Securing the Fortress with Barbican at Symantec Jason Fritcher Principal Infrastructure Engineer Cloud Platform Engineering.

Slides:



Advertisements
Similar presentations
Implementing Tableau Server in an Enterprise Environment
Advertisements

Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
The following 10 questions test your knowledge of Internet-based client management in Configuration Manager Configuration Manager 2007 Internet-Based.
IT Analytics for Symantec Endpoint Protection
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
Internet of Things Security Architecture
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
Keystone Security A Symantec Perspective on Securing Keystone
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
1 Security on OpenStack 11/7/2013 Brian Chong – Global Technology Strategist.
Backup Modernization with NetBackup Appliances
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Adding scalability to legacy PHP web applications Overview Mario A. Valdez-Ramirez.
1 June 1, 2015 Secure access to project budget information for OAR Principal Investigators Eugene F Burger Sylvia Scott Tracey Nakamura John L Forbes PMEL.
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Copyright© Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Tightening the Network: Network.
Symantec De-Duplication Solutions Complete Protection for your Information Driven Enterprise Richard Hobkirk Sr. Pre-Sales Consultant.
Chapter 7 HARDENING SERVERS.
Security and Policy Enforcement Mark Gibson Dave Northey
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
Notes: Update as of 12/31/2010 inclusive. Chart counts NIST CVE – Reported Software Flaws by “published” date, utilizing the NIST NVD. SQL Server.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
1 When Cloud Networking meets Cloud Computing: Software-Defined Networking (SDN) Customer Application Faan DeSwardt Infrastructure Architecture Manager.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
Ravi Sankar Technology Evangelist | Microsoft Corporation
PlacePlace TypeType ServiceService Analysis Caching Integration Sync Search Relational BLOB Query BackupLoad Multi Dim In Memory File XML Reporting.
Clinic Security and Policy Enforcement in Windows Server 2008.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Cloud Computing for the Enterprise November 18th, This work is licensed under a Creative Commons.
The Next Phase of Virtual Infrastructure Kevin Bailey Director - Product Marketing EMEA Symantec Corporation.
Training Workshop Windows Azure Platform. Presentation Outline (hidden slide): Technical Level: 200 Intended Audience: Developers Objectives (what do.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
1 Safely Using Shared Computers Amanda Grady December 2013.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
DEP350 Windows ® Rights Management (Part 1): Introduction, Concepts, And Technology Marco DeMello Group Program Manager Windows Trusted Platforms & Infrastructure.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Future of the Server Room Tour. Ottawa Montreal Calgary Vancouver Toronto Future of Your Server Room Three Pillars of Windows Server 2008 Virtualization.
Quick Thoughts on PGP Use Cases for KMIP 1 Michael Allen Sr. Technical Director.
The current state of Cybersecurity Targeted and In Your Pocket Dale “Dr. Z” Zabriskie CISSP CCSK Symantec Evangelist.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Installation of Storage Foundation for Windows High Availability 5.1 SP2 1 Daniel Schnack Principle Technical Support Engineer.
Web Services Security Patterns Alex Mackman CM Group Ltd
Copy to Tape TOI. 2 Copy to Tape TOI Agenda Overview1 Technical Feature Implementation2 Q&A3.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Service Pack 2 System Center Configuration Manager 2007.
Optimized Synthetics 1 OpenStorage Optimized Synthetics.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Microsoft ® Lync™ Server 2010 Setup and Deployment Module 04 Microsoft Corporation.
OST Virtual Synthetics 1. Synthetics Overvier Definitions – Catalog – Image – Extent Process Overview (today) – Extent map derivation – Read agenda –
Secure Data Access with SQL Server 2005 Doug Rees Associate Technologist, CM Group
6 Copyright © 2007, Oracle. All rights reserved. Managing Security and Metadata.
C Copyright © 2007, Oracle. All rights reserved. Security New Features.
ASP.NET 2.0 Security Alex Mackman CM Group Ltd
APIs related to NBU AIR Feature 1 OST APIs Related to NBU AIR Feature.
Security on OpenStack 11/7/2013
Enterprise Security in Practice
Security in Windows Store apps
Windows Azure 講師: 李智樺, Ruddy Lee
Upgrading Your Private Cloud with Windows Server 2012 R2
Building global and highly-available services using Windows Azure
Microsoft Virtual Academy
Presentation transcript:

Securing the Fortress with Barbican at Symantec Jason Fritcher Principal Infrastructure Engineer Cloud Platform Engineering

About Me In the Internet industry for nearly 20 years Worked in Development and Operations roles running Internet services Always had an interest in and an eye towards security In my free time, I enjoy Electronics, Video Games and Motorcycling 2 Copyright © 2015 Symantec Corporation

Agenda Copyright © 2015 Symantec Corporation 3 1Introduction to Barbican 2Barbican at Symantec 3Barbican Hardening 4Barbican Improvements 5Q & A

Agenda Copyright © 2015 Symantec Corporation 4 1Introduction to Barbican 2Barbican at Symantec 3Barbican Hardening 4Barbican Improvements 5Q & A

Introduction to Barbican Ye Olde Barbican 5 Copyright © 2015 Symantec Corporation “A Barbican is a fortified outpost or gateway, such as an outer defense to a city or castle, or any tower situated over a gate or bridge which was used for defensive purposes.” - Wikipedia

Introduction to Barbican Today’s Barbican 6 Copyright © 2015 Symantec Corporation Barbican is a REST API designed for the secure storage, provisioning and management of secrets such as passwords, encryption keys and X.509 Certificates.

Introduction to Barbican Secrets – Hold the data to be secured. – Small objects, typically < 10KB data Containers – Logical grouping of secrets Orders – Longer running tasks, like key generation Barbican Resources 7 Copyright © 2015 Symantec Corporation

Introduction to Barbican Components API Processes – Handles all interactions with the clients – Processes all secret and container tasks – Submits order tasks for workers Worker Processes – Processes all tasks which take more than a trivial amount of time Asymmetric key generation Certificate management Barbican Architecture 8 Copyright © 2015 Symantec Corporation

Introduction to Barbican Potential Dependencies Keystone – User authentication / authorization External Database – Replaces default SQLite option, more scalable Message Queue – API to Worker communication Hardware Security Module – Provides secure crypto environment and master key storage Barbican Architecture 9 Copyright © 2015 Symantec Corporation

Agenda Copyright © 2015 Symantec Corporation 10 1Introduction to Barbican 2Barbican at Symantec 3Barbican Hardening 4Barbican Improvements 5Q & A

Barbican at Symantec Secrets stored in Version Control System TLS Key Storage Encryption Keys Automated Deployments Automating Certificate Management Problems 11 Copyright © 2015 Symantec Corporation

Barbican at Symantec LBaaS TLS Provisioning Configuration Management Key Management as a Service for Product Groups Use Cases 12 Copyright © 2015 Symantec Corporation

Barbican at Symantec Galera MySQL DB Cluster – Multi master topology, plus top-notch replication, including cross data center RabbitMQ Cluster SafeNet Luna SA HSMs – More on these later uWSGI + Apache + mod_proxy_uwsgi – Maybe mod_security to add WAF functionality Implementation 13 Copyright © 2015 Symantec Corporation

Agenda Copyright © 2015 Symantec Corporation 14 1Introduction to Barbican 2Barbican at Symantec 3Barbican Hardening 4Barbican Improvements 5Q & A

Barbican Hardening Server TLS – Enabling TLS is as simple as specifying the key and cert in my.cnf ssl_key=/etc/pki/tls/private/mysql.key ssl_cert=/etc/pki/tls/certs/mysql.crt – To ensure TLS is always used, add REQUIRE SSL to your MySQL user account Client TLS – Activate TLS for connections by adding ssl_ca parameter to the connection string sql_connection = MySQL TLS Challenges – Intermediate certificates don’t work properly – Client hostname validation code is poor – Client/Server issues depending on OpenSSL versions Database 15 Copyright © 2015 Symantec Corporation

Barbican Hardening Restricted Node Access – Should only be accessible to a small pool of personnel For just sshd restriction, see {ALLOW,DENY}{USERS,GROUPS} in sshd_config man page For broader restrictions, look at pam_listfile or pam_access modules Automation issues – Automation systems like Puppet, or Chef could be problematic, depending on risk tolerance Filesystem permissions – Barbican should only have read permissions to everything, except a log and tmp directory. Network controls – Firewall network traffic to only allow traffic from authorized hosts, Load Balancers and Monitoring Barbican Node 16 Copyright © 2015 Symantec Corporation

Barbican Hardening Hardware Security Modules are specialized devices that provide a secure execution and storage environment for cryptography. Form factor varies in shape and size (USB, PCI-Express, Network Appliance) Performance varies drastically between devices – General Purpose CPUs beat HSMs for raw symmetric performance Not easily jumped into, some of my challenges – Data Center personnel hesitant with unfamiliar hardware – Building a secure environment within the data center – Auditing and compliance policies / processes – Separation of privileges Hardware Security Modules 17 Copyright © 2015 Symantec Corporation

Agenda Copyright © 2015 Symantec Corporation 18 1Introduction to Barbican 2Barbican at Symantec 3Barbican Hardening 4Barbican Improvements 5Q & A

Barbican Improvements Existing p11_crypto and PKCS11 modules have a lot of room for improvement – Lot of round trips to the HSM per transaction – Sessions are opened, authenticated and closed per transaction – Not a lot of caching is done Improvements being made – First effort is to reduce the number of operations made per transaction Caching project keys in the HSM and reusing them when possible, this saves ~4 RTs Holding first authenticated session open to make subsequent session opens faster Later we’ll use just a single connection or small pool to reduce setup/teardown costs Sync up with community efforts in this same realm PKCS11 Performance Improvements 19 Copyright © 2015 Symantec Corporation

Barbican Improvements Existing p11_crypto and PKCS11 modules is all or nothing – Barbican’s transaction rate become limited by the HSMs – To scale performance, you need to add more HSMs Improvements being made – Split class of service being implemented – First class will be the full HSM model is use today – Second class will relax security standard a little HSM will continue to encrypt/decrypt the Project Keys Project Keys will be used on node to do encrypt/decrypt operations on secrets Combined with caching Project Keys, should remove majority HSM bottleneck Going to work with community on design for contribution PKCS11 Classes of Service 20 Copyright © 2015 Symantec Corporation

Barbican Improvements Existing database model provides integrity protection for encrypted secret data – Does not provide integrity protection to other stored metadata – Attacker can change metadata and Barbican won’t detect it Researching ways to add integrity protection without killing performance Database Integrity Protection 21 Copyright © 2015 Symantec Corporation

Agenda Copyright © 2015 Symantec Corporation 22 1Introduction to Barbican 2Barbican at Symantec 3Barbican Hardening 4Barbican Improvements 5Q & A

Q & A 23Copyright © 2015 Symantec Corporation

Thank you! Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Jason Fritcher 24