lucw lsec-securit-20110907-4-final-5

39
<Insert Picture Here>

Upload: luc-wijns

Post on 28-Nov-2014

390 views

Category:

Technology


0 download

DESCRIPTION

This is a public presentation I gave in 2011 @ www.lsec.be wrt cloud security. Even the content is "Oracle tagged", it reflects my opinions at that time wrt cloud security. The pdf of this presentation is publicly available @ http://www.lsec.be/upload_directories/documents/110908_CloudTrust/8_Wijns_Luc_Oracle_110908.pdf

TRANSCRIPT

Page 1: Lucw lsec-securit-20110907-4-final-5

<Insert Picture Here>

Page 2: Lucw lsec-securit-20110907-4-final-5

<Insert Picture Here>

Data Security in the Cloud

Luc Wijns

Chief Technologist Systems Benelux

Page 3: Lucw lsec-securit-20110907-4-final-5

3 © 2011 Oracle Corporation

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.

Page 4: Lucw lsec-securit-20110907-4-final-5

4 © 2011 Oracle Corporation

NIST Definition of Cloud Computing

Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.

This cloud model promotes availability and is composed of:

Source: NIST Definition of Cloud Computing v15

3 Service Models

• SaaS

• PaaS

• IaaS

4 Deployment Models

• Public Cloud

• Private Cloud

• Community Cloud

• Hybrid Cloud

5 Essential Characteristics

• On-demand self-service

• Resource pooling

• Rapid elasticity

• Measured service

• Broad network access

Page 5: Lucw lsec-securit-20110907-4-final-5

5 © 2011 Oracle Corporation

Fear, Uncertainty & Doubt: FUD

• …”Cloud Computing is not Secure”… ?

• Can Cloud Computing be as Secure as on-premises

Data Centers ?

• Can Cloud Computing be Compliant ?

• What About: “Cloud Computing cannot meet the

Common Needs Because Customers won’t let their

Data leave their Country.” ?

• “We must move all to the Clouds or we won’t be

competitive anymore…”?!?

• …..etc ….

Page 6: Lucw lsec-securit-20110907-4-final-5

6 © 2011 Oracle Corporation

In the Cloud Threats do not Change

Security guru Bruce Schneier says that whatever

cloud computing is, the security issues and

conversations around it are nothing new. The key,

he says, always comes down to trust and

transparency.

http://www.schneier.com/news-083.html

By Dahna McConnachie

Technology & Business

March 31, 2009

Page 7: Lucw lsec-securit-20110907-4-final-5

7 © 2011 Oracle Corporation

7

Identification

Authentication Authorization

Confidentiality Integrity

Accountability

Availability

Non-repudiation Privacy

Security Concerns Don’t Change

Page 8: Lucw lsec-securit-20110907-4-final-5

8 © 2011 Oracle Corporation

Which is “Best” for which Context ?

Page 9: Lucw lsec-securit-20110907-4-final-5

9 © 2011 Oracle Corporation

9

Service Models and Transparency

Cloud Infrastructure

IaaS

PaaS

SaaS

Infrastructure as a Service (IaaS)

Architectures

Platform as a Service (PaaS)

Architectures

Software as a Service

(SaaS)

Architectures

Cloud Infrastructure

SaaS

Cloud Infrastructure

PaaS

SaaS

Cloud Infrastructure

IaaS

PaaS

Cloud Infrastructure

PaaS

Cloud Infrastructure

IaaS

Page 10: Lucw lsec-securit-20110907-4-final-5

10 © 2011 Oracle Corporation

Road To Security Maturity

Industrialization

Virtualization

Automation

Infrastructure Maturity

Business Value

Standardization Consolidation

Governance Performance Management

Infrastructure virtualization

End-to-end services provisioning Infrastructure on demand

Level 2 IT Component Management

Level 1 Crisis Control

Level 5 Business Value Management

Level 4 IT Service Management

Level 3 IT Operation Management

Page 11: Lucw lsec-securit-20110907-4-final-5

11 © 2011 Oracle Corporation

Oracle Cloud Computing Strategy

Public Clouds

IaaS

PaaS

SaaS I N T R A N E T

Private Cloud

Users

IaaS

PaaS

SaaS I N T E R N E T

IaaS

PaaS

IaaS

PaaS

Apps SaaS

Oracle Technology in public clouds

Oracle On Demand Oracle Applications

Oracle Private PaaS

Our objectives:

• Ensure that cloud computing is fully enterprise grade

• Support both public and private cloud computing – give customers choice

Page 12: Lucw lsec-securit-20110907-4-final-5

12 © 2011 Oracle Corporation

Oracle On Demand – Security (SaaS)

• Compliance Rules are implemented Everywhere

• Example: HIPAA Service Provider for Healthcare

• Compliant with the Technical, Physical and

Administrative Safeguards

• HITECH Requires Business Associates (Services

Providers) to be Compliant

• ISO27000 Certificate 1/2

Page 13: Lucw lsec-securit-20110907-4-final-5

13 © 2011 Oracle Corporation

Compliance Requirements

Orders Finance Patient

Records HR

Student

Records

PCI-DSS SOX HIPAA/

HITECH

Data

privacy laws FERPA

Payment Card

Industry-Data

Security

Standards

Sarbanes-Oxley Most US states +

foreign countries

Federal

Educational

Rights & Privacy

Act

Health

Information

Technology for

Economic &

Clinical Health

Act

Page 14: Lucw lsec-securit-20110907-4-final-5

14 © 2011 Oracle Corporation

Oracle Private Cloud Solution

Application

Quality Mgmt

Configuration

Management

Application

Performance Mgmt

Lifecycle

Management

Physical & Virtual

Systems Mgmt

Ops Center

Infrastructure as a Service

Database Grid: Oracle Database, RAC, ASM, Partitioning,

IMDB Cache, Active Data Guard, Database Security

Application Grid: WebLogic Server, Coherence, Tuxedo, JRockit

Platform as a Service

Integration:

SOA Suite

Security:

Identity Mgmt

Process Mgmt:

BPM Suite

User Interaction:

WebCenter

Oracle Apps 3rd Party Apps ISV Apps

Applications

Oracle VM for x86

Operating Systems: Oracle Enterprise Linux Oracle Linux Oracle Solaris

Oracle VM for SPARC (LDom) Solaris Containers

Servers

Storage

Oracle Enterprise

Manager

Cloud Management

Page 15: Lucw lsec-securit-20110907-4-final-5

15 © 2011 Oracle Corporation

vDCs

Cloud Architecture – Logical View S

ervic

es

PaaS Container

IaaS Storage Network Server

SaaS Application

Queue

Business Process Business Service

Interfaces Portals Native Protocols Custom UIs Self-Service APIs

Access

Facilities Perimeter Security Proxy Naming Balancing

Reso

urces

Physical Pools Networks Compute Storage

Logical Pools Networks Compute Storage External Clouds

Legacy

Partners

Other

Data

Pool Managers

Security

/ Policy

Mgmt Mediation,

Policy

enforcement

Service Mgmt Monitoring

Capacity mgmt.

Metering & Billing

Resource mgmt.

Model Mgmt Provisioning

Customer info model

Service catalog

User Interaction / self service

Clo

ud

Man

ag

em

en

t

Other

Page 16: Lucw lsec-securit-20110907-4-final-5

16 © 2011 Oracle Corporation

Identify Roles and Interactions Cloud Implies Changes in IT Roles

User

uses

service

Cloud Operator

creates resources

Monitor/manages cloud

Cloud Builder

App Owner DevOps

Developer Monitors &

Approves Services

Creates Services Packages &

Deploys Services

Models Service

Page 17: Lucw lsec-securit-20110907-4-final-5

17 © 2011 Oracle Corporation

Oracle Defense-in-Depth

Page 18: Lucw lsec-securit-20110907-4-final-5

18 © 2011 Oracle Corporation

1

8

• Encryption and Masking

• Privileged User Controls

• Multi-Factor Authorization

• Activity Monitoring and Audit

• Secure Configuration

• Monitor and Block

Middleware

Applications

• User and Role Management

• Access Management

• Virtual Directories

• Rights Management

• Identity Governance

• Comprehensive Compliance Mgmt.

• Centralized Policy Administration

• Access Management

• Track and Audit Content and Usage

Database Security

Infrastructure Security

• Hardware Accelerated Encryption

• Secure Key Management and Storage

• Strong Workload Isolation

• Secure Service Delivery Platforms

Infrastructure Applications Middleware Databases

Information

Oracle Security Inside Out

Page 19: Lucw lsec-securit-20110907-4-final-5

19 © 2011 Oracle Corporation

Bringing Infrastructure Security

Secure Infrastructure

Matters !

Page 20: Lucw lsec-securit-20110907-4-final-5

20 © 2011 Oracle Corporation

Infrastructure Security Foundation

Page 21: Lucw lsec-securit-20110907-4-final-5

21 © 2011 Oracle Corporation

Infrastructure and Cryptography

Page 22: Lucw lsec-securit-20110907-4-final-5

22 © 2011 Oracle Corporation

Secure Service Containers

User and Process Rights

Management

Secure Network Access

Cryptographic Framework

Comprehensive Auditing

Solaris Trusted Extensions

Common Criteria Evaluated (EAL4+)

Solaris Security

Page 23: Lucw lsec-securit-20110907-4-final-5

23 © 2011 Oracle Corporation

Solaris Zones: Immutable Service Containers

Page 24: Lucw lsec-securit-20110907-4-final-5

24 © 2011 Oracle Corporation

Infrastructure and Cryptography

Page 25: Lucw lsec-securit-20110907-4-final-5

25 © 2011 Oracle Corporation

How to Destroy Data in a Hurry

• Delete File: No

• Over writing the data: No

• Shoot the drive: No

• Security Erase: No

• De-Gaussing: No or at High Cost

• Melting : No or at High Cost

• Shreding : No or at High Cost

Page 26: Lucw lsec-securit-20110907-4-final-5

26 © 2011 Oracle Corporation

2

6

ZFS Hybrid Storage Pool Encryption

Solaris 11 Express brings Encryption to ZFS

Hybrid Storage Pools

• DRAM/ARC is not Encrypted

– But you can protect swapped out pages (encrypted swap

ZVOL)

• L2ARC is always encrypted (ephemeral keys)

• ZIL is always encrypted (on-disk or on-SSD)

• On Disk data is always encrypted

DRAM/

ARC

Read/

L2ARC

Flash

Write/

ZIL

Flash

Scalable

Large

Capacity

SAS

Disks

Page 27: Lucw lsec-securit-20110907-4-final-5

27 © 2011 Oracle Corporation

Full Disk Encryption (FDE)?

Almost 100% transparent

to the User

You will probably to enter a

password at boot time

0% performance impact if

encrypt/decrypt in firmware

Hardware is filesystem

agnostic

No Access to Ciphertext

Is it really encrypted ?

No known versions with data

encryption key change

Same keylen/algorithm/mode for

complete disk

A lot of data with same key

Need HW change to change

algorithm

No Enterprise SSD doing Crypto

Not aware of Raid Volumes

Page 28: Lucw lsec-securit-20110907-4-final-5

28 © 2011 Oracle Corporation

ZFS Filesystem & Dataset Encryption

• More Flexibility in Software

• Easiest for Key Management

• Single multi-disk pool or per

dataset wrapping keys

• Keys are agnostic of Raid

config

• Wrapping and Data endryption

change

• Algorithm/kelen/mode change

• Integrate with SSDs (HSP)

• Ciphertext is visible

• Encrypt Snapshot and

Clones

• Compression, encryption, &

deduplication work together

• Integrating with the host &

operating system crypto

infrastructure (SW and HW)

© 2010 Oracle Corporation – Proprietary and Confidential

Page 29: Lucw lsec-securit-20110907-4-final-5

29 © 2011 Oracle Corporation

Infrastructure and Cryptography

Page 30: Lucw lsec-securit-20110907-4-final-5

30 © 2011 Oracle Corporation 30

Cryptographic Capabilities and Algorithms T3 Processor

Page 31: Lucw lsec-securit-20110907-4-final-5

31 © 2011 Oracle Corporation

Infrastructure and Cryptography

Page 32: Lucw lsec-securit-20110907-4-final-5

32 © 2011 Oracle Corporation

Three Key Elements Needed for Data Encryption on

Removable Media

Crypto-Ready

Tape Drive

Key

Management

Station

Token to

Transport Keys

Page 33: Lucw lsec-securit-20110907-4-final-5

33 © 2011 Oracle Corporation

Key Takeways

• Public and Private Clouds share the same Security

Requirements

• “Cloud Thinking” wrt/Security

– Increases security concerns from day one

– Involves all the stakeholders from day one

• Investing in “Cloud Technologies” Requires to Shift

Minds and Impacts the “Complete Stack”

• Whatever you think to do with “Cloud”, Infrastructure

Always Matter

Page 34: Lucw lsec-securit-20110907-4-final-5

34 © 2011 Oracle Corporation

Oracle Security is Complete

Page 35: Lucw lsec-securit-20110907-4-final-5

35 © 2011 Oracle Corporation

Q & A

Page 36: Lucw lsec-securit-20110907-4-final-5

36 © 2011 Oracle Corporation

The preceding is intended to outline our general

product direction. It is intended for information

purposes only, and may not be incorporated into any

contract. It is not a commitment to deliver any

material, code, or functionality, and should not be

relied upon in making purchasing decisions.

The development, release, and timing of any

features or functionality described for Oracle’s

products remains at the sole discretion of Oracle.

Page 37: Lucw lsec-securit-20110907-4-final-5

37 © 2011 Oracle Corporation

Page 38: Lucw lsec-securit-20110907-4-final-5

38 © 2011 Oracle Corporation

Trust in Cloud Computing with Transparent Security

• Governance, Information Security and Transparency are inter-related concepts

• Security Governance: can rely on an ISMS based (iso27001/2)

• Transparency is related the disclosure of governance frameworks between cloud SP and users.

Sources:

http://blogs.barrons.com/techtraderdaily/

http://blog.talkingidentity.com

Page 39: Lucw lsec-securit-20110907-4-final-5

39 © 2011 Oracle Corporation

Data Encryption Matters

• The Best Way to Destroy Data in a

Hurry is: Encrypt Your Data and

Destroy Only the Key

• The Best Way to Protect Data Efficiently

is: Encrypt Your Data and Protect Only

the Key

• Data in Creation, Data in Transit, Data

at Rest

• At All Layers of the Stack