Infrastructure as a Service

Slides:



Advertisements
Similar presentations
1 Dell World 2014 Dell & Trend Micro Boost VM Density with AV Designed for VDI TJ Lamphier, Sr. Director Trend Micro & Aaron Brace, Solution Architect.
Advertisements

FIREWALLS Chapter 11.
Solidcore Harness the Power of Change John Sebes CTO Solidcore Systems, Inc. Case Study:
Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
VMware Virtualization Last Update Copyright Kenneth M. Chipps Ph.D.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
5205 – IT Service Delivery and Support
Security Guidelines and Management
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Copyright 2009 Trend Micro Inc. Harish Agastya, Director Server Security Product Marketing Server Security Press Presentation.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
An emerging computing paradigm where data and services reside in massively scalable data centers and can be ubiquitously accessed from any connected devices.
Module 14: Configuring Server Security Compliance
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Wireless Intrusion Prevention System
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Security Vulnerabilities in A Virtual Environment
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Introduction to Barracuda IM Firewall
CISOs Guide To Communicating WNCRY.
Microsoft Azure Virtual Machines
Chapter 6: Securing the Cloud
Avenues International Inc.
Top 5 Open Source Firewall Software for Linux User
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Critical Security Controls
AT&T Premises-Based Firewall Enhanced SBS Solution
CompTIA Security+ SY0-401 Real Exam Question Answer
Security of In-Vehicle Software
Firewall.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Answer the questions to reveal the blocks and guess the picture.
Introduction to Networking
Firewalls.
Virtualization & Security real solutions
Scalable SoftNAS Cloud Protects Customers’ Mission-Critical Data in the Cloud with a Highly Available, Flexible Solution for Microsoft Azure MICROSOFT.
Healthcare Cloud Security Stack for Microsoft Azure
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
IS4680 Security Auditing for Compliance
Part 3.
Chris Ince ISO Lead Auditor Security Risk Management Ltd
Healthcare Cloud Security Stack for Microsoft Azure
Technology Convergence
Microsoft Data Insights Summit
Presentation transcript:

Infrastructure as a Service Flexibility. Economy of resources. Free choice of computing power. New risks to providers and enterprises.

Economy 1. IT infrastructure on demand – more cost-effective. 2. No redundant IT infrastructure, staff, and/or investments. No restraining factor to innovations. 3. Flexible response to the needs in computing power. Flexibility, scalability, configurability, mobility.

Flexibility 1. Outsourcing hardware infrastructure; retaining IT management. 2. Outsourcing all aspects of IT management. 3. Mixed model; outsourcing some segments of IT management where applicable. Most often implemented on demand of enterprise administrative branches.

IDC market research International Data Corporation Surveyed top managers of 244 leading IT companies world-wide. As early as in 2008.

Primary concerns Will I have the same level of control over the IT infrastructure and the data? Does the IT infrastructure comply with the Law? How can I demonstrate it to the auditors? How will I prove to my company that the IT system is secure? How do I know that Service-Level Agreements will be observed?

Data-Processing Centre Risk 1: Placing sensitive data outside the secure perimeter may expose them to security risks. Risk 2: Placing sensitive data outside the secure perimeter may be incompatible with the Law.

Secure perimeter Firewall. DMZ. Network segmentation. Intrusion Detection & Prevention Systems. Network monitors.

Virtualization More computing power from physical servers' redundant capacities. Smaller DPC's, server consolidation, reduced costs of operation. Individual services; diversified configuration of applications.

Virtualization kills secure perimeter Impossible to build and apply secure perimeter: Many servers are installed on one hardware platform. Data security has to be built around the data themselves and each server. Generally low level of security. Secure perimeter loses its sense. Only application of new line of defence allows for transferring IT operations to the cloud.

Difficulties of cloud security Means of cloud security in principle the same as traditional means of system security. Providers of cloud services install virtual machines on the same physical servers. Increases efficiency of virtualization, compromises security. Traditional means of system security can't protect from attacks on virtual machines from within the same physical server.

System administrators have access via Internet. Access to the servers System administrators have access via Internet. Unlike traditional systems with access control on physical level. Additional challenges to the system security. Strict control of the administrators' access – critical. So is control and transparency of changes on the system level.

VM state and volatility Virtual machines are dynamic. Can be easily – rolled back to a previous state; – shut down and/or restarted; – cloned and moved between servers. Vulnerabilities and/or misconfigurations can spread uncontrollably.

Vulnerabilities & attacks from within The same level of risk to be hacked or infected. In fact it's even higher: A number of VM's working at the same time on a physical server increases the attacked space. New challenge: hacking or infecting from within. On the same physical server one virtual machine may attack another virtual machine. Intrusion Detection and Prevention systems now must be capable of working on the VM level, regardless of the location of that VM in the cloud.

A VM may be compromised even if turned off. Idle virtual machines A VM may be compromised even if turned off. Enough if the perpetrator has access to the images storage. VM defenceless while turned off: No security software is operating. It's responsibility of the provider of cloud services to scan idle virtual machines regularly. Companies should control if providers enable scanning on regular basis in their cloud environment.

Security solutions designed for x86 platform. Efficiency Security solutions designed for x86 platform. Without the virtualization in mind. Massive scanning of multiple resources will cause a dramatic decrease in efficiency of the whole cloud structure. Solution is in scanning on the hypervisor level: No concurrency for resources on the VM level. Companies should control if providers enables scanning on regular basis in their cloud environment.

Data integrity In a cloud attacked space is bigger and under greater risks than in traditional environment. It's critically important to prove that the data were not compromised to internal and external auditors. Logs must be analyzed for system integrity, file integrity, as well as internal activities. Compliance with security standards (PCI DSS, HIPAA, etc.) provides “safe haven” in case of data security breach.

Update management Once a company subscribed to a cloud service, updating their applications is not provider's responsibility. About 90% of data security breaches occurred due to misunderstanding of update management. “Virtual patches”: Blocking vulnerability attacks on the network level. If timely update is impossible or impracticable.

Laws and policies Data security standards (PCI DSS, HIPAA, GLBA, etc.) and security audit recommendations (ISO, SAS70, etc.) require ability to prove compliance with Law regardless physical loction of the cloud system Service-Level Agreements must provide for access to physical servers, virtual servers, firewall configuration, intrusion detection and prevention systems, logs, and anti-viruses.

Firewalls Reduce the attacked space. Cloud firewalls must comprise: – VM isolation; – input/output traffic filtration; – IP protocols coverage (TCP, UDP, ICMP, etc.); – IP frameworks coverage (TCP, ARP, etc.); – DoS attacks prevention; – sniffing and spoofing prevention. Also control over the physical location.

Intrusion detection & prevention Primary task to screen operating system's and applications' vulnerabilities until they will be eliminated. Must provide protection from known, as well as unknown (zero-day) vulnerabilities. Must provide protection from XSS and SQL injection.

Data integrity Detecting and preventing unauthorized changes in the operating system, files, and/or registers. Must include: – scheduled scanning and scanning on demand; – files' formats, properties, attributes and CRC; – directories' properties and attributes; – configurability of the scope of scanned objects; – reports (for audit).

Log analysis Detecting events, significant from the point of view of the information security, in the logs. Suspicious behaviour. Administrators' actions. Statistical analysis of events throughout the whole cloud infrastructure. Security of Information and Event Management (SIEM).

Measures against malicious s/w Anti-viruses adpted for the cloud environment. VMsafe: Software interface provided from the hypervisor (Vmware). Scanning active and idle virtual machines. Checking integrity of the VM's as well as their content (files, applications, and registers). Guarantees economical use of the physical resources.

VMsafe Protects active as well as idle virtual machines. Prevents blocking and/or uninstalling anti-viruses. Integrated with the cloud management control panel (Vmware vCenter). Automatic configuration of new virtual machines.

Thank you for your attention! Any questions? Thank you for your attention!