Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

50
Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter

Transcript of Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Page 1: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Virtualization and Cloud Computing

Virtualization, Cloud and Security

Michael Grafnetter

Page 2: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Agenda

Virtualization Security Risks and Solutions Cloud Computing Security Identity Management

Page 3: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Virtualization and Cloud Computing

Virtualization SecurityRisks and Solutions

Page 4: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Blue Pill Attack

Page 5: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Blue Pill Attack

Presented in 2006 by Joanna Rutkowska at Black Hat conference

Traps running OS by starting a hypervisor and virtualizing the underlaying machine (needs right to run privileged instructions to achieve this)

Could intercept nearly anything and send fake responses (hardware interrupts, requests for data, system time etc.)

Page 6: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Red Pill

Blue Pill is detectable by timing attack Trap-and-Emulate takes much longer than native

instructions External time sources (NTP) need to be used,

because system time could be spoofed

Page 7: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

VMM Vulnerability

By attacking a VMM, one could attack multiple servers at once

Page 8: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Datacenter Management SW

Virtualization infrastructure management software (VMware vCenter, Microsoft SC VMM) is used to control multiple hostsat once

Page 9: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Web Access to DCs

Multiple datacenters can be managed from a central console. Therefore, its security has to be hardened.

Page 10: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

One Ring to rule them all…

Management commands available using PowerShell or Web APIs Get-VM –Name * | Stop-VM Get-VM –Name * | Remove-VM Copy-VMGuestFile Invoke-VMScript –Type Bash …

Page 11: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Demo

DoS attack on virtualization infrastructure

Page 12: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.
Page 13: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Disabling Host-VM Communication

Page 14: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Physical vs. Virtual Firewall

With virtualization, servers from different Trust Zones usually share the same physical resources (memory, network card, etc.)

Page 15: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Traffic isolation

Page 16: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Demo

Configuring traffic isolationon Vmware ESXi

Page 17: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Other risks of virtualization

Introduction of yet another OS Reliance on traditional barriers Accelerated provisioning Security left to non-traditional security staff Audit scope creep

Page 18: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Security Solutions

Virtual Firewall Live migration Stretched clusters

Agentless Antivirus Extensible Switches Mobile Virtualization Platform Virtual Desktop Infrastructure (VDI)

Page 19: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Agentless AV

Page 20: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Extensible Switch

Page 21: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Mobile Virtualization Platform

Page 22: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Mobile Virtualization Platform

Page 23: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Mobile Virtualization Platform

Supported devices

Page 24: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Virtual Desktop Infrastructure

Page 25: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Virtualization and Cloud Computing

Cloud Computing Security Risks

Page 26: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Who has access to our data?

Page 27: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Physical Security

Page 28: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Hard Disk Crushers

Page 29: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Other Cloud Risks

Unclear data location Regulatory compliance Data segregation Lack of investigative support Disaster recovery Long-term viability, vendor lock-in

Page 30: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Virtualization and Cloud Computing

Identity Management

Page 31: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Identity Management

Basic Concepts External user DBs Two-factor authentication Role-Based Access Control (RBAC)

Identity Federation OAuth OpenID SAML RADIUS Proxy Identity Bridges

Page 32: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

External User DBs

Typically Active Directory or generic LDAP is used as central identity store for virtualization infrastructures

Page 33: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Azure Active Directory

Page 34: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Two-Factor Authentication

Page 35: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Role-Based Access Control

Page 36: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Identity Federation

Page 37: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

OAuth

Used to delegate user authorizationto a 3rd-party service provider

Page 38: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Demo

Creating a web applicationwith Facebook/Twitter/

Microsoft Account authentication

Page 39: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

OpenID

Page 40: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

OpenID

http://someopenid.provider.com/john.smith

Page 41: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

SAML

Similar to OpenID, but targeted to the enterprise

Security Assertion Markup Language XML-based Supports Single sign-on Requires mutual trust between IdP and SP Multiple bindings, not just HTTP Supports Identity provider initiated

authentication

Page 42: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

SAML

Page 43: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

SAML (Google Apps)

Page 44: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

SAML Example<saml:Assertion

ID="b07b804c-7c29-ea16-7300-4f3d6f7928ac“ Version="2.0"

IssueInstant="2004-12-05T09:22:05">

<saml:Issuer>https://idp.example.org/SAML2</saml:Issuer>

<ds:Signature>...</ds:Signature>

<saml:Conditions

NotBefore="2004-12-05T09:17:05" NotOnOrAfter="2004-12-05T09:27:05">

</saml:Conditions>

<saml:AttributeStatement>

<saml:Attribute x500:Encoding="LDAP" Name="urn:oid:1.3.6.1.4.1.5923.1.1.1.1" FriendlyName="eduPersonAffiliation">

<saml:AttributeValue xsi:type="xs:string">member</saml:AttributeValue>

<saml:AttributeValue xsi:type="xs:string">staff</saml:AttributeValue>

</saml:Attribute>

</saml:AttributeStatement>

</saml:Assertion>

Page 45: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Microsoft Active Directory Federation Services

SAML-based Typically used to give access to intranet

portals to business partners

Page 46: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Shibboleth

SAML-based federation portal Open Source

Page 47: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Demo

Signing in to a federatedweb application

Page 48: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

RADIUS Proxy (Eduroam)

Page 49: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Identity Bridges

Page 50: Virtualization and Cloud Computing Virtualization, Cloud and Security Michael Grafnetter.

Identity Bridges:Azure Access Control Service