54
WHY THE HOST RULES CLOUD IDS By Sam Bisbee, CTO of Threat Stack

3 Reasons Why The Host Rules Intrusion Detection in The Cloud

Embed Size (px)

Citation preview

Page 1: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

WHY THE HOST RULES CLOUD IDS

By Sam Bisbee, CTO of Threat Stack

Page 2: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

Introductions

Sam BisbeeCTO of Threat Stack

As the Chief Technology Officer at Threat Stack, Sam is responsible for leading the Company's strategic technology roadmap for its continuous security monitoring service, purpose-built for cloud environments. Sam brings highly-relevant experience in distributed systems in public, private, and hybrid cloud environments, as well as proven success scaling SaaS startups. Sam was most recently the CXO at Cloudant (acquired by IBM in Feb. 2014), a leader in the Database-as-a-Service space, where he played a senior technical and product role.

Page 3: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

Intrusion detection systems (IDS) have traditionally been deployed as network hardware devices enabled by access to the network infrastructure.

Page 4: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

Today, intrusion detection systems are struggling to find relevance in a world where the traditional network boundary no longer exists.

Page 5: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

This software shift has forced innovation in how organizations collect data from their Cloud environments and analyze that data for threat indicators.

Page 6: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

Some organizations began to work on this problem before the Cloud became pervasive.

Now everyone who wants to run their workload in the Cloud must contend with IDS in a software-only environment.

Page 7: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

The opportunity can be taken now to reevaluate whether it makes sense to collect data from and about the network or the host.

Page 8: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

How you answer this question directly impacts the complexity of your solution and defines the types of questions you will be able to answer about your environment.

Page 9: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

Three core reasons why we at Threat Stack believe that host-based intrusion detection

is best suited to the Cloud and software-defined environments…

Page 10: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

1. The Workload Holds The Truth

Page 11: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

If everything is software, then it’s critical to include it in the way we do security monitoring.

Page 12: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

This means that net flows by themselves are no longer sufficiently valuable; they must be contextualized with the users and processes that participated in the communication.

Page 13: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

For example, is it useful to know that an SSH connection left your environment if you cannot trivially associate it with a system user?

This context is critical for forensics and basic alerting, but let’s push it further…

Page 14: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

Role-based deployments of infrastructure became increasingly popular in the Cloud because it is so trivial to provision and manage many small instances.

Page 15: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

Each unit should perform one discrete function, meaning that if a server alters its workload, its operators should be notified of a potential breach or misconfiguration.

Page 16: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

This is one reason why at Threat Stack we recommend grouping your policies based on roles that match your environment.

This allows us to detect new processes, network activity, and file system changes across a whole set of servers.

Page 17: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

Put another way…

All your web servers should look and act the same, and your IDS should notify you if this is not the case.

Page 18: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

While a network-based approach may notice a change in the amount or type of traffic being emitted from your server, it will not be able to tell you the source in your workload that caused the abnormality.

Page 19: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

This means that it is up to you, the operator, to correlate host and network information, which meaningfully impacts your mean time to root cause.

Page 20: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

There is also no guarantee that the network sensor would have even appreciated the workload change.

It certainly could not have told you that a non-system user was accessing your database instead of your authorized workload.

Page 21: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

2. The Hidden Cost of Network IDS

Page 22: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

Another fascinating side effect of Cloud computing is that network, or bandwidth, is the last finite resource in our environments.

Page 23: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

Theoretically, there is an infinite amount of compute and storage that can be provisioned. Companies like Amazon and Google are incentivized to make as much of these resources available to you as they can.

Page 24: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

We have yet to see the same sorts of gains in Cloud service providers’ (CSP) networks though…

Page 25: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

When combined with the aforementioned ease of provisioning many smaller instances, it is no wonder that the benefits of parallelization have outpaced the rate at which per-core speeds have increased.

Page 26: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

That is to say, horizontal scaling can produce greater processing power and efficiency than vertical scaling.

Page 27: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

Why does this matter when discussing host versus network monitoring?

Solutions that tap a network interface and send carbon copies of packets to an off-host analysis tool effectively cut your potential bandwidth in half.

Page 28: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

This might be okay if the analysis is of a high value, but the vast majority of that net flow data will not be valuable, which means that you are spending through the nose on a finite resource for little return.

Page 29: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

This is especially costly if you are one of the many companies out there like Threat Stack working with large data sets, which would require you to disable network monitoring for those clusters.

Page 30: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

Most databases are already replicating data between hosts and many modern databases are performing these transactions inline across more than one host.

Page 31: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

Replaying those streams and doubling network traffic on your database servers is costly for both system performance and your CSP bill.

Yet it is hard to imagine that you would not want your IDS protecting your databases…

Page 32: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

This was not as much of a problem previously for network-based analysis because a vendor would sell you a piece of hardware that you would feed traffic to with port mirroring, allowing you to drastically decrease the impact on network performance.

Page 33: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

(I think it’s unnecessary for me to point out that this will not work in the Cloud as there is no loading dock address or remote hands…)

Page 34: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

Sadly, many vendors are attempting to replicate this model with “virtual appliances” and network-based solutions instead of embracing workload focused analysis at the host layer.

Page 35: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

“Cloud washing” network analysis is simply untenable given the way we think about and build our systems today.

Page 36: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

3. Concerns with Proxy Availability, Complexity & Security

Page 37: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

Let us assume that you are okay paying the price to stream all or most of your traffic twice…

One common technique to decrease the per-host penalty is to proxy all host-to-host network traffic through a set of servers that are running the network monitor or tap.

Page 38: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

This set up heavily penalizes east-west network traffic (server-to-server), especially if you can imagine introducing an extra network hop to each RPC call.

Page 39: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

But only proxying north-south network traffic (external-to-internal) does not give you sufficient visibility since you must understand how your workloads interact with one another.

(Plus, as all of those articles from the 1990s and 2000s taught us, perimeter detection alone is not sufficient and you must deploy monitoring with a “defense in depth” mindset.)

Page 40: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

However you arrange your proxies, you really only get insight into the traffic if you can decrypt it to inspect the payload.

Page 41: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

Your north-south network traffic is almost certainly encrypted and I have seen more companies encrypt east-west network traffic on principal due to fear stemming from high profile disclosures.

Page 42: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

However, decrypting that traffic costs compute and likely introduces more latency into the proxy’s network hop…

Page 43: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

Not only does this put you in a position of managing many proxy servers to sustain high availability and throughput, but you also have to deploy certificates and private keys onto the proxies to decrypt the traffic.

Page 44: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

This could be a very risky proposition depending on where the proxy sits in your network architecture.

This is especially true if you are decrypting north-south traffic on a NAT host, because now your private keys and certificates sit on a WAN routable host.

Page 45: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

Host-based monitoring does not introduce any of these complexities.

Page 46: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

We go so far as to never inspect your network packets at Threat Stack, instead only monitoring the network connection table and associating those connections with processes in your system.

Page 47: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

This way we can tell you who or what your workload is talking to, and likely why, without having to penalize network performance, introduce new availability concerns, or potentially put private keys at risk.

Page 48: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

From our and our customers’ experiences, the deployment of a host-based IDS is far simpler than a network-based IDS, which is itself a security feature.

Page 49: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

A Few Final Thoughts…

Page 50: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

You’ve likely noticed through this presentation that the majority of our comparison has been from the architectural and infrastructure point of view.

Page 51: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

This must be the starting point for new security products looking to secure Cloud deployments, as we have seen in other software verticals.

Page 52: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

Forklifting on-premises assets or Cloud washing concepts for off-premises deployments leads to confused or less impactful value.

Page 53: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

Focusing on the workload and understanding the new architectural behaviors in the Cloud, such as the lack of network control and bandwidth availability, naturally leads to host-based intrusion detection systems.

Page 54: 3 Reasons Why The Host Rules Intrusion Detection in The Cloud

See how host-based IDS can work for you.

Give Threat Stack a Try!

threatstack.com