Top Banner
Best Practices to Secure Working Environments Mohammed Almulla Kuwait University
27
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Mohammed Al Mulla - Best practices to secure working environments

Best Practices to Secure Working Environments

Mohammed AlmullaKuwait University

Page 2: Mohammed Al Mulla - Best practices to secure working environments

Executive Summary

• Recent changes in computing architecture from dedicated servers in datacenters to virtualization and Cloud Computing suggest that we rethink our IT security methodologies.

• The focus is on database security, as well as on securing most enterprise applications.

Page 3: Mohammed Al Mulla - Best practices to secure working environments

Table of Contents

• Limitations of existing database security approaches.

• Security considerations when deploying virtualization.

• How distributed monitoring best fits virtual and Cloud Computing environments.

Page 4: Mohammed Al Mulla - Best practices to secure working environments

Securing Information in Virtualization

Many enterprises future plan is to move some applications to Cloud Computing.

How does this affect their IT security methodologies?

Page 5: Mohammed Al Mulla - Best practices to secure working environments

Recent Requirements

• Working environments are centered around two major technological requirements:

– Very High Performance Networks (VHPN) – Complex applications.

Page 6: Mohammed Al Mulla - Best practices to secure working environments

Market Response

• To meet these requirements, security companies introduced a range of network appliances.

• Network Appliances: machines positioned somewhere in the network, to inspect the traffic for either protocol violations, malicious code, viruses malware or spams.

Page 7: Mohammed Al Mulla - Best practices to secure working environments

Types of Security Solutions

• Network-based system

• Host-based system

Page 8: Mohammed Al Mulla - Best practices to secure working environments

Winning the Battle

• In this era, solutions that depend on host-based software are neglected.

• Network-based IDS and IPS won the battle against host-based solutions.

• The concept of simply placing an appliance in a rack and attaching it to a switch is very attractive, especially when resources available for security are limited.

Page 9: Mohammed Al Mulla - Best practices to secure working environments

Recent Trend

• Today, many distributed applications have been leading to the adoption of host-based solutions, in conjunction with network appliances, specially

when the enterprises are concerned with

insider transactions.

Page 10: Mohammed Al Mulla - Best practices to secure working environments

Network-based Isn’t Enough

• The new databases are dynamically appearing in new locations.

• Question1: Will the network appliance approach be relevant when many transactions will not make it to the network

• Question2: Is the network monitoring approach efficient when the application network moves from LAN to WAN.

Page 11: Mohammed Al Mulla - Best practices to secure working environments

Before & After

• Previously, databases were not monitored or protected.

• Now monitoring DBs must cover local and intra-db attacks. Because of database breaches, customers are now investing time and effort in securing their databases.

Page 12: Mohammed Al Mulla - Best practices to secure working environments

Today’s Solutions

• Recently, appliance vendors have added local agents to their solutions, making many of today’s network-based solutions a hybrid of network appliance and host-based solution.

Page 13: Mohammed Al Mulla - Best practices to secure working environments

Solution Analysis

• The hybrid approach is not ideal, but as long as most applications run on the network in plain sight of the appliance, some enterprises were willing to accept the risks.

Page 14: Mohammed Al Mulla - Best practices to secure working environments

Disadvantages

• These hybrid solutions introduce complex implementation requirements such as kernel-level installation of the agent, for example, requiring reboots to the DB server.

• They still miss the sophisticated attacks generated from within the database itself.

• They also fail to address several technical challenges when implemented in either a virtual environments, or in the cloud.

Page 15: Mohammed Al Mulla - Best practices to secure working environments

Challenge #1 – Visibility Into VM-to-VM Transactions

One of the benefits of virtualization is the ability to share resources, resulting in environments where both the application and the databases are migrating to virtual machines.

Page 16: Mohammed Al Mulla - Best practices to secure working environments

Challenge #1 – Visibility Into VM-to-VM Transactions

The communication from the CRM application to the database storing customer data occurs entirely within the same physical server.

In such a case, there is little or no network traffic as the transactions between the application and the database occur from VM-to-VM within the server.

Network monitoring appliances will not see these transactions.

Page 17: Mohammed Al Mulla - Best practices to secure working environments

Solution

• Bring security inspection closer to its target: This is called “virtual appliance”, where a virtual machine is installed on virtual servers and the servers are re-architected to send traffic through the virtual machine.

• Warning: This approach has two severe drawbacks: -Performance -Architecture complications.

Page 18: Mohammed Al Mulla - Best practices to secure working environments

Challenge #2 – The Dynamic System Environments

• If virtual security appliances are not ideal solutions for virtual machines, they are even less applicable in cloud-based applications, where networks are dynamic.

Page 19: Mohammed Al Mulla - Best practices to secure working environments

Solution

• The only solution that works in all environments, including Cloud environment is a solution that is based on sensors that run side by side with the database on every machine that hosts one database or more.

Page 20: Mohammed Al Mulla - Best practices to secure working environments

Challenge #3 – Performance Over WAN

In Cloud Computing deployments, network bandwidth and latency will make off-host processing too inefficient.

Cloud Computing prevents you from co-locating a server close to your databases – you simply won’t know where they are.

This will slow down network performance, and prevents timely interruption of malicious activity.

Page 21: Mohammed Al Mulla - Best practices to secure working environments

Solution

Implement the necessary protection locally. This will ensure network’s performance.

For Cloud Computing, make sure that the system supports wide area network (WAN) topologies.

To limit exposure of sensitive data, encrypt all traffic between the management console and sensors, and for optimum performance, compression techniques should be implemented so that policy updates and alerts are efficiently transmitted.

Page 22: Mohammed Al Mulla - Best practices to secure working environments

Distributed Host-based Solutions The Only Efficient Approach

• The only way to secure databases on virtual machines or cloud environments, without sacrificing the huge benefits of these new architectures, is using software-based solutions that share the elasticity of virtual machines and Cloud Computing.

Page 23: Mohammed Al Mulla - Best practices to secure working environments

The Ultimate Challenge

• The challenge is to create host-based solutions that do not suffer the same drawbacks that made old host-based solutions irrelevant namely:– Intrusive implementations, – Performance issues – Quickly adapt to new and volatile environments.

Page 24: Mohammed Al Mulla - Best practices to secure working environments

Next-generation Solutions

• Next generation solutions must be lightweight, easily added to the virtual machine where needed, and installed in parallel to the first database that is installed on a machine.

Page 25: Mohammed Al Mulla - Best practices to secure working environments

Promoting Stability

• Adding a layer of security does not require changes in architecture and does not rely on the virtualization technology in use.

Page 26: Mohammed Al Mulla - Best practices to secure working environments

Conclusions

Many organizations found themselves drawn towards virtualization and Cloud Computing.

They realized that the complexity of ensuring adequate data security is an obstacle.

But, the movement towards these technologies is inevitable.

There are solutions out there that protect sensitive information as well as provide both effective and efficient data security across dedicated database servers as.

Page 27: Mohammed Al Mulla - Best practices to secure working environments

Thank You