33
© 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect Security, NSBU April 2015

© 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

Embed Size (px)

Citation preview

Page 1: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

© 2015 VMware Inc. All rights reserved.

Software-Defined Data Center:Security for the new battlefieldRob Randell, CISSPDirector/Principal Architect Security, NSBU

April 2015

Page 2: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

2

Where are we today?

The only thing outpacing security spend… is security losses

IT Spend

Security Spend

Security Breaches

Page 3: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

What does our battlefieldlook like today?

Page 4: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

4

The data center

IT Stack

Network StorageCompute

Application Layer

Page 5: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

5

Securing the data center

Security Stack

NetworkFW, IDS/IPS, NGFW, WAF,

AMP, UTM, DDoS

StorageEncryption, Key Management,

Tokenization

ComputeAV, HIPS, AMP, Encryption,

Exec/Device Control

Identity ControlsAdvanced Authentication, SSO, Authorization, User Provisioning

App/Database ControlsVulnerability Management, Storage Security,

Web Services Security, Secure OS

Page 6: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

6

Security Policy

People

Applications

Data

App

Page 7: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

7

The changing battlefield

UI

APP

Storage

DB

APP

UI

WEB

DB

Storage

APP

WEB

DB

Storage

APP

WEB

DB

Storage

APP

WEB

DB

Storage Service Service

Service Service

Service Service

Service Service

Service

Multi-tiered DistributedArchitecture

Monolithic Stack Composed Services on Converged Infrastructure

Service

Service

UI

Page 8: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

8CONFIDENTIAL

How do hackers take advantage ofmisalignment

Page 9: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

1.Prep

Attack Vector R&D

Human Recon

Delivery Mechanism

21 3

Page 10: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

2. Intrusion

Strain BDormant

Strain AActiveCompromise

Primary Entry Point

4

Install Command

& Control I/F

5

Page 11: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

Install C2 I/F Wipe Tracks Escalate Priv

Strain AActive

Escalate Privileges onPrimary Entry Point

6

Lateral Movement

7

8

3. Recon

Page 12: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

4. Recovery

Strain B Active

Strain C Dormant

Strain AActive

Attack Identified

Response Wake Up & ModifyNext Dormant Strain

9

Strain D Dormant

Page 13: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

13

5. Act on intent & Exfiltration

Attack Identified

10

Parcel &Obfuscate

11

Exfiltration

12 13

Cleanup

Page 14: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

14

Modern attack: targeted, interactive, stealthy

Why is it so difficult to move security controls inside the datacenter?An architectural challenge.

Stop infiltration Lack visibility, control to stop exfiltration

• Perimeter-centric

• Managing Compliance

• Application and User-centric

• Managing RiskShift to… Shift to…

Page 15: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

15

The Impact of Architecture

Distributed application architectures comingled on a common infrastructure

Creates a hyper-connected compute base with little context of how to connect the two layers

Resulting in massive misalignment

1. Lateral Movement

2. Comingled Policy

3. Distributed Policy

4. Chain Alignment

5. Orchestration

6. Context

Page 16: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

16

1. Lateral movementMoving from asymmetry to symmetrical concerns inside the data center

APP

UI

WEB

DB

Storage

APP

UI

WEB

DB

Storage

APP

WEB

DB

Storage

APP

WEB

DB

Storage Service Service

Service Service

Service Service

Service Service

Service

PerimeterFirewall

InsideFirewall

DataBreach

Composed Services on Converged Infrastructure

Entry Point

Page 17: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

17

2. Comingled policyConverged infrastructure means many firewall policies for many comingled applications

Composed Services on Converged Infrastructure

Perimeterfirewall

Insidefirewall

Service Service

Service Service

Service Service

Service Service

Service

WEB

DB

Storage

APP

WEB

DB

Storage

APP

UI

WEB

DB

Storage

APP

UI

WEB

DB

Storage

APP

Policy mixing across multiple apps

Mis-aligned over time due to above

Page 18: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

18

3. Distributed policyTraversing the network could represent encountering 10,000+ policies

Composed Services on Converged Infrastructure

APP

UI

WEB

DB

Storage

APP

UI

WEB

DB

Storage

APP

WEB

DB

Storage

APP

WEB

DB

Storage Service Service

Service Service

Service Service

Service Service

Service

Perimeterfirewall

Insidefirewall

Firewall #1100 rules

Firewall #2700 rules

Firewall #3900 rules

Inconsistent policies create misalignment

Page 19: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

19

4. Chain alignment

APP

UI

WEB

DB

Storage

APP

UI

WEB

DB

Storage

APP

WEB

DB

Storage

APP

WEB

DB

Storage Service Service

Service Service

Service Service

Service Service

Service

Perimeterfirewall

InsideFirewall

Composed Services on Converged Infrastructure

Blue App: Green App:

Improper sequencing of controls leads to issues

Page 20: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

5. OrchestrationEach security service is acting in a silo and not sharing states with each other

APP

UI

WEB

DB

Storage

APP

UI

WEB

DB

Storage

APP

WEB

DB

Storage

APP

WEB

DB

Storage Service Service

Service Service

Service Service

Service Service

Service

PerimeterFirewall

InsideFirewall

Composed Services on Converged Infrastructure

Vulnerability Management

Antivirus

Next-gen Firewall

Intrusion Protection

Anti-malware

20

Page 21: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

21

APP

UI

WEB

DB

Storage

APP

UI

WEB

DB

Storage

APP

WEB

DB

Storage

APP

WEB

DB

Storage Service Service

Service Service

Service Service

Service Service

Service

Perimeterfirewall

InsideFirewall

HTTP://192.159.2.10:8080

End Point Agent

HTTP://192.163.8.10:8080

10.20.2.1409:00:02:A3:D1:3D

HTTP://192.162.5.8:8080

10.18.3.13 08:00:03:A4:C2:4C

6. ContextPoor handles for policy and analytics

Composed Services on Converged Infrastructure

Page 22: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

Visualization is the key.A ubiquitous abstraction layer between the applications and the infrastructure.

Page 23: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

23

A traditional data center starts with compute capacity

Page 24: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

24

Then you network systems together

Internet

Page 25: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

25

Then you virtualize your compute

vSw

itchHypervisor vS

witchH

ypervisor vSw

itchHypervisor vS

witchH

ypervisorvS

witchH

ypervisor vSw

itchHypervisor vS

witchH

ypervisor vSw

itchHypervisor

Page 26: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

26

And create “virtual data centers”

vSw

itchHypervisor vS

witchH

ypervisor vSw

itchHypervisor vS

witchH

ypervisorvS

witchH

ypervisor vSw

itchHypervisor vS

witchH

ypervisor vSw

itchHypervisor

Virtual NetworksSoftware Containers, Like VMs

Virtual Network Topology

Page 27: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

27

Micro-segmentation

More than a barrier: a policy primitive

Assess

• Capture and expose application structural context to policy management (how do things connect together)

• Demonstrate the security posture of a service, in any state into which it may be driven (understand security posture)

Align

• Align investment to risk—align controls to what they are protecting and to each other.

• Align candidate mitigations/remediation across an application topology

3

Isolate

• Compartmentalize the environment so a breach of one thing isn’t a breach of everything

• Provide a mechanism for structuring the right controls at the right position in the app topology

Page 28: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

28

Take those comingled distributed applications…

App

Services

DB

AD NTP DHCP DNS CERT

DMZ

W

APP

W

APP

DB

W

APP

DB

W

APP

DB

W

APP

DB

W

APP

DBDB

VM VM VM VM VM

Page 29: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

29

And can create a zero trust model

Isolation Explicit Allow Comm. Secure Communications Structured Secure Comms.

VM VM VM

VM VM VM

VM VM VM

VM VM VM

VM VM VM

VM VM VM

NGFW

IPS

IPS

NGFW

WS

VM VM VM

DB DB

IPS

WAF

And align your controls to what you are protecting

Page 30: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

30

Implementing Security in the Virtualization Layer

SECURITY SERVICES MANAGEMENTSecurity Service Insertion and Orchestration

SECURITY SERVICES MANAGEMENTVisibility, Provisioning, and Orchestration

SOCSIEM, Security Analytics, Forensics

GOVERNANCE/COMPLIANCEVul Management, Log Management, GRC, Posture Management,

DLP

NETWORKFW, IDS/IPS, NGFW, WAF, AMP, UTM, DDoS

STORAGEEncryption, Key Management, Tokenization

COMPUTEAV, HIPS, AMP, Encryption, Exec/Device Control

SECURITY INFRASTRUCTURE

IDENTITY CONTROLSAdvanced Authentication, SSO, Authorization, User Provisioning

APP/DATABASE CONTROLSVulnerability Management, Storage Security, Web Services Security, Secure OS

ISOLATIONCONTEXT

Page 31: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

31

Virtualization: making your security controls better

1UbiquityPlace controlseverywhere

2ContextVisibility intoapp/user/data

3MitigationLeverage the I/Fand the ecosystem

4IsolationProtect your controlsfrom attackers

5 Orchestrationand state distribution

SECURITY SERVICES MANAGEMENTVisibility, Provisioning, and Orchestration

SOCSIEM, Security Analytics, Forensics

GOVERNANCE/COMPLIANCEVul Management, Log Management, GRC, Posture Management,

DLP

NETWORKFW, IDS/IPS, NGFW, WAF, AMP, UTM, DDoS

STORAGEEncryption, Key Management, Tokenization

COMPUTEAV, HIPS, AMP, Encryption, Exec/Device Control

SECURITY INFRASTRUCTURE

IDENTITY CONTROLSAdvanced Authentication, SSO, Authorization, User Provisioning

APP/DATABASE CONTROLSVulnerability Management, Storage Security, Web Services Security, Secure OS

Page 32: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

32

Summary

We’re experiencing a changing battlefield

We must re-align controls to what they are protecting

Virtualization/SDDC holds the key to solving this

The real value is not in simply looking at how to secure an SDDCbut in how you can leverage an SDDC to secure the things that matter?

Page 33: © 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect

Thank you