Top Banner
Phone: 650-681-8100 / email: [email protected] 1975 W. El Camino Real, Suite 203, Mountain View, CA 94040 Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates Tim Grance, Senior Computer Scientist, NIST Sushant Rao, Product Management Director, HyTrust Curtis Salinas, Systems Engineer, HyTrust © 2012, HyTrust, Inc. www.hytrust.com
25

Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

Jan 22, 2015

Download

Technology

HyTrust

 
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

1 Phone: 650-681-8100 / email: [email protected] 1975 W. El Camino Real, Suite 203, Mountain View, CA 94040

Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates Tim Grance, Senior Computer Scientist, NIST Sushant Rao, Product Management Director, HyTrust Curtis Salinas, Systems Engineer, HyTrust

© 2012, HyTrust, Inc. www.hytrust.com

Page 2: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

2

Security and Compliance Will Be Key to Virtualizing the Next 50% of the Data Center  

Discussion

  Growth depends on virtualizing mission critical workloads

  Virtualization platform provides basic security: OK for non-critical workloads

  Tier 1/2 workloads have higher security, compliance needs

  Purpose-built solutions needed

© 2012, HyTrust, Inc. www.hytrust.com

Page 3: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

3

Privileged Users Can Have Huge Impact

Percentage of breached companies who lost customers as a result of the breach

Percent of all breaches that involved privileged user misuse

Percentage of companies that have experienced a data breach

— Verizon report, 2010

— IT Compliance Institute

— IT Compliance Institute

48%

74%

87% Shionogi & Co: $3.2B pharmaceutical company Laid off IT admin: •  Logged in remotely to vSphere from

local McDonald’s WIFI •  Deleted 88 virtual production servers •  Took down email, order entry, payroll,

BlackBerry, & other services •  Caused $800K damage

© 2012, HyTrust, Inc. www.hytrust.com

Page 4: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

4

Expert Consensus on Virtualization Best Practices

4 © 2012, HyTrust, Inc. www.hytrust.com

* NIST SP 800-125: Guide to Security for Full Virtualization Technologies ** PCI-DSS 2.0 Information Supplement – Virtualization Security *** Neil MacDonald, vice president and Gartner fellow

•  “Enforce least privilege and separation of duties”

•  “It is critical that independent monitoring of all activities be enforced”

•  “Require multi-factor authentication for all administrative functions.”

•  “Administrative access to the hypervisor/VMM layer must be tightly controlled”

•  “Restrict and protect administrator access to the virtualization solution.”

•  “Secure each management interface”

•  “Monitor and analyze logs at all layers of the virtualization infrastructure”

Page 5: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

5

Secures the administration of the hypervisor & virtual infrastructure:   Enforces consistent access and

authorization policies covering all access methods

  Provides granular, user-specific, audit-quality logs

  Enables strong, multi-factor authentication

  Verifies platform integrity, ensuring the hypervisor is hardened and the virtual infrastructure is trusted

HyTrust Appliance Provides Necessary Controls to Confidently Virtualize Mission-Critical Applications

5 © 2012, HyTrust, Inc. www.hytrust.com

Provides complete visibility into and control over who accesses the infrastructure, the integrity of the infrastructure, and the validity of the changes requested.

Page 6: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

6

HyTrust’s Unique Role in Virtual Infrastructure Security

© 2012, HyTrust, Inc. www.hytrust.com

Page 7: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

7

Major Partners Trust HyTrust

© 2012, HyTrust, Inc. www.hytrust.com

HyTrust is key "go to" partner for vSphere security and compliance

HyTrust is part of CA Access Control for Virtual Environments

HyTrust is the platform security solution - access control and auditing - for vBlock

HyTrust reporting and controls being integrated with Symantec CCS

HyTrust is part of Intel's trusted cloud architecture based on TXT

HyTrust event reporting and TXT integration being integrated with McAfee ePO

HyTrust provides native integration with SecurID and enVision

HyTrust provides combined reporting with Trend's Deep Security product

Page 8: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

8

  Admin compliance and controls essential for mission critical workloads

  Capabilities not available from the virtual infrastructure   Granular, audit-quality administration logs   Granular, consistent privileged user and VM control policies   Multi-tenancy logical segmentation

  Trusted by market leaders

  Key component of major partners’ solutions

Virtualize More With HyTrust

8 © 2012, HyTrust, Inc. www.hytrust.com

Page 9: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

9 Phone: 650-681-8100 / email: [email protected] 1975 W. El Camino Real, Suite 203, Mountain View, CA 94040

NIST Special Publication (SP) 800-125

Guide To Security for Full Virtualization Technologies

Recommendations of the National Institute of Standards and Technology

Tim Grance Senior Computer Scientist in the Computer Security Division

Page 10: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

10

Disclaimer

Any mention of commercial products or reference to commercial organizations is for information only; it does not imply recommendation or endorsement by NIST nor does it imply that the products mentioned are necessarily the best

available for the purpose.

Page 11: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

11

Agenda

 What is SP 800-125  Why virtualization  Full virtualization  Security concerns  Recommendations for Security for full virtualization technologies  Summary  Questions and answers  Resources

Page 12: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

12

SP 800-125

 Full Virtualization technologies  Server and desktop virtualization  Security threats  Security recommendations for protecting full virtualization

Page 13: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

13

Why Virtualization?

 Reduce hardware footprint  More efficiency  Reduce energy, operations, and maintenance costs, e.g., disaster

recovery, dynamic workload, security benefits, etc.  Consolidation

Page 14: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

14

Forms of Virtualization

 Simulated environment  Not cover OS and application virtualization  Full virtualization – CPU, storage, network, display, etc  Hypervisor and host OS  Virtual Machine (VM) – Guest OS

 Isolated  Encapsulated  Portable

Page 15: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

15

Full Virtualization

 Bare metal virtualization  Hosted virtualization  Server virtualization  Desktop virtualization

Page 16: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

16

Virtualization and Security Concerns

 Additional layers of technology  Many systems on a physical system  Sharing pool of resources   Lack of visibility  Dynamic environment  May increase the attack surface

Page 17: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

17

Recommendations for Security for Full Virtualization Technologies

 Risk based approach  Secure all elements of a full virtualization solution and perform

continuous monitoring  Restrict and protect administrator access to the virtualization solution  Ensure that the hypervisor is properly secured  Carefully plan the security for a full virtualization solution before

installing, configuring, and deploying it

Page 18: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

18

Summary of Threats and Countermeasures

  Intra-guest vulnerabilities  Hypervisor partitioning

  Lack of visibility in the guest OS  Hypervisor instrumentation and monitoring

 Hypervisor management  Protect management interface, patch management, secure configuration

 Virtual workload security  Management of the guest OS, applications, data protection, patch

management, secure configuration, etc

 Virtualized infrastructure exposure  Manage access control to the hardware, hypervisors, network, storage,

etc.

Page 19: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

19

Resources

  Presidential Memorandum, June 10, 2010, Disposing of Unneeded Federal Real Estate, is available on the following Web page: http://www.whitehouse.gov/the-press-office/presidential-memorandum-disposing-unneeded-federal-real-estate

  NIST publications that provide information and guidance on planning, implementing and managing information system security and protecting information include:  Federal Information Processing Standard (FIPS) 199, Standards for Security

Categorization of Federal Information and Information Systems  NIST Special Publication (SP) 800-37 Revision 1, Guide for Applying the Risk

Management Framework to Federal Information Systems: A Security Life Cycle Approach  NIST SP 800-53 Revision 3, Recommended Security Controls for Federal Information

Systems and Organizations  NIST SP 800-61 Revision 1, Computer Security Incident Handling Guide  NIST SP 800-64 Revision 2, Security Considerations in the System Development Life

Cycle  NIST SP 800-88, Guidelines for Media Sanitization  NIST SP 800-115, Technical Guide to Information Security Testing and Assessment  NIST SP 800-122, Guide to Protecting the Confidentiality of Personally Identifiable

Information (PII)

  For information about these NIST standards and guidelines, as well as other security-related publications, see NIST’s Web page http://csrc.nist.gov/publications/index.html

Page 20: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

20

HyTrust Fills Critical Platform Access Gaps

© 2012, HyTrust, Inc. www.hytrust.com

Virtualization Platform Gap HyTrust Solution

Multiple administrators can log into hosts anonymously by sharing a root account

Uses root password vaulting (check-in/out) to ensure admins are individually accountable

An admin can bypass vCenter access controls and logging by connecting directly to hosts

Controls and logs access via any connection method, creating accountability

An admin can access another organization’s virtualized workloads in multi-tenant environments

Ensures that admins can only access their own organization’s data and applications, enabling secure multi-tenancy

Platform allows access via default password or compromised admin password

Prevents use of default passwords and supports multi-factor authentication to stop unauthorized access

A current or terminated admin can connect to the platform undetected using a backdoor account

Controls and logs access to every admin account, preventing major security breaches

Page 21: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

21

HyTrust Fills Critical Platform Authorization Gaps

© 2012, HyTrust, Inc. www.hytrust.com

Virtualization Platform Gap HyTrust Solution

An administrator can shut down any virtualized application or switch

Protects business continuity by controlling what resources an admin can manage

An admin can create unapproved VMs, with negative operations or compliance impacts

Prevents damaging outcomes by controlling VM creation privileges

An admin can disable security such as virtualized firewalls and antivirus

Preserves security by blocking unapproved shutdowns of virtual security measures

An admin can copy sensitive data from a VM to external storage

Keeps sensitive data confidential by applying controls to virtual resources

An admin can replace a critical VM with a compromised copy while leaving no tracks

Exposes tampering by creating a permanent, unchangeable record of every operation

An admin can move a low trust virtualized workload to a high trust server or virtual subnet, and vice versa

Mitigates security and compliance risks by preventing mixing of trust levels

Page 22: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

22

HyTrust Fills Critical Log Data Gaps

© 2012, HyTrust, Inc. www.hytrust.com

Log Data Provider

Data for Allowed Operation (example)

Data for Denied Operation (example)

Usability and Productivity

Virtualization Platform

User: root Time/date Target resource name, URL Operation executed

none • Separate log files for vCenter and each host server

• Different log formats for vCenter vs. hosts

HyTrust All of the above, plus: • User ID • Source IP address • Resource reconfigured • Previous resource state • New resource state • Label (Production) • Required privileges • Evaluated rules/

constraints

• User ID • Date/time • Source IP address • Operation requested • Operation denial • Target resource name,

IP address, port, and protocol

• Required privileges • Missing privileges • Evaluated rules/

constraints

• Consolidated, centrally managed logs covering vCenter and all hosts

• Single, uniform format for combined vCenter and host log data

• Logs sent to central repository or SIEM via syslog

Page 23: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

23 Phone: 650-681-8100 / email: [email protected] 1975 W. El Camino Real, Suite 203, Mountain View, CA 94040

HyTrust In Action – Live Demo

Page 24: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

24

Visibility

• Authentication • Logging

Control

• Role-Based Access Control

• Policy

Validation

• Configuration Assessment & Remediation

HyTrust is a Critical Component in Virtualizing Mission-Critical Applications

24 © 2012, HyTrust, Inc. www.hytrust.com

Page 25: Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates

25

Thank You!

© 2012, HyTrust, Inc. www.hytrust.com

Questions and Answers