+ All Categories
Home > Documents > Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ......

Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ......

Date post: 14-May-2018
Category:
Upload: duongtuyen
View: 221 times
Download: 4 times
Share this document with a friend
Embed Size (px)
of 65 /65
SESSION ID: SESSION ID: #RSAC Tom Corn Transforming Security Part 1: Cloud & Virtualization SPO1-R10 Senior Vice President, Security Products VMware @therealtomcorn
Transcript
Page 1: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

SESSION ID:SESSION ID:

#RSAC

Tom Corn

Transforming Security Part 1: Cloud & Virtualization

SPO1-R10

Senior Vice President, Security Products VMware@therealtomcorn

Page 2: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

GLASS. WOOD.

CONCRETE.

Page 3: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

THE PLANNING

PHASE

DEVELOPMENT

PHASE

FUNCTIONAL

TEST

GENERAL

AVAILABILITY

Page 4: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

THE PLANNING

PHASE

DEVELOPMENT

PHASE

FUNCTIONAL

TEST

GENERAL

AVAILABILITY

Page 5: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

DAY 2

OPERATIONS

Page 6: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

THREAT

THREAT

THREAT THREAT

THREAT

THREAT

Page 7: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

7

Page 8: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud
Page 9: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud
Page 10: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud
Page 11: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

11

YOUR CRITICAL APPLICATION

IS YOUR BABY

Page 12: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

12

Page 13: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

From Monolithic Stack to Distributed Apps

Page 14: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

The Application is a Network

Page 15: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Securing the InfrastructurePERIMETER SECURITY

Page 16: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

The Impact of Architectural Shifts on SecurityPERIMETER SECURITY

Page 17: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

The Impact of Architectural Shifts on SecurityPERIMETER SECURITY

Page 18: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

18

Misalignment

Security Policies Security Controls

APPS DATA COMPUTE NETWORK

Page 19: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Propagation Extraction ExfiltrationInfiltration

Attack vector/malware

Delivery mechanism

Entry point compromise

Escalate privileges

Install C2* infrastructure

Lateral movement

Break into data stores

Network eavesdropping

App-level extraction

Parcel and obfuscate

Exfiltration

Cleanup

Stop infiltration Stop exfiltration

Page 20: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Propagation Extraction

Escalate privileges

Install C2* infrastructure

Lateral movement

Break into data stores

Network eavesdropping

App-level extraction

Known good

Known bad

Unknown

Mass Complexity

Page 21: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

The Only Thing Outpacing Growth in Security Spend is Growth in Security Breaches

IT Spend Security Spend Security Breaches

Annual Cost of Security

Breaches: $445B(Source: Center for Strategic and Int’l Studies)

Security as a % of IT

Spend:

2012: 11%

2015: 21 %(Source: Forrester)

Projected Growth Rate

in IT Spend from 2014-

2019: Zero (Flat)(Source: Gartner)

Page 22: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

22

We need to align controls and policies to the application

Security Policies

APPS DATA

Security Controls

COMPUTE NETWORK

Application

Page 23: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

23

Application

We need to establish least privilege environments

Page 24: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

“Every program and every privileged

user of the system should operate using

the least amount of privilege necessary

to complete the job.”

Professor Jerome Saltzer,MIT Communications of the ACM

Page 25: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Least Privilege Is More Than Just Blocking

Propagation Extraction ExfiltrationInfiltration

Attack vector/malware

Delivery mechanism

Entry point compromise

Escalate privileges

Install C2* infrastructure

Lateral movement

Break into data stores

Network eavesdropping

App-level extraction

Parcel and obfuscate

Exfiltration

Cleanup

Page 26: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Least Privilege Is More Than Just Blocking

Propagation Extraction

Application

Network

Data Plane

Page 27: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Least Privilege Is More Than Just Blocking

StaticCourse Grained

DynamicFine Grained

Prevent

Detect

Respond

Application

Network

Data Plane

Page 28: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

28

• Highly complex and noisy

• Exposed, i.e., untrusted monitoring, limited context

• Manual and lacking orchestration

From our current modelFocused on malicious behavior

Page 29: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

29

To a new modelFocused on good (intended) behavior

• Simpler and smaller problem set

• Better signal to noise ratio

• Actionable and behavior-based alerts and responses

Page 30: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Why Haven’t We Done This Already?

APPLICATION

UNDERSTANDING

INFRASTRUCTURE

ALIGNMENT

DATACENTER

DYNAMICS

Application context and visibility

Connecting the dots between apps and I/F

Datacenters are highly dynamic

THE STAKES ARE HIGH

If we get it wrong…

At best: operational complexity

At worst: application disruption

Page 31: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

What does this have to do with virtualization and cloud?

Page 32: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

It Provides an Abstraction Layer Between I/F and Apps

Page 33: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Unique Properties of the Virtualization LayerIt’s in a unique position to see both Intentional and Runtime State

Intended State Runtime State

Application

Page 34: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Unique Properties of the Virtualization LayerIt’s in a unique position to understand the infrastructure and control topology

NGFWIPSWAF sFW ENC

TopologyApplication

Page 35: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Unique Properties of the Virtualization LayerIt’s in a unique position to maintain this alignment as the datacenter and applications evolve

Topology AlignmentApplication

Page 36: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Unique Properties of the Virtualization LayerIt’s in a unique position to deliver a high degree of automation

Topology Alignment AutomationApplication

Page 37: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Unique Properties of the Virtualization LayerIt’s in a unique position to deliver isolation: maintain a separate trust domain for security

Topology Alignment IsolationAutomationApplication

Page 38: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Isolation

We can leverage the unique properties of cloud and virtualization to

secure critical applications

Application Topology Alignment Automation

Page 39: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

VMVM

VMVM

APPVMVM

VMVM

APPVMVM

VMVM

APP

Software-Defined Security

Page 40: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Attack Vectors

Application

Data Plane

Network

Page 41: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Attack Vectors

Page 42: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Traditional Segmentation

Page 43: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Micro-Segmentation

FW

FW

DB

WEB

APP

APP

APP

Page 44: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Attack Vectors

Page 45: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

What About Exposure from the Physical Underlay?

Listening Inserting

DB

WEB

APP

APP

APP

Page 46: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

You Can Solve that with Encryption…. But that turns out to be enormously complex

DB

WEB

APP

APP

APP

Page 47: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Encryption as a Distributed Service

DB

WEB

APP

APP

APP

Page 48: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Application-Focused Least Privilege

Page 49: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

The Application as a System of Components

Processes

Security Agents / Monitoring

OS

Inbound

Communications

Outbound

Communications

Processes

Security Agents / Monitoring

OS

Inbound

Communications

Outbound

Communications

Processes

Security Agents / Monitoring

OS

Inbound

Communications

Outbound

Communications

DB

WEB

APP

APP

APP

Page 50: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Least Privilege for the Application LayerDetection and Response

Intentional State

Intended State Runtime State

Page 51: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Least Privilege for the Application LayerDetection and Response

Intentional State

Infrastructure Events(vRA, vCenter, NSX, Chef, Puppet,

AWS, etc)

• Machine context

• Control and security policies

• Network topology

Developer Workflow(Maven, Ansible, Jenkins, etc)

• Application flows down to process level

• Code signing/authorization

Runtime Behavior(Agents, Netflow, Policy Changes, etc)

• Process and network behavior

• Ideal for brownfield apps

Page 52: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Least Privilege for the Application LayerDetection and Response

Intentional State

Untrusted Zone (Guest)

Processes

Security Agents / Monitoring

OS

InboundCommunications

OutboundCommunications

Trusted Zone (Kernel)

Virtual Enclave

Runtime AttestationSecure Context Store

Page 53: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Least Privilege for the Application LayerDetection and Response

Intentional State

Untrusted Zone (Guest)

Processes

Security Agents / Monitoring

OS

InboundCommunications

OutboundCommunications

Trusted Zone (Kernel)

Virtual Enclave

Runtime AttestationSecure Context Store

Page 54: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Least Privilege for the Application LayerDetection and Response

Intentional State

Untrusted Zone (Guest)

Processes

Security Agents / Monitoring

OS

InboundCommunications

OutboundCommunications

Trusted Zone (Kernel)

Virtual Enclave

Runtime AttestationSecure Context Store

Great Context | Lacks Isolation

Security In Hardware

Great Isolation | Lacks Context

Security In Software

Goldilocks

Page 55: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Least Privilege for the Application LayerDetection and Response

Intentional State Remediation

Untrusted Zone (Guest)

Processes

Security Agents / Monitoring

OS

InboundCommunications

OutboundCommunications

Trusted Zone (Kernel)

Virtual Enclave

Runtime AttestationSecure Context Store

Page 56: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Least Privilege for the Application Layer

Untrusted Zone (Guest)

Security Agents / Monitoring

OutboundCommunications

Trusted Zone (Kernel)

Runtime AttestationSecure Context Store

Remediation

Page 57: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Least Privilege for the Application Layer

Intentional State Remediation

Untrusted Zone (Guest)

Processes

Security Agents / Monitoring

OS

InboundCommunications

OutboundCommunications

Trusted Zone (Kernel)

Virtual Enclave

Runtime AttestationSecure Context Store

Page 58: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Extending the Concept to the Security Ecosystem

Intentional State Remediation

Trusted Zone (Kernel)

Virtual Enclave

Runtime AttestationSecure Context Store

SECURITY VENDORS

Page 59: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

The Future of Software-Defined Security

Correlation/AnalyticsGovernance, Risk & Compliance

Network Security Controls Data Security ControlsCompute Security Controls

Network

Application-Centric

Micro-segmentation

Application-Centric

Detection & Response

Compute

PREVENT DETECT/RESPOND

ApplicationApplication

Page 60: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Propagation Extraction ExfiltrationInfiltration

Attack vector/malware

Delivery mechanism

Entry point compromise

Escalate privileges

Install C2* infrastructure

Lateral movement

Break into data stores

Network eavesdropping

App-level extraction

Parcel and obfuscate

Exfiltration

Cleanup

Page 61: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Propagation Extraction

Escalate privileges

Install C2* infrastructure

Lateral movement

Break into data stores

Network eavesdropping

App-level extraction

Known good

Known bad

Unknown

Page 62: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

Propagation Extraction

Escalate privileges

Install C2* infrastructure

Lateral movement

Break into data stores

Network eavesdropping

App-level extraction

Known good

Known bad

Unknown

Page 63: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

How do you secure virtualization?

How do you use virtualization to secure?

Page 64: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

64

Practitioners Vendors Cloud Infrastructure

What will you deliver next?

Page 65: Transforming Security Part 1: Cloud & Virtualization · Transforming Security Part 1: Cloud ... Practitioners Vendors Cloud Infrastructure ... Transforming Security Part 1: Cloud

SESSION ID:SESSION ID:

#RSAC

Tom Corn

Transforming Security Part 1: Cloud & Virtualization

SPO1-R10

Senior Vice President, Security Products VMware@therealtomcorn


Recommended