SlideShare a Scribd company logo
1 of 10
Secure Multi Tenancy In the Cloud



               Boris Strongin
 VP Engineering and Co-founder, Hytrust Inc.
           bstrongin@hytrust.com
At-a-Glance Trends

                                                                                           Increased Insider Threat
     Do MORE with LESS


                                                                                              Increasing IT spend on cloud

                                                                                              IT budget remains almost flat


                       1H11                           2H11                  1H12                       2H12

      ~10-35% virtualized                  ~35-50% virtualized

                                                                               ~50-80% virtualized

                      Major vendors: Repurpose and Aggregate

                                                                    Major vendors: Purpose-built


          - Resource constraints        - Compliance             - Many point solutions
  Pain    - Lack of skills              - Loss of control        - Multi-tenancy
          - Access control              - Lack of visibility     - Data protection

          - Infrastructure/Platform (influenced by Security)      - Business Application Owner (approval by
  Buyer
          - Ad-hoc                                               Security/Compliance/Risk)
Virtualization Challenges and Opportunities
The blurring line between Security and Management

—  Need to manage the complexity also in Security
   −  Heterogeneous VM platforms create security complexity
   −  Vary in approach to security and management

—  Unstructured physical boundaries make it harder to protect services and data
   −  VM mobility/distribution, copying/cloning, memory protection, etc.
   −  Where can my data migrate to? And who are my neighbors?

—  Unstructured time dimension challenges integrity
   −  VM reversion can result in lost audit events, security configurations, security policies,
      etc.

—  Virtualization Servers are subject to regulatory controls
   −  Physical systems are at greater risk as VMs share hardware
   −  Enhanced need for segregation of duties - New level of administration is introduced with the
      Hypervisor / Privileged Partitions
   −  Implication of VM mobility to privacy laws.
Virtualization Platform Effects on Security




  Abstraction and                 Collapse of switches and         Faster deployment in
  Consolidation                   servers into one device          shared environment
  •  ↑ Capital and Operational    •  ↑ Flexibility                 •  ↑ IT responsiveness
     Cost Savings                 •  ↑ Cost-savings                •  ↓ Inconsistencies in
  •  ↓ New infrastructure layer   •  ↓ Lack of visibility and         configuration
     to be secured and subject       control for virtual network   •  ↓ Physical change
     to compliance                   and storage                      processes ineffective
  •  ↓ Greater impact of attack   •  ↓ No separation of church     •  ↓ Inadequate tenant
     or misconfiguration             and state (network,              segmentation
                                     security, storage
                                     administration)
Virtualization Containers Effects on Security




  Fuzzy time boundaries        VM Mobility                   VM Encapsulation
  •  ↑ Great availability /    •  ↑ Improved Service         •  ↑ Ease DR
     recovery mechanism           Levels                     •  ↑ Hardware Independence
  •  ↓ Security and audit      •  ↓ Identity divorced from   •  ↓ Outdated offline systems
     events can be lost           physical location          •  ↓ Unauthorized copy
  •  ↓ Changes in time are     •  ↓ Policies may not         •  ↓ Reconfiguring virtual
     not visible from inside      follow virtual machine        hardware and console
     the virtual server                                         access are over the network
                                                                operations
New Security and Control Challenges in the Cloud

—  Investment in Cloud is growing due to agility, economic and operational benefits
   −  Enterprises adopt private cloud first, with strategy to go to hybrid and public cloud in the future

—  Tenants need to retain control and audit capabilities
   −  Tenants are ultimately responsible for compliance and standard of care of their workloads
   −  Automation and self-service capabilities are required

—  Providers need to manage complexity and enforce security
   −  Infrastructure as a service management including hypervisor and VM containers
   −  Compliance and security management as a premium service
                                                                                                                                                                                                             public	
  cloud	
  
                                                                                                                                                                 app	
  3	
  
                                                                                                                                                                                app	
  3	
   app	
  1	
      app	
  1	
        app	
  2	
  
                                                                                                                                                  app	
  3	
                            customer	
  1	
   customer	
  2	
   customer	
  n	
  
                                                           enterprise	
  private	
  cloud	
                                        app	
  3	
  



                 enterprise	
  datacenter	
                    app	
  1	
       app	
  2	
        app	
  3	
  
                                                                                                                    app	
  3	
  
                                                                                                                                                                                                   hyper	
  visor	
  
                                                                 app	
  1	
        app	
  2	
        app	
  3	
  

                                                                                                                                                                                                             hardware
             app1	
       app2	
      app3	
  
                                                                       hyper	
  visor	
  
                                                                        hyper	
  visor	
  
            hardwar      hardwar     hardwar                                                                                                                                                       iam
               e	
          e	
         e	
                                       hardware
                                                                                hardware 	
  

                                                 iam	
  
Co-management
  Accountability
   •    Access rules per resource; identities, credentials, roles, groups

  Transparency
   •    Workload location, infrastructure segmentation and segregation

  Visibility
   •    Per-tenant audit logs and reporting
Secure Multi-Tenancy

— Logical infrastructure segregation to provide tenant-level
  separation for service providers as well as application and
  line-of-business multi-tenancy for enterprises
— Policy labels used to provide resource-level classification
  (tenant, application tier, security zone, etc.) which provide
  compute, network and resource segregation
— Persistent policy labels for mobile VM workloads (hybrid
  cloud)
— Self service tied to tenant- and resource-level policy labels
— Per-tenant audit logging for virtual infrastructure and VM-
  level administrative changes
Security zones and multi-tenant policies in the
“shared” model
                             Security Requirements:

                             “Shared” Model: User can select default security policy
                             for each instance of sandbox/template within a shared
                             compute pool.

                             Security Zone (non-optional) has defined security policy.
                             Compute, storage and network resources shared as a
                             pool with ability to offer isolation.

                             Security Policy Enforcement:

                             Each sandbox and VM/server instance gets
                             classified during provisioning by applying tags.
                                   a)  Tenant/departmental ownership
                                   b)  Zone requirements
                                   c)  Custom security posture requirements
                                   d)  Real-time tags based on internal
                                       VM metadata
                             Security policy gets enforced by HyTrust Appliance
                             in real time based on sandbox tags (policies are global
                             and/or tenant specific). Policy includes segmentation of
                             resource pool/zone and network.
Security zones and multi-tenant policies in the
“dedicated” model
                             Security Requirements:
                             “Dedicated” Model: Each Compute Pool (configured on a
                             per-tenant basis) has a Security Zone and Policy.

                             Complete isolation between the tenants.

                             Security Policy Enforcement:

                             “Dedicated” Model (higher security) - Each compute
                             pool gets labeled based on tenant ownership and
                             security configuration.
                                 a)  Policy includes segmentation by resource
                                      pool/zone and network.
                                 b)  Security policy gets enforced by HyTrust
                                      Appliance in real time based on sandbox tags
                                      (policies are global and/or tenant specific).
                                 c)  The policies enforce access control and
                                      compliance (controlling privileged access to the
                                      host, separation of duties, audit reporting, etc).
                                 d)  Security policies (tags) are selected by a
                                      service consumer as a part of reservation
                                      management process (low, medium, high) for
                                      the type of workload (web, database, etc.)
                                      requested.

More Related Content

What's hot

BayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes EverythingBayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes EverythingCloudPassage
 
Softchoice Webinar Series: VMware vSphere 5.1 Changes
Softchoice Webinar Series: VMware vSphere 5.1 ChangesSoftchoice Webinar Series: VMware vSphere 5.1 Changes
Softchoice Webinar Series: VMware vSphere 5.1 ChangesSoftchoice Corporation
 
Five Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption DisastersFive Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption DisastersVenafi
 
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosAntivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosNextel S.A.
 
Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Four Must Know Certificate and Key Management Threats That Can Bring Down You...Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Four Must Know Certificate and Key Management Threats That Can Bring Down You...Venafi
 
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
Forecast 2012 Panel: Security POC NAB, Terremark, TrapezoidForecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
Forecast 2012 Panel: Security POC NAB, Terremark, TrapezoidOpen Data Center Alliance
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2JD Sherry
 
CCNA Security - Chapter 7
CCNA Security - Chapter 7CCNA Security - Chapter 7
CCNA Security - Chapter 7Irsandi Hasan
 
Juniper Enterprise Guest Access
Juniper Enterprise Guest AccessJuniper Enterprise Guest Access
Juniper Enterprise Guest AccessAltaware, Inc.
 
BOI 2011 - Be what's next
BOI 2011 - Be what's nextBOI 2011 - Be what's next
BOI 2011 - Be what's nextTudor Damian
 
Datacryptor Ethernet Layer 2 Rel 4.5
Datacryptor Ethernet Layer 2 Rel 4.5Datacryptor Ethernet Layer 2 Rel 4.5
Datacryptor Ethernet Layer 2 Rel 4.5Eugene Sushchenko
 
ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4guest66dc5f
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009apompliano
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentationhemanth102030
 
Cloud servers-new-risk-considerations
Cloud servers-new-risk-considerationsCloud servers-new-risk-considerations
Cloud servers-new-risk-considerationsAccenture
 

What's hot (18)

Technical Cyber Defense Strategies Explained!
Technical Cyber Defense Strategies Explained!Technical Cyber Defense Strategies Explained!
Technical Cyber Defense Strategies Explained!
 
BayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes EverythingBayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes Everything
 
Softchoice Webinar Series: VMware vSphere 5.1 Changes
Softchoice Webinar Series: VMware vSphere 5.1 ChangesSoftchoice Webinar Series: VMware vSphere 5.1 Changes
Softchoice Webinar Series: VMware vSphere 5.1 Changes
 
Five Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption DisastersFive Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption Disasters
 
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosAntivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizados
 
Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Four Must Know Certificate and Key Management Threats That Can Bring Down You...Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Four Must Know Certificate and Key Management Threats That Can Bring Down You...
 
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
Forecast 2012 Panel: Security POC NAB, Terremark, TrapezoidForecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
 
CCNA Security - Chapter 7
CCNA Security - Chapter 7CCNA Security - Chapter 7
CCNA Security - Chapter 7
 
Juniper Enterprise Guest Access
Juniper Enterprise Guest AccessJuniper Enterprise Guest Access
Juniper Enterprise Guest Access
 
BOI 2011 - Be what's next
BOI 2011 - Be what's nextBOI 2011 - Be what's next
BOI 2011 - Be what's next
 
Datacryptor Ethernet Layer 2 Rel 4.5
Datacryptor Ethernet Layer 2 Rel 4.5Datacryptor Ethernet Layer 2 Rel 4.5
Datacryptor Ethernet Layer 2 Rel 4.5
 
C2MS
C2MSC2MS
C2MS
 
Streamline it & save with virtualization
Streamline it & save with virtualizationStreamline it & save with virtualization
Streamline it & save with virtualization
 
ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentation
 
Cloud servers-new-risk-considerations
Cloud servers-new-risk-considerationsCloud servers-new-risk-considerations
Cloud servers-new-risk-considerations
 

Viewers also liked

Storage Multi-Tenancy For Cloud Service Providers
Storage Multi-Tenancy For Cloud Service ProvidersStorage Multi-Tenancy For Cloud Service Providers
Storage Multi-Tenancy For Cloud Service ProvidersCloudByte Inc.
 
Requirements of Storage Multitenancy
Requirements of Storage MultitenancyRequirements of Storage Multitenancy
Requirements of Storage MultitenancyUmasankar Mukkara
 
Transforming the CSO Role to Business Enabler
Transforming the CSO Role to Business EnablerTransforming the CSO Role to Business Enabler
Transforming the CSO Role to Business EnablerCloudPassage
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterAlgoSec
 
Rethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectRethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectCloudPassage
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesHyTrust
 
SDDC Study: SDDC Goes Mainstream
SDDC Study: SDDC Goes MainstreamSDDC Study: SDDC Goes Mainstream
SDDC Study: SDDC Goes MainstreamJason Lackey
 
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?BeyondTrust
 
VMware Outlines Its Own Journey to the Cloud
VMware Outlines Its Own Journey to the CloudVMware Outlines Its Own Journey to the Cloud
VMware Outlines Its Own Journey to the CloudVMware
 
Control the Creep: Streamline Security and Compliance by Sharing the Workload
Control the Creep: Streamline Security and Compliance by Sharing the WorkloadControl the Creep: Streamline Security and Compliance by Sharing the Workload
Control the Creep: Streamline Security and Compliance by Sharing the Workloadaregnerus
 
Enemy from Within: Managing and Controlling Access
Enemy from Within: Managing and Controlling AccessEnemy from Within: Managing and Controlling Access
Enemy from Within: Managing and Controlling AccessBeyondTrust
 
Multi Tenancy In The Cloud
Multi Tenancy In The CloudMulti Tenancy In The Cloud
Multi Tenancy In The Cloudrohit_ainapure
 
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachCA Technologies
 
Multi-tenancy in Java
Multi-tenancy in JavaMulti-tenancy in Java
Multi-tenancy in Javaseges
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017Ramiro Cid
 

Viewers also liked (19)

Storage Multi-Tenancy For Cloud Service Providers
Storage Multi-Tenancy For Cloud Service ProvidersStorage Multi-Tenancy For Cloud Service Providers
Storage Multi-Tenancy For Cloud Service Providers
 
Requirements of Storage Multitenancy
Requirements of Storage MultitenancyRequirements of Storage Multitenancy
Requirements of Storage Multitenancy
 
QoS, QoS Baby
QoS, QoS BabyQoS, QoS Baby
QoS, QoS Baby
 
Transforming the CSO Role to Business Enabler
Transforming the CSO Role to Business EnablerTransforming the CSO Role to Business Enabler
Transforming the CSO Role to Business Enabler
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data Center
 
Rethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectRethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure Effect
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
 
SDDC Study: SDDC Goes Mainstream
SDDC Study: SDDC Goes MainstreamSDDC Study: SDDC Goes Mainstream
SDDC Study: SDDC Goes Mainstream
 
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
 
Outcome of democracy
Outcome of democracyOutcome of democracy
Outcome of democracy
 
VMware Outlines Its Own Journey to the Cloud
VMware Outlines Its Own Journey to the CloudVMware Outlines Its Own Journey to the Cloud
VMware Outlines Its Own Journey to the Cloud
 
Multi-tenancy in the cloud
Multi-tenancy in the cloudMulti-tenancy in the cloud
Multi-tenancy in the cloud
 
Control the Creep: Streamline Security and Compliance by Sharing the Workload
Control the Creep: Streamline Security and Compliance by Sharing the WorkloadControl the Creep: Streamline Security and Compliance by Sharing the Workload
Control the Creep: Streamline Security and Compliance by Sharing the Workload
 
Enemy from Within: Managing and Controlling Access
Enemy from Within: Managing and Controlling AccessEnemy from Within: Managing and Controlling Access
Enemy from Within: Managing and Controlling Access
 
Multi Tenancy In The Cloud
Multi Tenancy In The CloudMulti Tenancy In The Cloud
Multi Tenancy In The Cloud
 
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data Breach
 
Multi-tenancy in Java
Multi-tenancy in JavaMulti-tenancy in Java
Multi-tenancy in Java
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 

Similar to Secure Multi Tenancy In the Cloud

S24 – Virtualiza.on Security from the Auditor Perspec.ve
S24 – Virtualiza.on Security from the Auditor Perspec.veS24 – Virtualiza.on Security from the Auditor Perspec.ve
S24 – Virtualiza.on Security from the Auditor Perspec.veHyTrust
 
Layer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public SectorLayer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public SectorCA API Management
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityAndrew Wong
 
Server Virtualization in Manufacturing Operations
Server Virtualization in Manufacturing OperationsServer Virtualization in Manufacturing Operations
Server Virtualization in Manufacturing OperationsARC Advisory Group
 
Using Server Virtualization for Manufacturing Operations
Using Server Virtualization for Manufacturing OperationsUsing Server Virtualization for Manufacturing Operations
Using Server Virtualization for Manufacturing OperationsARC Advisory Group
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...Ixia
 
Programatori cu capul in nori
Programatori cu capul in noriProgramatori cu capul in nori
Programatori cu capul in noriAlex Popescu
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentationMangesh Gunjal
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesCloudPassage
 
Your Firm In The Cloud
Your Firm In The CloudYour Firm In The Cloud
Your Firm In The CloudBCS ProSoft
 
Cloud Computing, SDN, Big Data and Internet of Everything - Lew Tucker
Cloud Computing, SDN, Big Data and Internet of Everything - Lew TuckerCloud Computing, SDN, Big Data and Internet of Everything - Lew Tucker
Cloud Computing, SDN, Big Data and Internet of Everything - Lew TuckerLew Tucker
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012Symantec
 
Symantec Endpoint Virtualization Suite
Symantec Endpoint Virtualization SuiteSymantec Endpoint Virtualization Suite
Symantec Endpoint Virtualization SuitePipeline Srl
 
Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003bjhutt
 
Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2rpark31
 
Cloud computing
Cloud computingCloud computing
Cloud computingvdvennen
 
Csa summit 2017 - Plataforma de Seguridad para entornos Cloud
Csa summit 2017 - Plataforma de Seguridad para entornos CloudCsa summit 2017 - Plataforma de Seguridad para entornos Cloud
Csa summit 2017 - Plataforma de Seguridad para entornos CloudCSA Argentina
 
AbiCloud Webinar 1.0
AbiCloud Webinar 1.0AbiCloud Webinar 1.0
AbiCloud Webinar 1.0Abiquo, Inc.
 

Similar to Secure Multi Tenancy In the Cloud (20)

S24 – Virtualiza.on Security from the Auditor Perspec.ve
S24 – Virtualiza.on Security from the Auditor Perspec.veS24 – Virtualiza.on Security from the Auditor Perspec.ve
S24 – Virtualiza.on Security from the Auditor Perspec.ve
 
Layer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public SectorLayer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public Sector
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
Server Virtualization in Manufacturing Operations
Server Virtualization in Manufacturing OperationsServer Virtualization in Manufacturing Operations
Server Virtualization in Manufacturing Operations
 
Using Server Virtualization for Manufacturing Operations
Using Server Virtualization for Manufacturing OperationsUsing Server Virtualization for Manufacturing Operations
Using Server Virtualization for Manufacturing Operations
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
 
Programatori cu capul in nori
Programatori cu capul in noriProgramatori cu capul in nori
Programatori cu capul in nori
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud Guidelines
 
Your Firm In The Cloud
Your Firm In The CloudYour Firm In The Cloud
Your Firm In The Cloud
 
Cloud Computing, SDN, Big Data and Internet of Everything - Lew Tucker
Cloud Computing, SDN, Big Data and Internet of Everything - Lew TuckerCloud Computing, SDN, Big Data and Internet of Everything - Lew Tucker
Cloud Computing, SDN, Big Data and Internet of Everything - Lew Tucker
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
Symantec Endpoint Virtualization Suite
Symantec Endpoint Virtualization SuiteSymantec Endpoint Virtualization Suite
Symantec Endpoint Virtualization Suite
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003
 
Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2
 
XS Japan 2008 Ganeti English
XS Japan 2008 Ganeti EnglishXS Japan 2008 Ganeti English
XS Japan 2008 Ganeti English
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Csa summit 2017 - Plataforma de Seguridad para entornos Cloud
Csa summit 2017 - Plataforma de Seguridad para entornos CloudCsa summit 2017 - Plataforma de Seguridad para entornos Cloud
Csa summit 2017 - Plataforma de Seguridad para entornos Cloud
 
AbiCloud Webinar 1.0
AbiCloud Webinar 1.0AbiCloud Webinar 1.0
AbiCloud Webinar 1.0
 

More from Roger Xia

机器学习推动金融数据智能
机器学习推动金融数据智能机器学习推动金融数据智能
机器学习推动金融数据智能Roger Xia
 
Code reviews
Code reviewsCode reviews
Code reviewsRoger Xia
 
Python introduction
Python introductionPython introduction
Python introductionRoger Xia
 
Learning notes ruby
Learning notes rubyLearning notes ruby
Learning notes rubyRoger Xia
 
Converged open platform for enterprise
Converged open platform for enterpriseConverged open platform for enterprise
Converged open platform for enterpriseRoger Xia
 
Code reviews
Code reviewsCode reviews
Code reviewsRoger Xia
 
E commerce search strategies
E commerce search strategiesE commerce search strategies
E commerce search strategiesRoger Xia
 
Indefero source code_managment
Indefero source code_managmentIndefero source code_managment
Indefero source code_managmentRoger Xia
 
Web Services Atomic Transactio
 Web Services Atomic Transactio Web Services Atomic Transactio
Web Services Atomic TransactioRoger Xia
 
Web service through cxf
Web service through cxfWeb service through cxf
Web service through cxfRoger Xia
 
Q con london2011-matthewwall-whyichosemongodbforguardiancouk
Q con london2011-matthewwall-whyichosemongodbforguardiancoukQ con london2011-matthewwall-whyichosemongodbforguardiancouk
Q con london2011-matthewwall-whyichosemongodbforguardiancoukRoger Xia
 
Spring one2gx2010 spring-nonrelational_data
Spring one2gx2010 spring-nonrelational_dataSpring one2gx2010 spring-nonrelational_data
Spring one2gx2010 spring-nonrelational_dataRoger Xia
 
Consistency-New-Generation-Databases
Consistency-New-Generation-DatabasesConsistency-New-Generation-Databases
Consistency-New-Generation-DatabasesRoger Xia
 
Java explore
Java exploreJava explore
Java exploreRoger Xia
 
Mongo db实战
Mongo db实战Mongo db实战
Mongo db实战Roger Xia
 
Ca siteminder
Ca siteminderCa siteminder
Ca siteminderRoger Xia
 
Fixing twitter
Fixing twitterFixing twitter
Fixing twitterRoger Xia
 
Eclipse plug in mylyn & tasktop
Eclipse plug in mylyn & tasktopEclipse plug in mylyn & tasktop
Eclipse plug in mylyn & tasktopRoger Xia
 

More from Roger Xia (20)

机器学习推动金融数据智能
机器学习推动金融数据智能机器学习推动金融数据智能
机器学习推动金融数据智能
 
Code reviews
Code reviewsCode reviews
Code reviews
 
Python introduction
Python introductionPython introduction
Python introduction
 
Learning notes ruby
Learning notes rubyLearning notes ruby
Learning notes ruby
 
Converged open platform for enterprise
Converged open platform for enterpriseConverged open platform for enterprise
Converged open platform for enterprise
 
Code reviews
Code reviewsCode reviews
Code reviews
 
E commerce search strategies
E commerce search strategiesE commerce search strategies
E commerce search strategies
 
Saml
SamlSaml
Saml
 
JavaEE6
JavaEE6JavaEE6
JavaEE6
 
Indefero source code_managment
Indefero source code_managmentIndefero source code_managment
Indefero source code_managment
 
Web Services Atomic Transactio
 Web Services Atomic Transactio Web Services Atomic Transactio
Web Services Atomic Transactio
 
Web service through cxf
Web service through cxfWeb service through cxf
Web service through cxf
 
Q con london2011-matthewwall-whyichosemongodbforguardiancouk
Q con london2011-matthewwall-whyichosemongodbforguardiancoukQ con london2011-matthewwall-whyichosemongodbforguardiancouk
Q con london2011-matthewwall-whyichosemongodbforguardiancouk
 
Spring one2gx2010 spring-nonrelational_data
Spring one2gx2010 spring-nonrelational_dataSpring one2gx2010 spring-nonrelational_data
Spring one2gx2010 spring-nonrelational_data
 
Consistency-New-Generation-Databases
Consistency-New-Generation-DatabasesConsistency-New-Generation-Databases
Consistency-New-Generation-Databases
 
Java explore
Java exploreJava explore
Java explore
 
Mongo db实战
Mongo db实战Mongo db实战
Mongo db实战
 
Ca siteminder
Ca siteminderCa siteminder
Ca siteminder
 
Fixing twitter
Fixing twitterFixing twitter
Fixing twitter
 
Eclipse plug in mylyn & tasktop
Eclipse plug in mylyn & tasktopEclipse plug in mylyn & tasktop
Eclipse plug in mylyn & tasktop
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Secure Multi Tenancy In the Cloud

  • 1. Secure Multi Tenancy In the Cloud Boris Strongin VP Engineering and Co-founder, Hytrust Inc. bstrongin@hytrust.com
  • 2. At-a-Glance Trends Increased Insider Threat Do MORE with LESS Increasing IT spend on cloud IT budget remains almost flat 1H11 2H11 1H12 2H12 ~10-35% virtualized ~35-50% virtualized ~50-80% virtualized Major vendors: Repurpose and Aggregate Major vendors: Purpose-built - Resource constraints - Compliance - Many point solutions Pain - Lack of skills - Loss of control - Multi-tenancy - Access control - Lack of visibility - Data protection - Infrastructure/Platform (influenced by Security) - Business Application Owner (approval by Buyer - Ad-hoc Security/Compliance/Risk)
  • 3. Virtualization Challenges and Opportunities The blurring line between Security and Management —  Need to manage the complexity also in Security −  Heterogeneous VM platforms create security complexity −  Vary in approach to security and management —  Unstructured physical boundaries make it harder to protect services and data −  VM mobility/distribution, copying/cloning, memory protection, etc. −  Where can my data migrate to? And who are my neighbors? —  Unstructured time dimension challenges integrity −  VM reversion can result in lost audit events, security configurations, security policies, etc. —  Virtualization Servers are subject to regulatory controls −  Physical systems are at greater risk as VMs share hardware −  Enhanced need for segregation of duties - New level of administration is introduced with the Hypervisor / Privileged Partitions −  Implication of VM mobility to privacy laws.
  • 4. Virtualization Platform Effects on Security Abstraction and Collapse of switches and Faster deployment in Consolidation servers into one device shared environment •  ↑ Capital and Operational •  ↑ Flexibility •  ↑ IT responsiveness Cost Savings •  ↑ Cost-savings •  ↓ Inconsistencies in •  ↓ New infrastructure layer •  ↓ Lack of visibility and configuration to be secured and subject control for virtual network •  ↓ Physical change to compliance and storage processes ineffective •  ↓ Greater impact of attack •  ↓ No separation of church •  ↓ Inadequate tenant or misconfiguration and state (network, segmentation security, storage administration)
  • 5. Virtualization Containers Effects on Security Fuzzy time boundaries VM Mobility VM Encapsulation •  ↑ Great availability / •  ↑ Improved Service •  ↑ Ease DR recovery mechanism Levels •  ↑ Hardware Independence •  ↓ Security and audit •  ↓ Identity divorced from •  ↓ Outdated offline systems events can be lost physical location •  ↓ Unauthorized copy •  ↓ Changes in time are •  ↓ Policies may not •  ↓ Reconfiguring virtual not visible from inside follow virtual machine hardware and console the virtual server access are over the network operations
  • 6. New Security and Control Challenges in the Cloud —  Investment in Cloud is growing due to agility, economic and operational benefits −  Enterprises adopt private cloud first, with strategy to go to hybrid and public cloud in the future —  Tenants need to retain control and audit capabilities −  Tenants are ultimately responsible for compliance and standard of care of their workloads −  Automation and self-service capabilities are required —  Providers need to manage complexity and enforce security −  Infrastructure as a service management including hypervisor and VM containers −  Compliance and security management as a premium service public  cloud   app  3   app  3   app  1   app  1   app  2   app  3   customer  1   customer  2   customer  n   enterprise  private  cloud   app  3   enterprise  datacenter   app  1   app  2   app  3   app  3   hyper  visor   app  1   app  2   app  3   hardware app1   app2   app3   hyper  visor   hyper  visor   hardwar hardwar hardwar iam e   e   e   hardware hardware   iam  
  • 7. Co-management   Accountability •  Access rules per resource; identities, credentials, roles, groups   Transparency •  Workload location, infrastructure segmentation and segregation   Visibility •  Per-tenant audit logs and reporting
  • 8. Secure Multi-Tenancy — Logical infrastructure segregation to provide tenant-level separation for service providers as well as application and line-of-business multi-tenancy for enterprises — Policy labels used to provide resource-level classification (tenant, application tier, security zone, etc.) which provide compute, network and resource segregation — Persistent policy labels for mobile VM workloads (hybrid cloud) — Self service tied to tenant- and resource-level policy labels — Per-tenant audit logging for virtual infrastructure and VM- level administrative changes
  • 9. Security zones and multi-tenant policies in the “shared” model Security Requirements: “Shared” Model: User can select default security policy for each instance of sandbox/template within a shared compute pool. Security Zone (non-optional) has defined security policy. Compute, storage and network resources shared as a pool with ability to offer isolation. Security Policy Enforcement: Each sandbox and VM/server instance gets classified during provisioning by applying tags. a)  Tenant/departmental ownership b)  Zone requirements c)  Custom security posture requirements d)  Real-time tags based on internal VM metadata Security policy gets enforced by HyTrust Appliance in real time based on sandbox tags (policies are global and/or tenant specific). Policy includes segmentation of resource pool/zone and network.
  • 10. Security zones and multi-tenant policies in the “dedicated” model Security Requirements: “Dedicated” Model: Each Compute Pool (configured on a per-tenant basis) has a Security Zone and Policy. Complete isolation between the tenants. Security Policy Enforcement: “Dedicated” Model (higher security) - Each compute pool gets labeled based on tenant ownership and security configuration. a)  Policy includes segmentation by resource pool/zone and network. b)  Security policy gets enforced by HyTrust Appliance in real time based on sandbox tags (policies are global and/or tenant specific). c)  The policies enforce access control and compliance (controlling privileged access to the host, separation of duties, audit reporting, etc). d)  Security policies (tags) are selected by a service consumer as a part of reservation management process (low, medium, high) for the type of workload (web, database, etc.) requested.