Kan min private sky sikres godt nok?

Kan min ”private sky” sikres godt nok? Christian Heinel – Systems Engineer Cisco Systems © 2009 Cisco | EMC | VMware. All rights reserved. 1 Agenda...
Author: Basil Chase
20 downloads 0 Views 2MB Size
Kan min ”private sky” sikres godt nok? Christian Heinel – Systems Engineer Cisco Systems © 2009 Cisco | EMC | VMware. All rights reserved.

1

Agenda  Definition af Cloud  Sikkerhedsmæssige udfordringer ved Cloud Computing  Sikring af den private cloud  Opsummering  QA

© 2009 Cisco | EMC | VMware. All rights reserved.

2

Defining Cloud Computing IT Resources and Services that Are Abstracted from the Underlying Infrastructure and Provided ―On Demand‖ and At Scale‖ in a Multitenant and Elastic Environment

A Style of Computing Where Massively Scalable IT-Enabled Capabilities Are Delivered ―As a Service‖ to Multiple External Customers Using Internet Technologies Source: Gartner “Defining and Describing an Emerging Phenomenon” June 2008

Anywhere, Anyone, Any Service © 2009 Cisco | EMC | VMware. All rights reserved.

3

Cloud Computing Concerns

Source: IDC April 2009

© 2009 Cisco | EMC | VMware. All rights reserved.

4

Sikkerhedsmæssige udfordringer ved Cloud

© 2009 Cisco | EMC | VMware. All rights reserved.

5

Implementing Cloud Computing The Rosy picture

But what happened to my security? V V V V

V V V V

Database

V V V V

V V V V

Virtual Desktops

Email

Custom

Web

© 2009 Cisco | EMC | VMware. All rights reserved.

6

What are the security issues?  Challenges:

– Dynamic environment, static barriers are no longer sufficient – Resource preservation becomes critical – Compliance requirements – What about auditing?  Solving these issues will force us to:

– Adapt our existing security models to this new world – Change how security is deployed – Dramatically change how we do security management!

© 2009 Cisco | EMC | VMware. All rights reserved.

7

Security issue #1: VM Mobility

now you see it

© 2009 Cisco | EMC | VMware. All rights reserved.

8

8

Security issue #1: VM Mobility

now you see it

now you don’t

© 2009 Cisco | EMC | VMware. All rights reserved.

9

9

Security issue #2: Static barriers are no longer sufficient The old perimeter was static.

 © 2009 Cisco | EMC | VMware. All rights reserved.

10

Security issue #2: Static barriers are no longer sufficient The new perimeter is dynamic.

#@!%

© 2009 Cisco | EMC | VMware. All rights reserved.

11

Security issue #3: VM Security Equipment is Physical Wires and cables. Routers and switches. Servers on racks. Storage arrays and disks. Memory and CPUs. Machines stay put. Security is in place.

BEFORE

AFTER

?

? ?

?

?

Equipment is Virtual How do we watch the network? Where are VMs located?. Are they moving around? What’s our change control policy? Are VMs patched? Is the hypervisor secure? Who’s responsible for security?

© 2009 Cisco | EMC | VMware. All rights reserved.

12

Security issue #4: Consolidation - Before Application Software

Virtual Machine

VSwitch

Storage & SAN

Compute

Access

Aggregation

Core

Edge

IP-NGN Backbone

App App App

OS

OS

Virtual Device Contexts

OS

Fabric-Hosted Storage Virtualization

App App App

OS

OS

Firewall Services

Internet

Virtual Device Contexts

OS

Storage Media Encryption

App App App

OS

Secure Domain Routing

OS

OS

IP-NGN Service Profiles Virtual Machine Optimization

Port Profiles & VN-Link Line-Rate NetFlow

Fibre Channel Forwarding Port Profiles & VN-Link Fabric Extension

App App App

Application Control (SLB+)

OS

OS

OS

10G Ethernet 10G FCoE 4G FC 1G Ethernet VM to vSwitch vSwitch to HW App to HW / VM

Service Control App App App

Virtual Contexts for FW & SLB

OS

OS

OS

Cisco and Third-Party Applications

VMWare Xen Hyper-V

Partners

Intrusion Detection

Nexus 1000v

Unified Computing MDS 9000 + System Consolidated EMC Intel 5500 series Storage Arrays

Nexus 5000 w/ Nexus 2000 Fabric Extender

Nexus 7000 (w/ Cat 6500 as Services Chassis)

Nexus 7000

CRS-1 7600 6500

CRS-1 ASR 9000 ASR 1000 7600

© 2009 Cisco | EMC | VMware. All rights reserved.

13

Security issue #4: Consolidation – After High risk of increase in Complexity Application Software

Virtual Machine

Compute & Access

Storage & SAN

Aggregation

Core

Virtual Device Contexts

Virtual Device Contexts

Edge

IP-NGN Backbone

App App App

Virtual Machine Optimization

OS

OS

OS

Service Profiles App App App

OS

OS

Fabric-Hosted Storage Virtualization

Internet

OS

Storage Media Encryption

App App App

OS

Secure Domain Routing

OS

OS

IP-NGN

Load Balancing Firewall Line-Rate NetFlow

SSL Termination

Partners

Intrusion Detection

… App App App

OS

OS

OS

App App App

OS

OS

OS

Cisco and Third-Party Applications

VMWare Xen Hyper-V

Unified Computing System

MDS 9000 + Consolidated EMC Storage Arrays

Nexus 7000

Nexus 7000

CRS-1 7600 6500

CRS-1 ASR 9000 ASR 1000 7600

© 2009 Cisco | EMC | VMware. All rights reserved.

14

Security issue #5: Moving to the Cloud Who Controls What? BEFORE

AFTER ?

? ?

? We Have Control It’s located at X It’s stored in server’s Y, Z We have backups in place Our admins control access Our uptime is sufficient The auditors are happy Our security team is engaged

?

Who Has Control? Where is it located? Where is it stored? Who backs it up? Who has access? How resilient is it? How is it audited? How does our security team engage?

© 2009 Cisco | EMC | VMware. All rights reserved.

15

Sikring af den private sky

© 2009 Cisco | EMC | VMware. All rights reserved.

16

Securing Clouds – Where to begin?  As with any security area, organizations should adopt a risk-based approach to moving to the cloud and selecting security options (*)

– Identify the asset for the cloud deployment – Evaluate the asset – Map the asset to potential cloud deployment models – Evaluate potential cloud service models and providers – Sketch the potential data flow – Conclusion/Decison * Cloud Security Alliance Whitepaper v2.1

© 2009 Cisco | EMC | VMware. All rights reserved.

17

Private Cloud Security

Private Cloud

 What is a Private Cloud?

– – – –

It’s Private ;-) You have control of everything You decide the security policy No need for total seperation of resources (some exceptions apply) – Need to secure virtual machines and services (see later)  Can take existing Data Center security designs and adapt them to the Cloud Computing model, see also new updated Design Guides available on www.cisco.com/go/datacenter

© 2009 Cisco | EMC | VMware. All rights reserved.

18

Virtual Server Risks  Hypervisor

–An attacker gaining unauthorized access to the hypervisor and taking control of the physical server and related virtual servers  Rogue VMs

–Has a guest operating system been compromised? –Virtual Server Mobility  Inter-VM traffic visibility and security

–Traffic between two virtual machines can flow across the bus inside the hosting physical server and not be required to be switched on an external network where traditional tools can be used

vnet adapters

Uplink Ports

 Shared File system between VMs  VMFS and VMotion

–Consolidated SANs or NAS attached storage

Physical Adapters

© 2009 Cisco | EMC | VMware. All rights reserved.

19

Virtual Machine LAN Security  Be aware of security affinities DMZ Web Server

Application Server

Database Server

–Would you place all your applications on the same VLAN?  Challenging troubleshooting and monitoring environment

!!

!!

!!

 ESX vSwitch lacks ―standard‖ network functions

–No SNMP and Netflow instrumentation to monitor flows between VMs –No ACLs and PVLAN to limit inter-VM traffic –No SPAN to enable forensic analysis of inter-VM traffic  Recommendation: Do not consolidate servers with unlike security affinities onto a single VLAN

© 2009 Cisco | EMC | VMware. All rights reserved.

20

Using Netflow to Protect Virtual Environments Nexus 1000V with NetFlow Export DMZ Web Server

!!

Application Server

!!

Database Server

DMZ Web Server

Application Server

Database Server

!!

VEM VMW ESX

© 2009 Cisco | EMC | VMware. All rights reserved.

21

What is NetFlow?  What is NetFlow

– NetFlow is like a phone bill while Packet capture is like a wiretap  This level of granularity allows NetFlow to scale for very large amounts of traffic

– We can see who’s talking to whom, over what protocols and ports, for how long, at what speed, for what duration, etc. – NetFlow is a form of telemetry pushed from the routers/switches — each one can be a sensor  Note! NetFlow is replacing Syslog on high end devices

© 2009 Cisco | EMC | VMware. All rights reserved.

22

Layer 2 Security in virtual environments  Virtual environments are usually implemented using Layer 2 technologies (VLAN)  Opens up for L2 attacks which have already been solved using Port Security and Private VLAN’s in physical switches  Examples (*):

– ARP attacks – DHCP attacks

© 2009 Cisco | EMC | VMware. All rights reserved.

23

Solving Layer 2 security - Cisco Nexus 1000V

Server VM #1

I

VM #2

VM #3

P

Server VM #4

C

VM #1

C

VM #2

VM #3

Server VM #4

VM #1

I

VM #2

VM #3

VM #4

I

Cisco Nexus 1000V VMW ESX

VMW ESX

VMW ESX

Cisco TrustSec

• Promiscuous port • Isolated port • Community port

• Access Control List • Port Security • DHCP Snooping • IP Source Guard • Dynamic ARP Inspection

SGACL Matrix Source Group

Private VLAN

Security Features

• Admission control: 802.1X • Hop-by-hop crypto: 802.1AE • Security Group Tag Destination Group

-

+

+

-

© 2009 Cisco | EMC | VMware. All rights reserved.

24

What about applying Security services in a virtual environment?

 Usually, virtual machines are associated with Security services like firewalls, load balancers and other security services  How do we ensure that these services are still doing their job when VM’s are instantiated or are moved?

– Manual configuration – Full integration into virtual environments (virtualization of the services) – Automated configuration

© 2009 Cisco | EMC | VMware. All rights reserved.

25

Impact on virtualization on network services

VMotion Application App1 1

Application 2

Policy, Security, QoS © 2009 Cisco | EMC | VMware. All rights reserved.

26

Opsummering  Cloud Computing is already happening and it is going through a enormous ‖hype‖ trend  Security is struggling to keep up but if you manage to keep your head cool, it is actually possible to ensure proper security in Cloud environments  Trust, SLA’s and the ability to assure compliance to customer requirements will become a major distinction factor between serious and non-serious Cloud Providers

© 2009 Cisco | EMC | VMware. All rights reserved.

27

Yderligere information og referencer

© 2009 Cisco | EMC | VMware. All rights reserved.

28

References  Cloud Security Alliance whitepaper

– http://www.cloudsecurityalliance.org/csaguide.pdf  Background and design guides

– Cisco Cloud page http://www.cisco.com/go/cloud  Blogs:

– Chris Hoff - http://www.rationalsurvivability.com/blog – James Urquhart - http://news.cnet.com/the-wisdom-ofclouds

© 2009 Cisco | EMC | VMware. All rights reserved.

29

Q&A

© 2009 Cisco | EMC | VMware. All rights reserved.

30

© 2009 Cisco | EMC | VMware. All rights reserved.

31