15
Managing Cloud Security: Intrusion Detection in Public Cloud Environments

Cloud Security Topics: Network Intrusion Detection for Amazon EC2

Embed Size (px)

DESCRIPTION

With the rapid growth of online commerce, the challenge to secure and monitor internal and customer-facing websites, card processing systems and other critical infrastructure has never been greater. Deploying full-featured intrusion detection in a public cloud has been challenging – the network models and multi-tenancy of public clouds do not make deep network services easy to deploy. Misha Govshteyn, VP of Emerging Products at Alert Logic will present a new approach for a an IDS solution in a public cloud.

Citation preview

Page 1: Cloud Security Topics: Network Intrusion Detection for Amazon EC2

Managing Cloud Security: Intrusion Detection in Public Cloud Environments

Page 2: Cloud Security Topics: Network Intrusion Detection for Amazon EC2

2

Introduction

• About the presenter− Misha Govshteyn− Founder & VP of Emerging Products at Alert Logic

• Our topic today:− Deploying Network Intrusion Detection technologies in Amazon

EC2 environment

Page 3: Cloud Security Topics: Network Intrusion Detection for Amazon EC2

Datapipe Cloud Services Stack

3

Page 4: Cloud Security Topics: Network Intrusion Detection for Amazon EC2

Comprehensive Security

4

“Strong security controls are a requirement for many

mission-critical IT workloads. Customers demand that

service providers address security as they move IT

infrastructure to fully elastic public cloud environments”

- Joel Friedman, Datapipe CSO

“Strong security controls are a requirement for many

mission-critical IT workloads. Customers demand that

service providers address security as they move IT

infrastructure to fully elastic public cloud environments”

- Joel Friedman, Datapipe CSO

IDS

2 Factor Authentication

Vulnerability Scanning

Integrity Monitoring

Configuration Assessment (Tripwire)

Firewall

Antivirus

Web Application Firewall

TDE – Transparent Database Encryption

Page 5: Cloud Security Topics: Network Intrusion Detection for Amazon EC2

5

Why detect intrusions?

Do you want to know if your webservers are making connections to botnet command & control servers?

Do you want to know if someone is running a vulnerability scan on you without your knowledge?

Do you trust that your development teams and software vendors have eliminated 100% of SQL injection or other common attacks?

Page 6: Cloud Security Topics: Network Intrusion Detection for Amazon EC2

6

Broad Cloud Adoption: Inhibitors

Page 7: Cloud Security Topics: Network Intrusion Detection for Amazon EC2

Public Cloud Security ComplexitySecurity solutions must be built specifically for public cloud

7

PUBLIC CLOUD SECURITY

REQUIREMENTS

elastic scaling

management automation

self-service provisioning

third-party ownership

managed operations

utility pricing

Page 7

Traditional “Big Box” Security Appliances are

Dead

=

Page 8: Cloud Security Topics: Network Intrusion Detection for Amazon EC2

8

• Lack of network introspection facilities such as SPAN1• Ephemeral networking means IP addresses cannot be

used as host identifiers2• Services must be tightly coupled to provisioning systems

via API to support auto-scaling and role-based management3

AWS environment challenges

Building a scalable security cloud service requires new solutions specifically designed to operate for cloud environments

Page 9: Cloud Security Topics: Network Intrusion Detection for Amazon EC2

9

Soft-Tap Architecture Unique approach to network security monitoring in EC2

eth0

eth1

eth0

eth1

eth0

eth1

eth0

eth1

eth0

eth1

VPN Transport

Soft Tap

Soft Tap

Soft Tap

Soft TapIDS

vpnvpn vpn vpn vpn

Page 10: Cloud Security Topics: Network Intrusion Detection for Amazon EC2

Provisioning API

Management API

Virtual Appliances & Host Agents

IDS for Cloud

LM for Cloud

VA for Cloud

Enabling:• Traffic monitoring via

software-based network taps• Log collection via a software agents• Virtual appliances based data collection • Host agents that continuously track the

state of monitored instances• Automated software and configuration

deployment via internal management APIs• Multi-tenant aware provisioning API for

integration with service provider

for

Amazon Web Services

Provides:• Auto-scaling by tracking IP addresses of protected hosts • Load balancing & fail over between appliances• Transport-level data encryption • Centralized resource authorization via certificates

Page 10

Alert Logic for Amazon EC2

Page 11: Cloud Security Topics: Network Intrusion Detection for Amazon EC2

Components

11

Collection/Cloud Management System

Security Portal Incident

Customer EC2 Environment

Page 12: Cloud Security Topics: Network Intrusion Detection for Amazon EC2

Datapipe IDS for EC2: Setup Process

+ + +Install software packages and virtual appliances

Deploy certificates

VPN Transport

API Integration

SOCUITM LM

CMS

Page 13: Cloud Security Topics: Network Intrusion Detection for Amazon EC2

13

VPN Transport

Attack Scenario

Attacker(me)

SQL Injection Attack(this time unsuccessful)

Page 14: Cloud Security Topics: Network Intrusion Detection for Amazon EC2

14

What happens next

Incident identified by correlation

engine

Threat level escalated to 60

out of 100

Notification sent to Datapipe

security

Incident investigated by Alert Logic SOC

Incident remediated by

Datapipe security team

Attacker blocked at the firewall

Page 15: Cloud Security Topics: Network Intrusion Detection for Amazon EC2

15

Availability

• In beta today with select customers

• Available as a managed service for AWS customers exclusively through Datapipe in early 2012

• RightScale enabled: bundled into ServerTemplates for automation

• Auto-scaling support coming soon

• Available as a self-service solution for AWS and other public clouds from Alert Logic in 1H 2012

Questions?Contact: @mgbits