© 2011 IBM Corporation Cloud Security Perspectives Dan Carlsen Certified Security IT Specialist – IBM

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Operating System Security
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Database Administration and Security Transparencies 1.
Security in the Cloud: Can You Trust What You Can’t Touch? Rob Johnson Security Architect, Cloud Engineering Unisys Corp.
Security Controls – What Works
Information Security Policies and Standards
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
Stephen S. Yau CSE , Fall Security Strategies.
Cloud Usability Framework
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
5205 – IT Service Delivery and Support
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Auditing Cloud Computing: Adapting to Changes in Data Management IIA and ISACA Joint Meeting March 12, 2013 Presented by: Jay Hoffman (AEP), John Didlott.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Cloud Computing Cloud Security– an overview Keke Chen.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Chapter 6 Operating System Support. This chapter describes how middleware is supported by the operating system facilities at the nodes of a distributed.
In the name of God :).
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Engineering Essential Characteristics Security Engineering Process Overview.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
April 09, 2008 The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 1 The Demilitarized Zone as an Information Protection.
© 2004 IBM Corporation IBM ^ z/VM Design considerations > Security > Performance (SIE)
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
Security Vulnerabilities in A Virtual Environment
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Development of a Clean Room/Highly Restricted Zone June 12, 2012 Thomas Garrubba - CVS Caremark; Manager, Technical Assessments Group ©2011 The Shared.
Architecture & Cybersecurity – Module 3 ELO-100Identify the features of virtualization. (Figure 3) ELO-060Identify the different components of a cloud.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Cloud Computing Lecture 5-6 Muhammad Ahmad Jan.
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
IS3220 Information Technology Infrastructure Security
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Unit 2 VIRTUALISATION. Unit 2 - Syllabus Basics of Virtualization Types of Virtualization Implementation Levels of Virtualization Virtualization Structures.
INF526: Secure Systems Administration Composition of Systems And Security Domains Prof. Clifford Neuman Lecture 3 3 June 2016 OHE100C.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
© 2011 IBM Corporation IBM Cloud Computing Data en Cloud Computing Frank van der Wal, Technical Advocate.
Onsite CRM Security
Chapter 6: Securing the Cloud
Cloud Security– an overview Keke Chen
Control system network security issues and recommendations
Cloud Management Mechanisms
IS4550 Security Policies and Implementation
IS4680 Security Auditing for Compliance
Keeping Member Data Safe
How to Mitigate the Consequences What are the Countermeasures?
Cloud-Enabling Technology
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

© 2011 IBM Corporation Cloud Security Perspectives Dan Carlsen Certified Security IT Specialist – IBM

© 2011 IBM Corporation Perspectives 2  IBM Corporation Security is one of the top customer concerns about Cloud Computing What does this mean? Cloud customers need assurance that providers are following sound security practices in mitigating the risks facing both the customer and the provider. The security requirements in cloud computing are not different from other distributed environments operated in a service provider model. However, through the low price points offered in a cloud and an often more anonymous consumer-provider- interaction, worries can grow..

© 2011 IBM Corporation Security in the Cloud According to IBM's Institute for Business Value 2010 Global IT Risk Study, cloud computing raised serious concerns among respondents about the use, access and control of data 3 A recent Appirio survey of 150+ mid to large-sized firms that have already adopted cloud applications:

© 2011 IBM Corporation Customer Concerns with Cloud Computing * 4  IBM Corporation  LOSS OF GOVERNANCE: Customer relinquishes some control over the infrastructure. TRUST in the provider is paramount. Providers experience with outsourcing provides evidence of trust.  COMPLIANCE RISKS: The providers operational characteristics directly affect the ability for a customer to achieve compliance with appropriate regulations and industry standards.  ISOLATION FAILURE : multi-tenancy and shared resources are defining characteristics of cloud computing. This risk category covers the failure of mechanisms separating storage, memory, routing and even reputation between different tenants (e.g., so-called guest-hopping attacks). However it should be considered that attacks on resource isolation mechanisms (e.g.,. against hypervisors) are still less numerous and much more difficult for an attacker to put in practice compared to attacks on traditional Operating Systems  DATA HANDLING -DATA PROTECTION: The customer relinquishes control over their data to the provider. The provider must give demonstrable assurances to the customer that their data is maintained securely from other tenants of the cloud. These assurances are part of the basis for trust in the provider -INSECURE or INCOMPLETE DATA DELETION: Does the provider ensure that data is deleted in a manner that does not allow leakage upon re-allocation.  MANAGEMENT INTERFACE COMPROMISE: customer management interfaces of a public cloud provider are accessible through the Internet and mediate access to larger sets of resources (than traditional hosting providers) and therefore pose an increased risk, especially when combined with remote access and web browser vulnerabilities  MALICIOUS INSIDER: Cloud architectures necessitate certain roles which give the provider highly privileged capabilities. Provider operations, monitoring and incident handling build trust with the customer. Providers history of running outsourcing contracts also builds trust * 2009 European Network and Information Security Agency (ENISA) Cloud Computing: Benefits, risks and recommendations for information security

© 2011 IBM Corporation Loss of Governance 5  IBM Corporation  TRUST -Concerns that at some level the customer is relinquishing control  Raises the questions -Can I trust the provider to handle my data in a manner that meets my requirements -How assured am I that the provider is managing the cloud in a competent manner -How assured am I that my data is separated from other tenants -How assured am I that my data is protected from insiders at the provider

© 2011 IBM Corporation Compliance Risks 6  IBM Corporation  Challenges -Myriad of different regulations, industry practices that a customer must meet -Customer is ultimately responsible for being compliant with the appropriate measures -Cloud provider capabilities factor into how a customer achieves their compliance objectives -Different cloud types put different burden on the provider (e.g. Infrastructure-as-a- Service on data center operations, Software-as-a-Service on application compliance)  Measures in Development/Test Cloud and Desktop Cloud -Our current infrastructure-focused service products, customer data is opaque to the provider. Provider is a custodian of the data, and does not touch the customer data -Typically in industry-specific compliance policies, from an infrastructure perspective, deal with:  Managing privileged access  Auditing of accesses to data by provider staff  Policies and practices for dealing with incidents

© 2011 IBM Corporation Isolation Failure 7  IBM Corporation  Challenges -Providing robust means of separating customers from each other.  Measures in Development/Test Cloud and Desktop Cloud -Development/Test cloud is a “multi-instance” form of multi-tenancy  Customers get “instances” of operating system images, which execute on resources that are shared between multiple tenants. -Mechanisms  Hypervisors - enforces separation of operating system instances within a single physical hardware system. Provides a “logical” air-gap between customers  Network Separation -Firewalls - Customer controlled -implemented independent of the operating systems at the hypervisor utilizing Trusted Virtual Domains -Virtual LANs -Customers can choose to have their guest images on a dedicated virtual LAN -VLANs connect back to the customer using Virtual Private Networks

© 2011 IBM Corporation Data Handling 8  IBM Corporation  Challenges -Ensuring that customer data is available to only that customer -Ensuring that when a customer deletes data (or ephemeral data is no longer in use) that it becomes unreadable  Measures in Development/Test Cloud and Desktop Cloud -Data Protection  Customers provided with the ability to create “virtual disk drives”(VDD) (files which are presented to virtual machines as block devices). Customer can utilize operating system and application level encryption against these as they are accessed as native file systems to the guests.  Each customers data is stored in a unique “file set” within the CC storage structure  Access Control Lists (ACL’s) are used to ensure separation of customers. Guests run as a specific “customer” user. ACL’s on files are set to that user. -Data Destruction  Any data on disk is securely erased using a US DoD algorithm when deleted  Ephemeral storage - when the storage is no longer used by a virtual machine  Customer VDDs - when deleted from the management console.

© 2011 IBM Corporation Management Interface Compromise 9  IBM Corporation  Challenges -Ensuring customer operations are separated from other customers -Ensuring that web based interfaces implement robust security practices -Ensuring customer accesses to their resources are managed and controlled by the customer  Measures in Development/Test Cloud and Desktop Cloud -Administrative Portal  Authenticated via Web Identity  Authorized via Portal Access Controls  Provides interfaces to initiate automated work flows for discrete tasks -Customer manages the privileges of their user base  Operations logged - end to end transaction auditing -Operating Systems Guests  Once provisioned IBM has no direct access to the guest VM;s  Customers provided with initial SSH Key pair or Administrative password -Customers MUST change these and any middleware administrative passwords upon taking control over the guest

© 2011 IBM Corporation Malicious Insider 10  IBM Corporation  Challenges -Ensuring that Cloud providers enforce policies for administrative operations to the infrastructure. This includes disciplinary policies. -Ensuring that the provider has documented policies which are applied for all administrators  Measures in Development/Test Cloud and Desktop Cloud -Automation  Not a traditional Security construct  Automation assures control over specific administrative tasks which are broken down to well defined work flow sequences. -Automation is audited end to end to be able to re-construct a given work flow -Human Administration  All infrastructure components are managed/operated to the same policies as IBM Internal systems (ITCS104).  Shared user ID’s are prohibited. Each administrative user uses their own ID to authenticate.  User authorizations assigned based on least privilege principles.  IBM’s business conduct guidelines provide the framework for disciplinary action should administrative privileges be abused.

© 2011 IBM Corporation Monitoring/Reporting 11  IBM Corporation  Challenges -Ensuring that the infrastructure is managed per provider specified policies -Providing reports to customers about operations which affect the infrastructure as a whole or their specific resources.  Measures in Development/Test cloud and Desktop Cloud -Logging  Infrastructure systems enable operating system audit capabilities  End to end operation flows are logged and auditable  Audit log data is retained for 90 days  Logs are monitored and incident tickets raised for any actions which are not permitted. -Intrusion  Infrastructure is monitored by Intrusion Detection & Protection systems (IDS/IPS)  Internet points of ingress and egress are monitored with IDS/IPS  Future - will provide customer specific IDS/IPS through hypervisor introspection technology -Reporting  Internal reporting of security incidents through monitoring of audit data  Future - customer level reports of actions which affect/alter the security of the infrastructure that directly relates to their resources.

© 2011 IBM Corporation For more information on Cloud computing   Cloud Security Whitepaper ibm.com/press/us/en/attachment/32799.wss?fileId=ATTA CH_FILE1&fileName= _US Cloud Computing White Paper_Final_LR.pdf