Virtualization and Cloud Computing

Slides:



Advertisements
Similar presentations
Secure Single Sign-On Across Security Domains
Advertisements

Agenda AD to Windows Azure AD Sync Options Federation Architecture
1 Dell World 2014 Dell & Trend Micro Boost VM Density with AV Designed for VDI TJ Lamphier, Sr. Director Trend Micro & Aaron Brace, Solution Architect.
Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
Securing Insecure Prabath Siriwardena, WSO2 Twitter
December 19, 2006 Solving Web Single Sign-on with Standards and Open Source Solutions Trey Drake AssetWorld 2007 Albuquerque, New Mexico November 2007.
A SOLUTION: 2X REMOTE APPLICATION SERVER. 2X REMOTE APPLICATION SERVER.
TechNet and Community Tour - Dynamic IT Dynamic Desktop Deployment Level Advanced.
Architecting a Complete Solution for the Cloud Economy Delivering Standards-Based Access Control Marc Chanliau Oracle Identity Management Bernard Diwakar.
6 Hypervisor Management OS Guest VM 1 Guest VM n Hardware User Mode Kernel Mode User Mode … Kernel Mode User Mode.
Virtualization for Cloud Computing
SIM205. (On-Premises) Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service)
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
5205 – IT Service Delivery and Support
Microsoft delivers a complete datacenter solution with Windows Server 2012 R2 out-of-the-box Cloud OS Development Management Identity Virtualization.
Federated Shibboleth, OpenID, oAuth, and Multifactor | 1 Federated Shibboleth, OpenID, oAuth, and Multifactor Russell Beall Senior Programmer/Analyst University.
Matt Steele Senior Program Manager Microsoft Corporation SESSION CODE: SIA326.
CIS 2200 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Data Center Network Redesign using SDN
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
OUC204. Recently Announced… Identity Integration Options 2 3 Identity Management Overview 1.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
Identity Management in Education. Welcome Scott Johnson, NetProf, Inc. Creator of OmnID Identity Management for Education
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Windows Azure Conference 2014 Deploy your Java workloads on Windows Azure.
ITServices Virtualization Terry Black January 2013.
Network Plus Virtualization Concepts. Virtualization Overview Virtualization is the emulation of a computer environment called a Virtual Machine. A Hypervisor.
COMS E Cloud Computing and Data Center Networking Sambit Sahu
From Virtualization Management to Private Cloud with SCVMM 2012 Dan Stolts Sr. IT Pro Evangelist Microsoft Corporation
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
Microsoft ® Official Course Module 13 Implementing Windows Azure Active Directory.
Single Sign-On
Paul Andrew. Recently Announced… Identity Integration Options 2 3 Identity Management Overview 1.
System Center Lesson 4: Overview of System Center 2012 Components System Center 2012 Private Cloud Components VMM Overview App Controller Overview.
Cloud Computing Use Case Draft v2.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
User and Device Management
Cloud Computing – UNIT - II. VIRTUALIZATION Virtualization Hiding the reality The mantra of smart computing is to intelligently hide the reality Binary->
ALL INFORMATION PRESENTED AS WELL AS ALL SESSIONS ARE MICROSOFT CONFIDENTIAL AND UNDER YOUR NON-DISCLOSURE AGREEMENT (NDA) AND\OR TECHNOLOGY PREVIEW.
WSO2 Identity Server 4.0 Fall WSO2 Carbon Enterprise Middleware Platform 2.
Secure Mobile Development with NetIQ Access Manager
F5 APM & Security Assertion Markup Language ‘sam-el’
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the purpose of Microsoft virtualization. Objective Course Weight 2%
WINDOWS AZURE AND THE HYBRID CLOUD. Hybrid Concepts and Cloud Services.
WSO2 Identity Server. Small company (called company A) had few services deployed on one app server.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Web SSO with Cloud Resources using AD Federation Services
Windows 2012R2 Hyper-V and System Center 2012
Access Policy - Federation March 23, 2016
Secure Single Sign-On Across Security Domains
Chapter 6: Securing the Cloud
Azure Active Directory - Business 2 Consumer
Introduction to Windows Azure AppFabric
VIRTUALIZATION & CLOUD COMPUTING
Prepared by: Assistant prof. Aslamzai
SaaS Application Deep Dive
Secure & Unified Identity
Managing Clouds with VMM
Auth0 Is Identity Made Simple for Developers, Built by Developers and Supported by the High Availability and Performance of Microsoft Azure MICROSOFT AZURE.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Management of Virtual Environments
Access and Information Protection Product Overview October 2013
Office 365 Identity Management
System Center Marketing
Shibboleth 2.0 IdP Training: Introduction
06 | SQL Server and the Cloud
Presentation transcript:

Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter

Agenda Virtualization Security Risks and Solutions Cloud Computing Security Identity Management

Virtualization and Cloud Computing Virtualization Security Risks and Solutions

Blue Pill Attack Joanna Rutkowska http://en.wikipedia.org/wiki/Blue_Pill_%28software%29 http://virtualization.info/en/news/2006/08/debunking-blue-pill-myth.html nearly anything, including hardware interrupts, requests for data and even the system time could be intercepted (and a fake response sent) by the hypervisor Timing attack, Trap-and-Emulate

Blue Pill Attack Presented in 2006 by Joanna Rutkowska at Black Hat conference Traps running OS by starting a hypervisor and virtualizing the underlaying machine (needs right to run privileged instructions to achieve this) Could intercept nearly anything and send fake responses (hardware interrupts, requests for data, system time etc.)

Red Pill Blue Pill is detectable by timing attack Trap-and-Emulate takes much longer than native instructions External time sources (NTP) need to be used, because system time could be spoofed

VMM Vulnerability By attacking a VMM, one could attack multiple servers at once

Datacenter Management SW Virtualization infrastructure management software (VMware vCenter, Microsoft SC VMM) is used to control multiple hosts at once

Web Access to DCs Multiple datacenters can be managed from a central console. Therefore, its security has to be hardened.

One Ring to rule them all… Management commands available using PowerShell or Web APIs Get-VM –Name * | Stop-VM Get-VM –Name * | Remove-VM Copy-VMGuestFile Invoke-VMScript –Type Bash …

DoS attack on virtualization infrastructure Demo DoS attack on virtualization infrastructure

Disabling Host-VM Communication

Physical vs. Virtual Firewall 8th ISO/OSI Layer: Politics and religion With virtualization, servers from different Trust Zones usually share the same physical resources (memory, network card, etc.)

Traffic isolation

Configuring traffic isolation on Vmware ESXi Demo Configuring traffic isolation on Vmware ESXi

Other risks of virtualization Introduction of yet another OS Reliance on traditional barriers Accelerated provisioning Security left to non-traditional security staff Audit scope creep

Security Solutions Virtual Firewall Agentless Antivirus Live migration Stretched clusters Agentless Antivirus Extensible Switches Mobile Virtualization Platform Virtual Desktop Infrastructure (VDI) Virtual firewalls are aware of the virtualized environments

Agentless AV Update Storms/Scan Storms Not always implementable: intrusion protection, packet analysis, browser protection, real time heuristics, application control, device control, NAC

Extensible Switch

Mobile Virtualization Platform

Mobile Virtualization Platform

Mobile Virtualization Platform Supported devices

Virtual Desktop Infrastructure + Data ostavaju iba vo firme - Vyzadovane stabilne prispojenie

Virtualization and Cloud Computing Cloud Computing Security Risks

Who has access to our data?

Physical Security

Hard Disk Crushers

Other Cloud Risks Unclear data location Regulatory compliance Data segregation Lack of investigative support Disaster recovery Long-term viability, vendor lock-in

Virtualization and Cloud Computing Identity Management

Identity Management Basic Concepts Identity Federation External user DBs Two-factor authentication Role-Based Access Control (RBAC) Identity Federation OAuth OpenID SAML RADIUS Proxy Identity Bridges

External User DBs Typically Active Directory or generic LDAP is used as central identity store for virtualization infrastructures

Azure Active Directory

Two-Factor Authentication

Role-Based Access Control

Identity Federation

OAuth Used to delegate user authorization to a 3rd-party service provider

Demo Creating a web application with Facebook/Twitter/ Microsoft Account authentication

OpenID

OpenID http://someopenid.provider.com/john.smith

SAML Similar to OpenID, but targeted to the enterprise Security Assertion Markup Language XML-based Supports Single sign-on Requires mutual trust between IdP and SP Multiple bindings, not just HTTP Supports Identity provider initiated authentication

SAML

SAML (Google Apps) The user attempts to reach a hosted Google application, such as Gmail, Start Pages, or another Google service. Google generates a SAML authentication request. The SAML request is encoded and embedded into the URL for the partner's SSO service. The RelayState parameter containing the encoded URL of the Google application that the user is trying to reach is also embedded in the SSO URL. This RelayState parameter is meant to be an opaque identifier that is passed back without any modification or inspection. Google sends a redirect to the user's browser. The redirect URL includes the encoded SAML authentication request that should be submitted to the partner's SSO service. The partner decodes the SAML request and extracts the URL for both Google's ACS (Assertion Consumer Service) and the user's destination URL (RelayState parameter). The partner then authenticates the user. Partners could authenticate users by either asking for valid login credentials or by checking for valid session cookies. The partner generates a SAML response that contains the authenticated user's username. In accordance with the SAML 2.0 specification, this response is digitally signed with the partner's public and private DSA/RSA keys. The partner encodes the SAML response and the RelayState parameter and returns that information to the user's browser. The partner provides a mechanism so that the browser can forward that information to Google's ACS. For example, the partner could embed the SAML response and destination URL in a form and provide a button that the user can click to submit the form to Google. The partner could also include JavaScript on the page that automatically submits the form to Google. Google's ACS verifies the SAML response using the partner's public key. If the response is successfully verified, ACS redirects the user to the destination URL. The user has been redirected to the destination URL and is logged in to Google Apps.

SAML Example <saml:Assertion ID="b07b804c-7c29-ea16-7300-4f3d6f7928ac“ Version="2.0" IssueInstant="2004-12-05T09:22:05"> <saml:Issuer>https://idp.example.org/SAML2</saml:Issuer> <ds:Signature>...</ds:Signature> … <saml:Conditions NotBefore="2004-12-05T09:17:05" NotOnOrAfter="2004-12-05T09:27:05"> </saml:Conditions> <saml:AttributeStatement> <saml:Attribute x500:Encoding="LDAP" Name="urn:oid:1.3.6.1.4.1.5923.1.1.1.1" FriendlyName="eduPersonAffiliation"> <saml:AttributeValue xsi:type="xs:string">member</saml:AttributeValue> <saml:AttributeValue xsi:type="xs:string">staff</saml:AttributeValue> </saml:Attribute> </saml:AttributeStatement> </saml:Assertion>

Microsoft Active Directory Federation Services SAML-based Typically used to give access to intranet portals to business partners

Shibboleth SAML-based federation portal Open Source

Signing in to a federated web application Demo Signing in to a federated web application

RADIUS Proxy (Eduroam)

Identity Bridges

Identity Bridges: Azure Access Control Service