Top Banner
Best Practices For Workload Security: Securing Servers in Modern Datacenter and Cloud Sami Laine, Principal Technologist, CloudPassage Aaron McKeown, Lead Security Architect, Xero
42

Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

Jan 09, 2017

Download

Technology

CloudPassage
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

BestPracticesForWorkloadSecurity:SecuringServersinModernDatacenterandCloud

SamiLaine,PrincipalTechnologist,CloudPassageAaronMcKeown,LeadSecurityArchitect,Xero

Page 2: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

TransformationofEnterpriseITDelivery

Enablesbusinessagility,speedandefficiency

PrivateCloud,SDDC IT-as-a-Service Public,Hybrid&Multicloud

Page 3: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

HolgerSchulze,CloudSecuritySpotlightReport/April2016

TransformationofEnterpriseITDelivery

Page 4: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

TraditionalITDelivery AgileITDelivery

TransformationofEnterpriseITDelivery

DataCenter

DataCenter,SDDCorPrivateCloud

Public,HybridorMulti-Cloud

Page 5: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

DataCenter,SDDCorPrivateCloud

Public,HybridorMulti-Cloud

TraditionalITDelivery AgileITDelivery

TransformationofEnterpriseITDelivery

DataCenter

• Cloudorientationdegradesperimeters• Sharedresponsibility,lessvisibility&control• Virtual,abstracted,transientworkloads• Workloadswidelydistributed• Large,flat,sharednetworks• Highrateofchange

• Datacenter&perimeterorientation• Totalownership,visibility&control• Applicationsondedicatedhardware• Hardwaresecurityappliances• Everything“behindthefirewall”• Lowrateofchange

Page 6: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

PerformanceDataSource:Geekbench (PrimateLabs)

AWSEC2c4.largeScore:3,911

36nodes

AzureStandardA3Score:3,594

39nodes

DellPowerEdgeR930Score:141,129

1node

TransformationofEnterpriseITDelivery

Page 7: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

PerformanceDataSource:Geekbench (PrimateLabs)

AWSEC2c4.largeScore:3,911

36nodes

AzureStandardA3Score:3,594

39nodes

DellPowerEdgeR930Score:141,129

1node

38xmoreenvironmentstosecure38xmoredatapointstomonitor38xmoreattackablesurfacearea38xmorehoursofeffort

Assumingoneupdateperdayvs.oneupdateperweek,add5xeffortduetochangeriskmanagement

TransformationofEnterpriseITDelivery

Page 8: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

Transformation of Enterprise IT Delivery

Weeks MinutesHours

Howlongdoyourmosttransientworkloadslive?

Page 9: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

J DF M A M J J A S O N

Analysisanddesign Coding&implementation Qualitytesting Stagingandrelease

R1

TransformationofApplicationDelivery

Page 10: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

Quality testingStagingandrelease

J DF M A M J J A S O N

AnalysisanddesignCodingandimplementation

R1 R12R11R10R2 R3 R4 R5 R6 R7 R8 R9

TransformationofApplicationDelivery

Page 11: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

Quality testingStagingandrelease

J DF M A M J J A S O N

AnalysisanddesignCodingandimplementation

R1 R12R11R10R2 R3 R4 R5 R6 R7 R8 R9

TransformationofApplicationDelivery

Page 12: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

ModernArchitectureandAppDeliveryBreaksSecurity

Diversity,Scale,Rateofchange,Orchestration

DataCenter,SDDCorPrivateCloud

Public,HybridorMulti-Cloud

36nodes1node

Page 13: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

ModernArchitectureandAppDeliveryBreaksSecurity

HolgerSchulze,CloudSecuritySpotlightReport/April2016

Page 14: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

TraditionalSecurityIsTheSquareWheel

• Perimeter&networkcentric• Hardwareapplianceoriented• Heavyagentfootprints• BuiltforstaticIPaddressing• Notdesignedforautomation• LackscomprehensiveAPIs

Page 15: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

15 |©2016CloudPassageConfidential15 |©2016CloudPassageConfidential

AgileITdeliveryrequiresanew,agilesecurity approach.

Page 16: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

Re-alignSecurityDeliveryToITDelivery

• On-demand,self-service• Automated,rapidexpansion• Measuredormeteredservice• Ubiquitous,convenientaccess• Resourcepooledgrid• Highlyscalable• Design-patternbased

• On-demand,Security-as-a-Service• Automated,rapidexpansion• Measuredormeteredservice• Ubiquitous,convenientaccess• Resourcepooledgrid• Highlyscalable• Design-patternbased

AgileITDelivery AgileSecurityDelivery

Page 17: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

Re-alignSecurityDeliveryToITDelivery

TraditionalSecurity AgileSecurity

Page 18: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

WhereIsYourGreatestSecurityRisk?

UserAdministration

ApplicationCode&Data

ApplicationFramework

VMGuestOS

VirtualizationStack

Compute/StorageHW

NetworkInfrastructure

PhysicalEnvironment

Customer responsibility Providerresponsibility

DataCenter Colo IaaS

Page 19: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

WhereIsYourGreatestSecurityRisk?

UserAdministration

ApplicationCode&Data

ApplicationFramework

VMGuestOS

VirtualizationStack

Compute/StorageHW

NetworkInfrastructure

PhysicalEnvironment

Customer responsibility Providerresponsibility

DataCenter Colo IaaS

VERYLOW

VERYLOW

VERYLOW

VERYLOW

HIGH

HIGH

MEDIUM-HIGH

MEDIUM

Risk

Page 20: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

WhereIsYourGreatestSecurityRisk?

UserAdministration

ApplicationCode&Data

ApplicationFramework

VMGuestOS

VirtualizationStack

Compute/StorageHW

NetworkInfrastructure

PhysicalEnvironment

Customer responsibility Providerresponsibility

DataCenter Colo IaaS

VERYLOW

VERYLOW

VERYLOW

VERYLOW

HIGH

HIGH

MEDIUM-HIGH

MEDIUM

Risk

Page 21: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

WorkloadSecurityPriority

OperationsHygieneNoarbitrarycodeAdminprivilegemanagementChangemanagementNoemail,webclientLogManagementAccesscontrol

Softwarevulnerability&configurationsecuritymanagement

Networksegmentationandtrafficvisibility

Integritymonitoring&management

Applicationcontrol/whitelisting

Exploitprevention/memoryprotection

Data-at-restencryption

Behavioraldetection

Vulnerabilityshielding

Deception

AV

Gartner/March2016

Page 22: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

WorkloadSecurityPriority

OperationsHygieneNoarbitrarycodeAdminprivilegemanagementChangemanagementNoemail,webclientLogManagementAccesscontrol

Softwarevulnerability&configurationsecuritymanagement

Networksegmentationandtrafficvisibility

Integritymonitoring&management

Applicationcontrol/whitelisting

Exploitprevention/memoryprotection

Data-at-restencryption

Behavioraldetection

Vulnerabilityshielding

Deception

AV

FOUNDATIONAL

LESSCRITICAL

Gartner/March2016

Page 23: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

WorkloadSecurityPriority

OperationsHygieneNoarbitrarycodeAdminprivilegemanagementChangemanagementNoemail,webclientLogManagementAccesscontrol

Softwarevulnerability&configurationsecuritymanagement

Networksegmentationandtrafficvisibility

Integritymonitoring&management

Applicationcontrol/whitelisting

Exploitprevention/memoryprotection

Data-at-restencryption

Behavioraldetection

Vulnerabilityshielding

Deception

AV

FOUNDATIONAL

LESSCRITICAL

Gartner/March2016

Page 24: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

SecuringServersinModernDatacenterandCloud

1. Workload centric

2. Policydriven

3. Automated andintegratedwithtoolchains

4. Attacksurfacereductionfocus

5. Context-awareandworksanywhere

6. SecurityplatformswithdeepAPIs

Page 25: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

Containers

Servers

Containers

PublicClouds DataCenters&PrivateClouds

Servers

InfrastructureOrchestration

SOC&GRCSystems

Page 26: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud
Page 27: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud
Page 28: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

Aaron McKeown, Lead Security Architect

Cloud security at Xero

Page 29: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

Beautiful cloud-based accounting softwareConnecting people with the right numbers anytime, anywhere, on any device

Page 30: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

1,450+Staff globally

$474mraised in capital

$202msub revenue FY16

23m+

businesses have interacted on the Xero platform

$1trincoming and outgoing transactions in past 12 mths

450mincoming and outgoing transactions in past 12 mths

All figures shown are in NZD

Page 31: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

2009 2010 2011 2012 2013 2014 2015 2016

700,000+Subscribers globally

Page 32: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

Public cloud migration

Improving data protection

Eliminating scheduled downtime

Maintaining and improving security

Support the next wave of growth

Reducing our cost to serve

Page 33: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

Key challenges

Skills are scarce

Regional representation and recommendations

Application architecture has to change

Automation is key

Need to focus on visibility

Third party commercial models need to change

Page 34: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

Key principles

Repeatable and automated build

and management of security systems

Accelerated pace of security innovation

On-demand security infrastructure that works at any scale

Page 35: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

Security as a service

VPN connectivity

Host Based

Security

Web Application Security and

DeliveryShared Key

Management Services

Security Operations

and Consulting

Services

Secure Bastion Access

Proxy Services

Page 36: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

Multi-Factor Authentication

• Secure AWS with:• password + MFA or access key + MFA

• Secure ALL systems with MFA• Enable MFA enhanced features• Use multiple MFA systems

Page 37: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

Configuration Drift Management

• CloudTrail, Config and the AWS Console provide a lot of great information

• Can be hard to find the needle in the haystack…

• Use Netflix Security Monkey to provide a “Single Pane of Glass”

Page 38: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

Host Security Automation

• Monitor, Detect and Defend at the Host level• Elasticity and Automation are key• Integrate, visibility is important• Use “Defence in Depth” model, protect every layer• Use an agile approach from deployment through to

operations

Page 39: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

Key learningsMeasure and Test, Monitor Everything

Welcome to the cloud -"Where's my span port"?

Security by Design -What's that?

Communication is Key -Who are your spokespeople?

Page 40: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

Final takeaways

Repeatable and automated build

and management of security systems

Accelerated pace of security innovation

On-demand security infrastructure that works at any scale

Page 41: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud

Beautiful accounting software

www.xero.com

Page 42: Best Practices for Workload Security: Securing Servers in Modern Data Center and Cloud