practical cloud security - owasp · node ephemerality and service abstraction • data related to...

30
Practical Cloud Security: Web/Dev Ops Edition Jason Chan chan@netflix.com Friday, December 2, 2011

Upload: others

Post on 16-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

Practical Cloud Security:Web/Dev Ops Edition

Jason [email protected]

Friday, December 2, 2011

Page 2: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

Agenda

• Background and Disclaimers

• Netflix in the Cloud

• Model-Driven Deployment Architecture

• APIs, Automation, and the Security Monkey

• Practical Cloud Security Gaps

Friday, December 2, 2011

Page 3: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

Background and Disclaimers

Friday, December 2, 2011

Page 4: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

Background and Disclaimers

• No cloud definitions, but . . .

• I will focus on IaaS

• Netflix uses Amazon Web Services

• Guidance should be generally applicable

• Works in progress . . .

Friday, December 2, 2011

Page 5: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

Netflix in the Cloud

Friday, December 2, 2011

Page 6: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

Why is Netflix Using Cloud?

Friday, December 2, 2011

Page 7: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

!"#"$%&#%'()"*"$+#,(

37x Growth 1/10 - 1/11

Outgrowing Data Centerhttp://techblog.netflix.com/2011/02/redesigning-netflix-api.html

Netflix API: Growth in Requests

Friday, December 2, 2011

Page 8: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

netflix.com is now ~100% Cloud

• Remaining components being migrated

Netflix Service Encoding Data Sciences

Friday, December 2, 2011

Page 9: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

Netflix Model-Driven Architecture

Friday, December 2, 2011

Page 10: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

Data Center Patterns

• Long-lived, non-elastic systems

• Push code and config to running systems

• Difficult to enforce deployment patterns

• ‘Snowflake phenomenon’

• Difficult to sync or reproduce environments (e.g. test and prod)

Friday, December 2, 2011

Page 11: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

Cloud Patterns

• Ephemeral nodes

• Dynamic scaling

• Hardware is abstracted

• Automation/orchestration supports common deployment patterns

Friday, December 2, 2011

Page 12: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

When Moving to the Cloud, Leave Old Ways Behind . . .

Generic forklift is generally a mistakeAdapt models appropriately

Friday, December 2, 2011

Page 13: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

Perforce

SCM

Jenkins

ContinuousIntegration

Yum

App-SpecificPackages and Configuration

AMI

Customized, Cloud-Ready

Image

Artifactory

BinaryRepository

Bakery

Combine Base and App-Specific Configuration

Instance

Live System!

Netflix Build and Deployhttp://techblog.netflix.com/2011/08/building-with-legos.html

ExistingComponents

Cloud-SpecificComponents

Friday, December 2, 2011

Page 14: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

Autoscaling Group: Deployment Unit of

Measure

Baked AMI

• Base Linux• App code• App dependencies• App-specific config

LaunchConfig

• Instance type• Security group config

AutoscalingGroup

• Target data centers• Min/max/desired nodes

+

Netflix Web App X

+

Friday, December 2, 2011

Page 15: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

Every change is a new push

Autoscaling Results and Ramifications

• Continuously adding and removing nodes

• Based on demand, system health

•New nodes must mirror existing

Friday, December 2, 2011

Page 16: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

Operational Impact

• No changes to running systems

• No CMDB

• No systems management infrastructure

• No snowflakes

• Fewer logins to prod systems

Friday, December 2, 2011

Page 17: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

Security Impact

• File integrity monitoring

• User activity monitoring

• Vulnerability management

• Patch management

Friday, December 2, 2011

Page 18: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

APIs, Automation, and the Security Monkey

Friday, December 2, 2011

Page 19: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

Common Challenges forSecurity Engineers

• Lots of data from different sources, in different formats

• Too many administrative interfaces and disconnected systems

•Too few options for scalable automation

Friday, December 2, 2011

Page 20: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

Enter the Cloud . . .

Friday, December 2, 2011

Page 21: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

How do you . . .• Add a user account?

• Inventory systems?

• Change a firewall config?

• Snapshot a drive for forensic analysis?

• Disable a multi-factor authentication token?

• CreateUser()

• DescribeInstances()

• AuthorizeSecurityGroupIngress()

• CreateSnapshot()

• DeactivateMFADevice()

Friday, December 2, 2011

Page 22: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

Security Monkeyhttp://techblog.netflix.com/2011/07/netflix-simian-army.html

• Centralized framework for cloud security monitoring and analysis

• Certificate and cipher monitoring

• Firewall configuration checks

• User/group/policy monitoring

• Next - web security scanning

Friday, December 2, 2011

Page 23: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

‘Practical’ Cloud Security Gaps

Friday, December 2, 2011

Page 24: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

Common Security Product Model

• Examples - AV, FIM, etc.

• “Management” station with client “nodes”

• Limited tagging or abstraction

• Per node licensing

Friday, December 2, 2011

Page 25: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

“Thundering Herd”

• Mass deployments

• “Red/Black” push - concurrent clusters of 500+ nodes

• Elasticity related to traffic spikes

• Licensing constraints

Friday, December 2, 2011

Page 26: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

Node Ephemerality and Service Abstraction

• Data related to individual nodes becomes less important

• Dealing with short-lived systems, IP and ID reuse

• Event and log archives and data relationships

Friday, December 2, 2011

Page 27: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

Resource Usage Logging and Auditing

• Public-facing APIs make access controls more difficult and more important

• Programmable infrastructure needs robust logging and auditing capabilities

• Can metering data be repurposed?

Friday, December 2, 2011

Page 28: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

“Trusted Cloud”

• Various components related to providing higher assurance/trust levels in the cloud

• Virtual TPM / hardware root of trust

• Credential management

• HSM in the cloud

Friday, December 2, 2011

Page 29: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

Thanks!Questions?

[email protected]

Friday, December 2, 2011

Page 30: Practical Cloud Security - OWASP · Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP

References

• http://www.slideshare.net/adrianco

• http://aws.amazon.com

• http://techblog.netflix.com

• https://cloudsecurityalliance.org/

• http://www.nist.gov/itl/cloud/index.cfm

Friday, December 2, 2011