SlideShare una empresa de Scribd logo
1 de 48
Descargar para leer sin conexión
Visibility & Security
for the Virtualized
Enterprise
John McDonald, CISSP

© Copyright 2013 EMC Corporation. All rights reserved.

1
Roadmap Information Disclaimer
 EMC makes no representation and undertakes no obligations with
regard to product planning information, anticipated product
characteristics, performance specifications, or anticipated release
dates (collectively, “Roadmap Information”).
 Roadmap Information is provided by EMC as an accommodation to the
recipient solely for purposes of discussion and without intending to be
bound thereby.
 Roadmap information is EMC Restricted Confidential and is provided
under the terms, conditions and restrictions defined in the EMC NonDisclosure Agreement in place with your organization.

© Copyright 2013 EMC Corporation. All rights reserved.

2
Agenda
 Foundations
 How Virtualization Impacts Your Security
 Securing & Monitoring Virtual Environments
 Summary

© Copyright 2013 EMC Corporation. All rights reserved.

3
Foundations

© Copyright 2013 EMC Corporation. All rights reserved.

4
Foundations
 Attack surface
 High Value Assets
 Types of Security Controls

© Copyright 2013 EMC Corporation. All rights reserved.

5
What is An Attack Surface?
 Originally proposed by the Software Engineering
Institute at Carnegie Mellon University
 The attack surface of a system the set of ways in
which an adversary can enter the ‘system’ and
potentially cause damage
– Intentional or unintentional

 Hence, the larger the attack surface, the more
difficult it is to secure the system
© Copyright 2013 EMC Corporation. All rights reserved.

6
Information is Created and Stored
DMZ
Attack Points:
• OS (multiple)
• Local storage
• Web Server
PII
PHI
PCI
IP

Networ
k

SAN

Internet

Custome
r/Client
/Patient

Database

Web
Server

Application
Server

Database
Server

Storage
Array

Infrastructure

© Copyright 2013 EMC Corporation. All rights reserved.

7
Information is Created and Stored
DMZ
Networ
k

Attack Points:
• OS (multiple)
• Local storage
• Web Server

Internet

Customer/
Client
/Patient

SAN

PII
PHI
PCI
IP

Web
Server

Database

Application
Server

Attack Points:
• OS (multiple)
• Local storage
• App (multiple)

Database
Server

Storage
Array

Infrastructure

© Copyright 2013 EMC Corporation. All rights reserved.

8
Information is Created and Stored
DMZ
Attack Points:
• OS (multiple)
• Local storage
• Web Server

SAN

Networ
k

PII
PHI
PCI
IP

Internet

Customer/
Client
/Patient

Attack Points:
• Switches
• Routers
•Sniffers

Web
Server

Application
Server

Attack Points:
• OS (multiple)
• Local storage
• App (multiple)

Database

Database
Server

Attack Points:
• OS (multiple)
• Local storage
• DB (multiple)

Storage
Array

Infrastructure

© Copyright 2013 EMC Corporation. All rights reserved.

9
Information is Created and Stored
DMZ
Attack Points:
• OS (multiple)
• Local storage
• Web Server

Attack Points:
• Switches
• Routers
•Sniffers

PII
PHI
PCI
IP

Internet

Customer
/Client
/Patient

SAN

Networ
k

Web
Server

Application
Server

Attack Points:
• OS (multiple)
• Local storage
• App (multiple)

Database
Server

Attack Points:
• OS (multiple)
• Local storage
• DB (multiple)

Infrastructure

© Copyright 2013 EMC Corporation. All rights reserved.

Attack Points:
• Switches
• Controllers
• Host Drivers

Database

Storage
Array

Attack Points:
• Mgt Interface
• Copies
• Backups

10
Information is Accessed and Managed
DMZ
Attack Points:
• OS (multiple)
• Local storage
• Web Server

Attack Points:
• Switches
• Routers
•Sniffers

SAN

Networ
k

PII
PHI
Database
PCI
IP

Internet

Customer
/Client
/Patient

Web
Server

Application
Server

Attack Points:
• OS (multiple)
• Local storage
• App (multiple)

Database
Server

Attack Points:
• OS (multiple)
• Local storage
• DB (multiple)

Infrastructure

© Copyright 2013 EMC Corporation. All rights reserved.

Attack Points:
• Switches
• Controllers
• Host Drivers

Storage
Array

Attack Points:
• Mgt Interface
• Copies
• Backups

11
Information is Accessed and Managed
SAN

PII
PHI
Database
PCI
IP

Database
Server

Storage
Array

Infrastructure

© Copyright 2013 EMC Corporation. All rights reserved.

12
Numerous Attack
Points

Information is Accessed and Managed
Partner
s

Customer
Attack Points:
• OS (multiple)
Service • Service App

Attack Points:
• Intercepted email
• Wrong addressee

Emai
l

• Local storage

SAN

Attack Points:
• OS (multiple)
• Backup App
• Snap/Clone

Attack Points:
• OS (multiple)
• Lost/stolen device
• Local storage

PII
PHI
Database
PCI
IP

Client
s

Employees

Customer
s

Suppliers

Portal/
Intranet

Attack Points:
• OS (multiple)
• Web Server
• Network

© Copyright 2013 EMC Corporation. All rights reserved.

Backup
Server

Database
Server

Attack Points:
• Lost/Stolen
• Unauthorized
Access

Copy
Attack Points:

Storag
• Network
Communications
e
Business Mobile Devices Array
Attack Points:
Attack Points:
Attack Points:
• Unauthorized DR
• OS (multiple)
• Device exploit
Applications •Lost/stolen
Access
Infrastructure
• Business App
• Physical Theft Site
device
• Local storage

13
What is an Information Attack Surface?
The Information Attack Surface for a given
type of information equals the combination of
the attack surfaces of all components that
‘touch’ that type of information
• For the entire lifecycle of that information
• Virtualization adds another layer to the attack
surface
© Copyright 2013 EMC Corporation. All rights reserved.

14
What are High-Value Assets?
• An asset that, if compromised, will have a significant
impact on:
–
–
–
–
–

Revenue/Critical Business Processes
Intellectual Property/Trade Secrets
Brand/Image
Legal/Regulatory Compliance
Total Customer Experience

• Assets can be systems (HVSA) or information (HVIA)
© Copyright 2013 EMC Corporation. All rights reserved.

15
Types of Security Controls
• Three types of security controls to consider

– Preventive – Prevent compromise from occurring in the first
place (Firewall, AV, Encryption, etc.)
– Detective – Detects if compromise has or is occurring and
what happened (SIEM, IDS/HDS, forensics, etc.)
– Corrective – Allows environment to be returned to previous
non-compromised state (e.g. AV, backups, DR, etc.)

• Preventive provides the greatest value, but becoming
increasingly difficult (e.g. 0-day vulnerabilities. APTs,
etc.)
© Copyright 2013 EMC Corporation. All rights reserved.

16
How Virtualization
Impacts Security

© Copyright 2013 EMC Corporation. All rights reserved.

17
Virtualization’s Impact
 New threat landscape
 Servers as files
 Server sprawl
 Super Admins
 Multitenancy

© Copyright 2013 EMC Corporation. All rights reserved.

18
New Threat Landscape

© Copyright 2013 EMC Corporation. All rights reserved.

19
Virtualization Threat Modeling
 You need to understand the changes the virtualization
introduces into your threat model

– Sources – Where the attack originates (don’t forget physical
and accidents)
– Objectives – The goals of the attack
– Methods – How the attack is accomplished

 ‘Objectives’ and ‘Methods’ tend to drive an attackers
targets
 Objectives that are focused on compromising sensitive
assets or disrupting your environment can target your
virtualization environment

© Copyright 2013 EMC Corporation. All rights reserved.

20
Threat Modeling Process
Threat Modeling Process
1. Identify Assets (including VMs)

Lead Designer, Business Owner

2. Create an Architecture Overview
3. Decompose the Attack Surface

Designer
Architect
Security Lead

4. Identify the Threats

Brainstorm Session

5. Document the Threats
6. Rate the Threats

© Copyright 2013 EMC Corporation. All rights reserved.

Designer, Development,
Infrastructure, Documentation,
Testers, Security, Project
Management

21
Physical Servers
• Most organizations have good physical security
•

Physical servers are well protected from theft

Data Center

© Copyright 2013 EMC Corporation. All rights reserved.

22
Virtualization Changes Server Security
 Servers are now files, which can easily be
copied/stolen

– Locally or over a network
– Along with the information they contain (.vmdk files)

=
Now

© Copyright 2013 EMC Corporation. All rights reserved.

23
Server Sprawl
 Virtualization makes adding servers easier

– Which inevitably results in more servers
– Which in turn means more copies of sensitive information
and a larger attack surface

=
Now

© Copyright 2013 EMC Corporation. All rights reserved.

24
Super Admins
 Previously, system admins only had
access to servers they were directly
responsible for
– With virtualization environments, VM
admins can access the files
representing the servers in the
domains they manage
– ‘Introspection’ capabilities provide
potential visibility into every VM

© Copyright 2013 EMC Corporation. All rights reserved.

25
Multi-tenancy
 Many virtual environments support
multiple different business
organizations in a single
environment
– Cloud providers

 Each environment may have
different security requirements; all
require segregation from the
others
© Copyright 2013 EMC Corporation. All rights reserved.

26
Securing &
Monitoring Your
Virtual Environment

© Copyright 2013 EMC Corporation. All rights reserved.

27
Securing & Monitoring
 Ensure solid foundations
 Understand the threats
 Protect & control access
 Monitor & respond
 Advanced solutions

© Copyright 2013 EMC Corporation. All rights reserved.

28
Ensure Solid Foundations
 There are a number of processes that need to be
solid before you can effectively secure a virtual (or
any) environment
–
–
–
–

Classification
Change control
Patch management
Configuration management

 Underlying all of these should be a solid
documentation foundation

– You can’t secure what you don’t understand!

© Copyright 2013 EMC Corporation. All rights reserved.

29
General Process Impact
 One of the biggest advantages of virtualization is that it tends to
simplify many processes
– What used to require accessing many physical servers can be easily
accomplished from a single VM management console
– But this can also be a weakness from a security perspective

 A common problem is that this simplification tends to lead to a
more lax approach to these processes
–
–
–
–

Change control
New server creation
Asset management
Patch management

 Which in turn reduces the effectiveness of these process controls

© Copyright 2013 EMC Corporation. All rights reserved.

30
Foundations: Classification
 Classification is the process of defining standard security
‘buckets’ based on broad protection requirements
– Usually 3-4 classification levels

 Example:
–
–
–
–

Restricted Internal
Company Confidential
Company Sensitive
Public

 Every asset should be assigned a classification

– Servers, databases, switches, etc.
– Based on the highest classification of information it ‘touches’

© Copyright 2013 EMC Corporation. All rights reserved.

31
Foundations: Classification (contd.)
 Need to define protection requirements for VMs based on
classification
– Each classification should mandate both general and
technology-specific standards
▪ Examples:
—

All OS instances that process information classified as ‘Company Confidential’ shall themselves
be classified ‘Company Confidential’
»
»

—
—

All attempted, successful and failed login attempts shall be logged and reviewed
All access changes must be reviewed and approved

Windows instances classified as ‘Company Confidential’ shall not run the following services:…
Linux instances classified as ‘Company Confidential’ shall not run the following daemons:…

 The VM environment itself should have a classification
– And associated security configuration standards

© Copyright 2013 EMC Corporation. All rights reserved.

32
Foundations: Change Control
 Automated, comprehensive & integrated change
control for VM environments
– Should cover ALL changes!
– Automated detection of changes (event logs) and
correlation to approved change requests
– Should include changes to the VM environment itself

 Change events should be sent to a SIEM system for
analysis and correlation
– Configuration change events as well as security events

© Copyright 2013 EMC Corporation. All rights reserved.

33
Foundations: Configuration Management
 Unmanaged/uncontrolled changes are one of the most
common sources of security vulnerabilities

– ‘Temporary’ changes to fight some fire that never get undone

 VM environment and VMs should be scanned regularly to
ensure compliance with define configuration standards
 Consider utilizing standards-based automated
configuration definition framework

– Security Configuration Automation Protocol (SCAP)
– XML-based NIST standard (submitted to ISO)

© Copyright 2013 EMC Corporation. All rights reserved.

34
Understand the Threats
 Virtualization adds an entirely new series of attack vectors to
your environment
– Understanding and monitoring potential threats is critical
– Both internal and external threats

 You need to be aware of new threats and be able to rapidly
adjust your security profile to address them
 You need to develop a threat intelligence team that monitors
threat news from multiple sources
– VMWare, McAfee, Symantec, hacker forums, Black Hat, etc.

 Be careful to distinguish between ‘threats’ and ‘vulnerabilities’

© Copyright 2013 EMC Corporation. All rights reserved.

35
Protect & Control Access
 Controlling who has access to what files and who can
perform which functions is critical
– Using tools like Introspection, VM admins become ‘super
admins’
– Can access files and data structures in any running VM

 Don’t forget the basics
–
–
–
–

Strong passwords
Password rotation
Avoid shared accounts
Multi-factor or risk-based authentication for privileged
accounts
– Document an map all accounts to specific users

© Copyright 2013 EMC Corporation. All rights reserved.

36
Protect & Control Access: Roles
 Role-based access control provides the ability to strongly segregate access
– Roles define which components a user can access and what they can (and can’t) do
– Users are assigned roles

 Most VM environments provide default roles

– Custom roles should be created to segregate access and control
– OS instance (VM) admins should be allowed access to only the VMs they’re
responsible for

 Implementing and managing fine-grained role-based access can be
complex, but critical
 VM host admins should be treated as some of the most sensitive accounts
in your environment!
– Strong authentication
– Full monitoring of all activities
– Restricted activities (e.g. web surfing)

© Copyright 2013 EMC Corporation. All rights reserved.

37
Sample Default Roles (VMWare)


No Access: A permanent role that is assigned to new users and groups. Prevents a user or group from viewing or making changes to an object



Read-Only: A permanent role that allows users to check the state of an object or view its details, but not make changes to it



Administrator: A permanent role that enables a user complete access to all of the objects on the server. The root user is assigned this role by default, as are
all of the users who are part of the local Windows Administrators group associated with vCenter Server. At least one user must have administrative
permissions in VMware.



Virtual Machine Administrator: A sample role that allows a user complete and total control of a virtual machine or a host, up to and including removing
that VM or host



Virtual Machine Power User: A sample role that grants a user access rights only to virtual machines; can alter the virtual hardware or create snapshots of
the VM



Virtual Machine User: Grants user access rights exclusively to VMs. The user can power on, power off, and reset the virtual machine, as well as run media
from the virtual discs.



Resource Pool Administrator: Allows the user to create resource pools (RAM and CPU reserved for use) and assign these pools to virtual machines



Datacenter Administrator: Permits a user to add new datacenter objects



VMware Consolidated Backup User: Required to allow VMware Consolidated Backup to run



Datastore Consumer: Allows the user to consume space on a datastore



Network Consumer: Allows the user to assign a network to a virtual machine or a host

© Copyright 2013 EMC Corporation. All rights reserved.

38
Protect & Control Access: Encryption
 Encryption can be thought of as a form of access
control

– Only actors with access to the decryption keys can access
the content

 Doing encryption right can be a challenge

– Need to understand the threats you’re trying to protect
against (use cases)
– One size does not fit all with encryption!
– Numerous potential ‘side effects’ that need to be
considered

© Copyright 2013 EMC Corporation. All rights reserved.

39
The Encryption Stack
• Encrypting at a given
layer tend to protect all
layers below
• High layer encryption
addresses more threat
profiles
• Cost and complexity tend
to go up as you move up
the stack
© Copyright 2013 EMC Corporation. All rights reserved.

40
Encryption: Considerations
 What are the drivers? (threats, regulations, policy, etc.)
 Key and algorithm strength
 Solution acquisition, implementation, management & impact costs
 Performance impact (encrypted data cannot be compressed)
 Protection Domains (where will the data be protected?)
 User Context/Access Control
 Transition
 Key Management (who has access, key rotation, key retention, etc.)
 Secondary Operations (backups, data de-duplication, replication, etc.)
 Government Regulations

© Copyright 2013 EMC Corporation. All rights reserved.

41
Monitor & Respond
 Continuous real-time monitoring of security-related events in a virtual
environment is critical to maintaining security

– Attacks happen fast
– The longer an attacker is active in your environment, the more damage that can be
done

 Monitoring is primarily a detective control, but may prevent further
damage by detecting early
 Need to define and document requirements (based on threat environment)
– What will be monitored?
– What events will be collected?
– What do the events mean?

 Modern complex environments generate huge amounts of event data
– Need to be able to make sense of it all
– Types of events collected should be based on classification

© Copyright 2013 EMC Corporation. All rights reserved.

42
Monitor & Respond: Event Monitoring
 Most obvious collection requirements are security events

– Focus on failures and errors
– For all critical components, not just host instances (e.g. network devices, VM events,
storage, etc.)

 However, management and change events can be just as critical
– Create new VM
– Change access permissions
– Accesses to VM files

 Numerous tools available

– Splunk, RSA Security Analytics, Catbird, etc.

 In a multi-tenancy environment, you may need to provide unique event
log feeds to each tenant
– All events relevant to their components (not just host events)

© Copyright 2013 EMC Corporation. All rights reserved.

43
Monitor & Respond: Responding
 Detecting a security event is meaningless unless it
can be addressed effectively
– Need to have a comprehensive structured incident
response plan

 The team responsible for the virtual environment
must be integrated into the response plan
 The use of VMs can actually simplify the forensic
process
– Easy to make a snapshot of impacted servers

© Copyright 2013 EMC Corporation. All rights reserved.

44
Advanced Solutions: Key Management
 In a multi-tenancy environment, some tenants may
require stronger protection of VMs
– Even if VM admin can’t access host OS, they can still
access the VM files

 Some vendors provide a split-key distributed key
management solution
– Allows each tenant to control a portion of their VM’s
encryption keys
– Afore Solutions is one example

© Copyright 2013 EMC Corporation. All rights reserved.

45
Advanced Solutions: SCIT
 Self-Cleansing Intrusion
Tolerance

– Invented by a team at George
Mason University
– Supports the assertion that you
will never be able to completely
prevent all intrusions, especially in
vulnerable servers (e.g. web
servers, DNS servers, etc.)

 Uses a rotating set of ‘gold
image’ VMs to regularly replace
potentially infected ones

© Copyright 2013 EMC Corporation. All rights reserved.

46
Summary
 Virtualization adds additional attack vectors to what
is already an extremely complex attack surface
 Basic foundational capabilities are critical to
effectively securing a virtual environment
 As with any technology you need to understand the
requirements and threats before you can secure it
 Controlling and protecting access and appropriate
monitoring are critical
© Copyright 2013 EMC Corporation. All rights reserved.

47
Visibility & Security for the Virtualized Enterprise

Más contenido relacionado

La actualidad más candente

Waterfall Security Solutions Overview Q1 2012
Waterfall Security Solutions   Overview Q1 2012Waterfall Security Solutions   Overview Q1 2012
Waterfall Security Solutions Overview Q1 2012henkpieper
 
IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewnazeer325
 
Wallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access ControlWallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access Controlzayedalji
 
PCI DSS & Virtualization
 PCI DSS & Virtualization PCI DSS & Virtualization
PCI DSS & VirtualizationTobyRobinson13
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesCamilo Fandiño Gómez
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products MatrixCharles McNeil
 
Cyber consequences, operational dependencies, and full scope security
Cyber consequences, operational dependencies, and full scope securityCyber consequences, operational dependencies, and full scope security
Cyber consequences, operational dependencies, and full scope securityJoe Slowik
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...Community Protection Forum
 
University Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataUniversity Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataNasser Hassan
 
IT Security Risk Mitigation Report: Virtualization Security
IT Security Risk Mitigation Report: Virtualization SecurityIT Security Risk Mitigation Report: Virtualization Security
IT Security Risk Mitigation Report: Virtualization SecurityBooz Allen Hamilton
 
Past and future of integrity based attacks in ics environments
Past and future of integrity based attacks in ics environmentsPast and future of integrity based attacks in ics environments
Past and future of integrity based attacks in ics environmentsJoe Slowik
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud SecurityIT@Intel
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
New Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - TrendNew Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - TrendArrow ECS UK
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012Symantec
 
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud ComputingCloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud ComputingOpSource
 
Virtualization
VirtualizationVirtualization
Virtualizationjworth
 
CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2vivekbhat
 
Technology
TechnologyTechnology
Technologysam ran
 

La actualidad más candente (20)

Waterfall Security Solutions Overview Q1 2012
Waterfall Security Solutions   Overview Q1 2012Waterfall Security Solutions   Overview Q1 2012
Waterfall Security Solutions Overview Q1 2012
 
IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overview
 
Wallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access ControlWallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access Control
 
PCI DSS & Virtualization
 PCI DSS & Virtualization PCI DSS & Virtualization
PCI DSS & Virtualization
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
Cyber consequences, operational dependencies, and full scope security
Cyber consequences, operational dependencies, and full scope securityCyber consequences, operational dependencies, and full scope security
Cyber consequences, operational dependencies, and full scope security
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
University Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataUniversity Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical Data
 
IT Security Risk Mitigation Report: Virtualization Security
IT Security Risk Mitigation Report: Virtualization SecurityIT Security Risk Mitigation Report: Virtualization Security
IT Security Risk Mitigation Report: Virtualization Security
 
Past and future of integrity based attacks in ics environments
Past and future of integrity based attacks in ics environmentsPast and future of integrity based attacks in ics environments
Past and future of integrity based attacks in ics environments
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
New Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - TrendNew Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - Trend
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud ComputingCloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Axoss Security Hardening Services
Axoss Security Hardening ServicesAxoss Security Hardening Services
Axoss Security Hardening Services
 
CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2
 
Technology
TechnologyTechnology
Technology
 

Destacado

White Paper: Mobile Banking: How to Balance Opportunities and Threats
White Paper: Mobile Banking: How to Balance Opportunities and ThreatsWhite Paper: Mobile Banking: How to Balance Opportunities and Threats
White Paper: Mobile Banking: How to Balance Opportunities and ThreatsEMC
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up EMC
 
Adaptec RAID 81605ZQ vs. LSI MegaRAID 9361-8i Performance Whitepaper
Adaptec RAID 81605ZQ vs. LSI MegaRAID 9361-8i Performance WhitepaperAdaptec RAID 81605ZQ vs. LSI MegaRAID 9361-8i Performance Whitepaper
Adaptec RAID 81605ZQ vs. LSI MegaRAID 9361-8i Performance WhitepaperAdaptec by PMC
 
Tues greek and maya
Tues greek and mayaTues greek and maya
Tues greek and mayaTravis Klein
 
Presentación packaging
Presentación packagingPresentación packaging
Presentación packagingMartaMuros
 
Thurs maya city states
Thurs maya city statesThurs maya city states
Thurs maya city statesTravis Klein
 
Dia de la_democracia
Dia de la_democraciaDia de la_democracia
Dia de la_democraciaLauma1416
 
Day 3 wars and revolts
Day 3 wars and revoltsDay 3 wars and revolts
Day 3 wars and revoltsTravis Klein
 
White Paper: Advanced Cyber Analytics with Greenplum Database
White Paper: Advanced Cyber Analytics with Greenplum DatabaseWhite Paper: Advanced Cyber Analytics with Greenplum Database
White Paper: Advanced Cyber Analytics with Greenplum DatabaseEMC
 
אחריות תאגידית במדיה חברתית
אחריות תאגידית במדיה חברתיתאחריות תאגידית במדיה חברתית
אחריות תאגידית במדיה חברתיתShirley Kantor
 
Parent information evening 2013
Parent information evening 2013Parent information evening 2013
Parent information evening 2013sharndenys
 
Fotonovel·la tutorial adrià, roger i gerard
Fotonovel·la tutorial adrià, roger i gerardFotonovel·la tutorial adrià, roger i gerard
Fotonovel·la tutorial adrià, roger i gerardmgonellgomez
 
EMC Perspective: Big Data Transforms the Life Science Commercial Model
EMC Perspective: Big Data Transforms the Life Science Commercial ModelEMC Perspective: Big Data Transforms the Life Science Commercial Model
EMC Perspective: Big Data Transforms the Life Science Commercial ModelEMC
 
Black plague wed thur
Black plague wed thurBlack plague wed thur
Black plague wed thurTravis Klein
 
Les centrals telefòniques anònim
Les centrals telefòniques anònimLes centrals telefòniques anònim
Les centrals telefòniques anònimmgonellgomez
 
TechBook: DB2 for z/OS Using EMC Symmetrix Storage Systems
TechBook: DB2 for z/OS Using EMC Symmetrix Storage Systems  TechBook: DB2 for z/OS Using EMC Symmetrix Storage Systems
TechBook: DB2 for z/OS Using EMC Symmetrix Storage Systems EMC
 

Destacado (20)

Animal power pont
Animal power pontAnimal power pont
Animal power pont
 
White Paper: Mobile Banking: How to Balance Opportunities and Threats
White Paper: Mobile Banking: How to Balance Opportunities and ThreatsWhite Paper: Mobile Banking: How to Balance Opportunities and Threats
White Paper: Mobile Banking: How to Balance Opportunities and Threats
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up
 
Adaptec RAID 81605ZQ vs. LSI MegaRAID 9361-8i Performance Whitepaper
Adaptec RAID 81605ZQ vs. LSI MegaRAID 9361-8i Performance WhitepaperAdaptec RAID 81605ZQ vs. LSI MegaRAID 9361-8i Performance Whitepaper
Adaptec RAID 81605ZQ vs. LSI MegaRAID 9361-8i Performance Whitepaper
 
Tues greek and maya
Tues greek and mayaTues greek and maya
Tues greek and maya
 
Jump start your application monitoring with APM
Jump start your application monitoring with APMJump start your application monitoring with APM
Jump start your application monitoring with APM
 
Presentación packaging
Presentación packagingPresentación packaging
Presentación packaging
 
Thurs maya city states
Thurs maya city statesThurs maya city states
Thurs maya city states
 
Dia de la_democracia
Dia de la_democraciaDia de la_democracia
Dia de la_democracia
 
Day 3 wars and revolts
Day 3 wars and revoltsDay 3 wars and revolts
Day 3 wars and revolts
 
White Paper: Advanced Cyber Analytics with Greenplum Database
White Paper: Advanced Cyber Analytics with Greenplum DatabaseWhite Paper: Advanced Cyber Analytics with Greenplum Database
White Paper: Advanced Cyber Analytics with Greenplum Database
 
אחריות תאגידית במדיה חברתית
אחריות תאגידית במדיה חברתיתאחריות תאגידית במדיה חברתית
אחריות תאגידית במדיה חברתית
 
семінар№1 профорієнтація
семінар№1 профорієнтаціясемінар№1 профорієнтація
семінар№1 профорієнтація
 
Parent information evening 2013
Parent information evening 2013Parent information evening 2013
Parent information evening 2013
 
Fotonovel·la tutorial adrià, roger i gerard
Fotonovel·la tutorial adrià, roger i gerardFotonovel·la tutorial adrià, roger i gerard
Fotonovel·la tutorial adrià, roger i gerard
 
EMC Perspective: Big Data Transforms the Life Science Commercial Model
EMC Perspective: Big Data Transforms the Life Science Commercial ModelEMC Perspective: Big Data Transforms the Life Science Commercial Model
EMC Perspective: Big Data Transforms the Life Science Commercial Model
 
Black plague wed thur
Black plague wed thurBlack plague wed thur
Black plague wed thur
 
Les centrals telefòniques anònim
Les centrals telefòniques anònimLes centrals telefòniques anònim
Les centrals telefòniques anònim
 
TechBook: DB2 for z/OS Using EMC Symmetrix Storage Systems
TechBook: DB2 for z/OS Using EMC Symmetrix Storage Systems  TechBook: DB2 for z/OS Using EMC Symmetrix Storage Systems
TechBook: DB2 for z/OS Using EMC Symmetrix Storage Systems
 
альбом пс 192
альбом пс 192альбом пс 192
альбом пс 192
 

Similar a Visibility & Security for the Virtualized Enterprise

JavaOne2013: Securing Java in the Server Room - Tim Ellison
JavaOne2013: Securing Java in the Server Room - Tim EllisonJavaOne2013: Securing Java in the Server Room - Tim Ellison
JavaOne2013: Securing Java in the Server Room - Tim EllisonChris Bailey
 
Layer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdfLayer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdfdistortdistort
 
Security in the Real World - JavaOne 2013
Security in the Real World - JavaOne 2013Security in the Real World - JavaOne 2013
Security in the Real World - JavaOne 2013MattKilner
 
Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?EMC
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityIBM Security
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microTheInevitableCloud
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardEMC
 
Virtualize Application Security Today - Hardware is No Longer Needed.pptx
 Virtualize Application Security Today - Hardware is No Longer Needed.pptx Virtualize Application Security Today - Hardware is No Longer Needed.pptx
Virtualize Application Security Today - Hardware is No Longer Needed.pptxAvi Networks
 
Sl virtual apps-131106
Sl virtual apps-131106Sl virtual apps-131106
Sl virtual apps-131106SL Corporation
 
Introduction to Cloud Security.pptx
Introduction to Cloud Security.pptxIntroduction to Cloud Security.pptx
Introduction to Cloud Security.pptxssuser0fc2211
 
Emc vi pr global data services
Emc vi pr global data servicesEmc vi pr global data services
Emc vi pr global data servicessolarisyougood
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security PresentationAjay p
 
Gestiona el riesgo de las grandes amenazas
Gestiona el riesgo de las grandes amenazasGestiona el riesgo de las grandes amenazas
Gestiona el riesgo de las grandes amenazasNextel S.A.
 

Similar a Visibility & Security for the Virtualized Enterprise (20)

JavaOne2013: Securing Java in the Server Room - Tim Ellison
JavaOne2013: Securing Java in the Server Room - Tim EllisonJavaOne2013: Securing Java in the Server Room - Tim Ellison
JavaOne2013: Securing Java in the Server Room - Tim Ellison
 
Cloud security
Cloud securityCloud security
Cloud security
 
Layer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdfLayer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdf
 
Security in the Real World - JavaOne 2013
Security in the Real World - JavaOne 2013Security in the Real World - JavaOne 2013
Security in the Real World - JavaOne 2013
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Virtualize Application Security Today - Hardware is No Longer Needed.pptx
 Virtualize Application Security Today - Hardware is No Longer Needed.pptx Virtualize Application Security Today - Hardware is No Longer Needed.pptx
Virtualize Application Security Today - Hardware is No Longer Needed.pptx
 
Sl virtual apps-131106
Sl virtual apps-131106Sl virtual apps-131106
Sl virtual apps-131106
 
Introduction to Cloud Security.pptx
Introduction to Cloud Security.pptxIntroduction to Cloud Security.pptx
Introduction to Cloud Security.pptx
 
Emc vi pr global data services
Emc vi pr global data servicesEmc vi pr global data services
Emc vi pr global data services
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
Gestiona el riesgo de las grandes amenazas
Gestiona el riesgo de las grandes amenazasGestiona el riesgo de las grandes amenazas
Gestiona el riesgo de las grandes amenazas
 

Más de EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 

Más de EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Último

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Último (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Visibility & Security for the Virtualized Enterprise

  • 1. Visibility & Security for the Virtualized Enterprise John McDonald, CISSP © Copyright 2013 EMC Corporation. All rights reserved. 1
  • 2. Roadmap Information Disclaimer  EMC makes no representation and undertakes no obligations with regard to product planning information, anticipated product characteristics, performance specifications, or anticipated release dates (collectively, “Roadmap Information”).  Roadmap Information is provided by EMC as an accommodation to the recipient solely for purposes of discussion and without intending to be bound thereby.  Roadmap information is EMC Restricted Confidential and is provided under the terms, conditions and restrictions defined in the EMC NonDisclosure Agreement in place with your organization. © Copyright 2013 EMC Corporation. All rights reserved. 2
  • 3. Agenda  Foundations  How Virtualization Impacts Your Security  Securing & Monitoring Virtual Environments  Summary © Copyright 2013 EMC Corporation. All rights reserved. 3
  • 4. Foundations © Copyright 2013 EMC Corporation. All rights reserved. 4
  • 5. Foundations  Attack surface  High Value Assets  Types of Security Controls © Copyright 2013 EMC Corporation. All rights reserved. 5
  • 6. What is An Attack Surface?  Originally proposed by the Software Engineering Institute at Carnegie Mellon University  The attack surface of a system the set of ways in which an adversary can enter the ‘system’ and potentially cause damage – Intentional or unintentional  Hence, the larger the attack surface, the more difficult it is to secure the system © Copyright 2013 EMC Corporation. All rights reserved. 6
  • 7. Information is Created and Stored DMZ Attack Points: • OS (multiple) • Local storage • Web Server PII PHI PCI IP Networ k SAN Internet Custome r/Client /Patient Database Web Server Application Server Database Server Storage Array Infrastructure © Copyright 2013 EMC Corporation. All rights reserved. 7
  • 8. Information is Created and Stored DMZ Networ k Attack Points: • OS (multiple) • Local storage • Web Server Internet Customer/ Client /Patient SAN PII PHI PCI IP Web Server Database Application Server Attack Points: • OS (multiple) • Local storage • App (multiple) Database Server Storage Array Infrastructure © Copyright 2013 EMC Corporation. All rights reserved. 8
  • 9. Information is Created and Stored DMZ Attack Points: • OS (multiple) • Local storage • Web Server SAN Networ k PII PHI PCI IP Internet Customer/ Client /Patient Attack Points: • Switches • Routers •Sniffers Web Server Application Server Attack Points: • OS (multiple) • Local storage • App (multiple) Database Database Server Attack Points: • OS (multiple) • Local storage • DB (multiple) Storage Array Infrastructure © Copyright 2013 EMC Corporation. All rights reserved. 9
  • 10. Information is Created and Stored DMZ Attack Points: • OS (multiple) • Local storage • Web Server Attack Points: • Switches • Routers •Sniffers PII PHI PCI IP Internet Customer /Client /Patient SAN Networ k Web Server Application Server Attack Points: • OS (multiple) • Local storage • App (multiple) Database Server Attack Points: • OS (multiple) • Local storage • DB (multiple) Infrastructure © Copyright 2013 EMC Corporation. All rights reserved. Attack Points: • Switches • Controllers • Host Drivers Database Storage Array Attack Points: • Mgt Interface • Copies • Backups 10
  • 11. Information is Accessed and Managed DMZ Attack Points: • OS (multiple) • Local storage • Web Server Attack Points: • Switches • Routers •Sniffers SAN Networ k PII PHI Database PCI IP Internet Customer /Client /Patient Web Server Application Server Attack Points: • OS (multiple) • Local storage • App (multiple) Database Server Attack Points: • OS (multiple) • Local storage • DB (multiple) Infrastructure © Copyright 2013 EMC Corporation. All rights reserved. Attack Points: • Switches • Controllers • Host Drivers Storage Array Attack Points: • Mgt Interface • Copies • Backups 11
  • 12. Information is Accessed and Managed SAN PII PHI Database PCI IP Database Server Storage Array Infrastructure © Copyright 2013 EMC Corporation. All rights reserved. 12
  • 13. Numerous Attack Points Information is Accessed and Managed Partner s Customer Attack Points: • OS (multiple) Service • Service App Attack Points: • Intercepted email • Wrong addressee Emai l • Local storage SAN Attack Points: • OS (multiple) • Backup App • Snap/Clone Attack Points: • OS (multiple) • Lost/stolen device • Local storage PII PHI Database PCI IP Client s Employees Customer s Suppliers Portal/ Intranet Attack Points: • OS (multiple) • Web Server • Network © Copyright 2013 EMC Corporation. All rights reserved. Backup Server Database Server Attack Points: • Lost/Stolen • Unauthorized Access Copy Attack Points: Storag • Network Communications e Business Mobile Devices Array Attack Points: Attack Points: Attack Points: • Unauthorized DR • OS (multiple) • Device exploit Applications •Lost/stolen Access Infrastructure • Business App • Physical Theft Site device • Local storage 13
  • 14. What is an Information Attack Surface? The Information Attack Surface for a given type of information equals the combination of the attack surfaces of all components that ‘touch’ that type of information • For the entire lifecycle of that information • Virtualization adds another layer to the attack surface © Copyright 2013 EMC Corporation. All rights reserved. 14
  • 15. What are High-Value Assets? • An asset that, if compromised, will have a significant impact on: – – – – – Revenue/Critical Business Processes Intellectual Property/Trade Secrets Brand/Image Legal/Regulatory Compliance Total Customer Experience • Assets can be systems (HVSA) or information (HVIA) © Copyright 2013 EMC Corporation. All rights reserved. 15
  • 16. Types of Security Controls • Three types of security controls to consider – Preventive – Prevent compromise from occurring in the first place (Firewall, AV, Encryption, etc.) – Detective – Detects if compromise has or is occurring and what happened (SIEM, IDS/HDS, forensics, etc.) – Corrective – Allows environment to be returned to previous non-compromised state (e.g. AV, backups, DR, etc.) • Preventive provides the greatest value, but becoming increasingly difficult (e.g. 0-day vulnerabilities. APTs, etc.) © Copyright 2013 EMC Corporation. All rights reserved. 16
  • 17. How Virtualization Impacts Security © Copyright 2013 EMC Corporation. All rights reserved. 17
  • 18. Virtualization’s Impact  New threat landscape  Servers as files  Server sprawl  Super Admins  Multitenancy © Copyright 2013 EMC Corporation. All rights reserved. 18
  • 19. New Threat Landscape © Copyright 2013 EMC Corporation. All rights reserved. 19
  • 20. Virtualization Threat Modeling  You need to understand the changes the virtualization introduces into your threat model – Sources – Where the attack originates (don’t forget physical and accidents) – Objectives – The goals of the attack – Methods – How the attack is accomplished  ‘Objectives’ and ‘Methods’ tend to drive an attackers targets  Objectives that are focused on compromising sensitive assets or disrupting your environment can target your virtualization environment © Copyright 2013 EMC Corporation. All rights reserved. 20
  • 21. Threat Modeling Process Threat Modeling Process 1. Identify Assets (including VMs) Lead Designer, Business Owner 2. Create an Architecture Overview 3. Decompose the Attack Surface Designer Architect Security Lead 4. Identify the Threats Brainstorm Session 5. Document the Threats 6. Rate the Threats © Copyright 2013 EMC Corporation. All rights reserved. Designer, Development, Infrastructure, Documentation, Testers, Security, Project Management 21
  • 22. Physical Servers • Most organizations have good physical security • Physical servers are well protected from theft Data Center © Copyright 2013 EMC Corporation. All rights reserved. 22
  • 23. Virtualization Changes Server Security  Servers are now files, which can easily be copied/stolen – Locally or over a network – Along with the information they contain (.vmdk files) = Now © Copyright 2013 EMC Corporation. All rights reserved. 23
  • 24. Server Sprawl  Virtualization makes adding servers easier – Which inevitably results in more servers – Which in turn means more copies of sensitive information and a larger attack surface = Now © Copyright 2013 EMC Corporation. All rights reserved. 24
  • 25. Super Admins  Previously, system admins only had access to servers they were directly responsible for – With virtualization environments, VM admins can access the files representing the servers in the domains they manage – ‘Introspection’ capabilities provide potential visibility into every VM © Copyright 2013 EMC Corporation. All rights reserved. 25
  • 26. Multi-tenancy  Many virtual environments support multiple different business organizations in a single environment – Cloud providers  Each environment may have different security requirements; all require segregation from the others © Copyright 2013 EMC Corporation. All rights reserved. 26
  • 27. Securing & Monitoring Your Virtual Environment © Copyright 2013 EMC Corporation. All rights reserved. 27
  • 28. Securing & Monitoring  Ensure solid foundations  Understand the threats  Protect & control access  Monitor & respond  Advanced solutions © Copyright 2013 EMC Corporation. All rights reserved. 28
  • 29. Ensure Solid Foundations  There are a number of processes that need to be solid before you can effectively secure a virtual (or any) environment – – – – Classification Change control Patch management Configuration management  Underlying all of these should be a solid documentation foundation – You can’t secure what you don’t understand! © Copyright 2013 EMC Corporation. All rights reserved. 29
  • 30. General Process Impact  One of the biggest advantages of virtualization is that it tends to simplify many processes – What used to require accessing many physical servers can be easily accomplished from a single VM management console – But this can also be a weakness from a security perspective  A common problem is that this simplification tends to lead to a more lax approach to these processes – – – – Change control New server creation Asset management Patch management  Which in turn reduces the effectiveness of these process controls © Copyright 2013 EMC Corporation. All rights reserved. 30
  • 31. Foundations: Classification  Classification is the process of defining standard security ‘buckets’ based on broad protection requirements – Usually 3-4 classification levels  Example: – – – – Restricted Internal Company Confidential Company Sensitive Public  Every asset should be assigned a classification – Servers, databases, switches, etc. – Based on the highest classification of information it ‘touches’ © Copyright 2013 EMC Corporation. All rights reserved. 31
  • 32. Foundations: Classification (contd.)  Need to define protection requirements for VMs based on classification – Each classification should mandate both general and technology-specific standards ▪ Examples: — All OS instances that process information classified as ‘Company Confidential’ shall themselves be classified ‘Company Confidential’ » » — — All attempted, successful and failed login attempts shall be logged and reviewed All access changes must be reviewed and approved Windows instances classified as ‘Company Confidential’ shall not run the following services:… Linux instances classified as ‘Company Confidential’ shall not run the following daemons:…  The VM environment itself should have a classification – And associated security configuration standards © Copyright 2013 EMC Corporation. All rights reserved. 32
  • 33. Foundations: Change Control  Automated, comprehensive & integrated change control for VM environments – Should cover ALL changes! – Automated detection of changes (event logs) and correlation to approved change requests – Should include changes to the VM environment itself  Change events should be sent to a SIEM system for analysis and correlation – Configuration change events as well as security events © Copyright 2013 EMC Corporation. All rights reserved. 33
  • 34. Foundations: Configuration Management  Unmanaged/uncontrolled changes are one of the most common sources of security vulnerabilities – ‘Temporary’ changes to fight some fire that never get undone  VM environment and VMs should be scanned regularly to ensure compliance with define configuration standards  Consider utilizing standards-based automated configuration definition framework – Security Configuration Automation Protocol (SCAP) – XML-based NIST standard (submitted to ISO) © Copyright 2013 EMC Corporation. All rights reserved. 34
  • 35. Understand the Threats  Virtualization adds an entirely new series of attack vectors to your environment – Understanding and monitoring potential threats is critical – Both internal and external threats  You need to be aware of new threats and be able to rapidly adjust your security profile to address them  You need to develop a threat intelligence team that monitors threat news from multiple sources – VMWare, McAfee, Symantec, hacker forums, Black Hat, etc.  Be careful to distinguish between ‘threats’ and ‘vulnerabilities’ © Copyright 2013 EMC Corporation. All rights reserved. 35
  • 36. Protect & Control Access  Controlling who has access to what files and who can perform which functions is critical – Using tools like Introspection, VM admins become ‘super admins’ – Can access files and data structures in any running VM  Don’t forget the basics – – – – Strong passwords Password rotation Avoid shared accounts Multi-factor or risk-based authentication for privileged accounts – Document an map all accounts to specific users © Copyright 2013 EMC Corporation. All rights reserved. 36
  • 37. Protect & Control Access: Roles  Role-based access control provides the ability to strongly segregate access – Roles define which components a user can access and what they can (and can’t) do – Users are assigned roles  Most VM environments provide default roles – Custom roles should be created to segregate access and control – OS instance (VM) admins should be allowed access to only the VMs they’re responsible for  Implementing and managing fine-grained role-based access can be complex, but critical  VM host admins should be treated as some of the most sensitive accounts in your environment! – Strong authentication – Full monitoring of all activities – Restricted activities (e.g. web surfing) © Copyright 2013 EMC Corporation. All rights reserved. 37
  • 38. Sample Default Roles (VMWare)  No Access: A permanent role that is assigned to new users and groups. Prevents a user or group from viewing or making changes to an object  Read-Only: A permanent role that allows users to check the state of an object or view its details, but not make changes to it  Administrator: A permanent role that enables a user complete access to all of the objects on the server. The root user is assigned this role by default, as are all of the users who are part of the local Windows Administrators group associated with vCenter Server. At least one user must have administrative permissions in VMware.  Virtual Machine Administrator: A sample role that allows a user complete and total control of a virtual machine or a host, up to and including removing that VM or host  Virtual Machine Power User: A sample role that grants a user access rights only to virtual machines; can alter the virtual hardware or create snapshots of the VM  Virtual Machine User: Grants user access rights exclusively to VMs. The user can power on, power off, and reset the virtual machine, as well as run media from the virtual discs.  Resource Pool Administrator: Allows the user to create resource pools (RAM and CPU reserved for use) and assign these pools to virtual machines  Datacenter Administrator: Permits a user to add new datacenter objects  VMware Consolidated Backup User: Required to allow VMware Consolidated Backup to run  Datastore Consumer: Allows the user to consume space on a datastore  Network Consumer: Allows the user to assign a network to a virtual machine or a host © Copyright 2013 EMC Corporation. All rights reserved. 38
  • 39. Protect & Control Access: Encryption  Encryption can be thought of as a form of access control – Only actors with access to the decryption keys can access the content  Doing encryption right can be a challenge – Need to understand the threats you’re trying to protect against (use cases) – One size does not fit all with encryption! – Numerous potential ‘side effects’ that need to be considered © Copyright 2013 EMC Corporation. All rights reserved. 39
  • 40. The Encryption Stack • Encrypting at a given layer tend to protect all layers below • High layer encryption addresses more threat profiles • Cost and complexity tend to go up as you move up the stack © Copyright 2013 EMC Corporation. All rights reserved. 40
  • 41. Encryption: Considerations  What are the drivers? (threats, regulations, policy, etc.)  Key and algorithm strength  Solution acquisition, implementation, management & impact costs  Performance impact (encrypted data cannot be compressed)  Protection Domains (where will the data be protected?)  User Context/Access Control  Transition  Key Management (who has access, key rotation, key retention, etc.)  Secondary Operations (backups, data de-duplication, replication, etc.)  Government Regulations © Copyright 2013 EMC Corporation. All rights reserved. 41
  • 42. Monitor & Respond  Continuous real-time monitoring of security-related events in a virtual environment is critical to maintaining security – Attacks happen fast – The longer an attacker is active in your environment, the more damage that can be done  Monitoring is primarily a detective control, but may prevent further damage by detecting early  Need to define and document requirements (based on threat environment) – What will be monitored? – What events will be collected? – What do the events mean?  Modern complex environments generate huge amounts of event data – Need to be able to make sense of it all – Types of events collected should be based on classification © Copyright 2013 EMC Corporation. All rights reserved. 42
  • 43. Monitor & Respond: Event Monitoring  Most obvious collection requirements are security events – Focus on failures and errors – For all critical components, not just host instances (e.g. network devices, VM events, storage, etc.)  However, management and change events can be just as critical – Create new VM – Change access permissions – Accesses to VM files  Numerous tools available – Splunk, RSA Security Analytics, Catbird, etc.  In a multi-tenancy environment, you may need to provide unique event log feeds to each tenant – All events relevant to their components (not just host events) © Copyright 2013 EMC Corporation. All rights reserved. 43
  • 44. Monitor & Respond: Responding  Detecting a security event is meaningless unless it can be addressed effectively – Need to have a comprehensive structured incident response plan  The team responsible for the virtual environment must be integrated into the response plan  The use of VMs can actually simplify the forensic process – Easy to make a snapshot of impacted servers © Copyright 2013 EMC Corporation. All rights reserved. 44
  • 45. Advanced Solutions: Key Management  In a multi-tenancy environment, some tenants may require stronger protection of VMs – Even if VM admin can’t access host OS, they can still access the VM files  Some vendors provide a split-key distributed key management solution – Allows each tenant to control a portion of their VM’s encryption keys – Afore Solutions is one example © Copyright 2013 EMC Corporation. All rights reserved. 45
  • 46. Advanced Solutions: SCIT  Self-Cleansing Intrusion Tolerance – Invented by a team at George Mason University – Supports the assertion that you will never be able to completely prevent all intrusions, especially in vulnerable servers (e.g. web servers, DNS servers, etc.)  Uses a rotating set of ‘gold image’ VMs to regularly replace potentially infected ones © Copyright 2013 EMC Corporation. All rights reserved. 46
  • 47. Summary  Virtualization adds additional attack vectors to what is already an extremely complex attack surface  Basic foundational capabilities are critical to effectively securing a virtual environment  As with any technology you need to understand the requirements and threats before you can secure it  Controlling and protecting access and appropriate monitoring are critical © Copyright 2013 EMC Corporation. All rights reserved. 47