44
Cybersecurity in Data Centers Murat Cudi Erentürk ISACA CISA, ISO 27001 Lead Auditor Gandalf Consulting and Software Ltd.

Cybersecurity in Data Centers - BICSI

  • Upload
    others

  • View
    3

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Cybersecurity in Data Centers - BICSI

Cybersecurity in Data Centers

Murat Cudi ErentürkISACA CISA, ISO 27001 Lead AuditorGandalf Consulting and Software Ltd.

Page 2: Cybersecurity in Data Centers - BICSI

What is Cybersecurity?• Information Security• IT Systems Security• Physical Security

Page 3: Cybersecurity in Data Centers - BICSI

International Standards• Certified Information Security System Professional

(CISSP) Common Body of Knowledge (CBK).• International Organization for Standardization (ISO)

27001 and 27002, version 2013• (NIST) Risk Management Framework (RMF) and SP

800-53,63

Page 4: Cybersecurity in Data Centers - BICSI

Threat landscape and motivations

Page 5: Cybersecurity in Data Centers - BICSI

Trends in CybersecurityCybersecurity Effectiveness

Effe

ctiv

enes

s

Time

Cyber Defenses

Cyber AttacksDefense Capex Increase

~Defense Opex

~Attack Incentive

Page 6: Cybersecurity in Data Centers - BICSI

Trends in CybersecurityIntelligent Attacker

• 7x24 In shifts• Attack research• Trained professionals

Page 7: Cybersecurity in Data Centers - BICSI

Trends in CybersecurityDetect and Delay

This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY-NC

Page 8: Cybersecurity in Data Centers - BICSI

Layer 1Layer 1

Layer 1

Trends in CybersecurityDefense in Depth

Layer 4

Layer 3

Layer 2

Layer 1

Page 9: Cybersecurity in Data Centers - BICSI

Trends in CybersecurityCatch and Repel

This Photo by Unknown Author is licensed under CC BY-NC-NDThis Photo by Unknown Author is licensed under CC BY-NC-ND

Page 10: Cybersecurity in Data Centers - BICSI

Physical SecurityPhysical Access Control (PAC) Technologies

• Components– Lock Systems– Card readers– Backend Servers

Page 11: Cybersecurity in Data Centers - BICSI

Physical SecurityVulnerabilities and Countermeasures

Photo Identity Badge and PIN

Smart Card and PIN

Photo Identity Badge and password

Access Card and Password

Photo Identity BadgePassword

Ticket (Identity

Unknown)

Keys(Identity

Unknown)

Smart Card and PIN (Identity Unknown)

Restricted Crypography

Restricted Authentication Protocols

Physical PresenceProofed Identity

Verif

icat

ion

Stre

ngth

Identity Assurance

Page 12: Cybersecurity in Data Centers - BICSI

Physical SecurityVulnerabilities and Countermeasures

Jon Doe

1002

234 Visitor

2002

234

Page 13: Cybersecurity in Data Centers - BICSI

Physical SecurityCabling Security

Page 14: Cybersecurity in Data Centers - BICSI

IT Systems SecurityNetwork Security

InstallationCost

Maintenance Cost

Separation of Networks

Page 15: Cybersecurity in Data Centers - BICSI

IT Systems SecurityServer Security Technologies

Onboard Security Chips (TPM)• Cryptokey Generation, Storage• Best use: Disk Encryption

Page 16: Cybersecurity in Data Centers - BICSI

IT Systems SecurityServer Security Technologies

• CPU Security Features– Write Protect– NXE/XD

• Protects against buffer overflows

This Photo by Unknown Author is licensed under CC BY-SA

Page 17: Cybersecurity in Data Centers - BICSI

IT Systems SecurityFirmware Security Technologies

• Provided by Device Manufacturers• Compliments Hardware provided security

Page 18: Cybersecurity in Data Centers - BICSI

IT Systems SecurityFirmware Security Technologies

This Photo by Unknown Author is licensed under CC BY-SA

UEFI in PC Firmware in Apple IoSThis Photo by Unknown Author is licensed under CC BY-SA

Page 19: Cybersecurity in Data Centers - BICSI

IT Systems SecurityFirmware Security Technologies

• What to look for– Trusted Updates– Trusted Boot– Setup Passwords

Page 20: Cybersecurity in Data Centers - BICSI

IT Systems SecurityFirmware Security Technologies

• Remote Management– Central Updates– Monitor Tampering– Change Passwords

Page 21: Cybersecurity in Data Centers - BICSI

IT Systems SecurityTrusted Boot Sequence

Firmware Check

Boot Manager Check

Operating System Check

Driver Check

Page 22: Cybersecurity in Data Centers - BICSI

IT Systems SecurityVirtualization Security Technologies

• Execution Partitions • Virtualization assisted

application whitelisting

Ring 0Ring 1

Ring 2

Ring 3

Page 23: Cybersecurity in Data Centers - BICSI

IT Systems SecurityPower Distribution Security

• UPS/PDU Security• PoE Security

This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY-SA

Page 24: Cybersecurity in Data Centers - BICSI

• IP Cameras, Recorders– Record Manipulation– Denial of Service

• Physical Access Control Systems– Unauthorized access– Covering tracks

IT Systems SecurityManagement Systems Security

Page 25: Cybersecurity in Data Centers - BICSI

IT Systems SecurityScada Systems Security in DC

• Pumps• Compressors• CRAC Units• DCIM, BAS, BMS

This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY

Page 26: Cybersecurity in Data Centers - BICSI

IT Systems SecurityScada Systems Security in DC

• Separate Networks• Disable unused

services/Controllers• Replace components that

can not be secured

Business Network

Supervisory Network

Control NetworkControl Network

Process Network

Process Network

Process Network

Process Network

Page 27: Cybersecurity in Data Centers - BICSI

Cybersecurity OperationsIncreased Security for Availability Classes

“Match your monitoring system security AND availability with systems you monitor”

Page 28: Cybersecurity in Data Centers - BICSI

Cybersecurity OperationsHolistic Approach

Page 29: Cybersecurity in Data Centers - BICSI

Cybersecurity OperationsSecurity Operations Center

Page 30: Cybersecurity in Data Centers - BICSI

Cybersecurity OperationsMinimize Operational Dependencies

IT SystemsSecurity Systems

Depends For Security

Depends For Operations

Page 31: Cybersecurity in Data Centers - BICSI

Cybersecurity OperationsCybersecurity Frameworks

• NIST Risk Management Framework– Functions (Identify, Protect, Detect, Respond, Recover)– Tiers (Partial, Risk Informed, Repeatable, Adaptive)– Categories

Page 32: Cybersecurity in Data Centers - BICSI

What can you do?

Page 33: Cybersecurity in Data Centers - BICSI

What can you do?Asses your cybersecurity risks

• You have physical access to critical Data Center systems • You use a computer connected to the network• You use Internet for communication (E-mail, Social Media)

Page 34: Cybersecurity in Data Centers - BICSI

What can you do?Select your laptop carefully

• Use a system with TPM (preferably with v2.0)

• Use disk encryption• Use secure boot

Page 35: Cybersecurity in Data Centers - BICSI

What can you do?Select your laptop carefully

• All your driver updates should be downloaded from a verified and trusted location

Page 36: Cybersecurity in Data Centers - BICSI

What can you do?Select your laptop carefully

• Use a supported and regularly updated OS AND Applications

Page 37: Cybersecurity in Data Centers - BICSI

What can you do?Select your laptop carefully

• Use Advanced Threat Protection End Point Software

Page 38: Cybersecurity in Data Centers - BICSI

What can you do?Use Secure Logon

• Use BIOS password• Use Startup password

This Photo by Unknown Author is licensed under CC BY-SA

Page 39: Cybersecurity in Data Centers - BICSI

What can you do?Use Secure Logon

• Use Multi-Factor Authentication for your laptop AND all your cloud applications

• Come up with a system for generating and remembering passwords

Page 40: Cybersecurity in Data Centers - BICSI

What can you do?USB Devices

• Best Solution: Do NOT use USB at all, network is easier to secure

• Second best: Do not insert ANY USB device to your machine that you do not know the origin. Use your own with a known brand.

Page 41: Cybersecurity in Data Centers - BICSI

What can you do?Daily Cyber Hygiene

• Beware where you send your password • Do not use public Wi-fi without VPN• Do not connect to sites if SSL is broken• Do not leave your computer with even screen

locked

Page 42: Cybersecurity in Data Centers - BICSI

What can you do?Secure your home network

• Use proper security on your wireless/Ethernet over power network

This Photo by Unknown Author is licensed under CC BY-NC-SA

Page 43: Cybersecurity in Data Centers - BICSI

What can you do?Secure your home network

• Never put any device on your local network that you can’t update firmware– Network Printers– NAS Devices– Smart Home devices– Ethernet over power switches

Page 44: Cybersecurity in Data Centers - BICSI

Questions?