Top Banner
Application Security in the Cloud Best Practices May 20, 2010
53
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Application Security in the Cloud - Best Practices

Application Security in the Cloud

Best Practices

May 20, 2010

Page 2: Application Security in the Cloud - Best Practices

Your Panel Today

Presenting:

Bernard Golden – CEO, HyperStratus

Steve Riley – Sr. Technical Program Manager, Amazon Web

Services

Michael Crandell – CEO, RightScale

Q&A line:

Tony Spataro – Security Specialist, RightScale

Andrew DeMille – Sr. Account Manager, RightScale

Please use the questions window to ask

questions anytime!

Page 3: Application Security in the Cloud - Best Practices

Agenda

Welcome

We‟re all in this Together

Overview of AWS Security

Overview of RightScale Security

Introduction to Security Best Practices for AWS

Q&A

Please use the questions window to ask

questions anytime!

Page 4: Application Security in the Cloud - Best Practices

Security Is The Biggest Issue

Slowing Cloud Deployment

Number one concern

Confusion: who‟s

responsible?

Lack of

guidance/best

practices

Page 5: Application Security in the Cloud - Best Practices

What You’ll Learn In

This Webinar

Application security: Six key

best practices areas

Techniques for layered &

application group security

Amazon: infrastructure and

security framework

RightScale: management to

automate security consistently

Page 6: Application Security in the Cloud - Best Practices

HyperStratus

In The Enterprise

World class education & consulting

Amazon & RightScale partner

Contributor to AWS practices & code

Proven methodologies

„6 Security Essentials‟

Page 7: Application Security in the Cloud - Best Practices

Security is a Shared

Responsibility

Integrates application with infrastructure

and management security framework

Implements consistent and

automated security practices

Best Practices

Security Framework

You

Page 8: Application Security in the Cloud - Best Practices

Traditional security model

Control

Secure Not secure

Ownership

Mine Not mine

Location

Here Not here

Page 9: Application Security in the Cloud - Best Practices

Layers of trust

Myhardware(root)

Mysoftware

Mypeople

Perimeters separate trusted (owned, local)from untrusted (other, remote)

Page 10: Application Security in the Cloud - Best Practices

The model is breaking

Control

Secure Not secure

Ownership

Mine Not mine

Location

Here Not here

Seriously?

Page 11: Application Security in the Cloud - Best Practices

The model is breaking

Control

Secure Not secure

Ownership

Mine Not mine

Location

Here Not here

Seriously?

Page 12: Application Security in the Cloud - Best Practices

New security model

Control

Encryption and

signatures

Service level

agreementsAuditable security

standards

Page 13: Application Security in the Cloud - Best Practices

Ownership vs. control

Ownershipnot required

To maintain control

LAN/WAN

• Pipe

• Data

VPN

• Data

On-premise

• Compute

• Storage

• Data

Cloud

• Data

Page 14: Application Security in the Cloud - Best Practices

Amazon EC2Amazon S3Amazon CloudFront

Page 15: Application Security in the Cloud - Best Practices
Page 16: Application Security in the Cloud - Best Practices
Page 17: Application Security in the Cloud - Best Practices

Amazon EC2Amazon S3Amazon CloudFront

Page 18: Application Security in the Cloud - Best Practices
Page 19: Application Security in the Cloud - Best Practices
Page 20: Application Security in the Cloud - Best Practices
Page 21: Application Security in the Cloud - Best Practices
Page 22: Application Security in the Cloud - Best Practices
Page 23: Application Security in the Cloud - Best Practices

Amazon S3Amazon SimpleDB

Amazon EBSAmazon RDS

Amazon EC2

++

++

++

Page 24: Application Security in the Cloud - Best Practices

Hypervisor layer

Physical interfaces

AWS firewall

Customer 1security groups

Customer 2security groups

Customer nsecurity groups

Customer 1virtual interfaces

Customer 2virtual interfaces

Customer nvirtual interfaces

Customer 1 Customer 2 Customer n…

AWS admins onlySSH via bastionsAudits reviewed

Customer onlyInbound flowsDefault deny

Customer onlySSH, ID/pw, X.509Root/admin control

Page 25: Application Security in the Cloud - Best Practices

0 0000 0

0 0 0 0 0

0 0 0 0 0

/ /// / /

/ / / / /

/ / / / /

Amazon EBS

all others

EC2

• EC2 ephemeral• Other services

Page 26: Application Security in the Cloud - Best Practices

Your corporate network

AmazonWeb ServicesCloud

Your VPC

Page 27: Application Security in the Cloud - Best Practices

Your corporate network

AmazonWeb ServicesCloud

Your VPC

Currently• EC2 on-demand and reserved• EBS• CloudWatch• Linux/Unix and Windows• US-East, EU-West

Upcoming• >1 router, >1 AZ• Outbound Internet• Elastic IPs• Elastic Load Balancing• Autoscaling• DevPay• Inter-subnet security groups

Page 28: Application Security in the Cloud - Best Practices
Page 29: Application Security in the Cloud - Best Practices
Page 30: Application Security in the Cloud - Best Practices

Compliance

Sarbanes-Oxley Act• Ongoing

HIPAA• Current customer deployments

• Whitepaper describes the specifics

SAS 70 type II• Complete

• Physical security, access controls, change management, operations

ISO 27001• In progress

Page 31: Application Security in the Cloud - Best Practices
Page 32: Application Security in the Cloud - Best Practices

Righ

tScaleRightScale Cloud Management Platform

Page 33: Application Security in the Cloud - Best Practices

RightScale Lifecycle Management

Page 34: Application Security in the Cloud - Best Practices

RightScale Security

Account Permissions

Resource Partitioning

Credential Management

Automation

Alerts and Monitoring

Page 35: Application Security in the Cloud - Best Practices

35

Management Structure for Separation of privileges

IT personnel have only the access they need to

perform their job function:

• “Designer” role: Developers and Testers

• “Observer” role: Managers, Support Reps, Auditors

• “Actor” role: Operations Personnel

Account Permissions

Page 36: Application Security in the Cloud - Best Practices

Best Practices: • Grant access only as required

to perform business function

• Especially limit Actor and

Admin privileges

• One user account per person

(no sharing)

Account Permissions

Page 37: Application Security in the Cloud - Best Practices

Resource Partitioning

Use two AWS/RS accounts; one for test/dev

and one for production

• Developers have unrestricted access to dev account

• Be more restrictive and granular with access to the

production account (only ops personnel, privileges only

as-needed)

Best Practices:

• When ServerTemplates are ready to deploy, share them

with your production account

• Ensures consistent testing and deployment procedures;

auditor-friendly access control rules

Page 38: Application Security in the Cloud - Best Practices

Resource Partitioning

Page 39: Application Security in the Cloud - Best Practices

Resource Partitioning

Allow Internet traffic

Allow cloud traffic

Security Groups

Page 40: Application Security in the Cloud - Best Practices

Credential Management

• Mediate users' consumption of cloud resources

• Input your AWS credential to the dashboard

• Ability to launch and bring down cloud resources ordained

through “Roles” given in RightScale

• Safeguard Application passwords

• With dashboard credentials users don‟t need to know passwords

Page 41: Application Security in the Cloud - Best Practices

RightScale Automation

• Security Patch Rollout

• Rolling out to all servers in deployment w/ push of button

• Inject key material into instances at boot time

• Use without ever storing it on disk

• Machine builds are consistent and auditable

25 Top Information Managers: 2010

Dave Powers, Eli Lilly & Co.

“Alongside the elastic cloud approach, Lilly is leveraging

RightScale's infrastructure management interface and

services against appliance/application stacks in a "vending

machine" concept that allows self-service to infrastructure and

up to three tiers of applications as needed.”

Page 42: Application Security in the Cloud - Best Practices

RightScale Alerts and Monitoring

Security Analytics

• Network bandwidth (Denial of Service)

• Disk/CPU usage (spam bot activity)

Intrusion Detection

• Alert when # logged-in users > 0

• Alert when network connections happen

Intrusion Prevention

• Escalate by unmounting encrypted volumes

• Escalate by shutting down machine or closing firewall

Page 43: Application Security in the Cloud - Best Practices

Alerts & Automation at work

Load exceeds threshold

Additional servers operational

Load drops below thresholdAdditional servers terminated

Page 44: Application Security in the Cloud - Best Practices

Security is a Shared

Responsibility

Integrates application with infrastructure

and management security framework

Implements consistent and

automated security practices

Best Practices

Security Framework

You

Page 45: Application Security in the Cloud - Best Practices

6 Crucial Areas

For Complete Security

1. Security groups

2. Key management

3. Network security

4. Storage protection

5. Intrusion detection

6. Application code management

Page 46: Application Security in the Cloud - Best Practices

Default Security Group Partitioning

Amazon Web Services

Web

Application

Storage

Default (22, 80, 8080, 3306)

Default (22, 80, 8080, 3306)

Default (22, 80, 8080, 3306)

Default

group is

closed

Default

overloading

Overloading

presents

security risk

Page 47: Application Security in the Cloud - Best Practices

A Better Option: Security Group

Partitioning By Application Role

Port 22

Single IP AddressPorts 80, 8080

Port 22

Single IP Address

Port 22

Single IP Address

Ports 80, 8080

Ports 3306, 8080

Ports 3306, 8080

Web

Application

Storage

Page 48: Application Security in the Cloud - Best Practices

Best Practice: Security Group

Partitioning By Application Stage

Dev Stage Production

Dev Sec Group

Dev Sec Group

Dev Sec Group

Stage Sec Group

Stage Sec Group

Stage Sec Group

Prod Sec Group

Prod Sec Group

Prod Sec Group

Page 49: Application Security in the Cloud - Best Practices

Amazon, Rightscale &

HyperStratus Together

Key to security is

thoroughness and consistency

AWS provides robust security

framework

RightScale automates and

implements consistency

Application applies security

practices to reduce risk

HyperStratus brings it all

together

Page 50: Application Security in the Cloud - Best Practices

Recommendations

Identify application security requirements

Understand AWS security framework

Define application security requirements

implemented and automated via RightScale

Integrate application security best practices with

RightScale and AWS security framework

Ensure application project management and IT

processes reinforce top-to-bottom security

architecture

Page 51: Application Security in the Cloud - Best Practices

Today’s Webinar Offer:Free “6 Security Essentials” Assessment

from Hyperstratus

Free for

30 days!

Compare your security to Cloud

Application Security Best Practices

Cover all six key areas

Only takes an hour

For more info:

www.hyperstratus.com/drupal/securitychecklist

Or call 925.209.4609

Page 52: Application Security in the Cloud - Best Practices

Q & A Free for

30 days!

Free “6 Security Essentials” Assessment

from Hyperstratus

www.hyperstratus.com/drupal/securitychecklist

Or call 925.209.4609

More information:

www.RightScale.com http://aws.amazon.com/

Webinar Recordings:

www. RightScale.com/Webinars

Page 53: Application Security in the Cloud - Best Practices

Thank You!