SlideShare a Scribd company logo
Securing Servers in Public and Hybrid Clouds Leveraging RightScale and CloudPassage Dec 15,  2011 Watch the video of this webinar
Your Panel Today Host Phil Cox , Director, Security and Compliance, RightScale @sec_prof Presenting Uri Budnik , Director, ISV Partner Program, RightScale. @uribudnik Carson Sweet , CEO of CloudPassage. @carsonsweet Q&A Will Eschen , Account Executive, RightScale Please use the “Questions” window to ask questions any time!
Agenda Introduction Security and Compliance in the Cloud – How are they Different? Model for Securing Cloud-based Hosting Environments Demo Deployment of Integrated Solution Q&A
CloudPassage Background Select Customers Recent Awards Production users since July 2010 Publicly accessible since Jan 2011 Commercial release Oct 2011 Halo TM  Solution 132  customers 2,154  servers secured 1,273,986  scans completed Early Adoption Founded January 2010 Team of 27 security specialists Backed by Benchmark Capital Company Background
 
 
 
Cloud Changes the Balance Servers used to be highly isolated Bad guys clearly on the outside Layers of perimeter security Poor configurations were tolerable private datacenter public cloud www-1 www-2 www-3 www-4
Cloud Changes the Balance Servers used to be highly isolated Bad guys clearly on the outside Layers of perimeter security Poor configurations were tolerable Cloud servers more exposed Outside of perimeter protections Little network control or visibility No idea who’s next door private datacenter public cloud www-1 www-2 www-3 www-4
Cloud Changes the Balance Servers used to be highly isolated Bad guys clearly on the outside Layers of perimeter security Poor configurations were tolerable Cloud servers more exposed Outside of perimeter protections Little network control or visibility No idea who’s next door Sprawling, multiplying exposures Rapidly growing attack surface area More servers = more vulnerabilities More servers ≠ more people private datacenter public cloud www-1 www-2 www-3 www-7 www-4 www-8 www-5 www-9 www-6 www-10
Cloud Changes the Balance Servers used to be highly isolated Bad guys clearly on the outside Layers of perimeter security Poor configurations were tolerable Cloud servers more exposed Outside of perimeter protections Little network control or visibility No idea who’s next door Sprawling, multiplying exposures Rapidly growing attack surface area More servers = more vulnerabilities More servers ≠ more people Fraudsters target cloud servers Softer targets to penetrate No perimeter defenses to thwart Elasticity = more botnet to sell private datacenter public cloud www-1 www-2 www-3 www-7 www-4 www-8 www-5 www-9 www-6 www-10
Your Servers… Your Responsibility Direct from Amazon AWS Customer Responsibility Provider Responsibility “… the  customer   should assume responsibility and management of, but not limited to, the guest operating system.. and associated application software...” “ it is possible for customers to enhance security and/or meet more stringent compliance requirements  with the addition of…   host based firewalls, host based intrusion detection/prevention, encryption and key management.”   Amazon Web Services: Overview of Security Processes (2011) Physical Facilities Hypervisor Compute & Storage Shared Network Virtual Machine Data App Code App Framework Operating System
CloudPassage Halo was  purpose-built  to actively  protect servers in any cloud. RightScale  can ensure  secure server   configurations across  multiple clouds .
Halo GhostPorts two-factor access control Halo REST API for integration & automation Halo is a security Software-as-a-Service providing all you need to  secure your cloud servers . Halo TM  Functional Capabilities Dynamic network access control Configuration and package security Server account  visibility & control Server compromise & intrusion alerting
Compute Grid User Portal https RESTful  API Gateway https CloudPassage Halo Halo Daemon Policies, Commands, Reports www-1 Halo www-1
Compute Grid User Portal https RESTful  API Gateway https CloudPassage Halo Policies, Commands, Reports www-1 Halo Policies & Commands www-1
Compute Grid User Portal https RESTful  API Gateway https CloudPassage Halo Policies, Commands, Reports www-1 Results & Updates Halo www-1
Compute Grid User Portal https RESTful  API Gateway https CloudPassage Halo Policies, Commands, Reports www-1 Halo www-1 State and Event Analysis
Compute Grid User Portal https RESTful  API Gateway https CloudPassage Halo Policies, Commands, Reports www-1 Halo Alerts, Reports  and Trending www-1
100% Multi-Cloud Capable Single pane of glass across hosting models Scales and bursts with dynamic cloud environments Not dependant on chokepoints, static networks or fixed IPs Agnostic to cloud provider, hypervisor or hardware
Features & Pricing  Dynamic network access control ✔ ✔ Server compromise & intrusion alerting ✔ ✔ Configuration and software security ✔ ✔ Server account visibility & control ✔ ✔ REST API access ✔ GhostPorts multi-factor authentication ✔ Data storage One day Two years Maximum scanning frequency Daily Hourly Servers protected Up to 25 Unlimited FREE $0.10/hour
Getting Started Register and setup Halo Up to 25 servers are free Evaluation keys are available to unlock pro features Optimize your Halo configuration Set up some server groups & a firewall policy Explore base policies provided by CloudPassage Get answers and tips at  community.cloudpassage.com   Deploy Halo via RightScript Ensures consistent deployment of Halo across all servers Offers additional visibility and remediation alternatives
RightScale Integration Installation of Halo via RightScript Load your Halo API key into RightScale as a credential Add the CloudPassage Halo RightScript to your server templates All launched servers will automatically have CloudPassage Halo activated Easy, consistent security!
RightScale  Real Customers, Real Deployments, Real Benefits Managed Cloud Deployments for 4 Years — globally More than 45,000 users; launched more than 3MM servers! Powering the largest production deployments on the cloud
What do we Mean by Cloud Computing? RightScale
RightScale Manages IaaS Clouds RightScale
Complete Systems Management
Dynamic configuration Abstract role and behavior from cloud infrastructure Predictable deployment Cloud agnostic / portable Object-oriented programming for sysadmins ServerTemplates
Parenthesis : What are ServerTemplates? Custom MySQL 5.0.24 (CentOS 5.2) Custom MySQL 5.0.24 (CentOS 5.4) MySQL 5.0.36 (CentOS 5.4) MySQL 5.0.36 (Ubuntu 8.10) MySQL 5.0.36 (Ubuntu 8.10) 64bit Frontend Apache 1.3 (Ubuntu 8.10) Frontend Apache 2.0 (Ubuntu 9.10) - patched CMS v1.0 (CentOS 5.4) CMS v1.1 (CentOS 5.4) My ASP appserver  (windows 2008) My ASP.net  (windows 2008) – security update 1 My ASP.net  (windows 2008) – security update 8 SharePoint v4 (windows 2003) – 32bit SharePoint v4 (windows 2003) –64bit SharePoint v4.5 (windows 2003) –64bit … Configuring servers through bundling Images: A set of configuration directives that will install and configure software on top of the base image Configuring servers with ServerTemplates: CentOS 5.2 CentOS 5.4 Ubuntu 8.10 Ubuntu 9.10 Win 2003 Win 2007 Base Image Very few and basic
Integrated approach that puts together all the parts needed to architect single & multi-server deployments ServerTemplates VS.
CloudPassage / RightScale Integration Demo
Find Out More Web Resources: RightScale.com/partners/isv/CloudPassage.php  Right Scale.com/webinars Right Scale.com/whitepapers Community.CloudPassage.com Blogs: Blog.RightScale.com Follow us on Twitter @secprof @uribudnik @carsonsweet @cloudpassage @rightscale
Thank you!!!  Contact Information CloudPassage Team info@ cloudpassage.com [email_address] (415) 886-3020 RightScale [email_address] (866) 720-0208 phil @rightscale.com
Additional Slides
Data Security We will cover … Common data exposure vectors Security benefits of centralized management Unique security needs associated with hybrid and cross-cloud environments
Biggest real risks to data in the cloud? The same things as when your data were not in the cloud. Poor application security leading to Injection Poor system configurations, leading to system compromised Poor application configuration leading to application compromise Poor user habits leading to compromised credentials, that are then used to access data
Common data exposure vectors in the cloud Data is typically exposed in the following three states: In Process At Rest In Transit
We must protect data  “In Transit” Why? You do not want the bad guys to see or modify your data You can ’t guarantee the path your data will take You may have regulatory or contractual requirements to do so Risk Sniffing along the path Modification of existing data Injection of new data Common Solutions Application Transport (SSL & TLS) VPN (SSL, IPSEC, PPTP, L2TP) App level data encryption (custom) Map of Internet Traffic
We must protect data  “At Rest” Why? Same as previous: You do not want unauthorized Disclosure Modification Injection Risks Intrusion into Instance/Guest exposes data on its filesystem Cloud provider access to ephemeral storage (e.g., EBS, SWIFT) Cloud provider access to other storage options (e.g., S3, CloudFiles) Common Solutions Protection offered by running operating system (Access Control Lists) *Encryption (and Key Management)* SLA and Policies/Processes of the Cloud provider
We must protect data while  “In Process” Why? Same as previous: You do not want unauthorized Disclosure Modification Injection Risk Data is in clear in the memory of the Instance Privileged users on a system can read memory Hypervisor has access to instance memory Common Solutions Protect the system that is processing Protect the hypervisor running the Instance Limit administrative users
Where RightScale shines RightScale can be used to ensure that poor system and application configurations are not what cause you to lose your data Use RightScale to: Require data to be transmitted securely Require data be stored securely Ensure systems are appropriately patched and configured to minimize exposures The core technologies are RightImages ServerTemplates RightScripts Repo’s and Mirrors Security Motto:  “Build it secure, keep it secure!”
Build it Secure Known Configurations Start with Multi-Cloud Images Build with ServerTemplates Modify with RightScripts Build from Frozen Repos What How Use Trusted Images Script the install  and configuration Trusted Repository
Keep it Secure What Update the Operating System Update the applications Validate the configuration How You can use the same mechanism as in your enterprise *OR*  Use operational RightScripts to do it for you *OR* Use a partner ISV that specializes in that service
Hybrid/cross cloud security concerns Cloud functionality differences This is  the  biggest concern in a non-homogeneous environment Security features are different in scope and implementation for basically all different cloud orchestration technologies Identity and Access Management features differ Log levels and information differ Applying consistent builds throughout Think of the term “security group”, then define what that means in all the clouds you will use? How do you manage them consistently? Physical protections will differ from provider to provider You will need to take this into consideration when looking at controls to implement

More Related Content

PDF
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Happiest Minds Technologies
 
PPT
Securing Sensitive Data in Your Hybrid Cloud
RightScale
 
PDF
BlockChain Enabled-Cloud Delivered For Network Secuirty
Happiest Minds Technologies
 
PDF
CSA Introduction 2013 David Ross
Graeme Wood
 
PDF
Global Mandate to Secure Cloud Computing
CloudSecurityAllianceAustralia
 
PDF
Cloud summit demystifying cloud security
David De Vos
 
PPTX
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
Raffa Learning Community
 
PDF
Why CSA Australia
CloudSecurityAllianceAustralia
 
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Happiest Minds Technologies
 
Securing Sensitive Data in Your Hybrid Cloud
RightScale
 
BlockChain Enabled-Cloud Delivered For Network Secuirty
Happiest Minds Technologies
 
CSA Introduction 2013 David Ross
Graeme Wood
 
Global Mandate to Secure Cloud Computing
CloudSecurityAllianceAustralia
 
Cloud summit demystifying cloud security
David De Vos
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
Raffa Learning Community
 

What's hot (20)

PDF
Cloud Security Guide - Ref Architecture and Gov. Model
Vishal Sharma
 
PDF
Cloud Security Governance
Shankar Subramaniyan
 
PDF
Secaa s cat_10_network_security_implementation_guidance
drewz lin
 
PPTX
How SASE can help you move securely from the PSN with VMware and Breeze Networks
Articulate Marketing
 
PPTX
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
 
PPTX
Rik Ferguson
CloudExpoEurope
 
PDF
CSA Standards Development Summary
CloudSecurityAllianceAustralia
 
PDF
Mindtree distributed agile journey and guiding principles
Mindtree Ltd.
 
PDF
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera Technologies
 
PDF
Security As A Service
Olav Tvedt
 
PPTX
Cloud Security for U.S. Military Agencies
NJVC, LLC
 
PDF
IT Security As A Service
Michael Davis
 
PDF
Best-Practices-Web-Usability
Larry Wilson
 
PPTX
Security as a Service Model for Cloud Environment
KaashivInfoTech Company
 
PPTX
Cloud Computing Security
Nithin Raj
 
PPTX
NIST Cybersecurity Framework (CSF) on the Public Cloud
CloudHesive
 
PDF
CSA Security Guidance Cloud Computing v3.0
CloudSecurityAllianceAustralia
 
PPTX
4.5.cloud security
DrRajapraveenkN
 
PDF
John Merline - How make your cloud SASE
AWS Chicago
 
Cloud Security Guide - Ref Architecture and Gov. Model
Vishal Sharma
 
Cloud Security Governance
Shankar Subramaniyan
 
Secaa s cat_10_network_security_implementation_guidance
drewz lin
 
How SASE can help you move securely from the PSN with VMware and Breeze Networks
Articulate Marketing
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
 
Rik Ferguson
CloudExpoEurope
 
CSA Standards Development Summary
CloudSecurityAllianceAustralia
 
Mindtree distributed agile journey and guiding principles
Mindtree Ltd.
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera Technologies
 
Security As A Service
Olav Tvedt
 
Cloud Security for U.S. Military Agencies
NJVC, LLC
 
IT Security As A Service
Michael Davis
 
Best-Practices-Web-Usability
Larry Wilson
 
Security as a Service Model for Cloud Environment
KaashivInfoTech Company
 
Cloud Computing Security
Nithin Raj
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
CloudHesive
 
CSA Security Guidance Cloud Computing v3.0
CloudSecurityAllianceAustralia
 
4.5.cloud security
DrRajapraveenkN
 
John Merline - How make your cloud SASE
AWS Chicago
 
Ad

Similar to Securing Servers in Public and Hybrid Clouds (20)

PPTX
Why Cloud Management Makes Sense
RightScale
 
PPTX
Introduction To Cloud Computing
Rinat Shagisultanov
 
PPTX
Harbour IT & VMware - vForum 2010 Wrap
HarbourIT
 
PPTX
CSC AWS re:Invent Enterprise DevOps session
Tom Laszewski
 
PPTX
What’s New at Cloudflare: New Product Launches
Cloudflare
 
PDF
SSL VPN Evaluation Guide
Array Networks
 
PPT
Build & Deploy Scalable Cloud Applications in Record Time
RightScale
 
PDF
Istio Service Mesh
Lew Tucker
 
PPTX
Building a Hybrid Cloud The Real Deal
RightScale
 
PPTX
Webinar Series Part 2 -Recipe for a Successful SaaS Company - Migrating Sing...
Techcello
 
PDF
Hybridní cloud s F5 v prostředí kontejnerů
MarketingArrowECS_CZ
 
PPTX
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
PPTX
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
Jeremy Gray
 
PPTX
emc world keynote gelsinger
Orange Business Services Business development IT
 
PPT
Creating Secure Applications
guest879f38
 
PDF
Soa12c launch 1 overview cr
Vasily Demin
 
PDF
Enterprise Cloud Security
MongoDB
 
ODP
Cloud Computing & Sun Vision 03262009
guest829442
 
PDF
Cozystack: Free PaaS platform and framework for building clouds
Andrei Kvapil
 
PPTX
Application Security in the Cloud - Best Practices
RightScale
 
Why Cloud Management Makes Sense
RightScale
 
Introduction To Cloud Computing
Rinat Shagisultanov
 
Harbour IT & VMware - vForum 2010 Wrap
HarbourIT
 
CSC AWS re:Invent Enterprise DevOps session
Tom Laszewski
 
What’s New at Cloudflare: New Product Launches
Cloudflare
 
SSL VPN Evaluation Guide
Array Networks
 
Build & Deploy Scalable Cloud Applications in Record Time
RightScale
 
Istio Service Mesh
Lew Tucker
 
Building a Hybrid Cloud The Real Deal
RightScale
 
Webinar Series Part 2 -Recipe for a Successful SaaS Company - Migrating Sing...
Techcello
 
Hybridní cloud s F5 v prostředí kontejnerů
MarketingArrowECS_CZ
 
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
Jeremy Gray
 
Creating Secure Applications
guest879f38
 
Soa12c launch 1 overview cr
Vasily Demin
 
Enterprise Cloud Security
MongoDB
 
Cloud Computing & Sun Vision 03262009
guest829442
 
Cozystack: Free PaaS platform and framework for building clouds
Andrei Kvapil
 
Application Security in the Cloud - Best Practices
RightScale
 
Ad

More from RightScale (20)

PDF
10 Must-Have Automated Cloud Policies for IT Governance
RightScale
 
PDF
Kubernetes and Terraform in the Cloud: How RightScale Does DevOps
RightScale
 
PDF
Optimize Software, SaaS, and Cloud with Flexera and RightScale
RightScale
 
PDF
Prepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About Now
RightScale
 
PDF
How to Set Up a Cloud Cost Optimization Process for your Enterprise
RightScale
 
PDF
Multi-Cloud Management with RightScale CMP (Demo)
RightScale
 
PDF
Comparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBM
RightScale
 
PDF
How to Allocate and Report Cloud Costs with RightScale Optima
RightScale
 
PDF
Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...
RightScale
 
PDF
Using RightScale CMP with Cloud Provider Tools
RightScale
 
PDF
Best Practices for Multi-Cloud Security and Compliance
RightScale
 
PDF
Automating Multi-Cloud Policies for AWS, Azure, Google, and More
RightScale
 
PDF
The 5 Stages of Cloud Management for Enterprises
RightScale
 
PDF
9 Ways to Reduce Cloud Storage Costs
RightScale
 
PDF
Serverless Comparison: AWS vs Azure vs Google vs IBM
RightScale
 
PDF
Best Practices for Cloud Managed Services Providers: The Path to CMP Success
RightScale
 
PDF
Cloud Storage Comparison: AWS vs Azure vs Google vs IBM
RightScale
 
PDF
2018 Cloud Trends: RightScale State of the Cloud Report
RightScale
 
PDF
Got a Multi-Cloud Strategy? How RightScale CMP Helps
RightScale
 
PDF
How to Manage Cloud Costs with RightScale Optima
RightScale
 
10 Must-Have Automated Cloud Policies for IT Governance
RightScale
 
Kubernetes and Terraform in the Cloud: How RightScale Does DevOps
RightScale
 
Optimize Software, SaaS, and Cloud with Flexera and RightScale
RightScale
 
Prepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About Now
RightScale
 
How to Set Up a Cloud Cost Optimization Process for your Enterprise
RightScale
 
Multi-Cloud Management with RightScale CMP (Demo)
RightScale
 
Comparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBM
RightScale
 
How to Allocate and Report Cloud Costs with RightScale Optima
RightScale
 
Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...
RightScale
 
Using RightScale CMP with Cloud Provider Tools
RightScale
 
Best Practices for Multi-Cloud Security and Compliance
RightScale
 
Automating Multi-Cloud Policies for AWS, Azure, Google, and More
RightScale
 
The 5 Stages of Cloud Management for Enterprises
RightScale
 
9 Ways to Reduce Cloud Storage Costs
RightScale
 
Serverless Comparison: AWS vs Azure vs Google vs IBM
RightScale
 
Best Practices for Cloud Managed Services Providers: The Path to CMP Success
RightScale
 
Cloud Storage Comparison: AWS vs Azure vs Google vs IBM
RightScale
 
2018 Cloud Trends: RightScale State of the Cloud Report
RightScale
 
Got a Multi-Cloud Strategy? How RightScale CMP Helps
RightScale
 
How to Manage Cloud Costs with RightScale Optima
RightScale
 

Recently uploaded (20)

PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Software Development Methodologies in 2025
KodekX
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Doc9.....................................
SofiaCollazos
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Software Development Methodologies in 2025
KodekX
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
The Future of Artificial Intelligence (AI)
Mukul
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 

Securing Servers in Public and Hybrid Clouds

  • 1. Securing Servers in Public and Hybrid Clouds Leveraging RightScale and CloudPassage Dec 15, 2011 Watch the video of this webinar
  • 2. Your Panel Today Host Phil Cox , Director, Security and Compliance, RightScale @sec_prof Presenting Uri Budnik , Director, ISV Partner Program, RightScale. @uribudnik Carson Sweet , CEO of CloudPassage. @carsonsweet Q&A Will Eschen , Account Executive, RightScale Please use the “Questions” window to ask questions any time!
  • 3. Agenda Introduction Security and Compliance in the Cloud – How are they Different? Model for Securing Cloud-based Hosting Environments Demo Deployment of Integrated Solution Q&A
  • 4. CloudPassage Background Select Customers Recent Awards Production users since July 2010 Publicly accessible since Jan 2011 Commercial release Oct 2011 Halo TM Solution 132 customers 2,154 servers secured 1,273,986 scans completed Early Adoption Founded January 2010 Team of 27 security specialists Backed by Benchmark Capital Company Background
  • 5.  
  • 6.  
  • 7.  
  • 8. Cloud Changes the Balance Servers used to be highly isolated Bad guys clearly on the outside Layers of perimeter security Poor configurations were tolerable private datacenter public cloud www-1 www-2 www-3 www-4
  • 9. Cloud Changes the Balance Servers used to be highly isolated Bad guys clearly on the outside Layers of perimeter security Poor configurations were tolerable Cloud servers more exposed Outside of perimeter protections Little network control or visibility No idea who’s next door private datacenter public cloud www-1 www-2 www-3 www-4
  • 10. Cloud Changes the Balance Servers used to be highly isolated Bad guys clearly on the outside Layers of perimeter security Poor configurations were tolerable Cloud servers more exposed Outside of perimeter protections Little network control or visibility No idea who’s next door Sprawling, multiplying exposures Rapidly growing attack surface area More servers = more vulnerabilities More servers ≠ more people private datacenter public cloud www-1 www-2 www-3 www-7 www-4 www-8 www-5 www-9 www-6 www-10
  • 11. Cloud Changes the Balance Servers used to be highly isolated Bad guys clearly on the outside Layers of perimeter security Poor configurations were tolerable Cloud servers more exposed Outside of perimeter protections Little network control or visibility No idea who’s next door Sprawling, multiplying exposures Rapidly growing attack surface area More servers = more vulnerabilities More servers ≠ more people Fraudsters target cloud servers Softer targets to penetrate No perimeter defenses to thwart Elasticity = more botnet to sell private datacenter public cloud www-1 www-2 www-3 www-7 www-4 www-8 www-5 www-9 www-6 www-10
  • 12. Your Servers… Your Responsibility Direct from Amazon AWS Customer Responsibility Provider Responsibility “… the customer should assume responsibility and management of, but not limited to, the guest operating system.. and associated application software...” “ it is possible for customers to enhance security and/or meet more stringent compliance requirements with the addition of… host based firewalls, host based intrusion detection/prevention, encryption and key management.” Amazon Web Services: Overview of Security Processes (2011) Physical Facilities Hypervisor Compute & Storage Shared Network Virtual Machine Data App Code App Framework Operating System
  • 13. CloudPassage Halo was purpose-built to actively protect servers in any cloud. RightScale can ensure secure server configurations across multiple clouds .
  • 14. Halo GhostPorts two-factor access control Halo REST API for integration & automation Halo is a security Software-as-a-Service providing all you need to secure your cloud servers . Halo TM Functional Capabilities Dynamic network access control Configuration and package security Server account visibility & control Server compromise & intrusion alerting
  • 15. Compute Grid User Portal https RESTful API Gateway https CloudPassage Halo Halo Daemon Policies, Commands, Reports www-1 Halo www-1
  • 16. Compute Grid User Portal https RESTful API Gateway https CloudPassage Halo Policies, Commands, Reports www-1 Halo Policies & Commands www-1
  • 17. Compute Grid User Portal https RESTful API Gateway https CloudPassage Halo Policies, Commands, Reports www-1 Results & Updates Halo www-1
  • 18. Compute Grid User Portal https RESTful API Gateway https CloudPassage Halo Policies, Commands, Reports www-1 Halo www-1 State and Event Analysis
  • 19. Compute Grid User Portal https RESTful API Gateway https CloudPassage Halo Policies, Commands, Reports www-1 Halo Alerts, Reports and Trending www-1
  • 20. 100% Multi-Cloud Capable Single pane of glass across hosting models Scales and bursts with dynamic cloud environments Not dependant on chokepoints, static networks or fixed IPs Agnostic to cloud provider, hypervisor or hardware
  • 21. Features & Pricing Dynamic network access control ✔ ✔ Server compromise & intrusion alerting ✔ ✔ Configuration and software security ✔ ✔ Server account visibility & control ✔ ✔ REST API access ✔ GhostPorts multi-factor authentication ✔ Data storage One day Two years Maximum scanning frequency Daily Hourly Servers protected Up to 25 Unlimited FREE $0.10/hour
  • 22. Getting Started Register and setup Halo Up to 25 servers are free Evaluation keys are available to unlock pro features Optimize your Halo configuration Set up some server groups & a firewall policy Explore base policies provided by CloudPassage Get answers and tips at community.cloudpassage.com Deploy Halo via RightScript Ensures consistent deployment of Halo across all servers Offers additional visibility and remediation alternatives
  • 23. RightScale Integration Installation of Halo via RightScript Load your Halo API key into RightScale as a credential Add the CloudPassage Halo RightScript to your server templates All launched servers will automatically have CloudPassage Halo activated Easy, consistent security!
  • 24. RightScale Real Customers, Real Deployments, Real Benefits Managed Cloud Deployments for 4 Years — globally More than 45,000 users; launched more than 3MM servers! Powering the largest production deployments on the cloud
  • 25. What do we Mean by Cloud Computing? RightScale
  • 26. RightScale Manages IaaS Clouds RightScale
  • 28. Dynamic configuration Abstract role and behavior from cloud infrastructure Predictable deployment Cloud agnostic / portable Object-oriented programming for sysadmins ServerTemplates
  • 29. Parenthesis : What are ServerTemplates? Custom MySQL 5.0.24 (CentOS 5.2) Custom MySQL 5.0.24 (CentOS 5.4) MySQL 5.0.36 (CentOS 5.4) MySQL 5.0.36 (Ubuntu 8.10) MySQL 5.0.36 (Ubuntu 8.10) 64bit Frontend Apache 1.3 (Ubuntu 8.10) Frontend Apache 2.0 (Ubuntu 9.10) - patched CMS v1.0 (CentOS 5.4) CMS v1.1 (CentOS 5.4) My ASP appserver (windows 2008) My ASP.net (windows 2008) – security update 1 My ASP.net (windows 2008) – security update 8 SharePoint v4 (windows 2003) – 32bit SharePoint v4 (windows 2003) –64bit SharePoint v4.5 (windows 2003) –64bit … Configuring servers through bundling Images: A set of configuration directives that will install and configure software on top of the base image Configuring servers with ServerTemplates: CentOS 5.2 CentOS 5.4 Ubuntu 8.10 Ubuntu 9.10 Win 2003 Win 2007 Base Image Very few and basic
  • 30. Integrated approach that puts together all the parts needed to architect single & multi-server deployments ServerTemplates VS.
  • 31. CloudPassage / RightScale Integration Demo
  • 32. Find Out More Web Resources: RightScale.com/partners/isv/CloudPassage.php Right Scale.com/webinars Right Scale.com/whitepapers Community.CloudPassage.com Blogs: Blog.RightScale.com Follow us on Twitter @secprof @uribudnik @carsonsweet @cloudpassage @rightscale
  • 33. Thank you!!! Contact Information CloudPassage Team info@ cloudpassage.com [email_address] (415) 886-3020 RightScale [email_address] (866) 720-0208 phil @rightscale.com
  • 35. Data Security We will cover … Common data exposure vectors Security benefits of centralized management Unique security needs associated with hybrid and cross-cloud environments
  • 36. Biggest real risks to data in the cloud? The same things as when your data were not in the cloud. Poor application security leading to Injection Poor system configurations, leading to system compromised Poor application configuration leading to application compromise Poor user habits leading to compromised credentials, that are then used to access data
  • 37. Common data exposure vectors in the cloud Data is typically exposed in the following three states: In Process At Rest In Transit
  • 38. We must protect data “In Transit” Why? You do not want the bad guys to see or modify your data You can ’t guarantee the path your data will take You may have regulatory or contractual requirements to do so Risk Sniffing along the path Modification of existing data Injection of new data Common Solutions Application Transport (SSL & TLS) VPN (SSL, IPSEC, PPTP, L2TP) App level data encryption (custom) Map of Internet Traffic
  • 39. We must protect data “At Rest” Why? Same as previous: You do not want unauthorized Disclosure Modification Injection Risks Intrusion into Instance/Guest exposes data on its filesystem Cloud provider access to ephemeral storage (e.g., EBS, SWIFT) Cloud provider access to other storage options (e.g., S3, CloudFiles) Common Solutions Protection offered by running operating system (Access Control Lists) *Encryption (and Key Management)* SLA and Policies/Processes of the Cloud provider
  • 40. We must protect data while “In Process” Why? Same as previous: You do not want unauthorized Disclosure Modification Injection Risk Data is in clear in the memory of the Instance Privileged users on a system can read memory Hypervisor has access to instance memory Common Solutions Protect the system that is processing Protect the hypervisor running the Instance Limit administrative users
  • 41. Where RightScale shines RightScale can be used to ensure that poor system and application configurations are not what cause you to lose your data Use RightScale to: Require data to be transmitted securely Require data be stored securely Ensure systems are appropriately patched and configured to minimize exposures The core technologies are RightImages ServerTemplates RightScripts Repo’s and Mirrors Security Motto: “Build it secure, keep it secure!”
  • 42. Build it Secure Known Configurations Start with Multi-Cloud Images Build with ServerTemplates Modify with RightScripts Build from Frozen Repos What How Use Trusted Images Script the install and configuration Trusted Repository
  • 43. Keep it Secure What Update the Operating System Update the applications Validate the configuration How You can use the same mechanism as in your enterprise *OR*  Use operational RightScripts to do it for you *OR* Use a partner ISV that specializes in that service
  • 44. Hybrid/cross cloud security concerns Cloud functionality differences This is the biggest concern in a non-homogeneous environment Security features are different in scope and implementation for basically all different cloud orchestration technologies Identity and Access Management features differ Log levels and information differ Applying consistent builds throughout Think of the term “security group”, then define what that means in all the clouds you will use? How do you manage them consistently? Physical protections will differ from provider to provider You will need to take this into consideration when looking at controls to implement

Editor's Notes

  • #16: y
  • #17: y
  • #18: y
  • #19: y
  • #20: y
  • #37: Poor application security leading to Injection SQL injection was one of the top exploit in the Verizon Data Breach Report Poor system configurations, leading to system compromised Note the recent Windows RDP “exploit”. RDP left open, with Administrator having a well known password. Poor application configuration leading to application compromise Browsers that run scripts automatically Poor user habits leading to compromised credentials, that are then used to access data Users who click on attachments. Zeus bot, FakeAV, etc.
  • #39: Considerations TCP/UDP paths are not guaranteed! From source to destination (initial loads or updates) Across public networks or private? Once in the “cloud” Within Cloud Provider (CP) network where data is stored Crossing CP network where data is stored Within the hypervisor Can someone: View or Modify it? Yes: Unencrypted, encrypted w/keys So encrypt it , and protect the keys Deny it? Yes: packet manipulation No way to prevent. Can use reliable transports and dedicated connections
  • #40: Can someone: View or Modify it? Yes: Unencrypted, encrypted w/keys So encrypt it , and protect the keys Deny it? Yes: local system access if improper ACL. Improper CP controls Proper ACL for local accounts. No way to prevent CP access. Risk assessment should be performed.
  • #41: Can someone: View or Modify it? Yes: Memory is clear Need to protect running memory from the Instance Need to trust the CP Deny it? No: Not specifically data. Can affect the instance, but really not practical to affect data in memory without affecting running instance stability
  • #43: Trusted Images Windows w/ critical/recommend patch installed to image creation date  Known configurations ServerTemplates Trusted software repositories Frozen repositories Script the install and config RightScripts
  • #44: How Same mechanism as in your enterprise  RightScale can be used to automate/orchestrate where needed, but does not do the patching Windows: Windows Update, SUS, SCOM agent, etc. Think about application patching Linux: Unfreeze repositories OR RightScript to update repository to latest tested Latter probably works better with Change Control Process