise Linux 6 Virtualization A Unique Cloud Approach. Jeff Ruby Channel Manager jruby@redhat.com

Servervirualisierung mit Citrix XenServer

Meet the BYOD, Computing Anywhere Challenge: Planning and License Management for Desktop Virtualization

Intro to Virtualization

Integrating NComputing Virtual Desktops with VMware and Citrix

How To Create A Cloud Based System For Aaas (Networking)

VMware Virtual Infrastucture From the Virtualized to the Automated Data Center

Virtualization Support - Real Backups of Virtual Environments

2) Xen Hypervisor 3) UEC

RED HAT ENTERPRISE VIRTUALIZATION & CLOUD COMPUTING

2014 Teradici Corporation.

HRG Assessment: Stratus everrun Enterprise

Cloud Optimize Your IT

Linux/Open Source and Cloud computing Wim Coekaerts Senior Vice President, Linux and Virtualization Engineering

LOCAL VM DESKTOPS Delivering valuable, new usage scenarios to Enterprises

White Paper Levels of Linux Operating System Security

With Red Hat Enterprise Virtualization, you can: Take advantage of existing people skills and investments

Backup & Disaster Recovery Appliance User Guide

<Insert Picture Here> Oracle VM and Cloud Computing

HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances

Virtual Switching Without a Hypervisor for a More Secure Cloud

Panoramica su Cloud Computing targata Red Hat AIPSI Meeting 2010

Mitigating Information Security Risks of Virtualization Technologies

Simplified Private Cloud Management

Frontiers in Cyber Security: Beyond the OS

Citrix XenClient 1.0

FOR SERVERS 2.2: FEATURE matrix

Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems

A Comparison of VMware and {Virtual Server}

Enterprise-class desktop virtualization with NComputing. Clear the hurdles that block you from getting ahead. Whitepaper

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology

2009 AAMGA Automation Conference

Boas Betzler. Planet. Globally Distributed IaaS Platform Examples AWS and SoftLayer. November 9, IBM Corporation

Xen Project 4.4: Features and Futures. Russell Pavlicek Xen Project Evangelist Citrix Systems

Overview. CMU/SEI Cyber Innovation Center. Dynamic On-Demand High-Performance Computing System. KVM and Hypervisor Security.

CSE 501 Monday, September 09, 2013 Kevin Cleary

Data Centers and Cloud Computing

7 Things You Need to Know about Virtual Mobile Infrastructure

Virtualization Impact on Compliance and Audit

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5

Virtualization 101 ASPE RESOURCE SERIES. Prepared for ASPE by Global Knowledge's Kerry Doyle, MA, ZDNet/CNet.com Associate Editor

Technical Brief. Userful Multiplatform Desktop Virtualization Software

The Art of Virtualization with Free Software

Microkernels, virtualization, exokernels. Tutorial 1 CSC469

Distributed and Cloud Computing

EECatalog SPECIAL FEATURE

Enterprise-Class Virtualization with Open Source Technologies

Virtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

IOS110. Virtualization 5/27/2014 1

Virtualization and Cloud Computing

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

Software Execution Protection in the Cloud

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

HP VMware ESXi 5.0 and Updates Getting Started Guide

Transcription:

SecureView Overview Updated 7 Oct 2013 Air Force Research Laboratory AFRL/RIEB afrl.rieb.secureview@us.af.mil 315-330-7658 Subtitle Style SAF PA Case Number: 88ABW-2013-4408 The material was assigned a clearance of CLEARED on 17 OCT 2013

2 UNCLASSIFIED Overview About AFRL Background Architecture Features Hardware Support Programmatics MLS Comparison Summary POCs Subtitle Style

3 AFRL Mission & Organization Leading the discovery, development, and integration of affordable warfighting technologies for our air, space and cyberspace force Subtitle Style

AFRL Rome Research Site in Upstate NY Subtitle Style 750 on-site S&E team of scientists/ engineers Dynamically formed research team ~3,700 collaborators One of the world s most diversified military research organizations, providing innovative technology for the nation 4 Distribution C. Distribution authorized to U.S. Government agencies and their contractors (Administrative or Operational Use) (01 Oct 2012). Other requests for this document shall be referred to (AFRL/RI, Rome NY)

AFRL/RIEB Background Mission Partner Focused Technology Transition Diverse Direct Respected 5 Mission Statement Research, develop, transition and sustain leading-edge information technology solutions that deliver timely and secure intelligence information access, analysis, and dissemination capabilities to the Air Force and the Intelligence Community Subtitle Style Intelligence Data Handling Systems (IDHS) Program Technology/products are used operationally throughout Department of Defense and Intelligence Community 40+ Year legacy of applying leading edge technologies to provide secure, affordable and sustainable IT solutions General Defense Intelligence Program (GDIP) resources represent the core of the IDHS manpower/program resources

6 A History Of Innovation CATIS/IESS IPL XIDB/MIDB ISSE Guard CSE-SS JEDI Subtitle Style CD-ROM MTIX Personalized Assistant that Learns (PAL) DTW WebTAS/CIDNE DRP JTT Collaboration Gateway Latex Paint

7 Current Focus Areas Data Survivability AF JWICS Disaster Recovery Click Multi-Level to Security Edit Master ISSE Guard SABER Multi-Level Title Thin Style Client SecureView Multi-Level Virtual Platform JEDI Security Lockdown DoDIIS Cross Domain Mgmt Office (DCDMO) Subtitle Style Messaging Messaging Infrastructure Services & Tools for the IC (MISTIC) Cross Domain Collaboration Collaboration Gateway (CD Chat, V2CDS) Data Access & Apps WebTAS Toolkit (incl CIDNE, CEP) Info for Op & Tactical Analysis (IOTA) Automated Virtual Intel Prod Spt Sys (AVIPSS) Databases for the 21st Century (DB-21) Modernized Integrated Database (MIDB) Targeting Automation Joint Targeting Toolkit (JTT) Solutions Globally Deployed 100K+ users

Certification Efforts Product TSABI SABI UCDMO Baseline ISSE Guard 4.0 SABER 4.3.1 Collaboration Gateway 2.0 ST&E Apr 13 MLDBR 1 SAWES Subtitle Style ~Fall 13 DTW 4.1.1 Multi-Level Print Server (MLPS) 2 SecureView 1.2 ~Fall 13 8 1-As part of ISSE 2-as part of DTW

UNCLASSIFIED SecureView What is it? SecureView is a low-cost MILS (Multiple Independent Levels of Security) workstation based on COTS technology. (Citrix XenClient XT) Runs on any Intel vpro personal computer Based on a Type 1 or bare metal client hypervisor Single or multiple wires to desktop Allows a single computer to host multiple guest virtual machines Click to (VMs) Edit running Master at different Subtitle classification Style levels. Supports Windows, Linux and Solaris guests Supports both rich and thin client computing models 9 vpro: Intel CPU technologies that enable management features such as monitoring, maintenance, and management independent of the state of the operating system. Type 1 hypervisor: A native, bare metal hypervisor which runs directly on the host's hardware to control the hardware and to manage the operating systems which run on a level above the hypervisor.

10 Background ODNI CIO requested AFRL/RI develop a secure & robust MLS workstation for the Intelligence Community and DoD Levied extraordinary security requirements Must handle highly-secure/sensitive data and information Zero tolerance for data exfiltration Minimal impact to host agency Support high-performance applications Subtitle Style Rapid provisioning (4 hours) Required rapid delivery (<10 months)

11 UNCLASSIFIED The Solution Over a dozen solutions analysed over a 6-month period Type 1 client hypervisor architecture selected Based on Citrix s XenClient AFRL worked very closely with Citrix to modify and enhanced basic Xen architecture, resulting in XenClient XT Added GOTS enhancements Subtitle Style SecureView is the Government program that utilizes XenClient XT as the basis for a Multiple Independent Levels of Security (MILS) workstation XenClient XT is now a COTS product and commercially supported by Citrix.

12 SecureView UNCLASSIFIED Government Industry Collaboration AFRL, Intel, and Citrix kicked off a partnership early 2010 Intel & Citrix have provided the Government an unprecedented level of cooperation Collaborated with Intel on SMI Transfer Monitor (STM) specification NSA has provided guidance (HAP PMO) and testing (I733) resources Subtitle Style Dell & HP have provided access to BIOS, firmware, and STM collaboration SELinux Xen Client XSM GOTS Configuration SecureView Program TDP SecureView Workstation Xen Client XT OSS Xen Client XT

13 Why Xen? UNCLASSIFIED The Xen.org Open Source Development Community Hundreds of developers, many companies, universities and other organizations More than 25,000 code submissions in Xen 4.0 >85% of the Public Infrastructure Cloud runs on Xen Used in servers, desktops, laptops, storage appliances, network appliances, PDAs, and smart phones Runs multiple independent VMs with policy controlled information flow Subtitle Style Enables MILS systems Enables out-of-band management & policy enforcement Control removable media access, image update, backup, and attestation Thick or Thin mode of operation

14 UNCLASSIFIED SecureView (Login Screen) Subtitle Style

UNCLASSIFIED Modifications from XenClient to XCXT DRTM of hypervisor and dom0 (measured launch) Platform hardening Disaggregate and de-privilege functionality into dedicated service VMs Moved network stack to a separate service VM Implemented SELinux in dom0 and service VMs with custom set of SELinux policies Narrow interfaces between components Cross-VM mouse control Subtitle Style 15 XenClient XenClient XT

16 User Interface (UIVM) Network (NDVM) Management Client (syncvm) SecureView 2.0 Architecture MultiView Network Driver (NDVM) VPN Isolation VPN Isolation ThinVMs Control Domain Standard Service VMs Optional Service VMs Encrypted VM Configuration Encrypted VM Storage Encrypted Security Platform SELinux User VM 1 Policy Granularity User VM 2 Policy Granularity User VM n Policy Granularity XenClient XT Subtitle Style Xen Security Modules BIOS OROMs Hardware VT-x VT-d TXT AES-NI nvidia/ati GPUs Intel Integrated GPU

17 UNCLASSIFIED Typical Network Architecture SecureView Workstation Single wire to workstation Subtitle Style Network 1 Network 2 Network 3 Standard COTS VPN Concentrator(s)

18 Security Foundation NDVM (Network Isolation) VPN VM (VPN Isolation) Establish Secure Isolation in the hardware Intel Virtualization Technology Extensions (VT-x) : Hardware based X86 CPU virtualization Intel Virtualization Technology for Directed I/O (VT-d): Hardware based Input & Output Memory Management Unit (IOMMU) that utilizes DMA mapping and direct PCI assignment Utilize VM isolation to minimize attack surface and constrain exploits Assume attackers will compromise guest VMs, limit their mobility Constrain Allowable Operations Use NSA Security Enhanced Linux (SELinux) to limit how Service VMs can use resources Subtitle Style NSA Xen Security Modules (XSM) to limit how hypervisor can use resources Limit mobility of malware with policy constraints on capabilities (i.e USB) Verify Integrity through Trusted Boot Measure and store initial system state in the Trusted Platform Module (TPM) When booted, current core system re-measured and results verified Protect Data at Rest and in Transit using encryption Trusted Boot mechanism locks core system components until verified Encrypt all sensitive components including configuration, service VMs, and optionally guest VM images to protect from offline tampering Encrypt network comms. within IPSEC VPN tunnels to protect data in transit Service VMs SE Windows OS Guest Guest SE VM VM Xen Security Modules (XSM) XenClient XT (Hypervisor / VMM) Intel vpro Hardware VT-x TPM Linux OS VT-d TXT Hypervisor = Virtual Machine Manager (VMM)

19 UNCLASSIFIED SecureView: Trusted Boot with Intel TXT Core System Measured Install SecureView Measurements stored in TPM Core system remeasured by Intel TXT on every boot Subtitle Style Only then can you boot guest (Windows) VMs Measurement used to unlock encryption keys and configuration

20 SecureView 2.0 Enhancements SecureView Mgmt Server (Enterprise Scalability) Secure Seamless Windowing MultiView ConnectView/Linux ThinVM Multi-Layer Suite B VPN Comms. (NSA/CSFC) Subtitle Style NSA Certified Full Disk Encryption Expanded HW Compatibility List

21 SecureView Management Server Enterprise Scalability Deploy new VMs Delete managed VMs Reconfigure existing VMs Configure platform Click Upgrade to Edit platform Master Subtitle Style Status monitor

22 Seamless Windowing - MultiView Secure Seamless Windowing MultiView Allows Windows applications from different security domains to be seen simultaneously on the same screen Note: Images are Unclassified - Classified markings are for illustration purposes only Subtitle Style

23 Seamless Windowing - MultiView Secure Seamless Windowing MultiView Allows Windows applications from different security domains to be seen simultaneously on the same screen Note: Images are Unclassified - Classified markings are for illustration purposes only Subtitle Style

24 ConnectView/Linux ThinVM ConnectView Dynamically create ThinVM and paired VPNVM other networks (if allowed) Allows AD/Hoc connections to Subtitle Style Linux ThinVM Virtual desktop access Citrix ICA Microsoft RDP VMWare View Isolated web browser Seamless desktop No data persistence Read-only and measured Shared image (saves storage)

25 GlowView Colored keyboards to identify security level of current action Guest Click VM to Edit Master Security level color is associated with each Color changes based on where keyboard focus is given Logitech G510 Subtitle Style Colored keys and LCD screen LCD shows security label (text) and VM name Luxeed U7 Crossover Colored keys only

26 SecureView 2.0 Features VPN Options Single Low-over-High VPN Example: Tunnel SIPR over JWICS Double-nested Suite B VPN (NSA CSfC) Click Example: to Edit Master Tunnel Subtitle JWICS Style over SIPR or Internet Expanded hardware Cisco Aruba

27 SecureView 2.0 VPN Data Flow Subtitle Style

28 SecureView 2.0 Features Certified Full Disk Encryption Hardware encryption of disks Use TCG standard methods Use COTS self-encrypting drives Subtitle Style Working with NSA to establish CSfC capability package

29 SIPRNET Token Support The approved SIPRNET token reader Click to (OmniKey Edit Master 3121) is currently Title supported Style on SecureView. Subtitle Style The approved SIPR Token middleware by 90meter is also supported and fully functional.

30 UNCLASSIFIED Thin Client Support SecureView can be configured as a Thin Client locally Minimal WinTPC or Linux OE installed No local data No local apps Only locally installed app is a Citrix Receiver or other VDI client Variety of small and ultra small factor desktop appliances are supported Supports Zero Touch small footprint updated remotely if/when required Subtitle Style

31 SecureView 2.0 HW Compatibility List Hardware Support Desktops Dell OptiPlex 980, 990, 7010, 9010 HP Compaq Elite 8200, 8300 Laptops Dell Latitude E6420 XFR and E6430 Click HP to EliteBook Edit Master 2760p Subtitle and 9470 Style Folio Lenovo T430s Workstation NCS Vortex A422 Almost any Intel-based platform with full vpro support and integrated Intel graphics can be supported.

32 UNCLASSIFIED Cost Performance desktop computer $795 (AF QEB 2013A) + options Click and laptops to Edit Master i.e. Dell Optiplex 980/990/9010, HP Compaq Elite 8200/8300, other desktops XenClient XT MSRP qty 1 = $610/license AFRL ELA $249 for any quantity includes year 1 software maintenance Citrix has enterprise agreements with many agencies Subtitle Style Product may get bundled with other Citrix products AFRL Support Installation funding determined by level of support required Sustainment as low as $25 per seat at quantity

33 Total Cost of Ownership Summary by Intel Environment 4 SecureView vpro Workstation Single Encrypted Grey Wire to workstation Domain A Domain B Network Storage with Network Services Network Storage with Network Services Standard COTS VPN Concentrator(s) Domain C Subtitle Style SecureView savings are significant compered to alternative architectures SecureView is estimated to reduce TCO by up to 67% over single-domain architectures and 45% savings over a thin-client, multi-domain architecture. Analysis included: Cost to deploy and support 10,000 users Necessary build-out costs for client, server, network and other hardware over entire upgrade cycle Impact of lost productivity when analysts using a server-hosted virtualization solution must wait for slow systems or heavily-loaded networks Power costs, costs of pre-deployment preparation, deployment, and ongoing management costs over upgrade cycle 5 UNCLASSIFIED Network Storage with Network Services

34 Current Certification and ATOs SecureView was favorably evaluated against the NIST 800-53 Security Controls Catalog for Confidentiality: HIGH, Integrity: HIGH, Availability: MEDIUM Original v1.0 ATO issued 10 August 2011 SV 1.2 Authority to Operate (ATO) DIA Top Secret SCI And Below Interoperability (TSABI) ATO: 2 April 2013 ODNI IC3E ATO: 10 Dec 2012 AF DAA DIACAP ATO: 4 June 2013 Subtitle Style AFISRA/A6S IATT: 23 Sep 2013 Listed on UCDMO Baseline as CDS Access Solution - 4 April 2013 SV 2.0 Certification, Test & Evaluation (CT&E) Status Secret and Below Interoperability (SABI) CT&E started 26 September 2013 AFISRA TSABI CT&E completed 20 September 2013 DIA TSABI CT&E completed 19 September 2013

35 UNCLASSIFIED No Extensive Training Required Easy to setup, configure, and maintain Qualified CSAs should have the skills Even system admins cannot inadvertently create a cross-domain security breach Easy to use Users adapt quickly to multi-domain features Switching domains is somewhat similar to using a KVM switch Full documentation available System Security Plan (SSP) Click Security to Edit Test Master Plan & Procedures Subtitle (STP) Style Master Security Requirements Matrix (MSRTM) Installation & Configuration Guide (ICG) Administrator Guide (AG) User s Guide (UG) Integrated Support Plan (ISP)

36 Related Efforts - SecureServe March 2010 ACC requested AFRL assist in virtualization solution for the Next Generation Air Operations Center (AOC) Start with SecureView (80% client/server code base common) Further security enhancements for both client and server Goal: Citrix Xen Server XT available as low cost COTS or Open Source Leveraging DARPA Detection and Response Embedded Device Network access control Subtitle Style Availability: Secure Virtualization 2013 / Enhancement/Extensions 2014

3 rd Party Multi-Level Applications - Email Subtitle Style Single interface for email, calendar, contacts, tasks Only metadata transferred to create unified view Connects to existing Exchange servers Works in full screen and seamless desktop integration modes SecureView 2.0 adds colored borders to windows based on source VM classification 37 37

3 rd Party Multi-Level Applications - Search Subtitle Style Single interface for searching across multiple VMs View and interact with content at source security level Connects to existing search engines Works in full screen and seamless desktop integration modes SecureView 2.0 adds colored borders to windows based on source VM classification 38 38

39 UNCLASSIFIED Comparison to Other MLS Clients Unprecedented security via Intel s hardware-based security features VT-d, VT-x, TPM, TXT, AESNI Relatively simple, robust and flexible architecture Supports dedicated 3D graphics or shared display Supports dedicated network I/Fs or One-wire Configuration Guest VMs can be either thick or thin Full SIPRNET Token Support Does not require specialized sys admin support Subtitle Style Extensive desktop server backend not required -- can be leveraged if available Low-cost commodity desktop hardware (or laptops) COTS software based on Open Source, no system integrator or lock-in Significantly cheaper than other MLS access solutions

40 UNCLASSIFIED Summary SecureView breaks new ground in client virtualization True type 1 hypervisor for robust isolation and very high performance COTS, open source based More affordable and capable Total cost of ownership reduced by Click up to Edit 67% Master Subtitle Style Avoids integrator/hardware vendor Lock-in SecureView is available NOW NIST 800-53 certified

41 UNCLASSIFIED Questions Subtitle Style

42 UNCLASSIFIED Points of Contact Air Force Research Laboratory AFRL/RIEB afrl.rieb.secureview@us.af.mil 315-330-7658 NIPR: https://extranet.if.afrl.af.mil/sv SIPR: http://sv.afmc.smil.mil JWICS: http://web1.rome.ic.gov/sv Subtitle Style

Subtitle Style