Virtual Security in Cloud Networks

38
Virtualization Security is NOT Cloud Security! Privacy, Security and Trust Issues arising from Cloud Computing Flash Talk

description

Understanding the difference between Cloud and Virtualization

Transcript of Virtual Security in Cloud Networks

Page 1: Virtual Security in Cloud Networks

Virtualization Security is NOT Cloud Security!

Privacy, Security and Trust Issues arising from Cloud

Computing

Flash Talk

Page 2: Virtual Security in Cloud Networks

Who Am I?Marcelo Grebois

[email protected]

www.linkedin.com/grebois@Grebois

Page 3: Virtual Security in Cloud Networks

General Idea and Agenda

• Understanding the difference between Cloud and Virtualization

• Definition of Cloud computing

• The problem of the cloud

• The common risks

• The real risks

• Possible solutions

• Deeper concerns

Page 4: Virtual Security in Cloud Networks

Not Focusing on any vendor

Page 5: Virtual Security in Cloud Networks

Intended Audience

This presentation is more theorical than technical so its main audience is;

-All Sysadmins-Security Auditors- Infrastructure designers-Virtualization professionals

Page 6: Virtual Security in Cloud Networks

“Cloud computing is a model for enabling convenient, on-demand

network access to a shared pool of configurable computing resources (e.g., networks, servers, storage,

applications, and services) that can be rapidly provisioned and released with minimal management effort or service

provider interaction.”

NIST definition of Cloud Computing

Page 7: Virtual Security in Cloud Networks

NIST does not include virtualization as part of their cloud description so;

CLOUD COMPUTING IS NOT VIRTUALIZATION

Cloud Computing is a new paradigm that offers a number of new features.

Any new paradigm has weaknesses characteristic to its very design.

What is NOT cloud computing

Page 8: Virtual Security in Cloud Networks

The Power Grid Analogy

Page 9: Virtual Security in Cloud Networks

What they want us to believe

-Totally secure

-Management Free

-Pay-as-you-go

-No Downtime

Page 10: Virtual Security in Cloud Networks

The Problem

Page 11: Virtual Security in Cloud Networks

Organizational Ownership?

Who owns the Virtual network?

VMServiceProcess

VMServiceProcess

VMServiceProcessVMService

Process

VMServiceProcessVMService

ProcessVM

VMServiceProcessVMService

ProcessVMServiceProcess

Management

VMVM

Ph

ys

ica

l NIC

s

Physical Network Virtual Network

Traditional Security Who’s Watching?

Network Admin

Server Admin

Application Owners

Data Custodians

?

Page 12: Virtual Security in Cloud Networks

Data becomes part of an abstraction model

Page 13: Virtual Security in Cloud Networks

People only care about data

Page 14: Virtual Security in Cloud Networks

So what are the common threats?

Page 15: Virtual Security in Cloud Networks

As in any model, you just have to find the gaps

Page 16: Virtual Security in Cloud Networks

More Virtual = More Gaps

Page 17: Virtual Security in Cloud Networks

Downtimes

Page 18: Virtual Security in Cloud Networks

Phishing“hey! check out this funny blog about you...”

Page 19: Virtual Security in Cloud Networks

19

Password Cracking

Page 20: Virtual Security in Cloud Networks

Botnets and Malware

Page 21: Virtual Security in Cloud Networks

But what are the real threats?

Page 22: Virtual Security in Cloud Networks

• Ring -3 – User mode rootkits• Ring -0 – Kernel mode rootkits

• Ring -1 – Hypervisor rootkits• Ring -2 – SMM rootkits• Ring -3 – AMT rootkits

Lord of the Rings

Page 23: Virtual Security in Cloud Networks

• Threat #1: Abuse and Nefarious Use of Cloud

• Threat #2: Insecure Interfaces and APIs

• Threat #3: Malicious Insiders

• Threat #4: Shared Technology Issues

• Threat #5: Data Loss or Leakage

• Threat #6: Account or Service Hijacking

• Threat #7: Unknown Risk Profile

The usual suspects

Page 24: Virtual Security in Cloud Networks

What should we do about this?

Page 25: Virtual Security in Cloud Networks

Don’t let one person managing all the devices • Enforce Separation of Duties (SOD)

SOD makes sure that one individual cannot complete a critical task by himself.

Avoid the same person can manage the hosts and the Virtual Machine

Use Role Based Access Control

• RBAC is the model used in Virtual Center

FOCUS ON DATA

Page 26: Virtual Security in Cloud Networks

Network Access Control grants access to enterprise network resources is granted based upon authentication

of the user and device as well as only if compliat with policy

Authentication

Page 27: Virtual Security in Cloud Networks

Authorization

Page 28: Virtual Security in Cloud Networks

Follow best practices

Page 29: Virtual Security in Cloud Networks

Security Principle

Implementation in VI

Least Privileges

Roles with only required privileges

Separation of Duties

Roles applied only to required objects

Administrator

Operator

UserAnne

Harry

Joe

Enforce Strong Access Controls

Page 30: Virtual Security in Cloud Networks

• Security Best Practices (Firewalls, IPS, Patching, Patching, Patching, Patching)• Secure your VMs as you would physical machines

• Secure the Network• Use Separate Private backup and SAN network• Use Separate Private Management Console network

• Favor Type 1 Hypervisors for Production and Testing Servers• VMWare ESX Server, Citrix XenServer, MS Hyper-V, etc.

• Favor Type 2 use in Security applications• Disable Hardware Acceleration• Use QEmu (full emulation mode w/out kqemu) • Disable all sharing features

• Favor Type 2 for Development environments• Run different security zones VMs on separate physical hosts

• Use separate physical switches or VLANs in physical switches• Run different Management stations

• Disable/remove unnecessary virtual hardware

Keep follow best practices

Page 31: Virtual Security in Cloud Networks

So that’s it?

Page 32: Virtual Security in Cloud Networks

Software-as-a-service Problems

Page 33: Virtual Security in Cloud Networks

Platform-as-a-service Problems

Page 34: Virtual Security in Cloud Networks

Infrastructure-as-a-service Problems

Page 35: Virtual Security in Cloud Networks

What about forensics?

Page 36: Virtual Security in Cloud Networks

• Most CSP does not provide incident analysis

• Access to log is restricted to the customers

• Forensics become almost impossible

• CSP force you to trust in their security

Incident Analysis

Page 37: Virtual Security in Cloud Networks

God please save me!

Page 38: Virtual Security in Cloud Networks

• Possible solutions are;• HIDS• Virtual Firewalls• Catbird Security• Vshield

• Of course the old ones;• Data encryption• Data integrity check ( during VMs

transfer )

Is not that bad!