+ All Categories
Home > Technology > Isaca 2011 trends in virtual security v1.0

Isaca 2011 trends in virtual security v1.0

Date post: 17-May-2015
Category:
Upload: kimwisniewski
View: 1,258 times
Download: 0 times
Share this document with a friend
Popular Tags:
40
ISACA Perth: 2011 Annual Conference Trends in Virtual Security (Balance Virtual Risk with Reward) Kim Wisniewski Senior Consultant, Empired Ltd.
Transcript
Page 1: Isaca 2011 trends in virtual security v1.0

ISACA Perth: 2011 Annual Conference

Trends in Virtual Security (Balance Virtual Risk with Reward)

Kim Wisniewski – Senior Consultant, Empired Ltd.

Page 2: Isaca 2011 trends in virtual security v1.0

» Virtualisation has come a long way in the past ten years. We are looking

beyond the pure consolidation benefits of server virtualisation, into a

future of cloud computing and infrastructure-as-a-service. No longer can

we see the data-centre that our virtual machines are running in, the safety

cord is broken. This opens the door to a plethora of new security

considerations that security professionals need to be aware of to remain

competitive.

» This presentation looks at the current state of virtualisation asking the

following questions: What should IT professionals consider when selling,

designing or auditing a virtual infrastructure? Are there any security

benefits with virtualisation? How can we safely deploy our virtual

machines in the cloud? Can PCI compliance be reached in a virtual

world? Is it even safe to virtualise my DMZ?

» The presentation will look at these objectives within the context of the

common virtualisation platforms on the market today, concluding with a

look into the future at emerging technologies and virtualisation standards

that may help those in pursuit of the ultimate secure virtual world.

The Abstract

Page 3: Isaca 2011 trends in virtual security v1.0

» Virtualisation has come a long way in the past ten years. We are looking beyond the pure consolidation benefits of server virtualisation, into a future of cloud

computing and infrastructure-as-a-service. No longer can we see the data-centre

that our virtual machines are running in, the safety

cord is broken. This opens the door to a plethora of new security

considerations that security professionals need to be aware of to remain

competitive.

» This presentation looks at the current state of virtualisation asking the

following questions: What should IT professionals consider when selling,

designing or auditing a virtual infrastructure? Are there any security

benefits with virtualisation? How can we safely deploy our virtual

machines in the cloud? Can PCI compliance be reached in a virtual

world? Is it even safe to virtualise my DMZ?

» The presentation will look at these objectives within the context of the

common virtualisation platforms on the market today, concluding with a

look into the future at emerging technologies and virtualisation standards

that may help those in pursuit of the ultimate secure virtual world.

The Abstract

Page 4: Isaca 2011 trends in virtual security v1.0

» Boundaryless Information™ (III-RM)

» Integrated Information Infrastructure Reference

Model

» Ref: TOGAF 9

Boundaryless IT

Page 5: Isaca 2011 trends in virtual security v1.0

The Next Step:

Boundaryless Technology Infrastructure

Infrastructure Mesh

Stack Convergence

Meta-Virtualise

Cloud

Legacy (old school)

siloed infrastructure

Virtual Infrastructure

Page 6: Isaca 2011 trends in virtual security v1.0

» Virtualisation has come a long way in the past ten years. We are looking

beyond the pure consolidation benefits of server virtualisation, into a

future of cloud computing and infrastructure-as-a-service. No longer can

we see the data-centre that our virtual machines are running in, the safety

cord is broken. This opens the door to a plethora of new security

considerations that security professionals need to be aware of to remain

competitive.

» This presentation looks at the current state of virtualisation asking the

following questions: What should IT professionals

consider when selling, designing or

auditing a virtual infrastructure? Are there any

security benefits with virtualisation? How can we safely deploy our virtual

machines in the cloud? Can PCI compliance be reached in a virtual

world? Is it even safe to virtualise my DMZ?

» The presentation will look at these objectives within the context of the

common virtualisation platforms on the market today, concluding with a

look into the future at emerging technologies and virtualisation standards

that may help those in pursuit of the ultimate secure virtual world.

The Abstract

Page 7: Isaca 2011 trends in virtual security v1.0

What does Uncle

Sam Say?

» Hypervisors have bugs and vulnerabilities too

» Physical isolation/separation principles are gone

» Scoping the Infra. Mesh Audit will be tricky…

Page 8: Isaca 2011 trends in virtual security v1.0

In my opinion…

» The Management Constructs

associated with virtualisation / cloud

platforms…. The biggest risks

» Your mgmt. tools and users

» …& how much is exposed to them…

Page 9: Isaca 2011 trends in virtual security v1.0

Some Top Virtual Risks

» Prebuilt VMs/appliances containing malicious code

» Improperly configured hypervisor

» Improperly configured virtual firewalls or networking

» Data leakage through templates/clones

» Administrative or operational error

» Mixing security domains without controls

» Lax hypervisor patching

» Lack of understanding of security principles across

the entire stack

A lack of process & architecture in the beginning?

Page 10: Isaca 2011 trends in virtual security v1.0

» It all starts with good PARENTING

» Physical Security

» Storage Security

» Network Security

» Converged Security (e.g., blades)

» Hypervisor security

» Guests security

» Hypervisor relationship to its guests

» Aggregates – clusters, pools, groups, etc.

» Management Centres

Virtual Architecture 101

Principles: Isolation, Separation

Page 11: Isaca 2011 trends in virtual security v1.0

» Management Layer Security

» Virtual Centres, SCVMMs, Remote Consoles

» Admin Model

» Management, Controls, Process

» Audit (self audit, independent audit, the more

the merrier…)

Virtual Architecture 102

Principles: Role Based, Auditability,

Change Logging, treat the Hypervisor

as your engine room…

Page 12: Isaca 2011 trends in virtual security v1.0

» Virtualisation has come a long way in the past ten years. We are looking

beyond the pure consolidation benefits of server virtualisation, into a

future of cloud computing and infrastructure-as-a-service. No longer can

we see the data-centre that our virtual machines are running in, the safety

cord is broken. This opens the door to a plethora of new security

considerations that security professionals need to be aware of to remain

competitive.

» This presentation looks at the current state of virtualisation asking the

following questions: What should IT professionals consider when selling,

designing or auditing a virtual infrastructure? Are there any

security benefits with virtualisation? How can

we safely deploy our virtual machines in the cloud? Can PCI compliance

be reached in a virtual world? Is it even safe to virtualise my DMZ?

» The presentation will look at these objectives within the context of the

common virtualisation platforms on the market today, concluding with a

look into the future at emerging technologies and virtualisation standards

that may help those in pursuit of the ultimate secure virtual world.

The Abstract

Page 13: Isaca 2011 trends in virtual security v1.0

» “I cannot see any security or legal

benefits whatsoever related to cloud

computing…” (A. Lawyer)

Page 14: Isaca 2011 trends in virtual security v1.0

» Some NEW possibilities

» Introspection APIs

» Deep collection & visibility

» Antivirus offload (agentless-AV)

» Meta-Virtual compliance

» Reporting / compliance tracking

» Compliance Toolkits

Page 15: Isaca 2011 trends in virtual security v1.0

» Only SOME and SPECIFIC platforms

evaluated to EAL 4+ Common Criteria,

NIST, DISA STIG, US DoD, NSA CSS

etc…

Page 16: Isaca 2011 trends in virtual security v1.0

Principles:

Build a solid foundation;

Use the vendor’s hardening guides;

& ISACA materials (auditors too)

Trust your own before anybody else's

Page 17: Isaca 2011 trends in virtual security v1.0

» Virtualisation has come a long way in the past ten years. We are looking

beyond the pure consolidation benefits of server virtualisation, into a

future of cloud computing and infrastructure-as-a-service. No longer can

we see the data-centre that our virtual machines are running in, the safety

cord is broken. This opens the door to a plethora of new security

considerations that security professionals need to be aware of to remain

competitive.

» This presentation looks at the current state of virtualisation asking the

following questions: What should IT professionals consider when selling,

designing or auditing a virtual infrastructure? Are there any security

benefits are with virtualisation? How can we safely

deploy our virtual machines in the cloud? Can PCI compliance be reached in a virtual world? Is it even safe to

virtualise my DMZ?

» The presentation will look at these objectives within the context of the

common virtualisation platforms on the market today, concluding with a

look into the future at emerging technologies and virtualisation standards

that may help those in pursuit of the ultimate secure virtual world.

The Abstract

Page 18: Isaca 2011 trends in virtual security v1.0

» Cloud (IaaS) Security

» Do you trust the providers?

» Do you trust what you’re putting out there?

Virtual Architecture 103

Principles: Architectural Transparency;

Understand the journey of your VMs

Virtualisation: a journey from your data-centre

to some cloudy ones, some mixing it up in the

middle (hybrid)

Page 19: Isaca 2011 trends in virtual security v1.0

Meta-Virtualisation

Meta = describes; is made up of; constituent parts…

Meta-Virtualise – Describe the containers,

relationships, requirements and boundaries between

VMs

• security requirements, compliance goals

• minimum performance levels, SLAs

• their relationship to the environment (the VI)

Page 20: Isaca 2011 trends in virtual security v1.0

The Virtual Machine

(Amoeba)

VM 1.0

Independent;

Basic environmental awareness

“enough to survive”

Page 21: Isaca 2011 trends in virtual security v1.0

Enhanced VMs

VM 2.0

Increased controls

Improved environmental

awareness

Still operating independently

Page 22: Isaca 2011 trends in virtual security v1.0

VMs in a Petri Dish

VM 3.0

Collaborating

Groups

Expanded META

boundary

e.g., VMware vAPP

Page 23: Isaca 2011 trends in virtual security v1.0

DMZ

Intranet

Research

Meta Groups

Page 24: Isaca 2011 trends in virtual security v1.0

DMZ Intranet

Research

Tenant Meta

Page 25: Isaca 2011 trends in virtual security v1.0

Multi

Tenant

Meta

Coca-Cola

Pepsi

ACME Corp.

Infrastructure

Cloud

Page 26: Isaca 2011 trends in virtual security v1.0

» Meta defines the principles where VMs

operate

» Meta follows where things move

» Enforcing Meta across the converged stack,

mesh, and into clouds is a challenge

Meta-Virtualisation

Think “Admission Control” – in your DC

or a Cloud Provider

Page 27: Isaca 2011 trends in virtual security v1.0

» Secure Multi Tenancy

Vendor Reference Architecture

Page 28: Isaca 2011 trends in virtual security v1.0

» Virtualisation has come a long way in the past ten years. We are looking

beyond the pure consolidation benefits of server virtualisation, into a

future of cloud computing and infrastructure-as-a-service. No longer can

we see the data-centre that our virtual machines are running in, the safety

cord is broken. This opens the door to a plethora of new security

considerations that security professionals need to be aware of to remain

competitive.

» This presentation looks at the current state of virtualisation asking the

following questions: What should IT professionals consider when selling,

designing or auditing a virtual infrastructure? Are there any security

benefits are with virtualisation? How can we safely deploy our virtual

machines in the cloud? Can PCI compliance be

reached in a virtual world? Is it even safe to

virtualise my DMZ? » The presentation will look at these objectives within the context of the

common virtualisation platforms on the market today, concluding with a

look into the future at emerging technologies and virtualisation standards

that may help those in pursuit of the ultimate secure virtual world.

The Abstract

Page 29: Isaca 2011 trends in virtual security v1.0

» Philosophical Debate

» Can & should you host your DMZ VMs on

the same host/partition/environment as

your other VMs?

Vendor Reference Architectures aplenty; but

what does the security community say?

Virtualising Your DMZ

Page 31: Isaca 2011 trends in virtual security v1.0

» PCI DSS v2.0 – Virtualisation Special

Interest Group (SIG) … formed late 2008

» PCI DSS Virtualisation Guidelines released

June 2011

Virtualising PCI-DSS

Page 32: Isaca 2011 trends in virtual security v1.0

» Virtualisation has come a long way in the past ten years. We are looking

beyond the pure consolidation benefits of server virtualisation, into a

future of cloud computing and infrastructure-as-a-service. No longer can

we see the data-centre that our virtual machines are running in, the safety

cord is broken. This opens the door to a plethora of new security

considerations that security professionals need to be aware of to remain

competitive.

» This presentation looks at the current state of virtualisation asking the

following questions: What should IT professionals consider when selling,

designing or auditing a virtual infrastructure? Are there any security

benefits are with virtualisation? How can we safely deploy our virtual

machines in the cloud? Can PCI compliance be reached in a virtual

world? Is it even safe to virtualise my DMZ?

» The presentation will look at these objectives within the context of the

common virtualisation platforms on the market today, concluding with a

look into the future at emerging

technologies and virtualisation standards that may help those in pursuit of the ultimate secure virtual world.

The Abstract

Page 33: Isaca 2011 trends in virtual security v1.0

Microsoft Virtualisation

» Hyper-V “Open Source Promise”

» Hyper-V … Cisco 1000V

» Hyper-V Trusted Computing Base (TCB)

» Hyper-V Security Best Practices Podcast

HyperV <> Azure

Convergence (IaaS)

Page 34: Isaca 2011 trends in virtual security v1.0

» Cloud Connectivity & Portability

» VMware’s vCloud Connector

» vCloud Service Providers

» Long Distance VMotion / VXLAN / OTV

» Microsoft SCVMM 2012

» OpenStack

» Meta-virtualisation: support for & building upon

Emerging Technologies

Page 35: Isaca 2011 trends in virtual security v1.0

» IaaS Cloud Encryption

» Virtual machines in transit

» Virtual machines runtime

» Customer holds the keys

» TXT/TPM Integrations

» Trusted execution technology

» Trusted platform module

» Hypervisor & cloud stack talking the TXT lingo…

Emerging Technologies

Page 36: Isaca 2011 trends in virtual security v1.0

» Demonstrating compliance across the

provider’s Infrastructure Mesh

» e.g., FISMA Certified Clouds

» Open Portability between cloud types

» e.g., Azure <> vCloud <> OpenStack ???

Emerging Trends

Standards Based Clouds

Page 37: Isaca 2011 trends in virtual security v1.0

Case Study: Los Alamos National

Laboratory www.lanl.gov

» Security research institution responsible for

American nuclear deterrence

» Achieved

» NIST Certification and Accreditation

» Authority to operate as FISMA moderate with

VMware vCloud

» Secure Multi-Tenancy (META-Virtual)

» Reference Architecture forthcoming…?

Page 39: Isaca 2011 trends in virtual security v1.0

What does Uncle Sam Say?

Page 40: Isaca 2011 trends in virtual security v1.0

Questions

[email protected]

www.empired.com


Recommended