40
ISACA Perth: 2011 Annual Conference Trends in Virtual Security (Balance Virtual Risk with Reward) Kim Wisniewski Senior Consultant, Empired Ltd.

Isaca 2011 trends in virtual security v1.0

Embed Size (px)

Citation preview

Page 1: Isaca 2011 trends in virtual security v1.0

ISACA Perth: 2011 Annual Conference

Trends in Virtual Security (Balance Virtual Risk with Reward)

Kim Wisniewski – Senior Consultant, Empired Ltd.

Page 2: Isaca 2011 trends in virtual security v1.0

» Virtualisation has come a long way in the past ten years. We are looking

beyond the pure consolidation benefits of server virtualisation, into a

future of cloud computing and infrastructure-as-a-service. No longer can

we see the data-centre that our virtual machines are running in, the safety

cord is broken. This opens the door to a plethora of new security

considerations that security professionals need to be aware of to remain

competitive.

» This presentation looks at the current state of virtualisation asking the

following questions: What should IT professionals consider when selling,

designing or auditing a virtual infrastructure? Are there any security

benefits with virtualisation? How can we safely deploy our virtual

machines in the cloud? Can PCI compliance be reached in a virtual

world? Is it even safe to virtualise my DMZ?

» The presentation will look at these objectives within the context of the

common virtualisation platforms on the market today, concluding with a

look into the future at emerging technologies and virtualisation standards

that may help those in pursuit of the ultimate secure virtual world.

The Abstract

Page 3: Isaca 2011 trends in virtual security v1.0

» Virtualisation has come a long way in the past ten years. We are looking beyond the pure consolidation benefits of server virtualisation, into a future of cloud

computing and infrastructure-as-a-service. No longer can we see the data-centre

that our virtual machines are running in, the safety

cord is broken. This opens the door to a plethora of new security

considerations that security professionals need to be aware of to remain

competitive.

» This presentation looks at the current state of virtualisation asking the

following questions: What should IT professionals consider when selling,

designing or auditing a virtual infrastructure? Are there any security

benefits with virtualisation? How can we safely deploy our virtual

machines in the cloud? Can PCI compliance be reached in a virtual

world? Is it even safe to virtualise my DMZ?

» The presentation will look at these objectives within the context of the

common virtualisation platforms on the market today, concluding with a

look into the future at emerging technologies and virtualisation standards

that may help those in pursuit of the ultimate secure virtual world.

The Abstract

Page 4: Isaca 2011 trends in virtual security v1.0

» Boundaryless Information™ (III-RM)

» Integrated Information Infrastructure Reference

Model

» Ref: TOGAF 9

Boundaryless IT

Page 5: Isaca 2011 trends in virtual security v1.0

The Next Step:

Boundaryless Technology Infrastructure

Infrastructure Mesh

Stack Convergence

Meta-Virtualise

Cloud

Legacy (old school)

siloed infrastructure

Virtual Infrastructure

Page 6: Isaca 2011 trends in virtual security v1.0

» Virtualisation has come a long way in the past ten years. We are looking

beyond the pure consolidation benefits of server virtualisation, into a

future of cloud computing and infrastructure-as-a-service. No longer can

we see the data-centre that our virtual machines are running in, the safety

cord is broken. This opens the door to a plethora of new security

considerations that security professionals need to be aware of to remain

competitive.

» This presentation looks at the current state of virtualisation asking the

following questions: What should IT professionals

consider when selling, designing or

auditing a virtual infrastructure? Are there any

security benefits with virtualisation? How can we safely deploy our virtual

machines in the cloud? Can PCI compliance be reached in a virtual

world? Is it even safe to virtualise my DMZ?

» The presentation will look at these objectives within the context of the

common virtualisation platforms on the market today, concluding with a

look into the future at emerging technologies and virtualisation standards

that may help those in pursuit of the ultimate secure virtual world.

The Abstract

Page 7: Isaca 2011 trends in virtual security v1.0

What does Uncle

Sam Say?

» Hypervisors have bugs and vulnerabilities too

» Physical isolation/separation principles are gone

» Scoping the Infra. Mesh Audit will be tricky…

Page 8: Isaca 2011 trends in virtual security v1.0

In my opinion…

» The Management Constructs

associated with virtualisation / cloud

platforms…. The biggest risks

» Your mgmt. tools and users

» …& how much is exposed to them…

Page 9: Isaca 2011 trends in virtual security v1.0

Some Top Virtual Risks

» Prebuilt VMs/appliances containing malicious code

» Improperly configured hypervisor

» Improperly configured virtual firewalls or networking

» Data leakage through templates/clones

» Administrative or operational error

» Mixing security domains without controls

» Lax hypervisor patching

» Lack of understanding of security principles across

the entire stack

A lack of process & architecture in the beginning?

Page 10: Isaca 2011 trends in virtual security v1.0

» It all starts with good PARENTING

» Physical Security

» Storage Security

» Network Security

» Converged Security (e.g., blades)

» Hypervisor security

» Guests security

» Hypervisor relationship to its guests

» Aggregates – clusters, pools, groups, etc.

» Management Centres

Virtual Architecture 101

Principles: Isolation, Separation

Page 11: Isaca 2011 trends in virtual security v1.0

» Management Layer Security

» Virtual Centres, SCVMMs, Remote Consoles

» Admin Model

» Management, Controls, Process

» Audit (self audit, independent audit, the more

the merrier…)

Virtual Architecture 102

Principles: Role Based, Auditability,

Change Logging, treat the Hypervisor

as your engine room…

Page 12: Isaca 2011 trends in virtual security v1.0

» Virtualisation has come a long way in the past ten years. We are looking

beyond the pure consolidation benefits of server virtualisation, into a

future of cloud computing and infrastructure-as-a-service. No longer can

we see the data-centre that our virtual machines are running in, the safety

cord is broken. This opens the door to a plethora of new security

considerations that security professionals need to be aware of to remain

competitive.

» This presentation looks at the current state of virtualisation asking the

following questions: What should IT professionals consider when selling,

designing or auditing a virtual infrastructure? Are there any

security benefits with virtualisation? How can

we safely deploy our virtual machines in the cloud? Can PCI compliance

be reached in a virtual world? Is it even safe to virtualise my DMZ?

» The presentation will look at these objectives within the context of the

common virtualisation platforms on the market today, concluding with a

look into the future at emerging technologies and virtualisation standards

that may help those in pursuit of the ultimate secure virtual world.

The Abstract

Page 13: Isaca 2011 trends in virtual security v1.0

» “I cannot see any security or legal

benefits whatsoever related to cloud

computing…” (A. Lawyer)

Page 14: Isaca 2011 trends in virtual security v1.0

» Some NEW possibilities

» Introspection APIs

» Deep collection & visibility

» Antivirus offload (agentless-AV)

» Meta-Virtual compliance

» Reporting / compliance tracking

» Compliance Toolkits

Page 15: Isaca 2011 trends in virtual security v1.0

» Only SOME and SPECIFIC platforms

evaluated to EAL 4+ Common Criteria,

NIST, DISA STIG, US DoD, NSA CSS

etc…

Page 16: Isaca 2011 trends in virtual security v1.0

Principles:

Build a solid foundation;

Use the vendor’s hardening guides;

& ISACA materials (auditors too)

Trust your own before anybody else's

Page 17: Isaca 2011 trends in virtual security v1.0

» Virtualisation has come a long way in the past ten years. We are looking

beyond the pure consolidation benefits of server virtualisation, into a

future of cloud computing and infrastructure-as-a-service. No longer can

we see the data-centre that our virtual machines are running in, the safety

cord is broken. This opens the door to a plethora of new security

considerations that security professionals need to be aware of to remain

competitive.

» This presentation looks at the current state of virtualisation asking the

following questions: What should IT professionals consider when selling,

designing or auditing a virtual infrastructure? Are there any security

benefits are with virtualisation? How can we safely

deploy our virtual machines in the cloud? Can PCI compliance be reached in a virtual world? Is it even safe to

virtualise my DMZ?

» The presentation will look at these objectives within the context of the

common virtualisation platforms on the market today, concluding with a

look into the future at emerging technologies and virtualisation standards

that may help those in pursuit of the ultimate secure virtual world.

The Abstract

Page 18: Isaca 2011 trends in virtual security v1.0

» Cloud (IaaS) Security

» Do you trust the providers?

» Do you trust what you’re putting out there?

Virtual Architecture 103

Principles: Architectural Transparency;

Understand the journey of your VMs

Virtualisation: a journey from your data-centre

to some cloudy ones, some mixing it up in the

middle (hybrid)

Page 19: Isaca 2011 trends in virtual security v1.0

Meta-Virtualisation

Meta = describes; is made up of; constituent parts…

Meta-Virtualise – Describe the containers,

relationships, requirements and boundaries between

VMs

• security requirements, compliance goals

• minimum performance levels, SLAs

• their relationship to the environment (the VI)

Page 20: Isaca 2011 trends in virtual security v1.0

The Virtual Machine

(Amoeba)

VM 1.0

Independent;

Basic environmental awareness

“enough to survive”

Page 21: Isaca 2011 trends in virtual security v1.0

Enhanced VMs

VM 2.0

Increased controls

Improved environmental

awareness

Still operating independently

Page 22: Isaca 2011 trends in virtual security v1.0

VMs in a Petri Dish

VM 3.0

Collaborating

Groups

Expanded META

boundary

e.g., VMware vAPP

Page 23: Isaca 2011 trends in virtual security v1.0

DMZ

Intranet

Research

Meta Groups

Page 24: Isaca 2011 trends in virtual security v1.0

DMZ Intranet

Research

Tenant Meta

Page 25: Isaca 2011 trends in virtual security v1.0

Multi

Tenant

Meta

Coca-Cola

Pepsi

ACME Corp.

Infrastructure

Cloud

Page 26: Isaca 2011 trends in virtual security v1.0

» Meta defines the principles where VMs

operate

» Meta follows where things move

» Enforcing Meta across the converged stack,

mesh, and into clouds is a challenge

Meta-Virtualisation

Think “Admission Control” – in your DC

or a Cloud Provider

Page 27: Isaca 2011 trends in virtual security v1.0

» Secure Multi Tenancy

Vendor Reference Architecture

Page 28: Isaca 2011 trends in virtual security v1.0

» Virtualisation has come a long way in the past ten years. We are looking

beyond the pure consolidation benefits of server virtualisation, into a

future of cloud computing and infrastructure-as-a-service. No longer can

we see the data-centre that our virtual machines are running in, the safety

cord is broken. This opens the door to a plethora of new security

considerations that security professionals need to be aware of to remain

competitive.

» This presentation looks at the current state of virtualisation asking the

following questions: What should IT professionals consider when selling,

designing or auditing a virtual infrastructure? Are there any security

benefits are with virtualisation? How can we safely deploy our virtual

machines in the cloud? Can PCI compliance be

reached in a virtual world? Is it even safe to

virtualise my DMZ? » The presentation will look at these objectives within the context of the

common virtualisation platforms on the market today, concluding with a

look into the future at emerging technologies and virtualisation standards

that may help those in pursuit of the ultimate secure virtual world.

The Abstract

Page 29: Isaca 2011 trends in virtual security v1.0

» Philosophical Debate

» Can & should you host your DMZ VMs on

the same host/partition/environment as

your other VMs?

Vendor Reference Architectures aplenty; but

what does the security community say?

Virtualising Your DMZ

Page 31: Isaca 2011 trends in virtual security v1.0

» PCI DSS v2.0 – Virtualisation Special

Interest Group (SIG) … formed late 2008

» PCI DSS Virtualisation Guidelines released

June 2011

Virtualising PCI-DSS

Page 32: Isaca 2011 trends in virtual security v1.0

» Virtualisation has come a long way in the past ten years. We are looking

beyond the pure consolidation benefits of server virtualisation, into a

future of cloud computing and infrastructure-as-a-service. No longer can

we see the data-centre that our virtual machines are running in, the safety

cord is broken. This opens the door to a plethora of new security

considerations that security professionals need to be aware of to remain

competitive.

» This presentation looks at the current state of virtualisation asking the

following questions: What should IT professionals consider when selling,

designing or auditing a virtual infrastructure? Are there any security

benefits are with virtualisation? How can we safely deploy our virtual

machines in the cloud? Can PCI compliance be reached in a virtual

world? Is it even safe to virtualise my DMZ?

» The presentation will look at these objectives within the context of the

common virtualisation platforms on the market today, concluding with a

look into the future at emerging

technologies and virtualisation standards that may help those in pursuit of the ultimate secure virtual world.

The Abstract

Page 33: Isaca 2011 trends in virtual security v1.0

Microsoft Virtualisation

» Hyper-V “Open Source Promise”

» Hyper-V … Cisco 1000V

» Hyper-V Trusted Computing Base (TCB)

» Hyper-V Security Best Practices Podcast

HyperV <> Azure

Convergence (IaaS)

Page 34: Isaca 2011 trends in virtual security v1.0

» Cloud Connectivity & Portability

» VMware’s vCloud Connector

» vCloud Service Providers

» Long Distance VMotion / VXLAN / OTV

» Microsoft SCVMM 2012

» OpenStack

» Meta-virtualisation: support for & building upon

Emerging Technologies

Page 35: Isaca 2011 trends in virtual security v1.0

» IaaS Cloud Encryption

» Virtual machines in transit

» Virtual machines runtime

» Customer holds the keys

» TXT/TPM Integrations

» Trusted execution technology

» Trusted platform module

» Hypervisor & cloud stack talking the TXT lingo…

Emerging Technologies

Page 36: Isaca 2011 trends in virtual security v1.0

» Demonstrating compliance across the

provider’s Infrastructure Mesh

» e.g., FISMA Certified Clouds

» Open Portability between cloud types

» e.g., Azure <> vCloud <> OpenStack ???

Emerging Trends

Standards Based Clouds

Page 37: Isaca 2011 trends in virtual security v1.0

Case Study: Los Alamos National

Laboratory www.lanl.gov

» Security research institution responsible for

American nuclear deterrence

» Achieved

» NIST Certification and Accreditation

» Authority to operate as FISMA moderate with

VMware vCloud

» Secure Multi-Tenancy (META-Virtual)

» Reference Architecture forthcoming…?

Page 39: Isaca 2011 trends in virtual security v1.0

What does Uncle Sam Say?

Page 40: Isaca 2011 trends in virtual security v1.0

Questions

[email protected]

www.empired.com