Top Banner
Private Cloud Security via Forefront TMG 2010 Esmaeil Sarabadani Systems and Security Consultant
28
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Private Cloud Security via Forefront TMG 2010

Private Cloud Security via

Forefront TMG 2010Esmaeil SarabadaniSystems and Security Consultant

Page 2: Private Cloud Security via Forefront TMG 2010

What’s going to be covered…

• Overview of the Public and Private Cloud• Public and Private Cloud Security Concerns• Data Isolation in Microsoft Cloud• The Geographical Location of Data• An Overview on Forefront Threat Management

Gateway 2010• Virtualization of TMG in the Cloud• TMG Network Inspection System• TMG HTTPS Inspection• TMG Firewall Features• Securing Remote Access to your Private Cloud

Page 3: Private Cloud Security via Forefront TMG 2010

What is the cloud?!!

• It’s nothing supernatural.

• It’s been with you for a long time.

• Even our grandparents are using it now

• It’s used for social activities, entertainment, business and so more.

• It could be more secure than your own PCs.

Page 4: Private Cloud Security via Forefront TMG 2010

Public CloudPrivate Cloud

Whatever…

Page 5: Private Cloud Security via Forefront TMG 2010

Public CloudSecurity Concerns

Choose where to store your data …

Page 6: Private Cloud Security via Forefront TMG 2010

Public CloudData Isolation

Physical Hardware

Hypervisor

Host VM Guest VM Guest VM Guest VM

No Access

HackedHealthy

HealthyHealthy

Page 7: Private Cloud Security via Forefront TMG 2010

Public CloudNetwork Security

Microsoft Public Cloud

Hackers

Hypervisors

VM VM VM VM VM VM VM VM VM

Differentiating between the legitimate and illegitimate traffic is quite challenging.

Analysis…Malicious Traffic ?!!

Page 8: Private Cloud Security via Forefront TMG 2010

Private CloudSecurity Concerns

• Isolation of VMs from one another• You are the only one responsible

for the security of the cloud• Attacks from inside the cloud• Huge attacks from the internet.

Such as DoS or DDoS• Authentication, Authorization or

Auditing of access to cloud services

Page 9: Private Cloud Security via Forefront TMG 2010

Forefront Threat Management Gateway 2010

• Network Inspection System• Web Anti-malware• HTTPS Inspection• Builds on ISA Server 2006• Active Directory Integration• Custom Reports• Can be virtualized

Page 10: Private Cloud Security via Forefront TMG 2010

DemoAn Overview on TMG

Page 11: Private Cloud Security via Forefront TMG 2010

Software vs. Hardware

Are hardware firewalls more Secure than software firewalls?

Page 12: Private Cloud Security via Forefront TMG 2010

Software vs. Hardware

Hardware firewalls are all software-based but only come in a hardware package.

Page 13: Private Cloud Security via Forefront TMG 2010

Virtualization of TMG

Hypervisor

Host VM

Guest VM

Guest VM

Guest VM

Pri

vate

Clo

ud

TMG

Not Connected to the Internet

Internet

• The edge gateway and FW• The only Guest connected to the Internet • At least two virtual NIC

Data transmission between the private and public clouds.

Page 14: Private Cloud Security via Forefront TMG 2010

Physical Hardware

Hypervisor

Host VM Guest VM Guest VM TMG

Two Virtual NICs

Page 15: Private Cloud Security via Forefront TMG 2010

Pri

vate

Clo

ud

Hypervisor Hypervisor Hypervisor

Data transmission inside the private cloud.

Page 16: Private Cloud Security via Forefront TMG 2010

DemoVirtualization of TMG

Page 17: Private Cloud Security via Forefront TMG 2010

Virtualization of TMGBest Practices

• Always disconnect the Host VM from the Internet

• All the traffic to the Internet must pass through the VM with TMG

• If there are multiple hypervisors (Physical Servers), the traffic between the VMs in different physical servers should be filtered using TMG.

• The virtual Switch connecting the VMs in every physical server must be Private.

Page 18: Private Cloud Security via Forefront TMG 2010

Network Inspection System

• Inspects the traffic for exploits of vulnerabilities

• With the minimum number of false positives

• Has a repository to store signatures for different types of attacks and can update the repository

• Able to create inspection exception for some parts of the network

Page 19: Private Cloud Security via Forefront TMG 2010

DemoTMG Network Inspection System

Page 20: Private Cloud Security via Forefront TMG 2010

HTTPS Inspection

• It acts as a man-in-the-middle between the two SSL connection parties

• It can inspect inside SSL-Encrypted traffic

• It looks for possible malware or exploits inside an SSL connection

Page 21: Private Cloud Security via Forefront TMG 2010

DemoTMG HTTPS Inspection

Page 22: Private Cloud Security via Forefront TMG 2010

TMG Firewall Features

• Multi-Layer Firewall. It provides access control and protection on three layers:

• Packet filtering• Stateful inspection• Application layer

filtering• DoS Protection• Supports so many protocols and

new protocols can be defined.• Granular HTTP Control:

• File Download Controls• Signature Based Blocking• HTTP Method Control

Page 23: Private Cloud Security via Forefront TMG 2010

DemoTMG Firewall Features

Page 24: Private Cloud Security via Forefront TMG 2010

Securing Remote Accessto your Private Cloud

TMG

Active DirectoryRODC

Outlook Web Access

VPN Client

Pri

vate

Clo

ud

Active Directory Integration forAuthentication, Authorization, Auditing

Page 25: Private Cloud Security via Forefront TMG 2010

Securing Remote Accessto your Private Cloud

• Remote Access VPN by PPTP, L2TP/IPSec and SSTP

• Inspection of VPN traffic• Integration with Active

Directory • Integration with

Network Access Protection and VPN Quarantine

Page 26: Private Cloud Security via Forefront TMG 2010

DemoTMG Secure Remote Access

Page 27: Private Cloud Security via Forefront TMG 2010

Thank YouQ&A

Page 28: Private Cloud Security via Forefront TMG 2010

void contact() {

}

e-mail Address: [email protected]

My Blog: http://esihere.wordpress.com/

Twitter: http://www.twitter.com/esmaeils