SlideShare a Scribd company logo
1 of 48
Download to read offline
Visibility & Security
for the Virtualized
Enterprise
John McDonald, CISSP

© Copyright 2013 EMC Corporation. All rights reserved.

1
Roadmap Information Disclaimer
 EMC makes no representation and undertakes no obligations with
regard to product planning information, anticipated product
characteristics, performance specifications, or anticipated release
dates (collectively, “Roadmap Information”).
 Roadmap Information is provided by EMC as an accommodation to the
recipient solely for purposes of discussion and without intending to be
bound thereby.
 Roadmap information is EMC Restricted Confidential and is provided
under the terms, conditions and restrictions defined in the EMC NonDisclosure Agreement in place with your organization.

© Copyright 2013 EMC Corporation. All rights reserved.

2
Agenda
 Foundations
 How Virtualization Impacts Your Security
 Securing & Monitoring Virtual Environments
 Summary

© Copyright 2013 EMC Corporation. All rights reserved.

3
Foundations

© Copyright 2013 EMC Corporation. All rights reserved.

4
Foundations
 Attack surface
 High Value Assets
 Types of Security Controls

© Copyright 2013 EMC Corporation. All rights reserved.

5
What is An Attack Surface?
 Originally proposed by the Software Engineering
Institute at Carnegie Mellon University
 The attack surface of a system the set of ways in
which an adversary can enter the ‘system’ and
potentially cause damage
– Intentional or unintentional

 Hence, the larger the attack surface, the more
difficult it is to secure the system
© Copyright 2013 EMC Corporation. All rights reserved.

6
Information is Created and Stored
DMZ
Attack Points:
• OS (multiple)
• Local storage
• Web Server
PII
PHI
PCI
IP

Networ
k

SAN

Internet

Custome
r/Client
/Patient

Database

Web
Server

Application
Server

Database
Server

Storage
Array

Infrastructure

© Copyright 2013 EMC Corporation. All rights reserved.

7
Information is Created and Stored
DMZ
Networ
k

Attack Points:
• OS (multiple)
• Local storage
• Web Server

Internet

Customer/
Client
/Patient

SAN

PII
PHI
PCI
IP

Web
Server

Database

Application
Server

Attack Points:
• OS (multiple)
• Local storage
• App (multiple)

Database
Server

Storage
Array

Infrastructure

© Copyright 2013 EMC Corporation. All rights reserved.

8
Information is Created and Stored
DMZ
Attack Points:
• OS (multiple)
• Local storage
• Web Server

SAN

Networ
k

PII
PHI
PCI
IP

Internet

Customer/
Client
/Patient

Attack Points:
• Switches
• Routers
•Sniffers

Web
Server

Application
Server

Attack Points:
• OS (multiple)
• Local storage
• App (multiple)

Database

Database
Server

Attack Points:
• OS (multiple)
• Local storage
• DB (multiple)

Storage
Array

Infrastructure

© Copyright 2013 EMC Corporation. All rights reserved.

9
Information is Created and Stored
DMZ
Attack Points:
• OS (multiple)
• Local storage
• Web Server

Attack Points:
• Switches
• Routers
•Sniffers

PII
PHI
PCI
IP

Internet

Customer
/Client
/Patient

SAN

Networ
k

Web
Server

Application
Server

Attack Points:
• OS (multiple)
• Local storage
• App (multiple)

Database
Server

Attack Points:
• OS (multiple)
• Local storage
• DB (multiple)

Infrastructure

© Copyright 2013 EMC Corporation. All rights reserved.

Attack Points:
• Switches
• Controllers
• Host Drivers

Database

Storage
Array

Attack Points:
• Mgt Interface
• Copies
• Backups

10
Information is Accessed and Managed
DMZ
Attack Points:
• OS (multiple)
• Local storage
• Web Server

Attack Points:
• Switches
• Routers
•Sniffers

SAN

Networ
k

PII
PHI
Database
PCI
IP

Internet

Customer
/Client
/Patient

Web
Server

Application
Server

Attack Points:
• OS (multiple)
• Local storage
• App (multiple)

Database
Server

Attack Points:
• OS (multiple)
• Local storage
• DB (multiple)

Infrastructure

© Copyright 2013 EMC Corporation. All rights reserved.

Attack Points:
• Switches
• Controllers
• Host Drivers

Storage
Array

Attack Points:
• Mgt Interface
• Copies
• Backups

11
Information is Accessed and Managed
SAN

PII
PHI
Database
PCI
IP

Database
Server

Storage
Array

Infrastructure

© Copyright 2013 EMC Corporation. All rights reserved.

12
Numerous Attack
Points

Information is Accessed and Managed
Partner
s

Customer
Attack Points:
• OS (multiple)
Service • Service App

Attack Points:
• Intercepted email
• Wrong addressee

Emai
l

• Local storage

SAN

Attack Points:
• OS (multiple)
• Backup App
• Snap/Clone

Attack Points:
• OS (multiple)
• Lost/stolen device
• Local storage

PII
PHI
Database
PCI
IP

Client
s

Employees

Customer
s

Suppliers

Portal/
Intranet

Attack Points:
• OS (multiple)
• Web Server
• Network

© Copyright 2013 EMC Corporation. All rights reserved.

Backup
Server

Database
Server

Attack Points:
• Lost/Stolen
• Unauthorized
Access

Copy
Attack Points:

Storag
• Network
Communications
e
Business Mobile Devices Array
Attack Points:
Attack Points:
Attack Points:
• Unauthorized DR
• OS (multiple)
• Device exploit
Applications •Lost/stolen
Access
Infrastructure
• Business App
• Physical Theft Site
device
• Local storage

13
What is an Information Attack Surface?
The Information Attack Surface for a given
type of information equals the combination of
the attack surfaces of all components that
‘touch’ that type of information
• For the entire lifecycle of that information
• Virtualization adds another layer to the attack
surface
© Copyright 2013 EMC Corporation. All rights reserved.

14
What are High-Value Assets?
• An asset that, if compromised, will have a significant
impact on:
–
–
–
–
–

Revenue/Critical Business Processes
Intellectual Property/Trade Secrets
Brand/Image
Legal/Regulatory Compliance
Total Customer Experience

• Assets can be systems (HVSA) or information (HVIA)
© Copyright 2013 EMC Corporation. All rights reserved.

15
Types of Security Controls
• Three types of security controls to consider

– Preventive – Prevent compromise from occurring in the first
place (Firewall, AV, Encryption, etc.)
– Detective – Detects if compromise has or is occurring and
what happened (SIEM, IDS/HDS, forensics, etc.)
– Corrective – Allows environment to be returned to previous
non-compromised state (e.g. AV, backups, DR, etc.)

• Preventive provides the greatest value, but becoming
increasingly difficult (e.g. 0-day vulnerabilities. APTs,
etc.)
© Copyright 2013 EMC Corporation. All rights reserved.

16
How Virtualization
Impacts Security

© Copyright 2013 EMC Corporation. All rights reserved.

17
Virtualization’s Impact
 New threat landscape
 Servers as files
 Server sprawl
 Super Admins
 Multitenancy

© Copyright 2013 EMC Corporation. All rights reserved.

18
New Threat Landscape

© Copyright 2013 EMC Corporation. All rights reserved.

19
Virtualization Threat Modeling
 You need to understand the changes the virtualization
introduces into your threat model

– Sources – Where the attack originates (don’t forget physical
and accidents)
– Objectives – The goals of the attack
– Methods – How the attack is accomplished

 ‘Objectives’ and ‘Methods’ tend to drive an attackers
targets
 Objectives that are focused on compromising sensitive
assets or disrupting your environment can target your
virtualization environment

© Copyright 2013 EMC Corporation. All rights reserved.

20
Threat Modeling Process
Threat Modeling Process
1. Identify Assets (including VMs)

Lead Designer, Business Owner

2. Create an Architecture Overview
3. Decompose the Attack Surface

Designer
Architect
Security Lead

4. Identify the Threats

Brainstorm Session

5. Document the Threats
6. Rate the Threats

© Copyright 2013 EMC Corporation. All rights reserved.

Designer, Development,
Infrastructure, Documentation,
Testers, Security, Project
Management

21
Physical Servers
• Most organizations have good physical security
•

Physical servers are well protected from theft

Data Center

© Copyright 2013 EMC Corporation. All rights reserved.

22
Virtualization Changes Server Security
 Servers are now files, which can easily be
copied/stolen

– Locally or over a network
– Along with the information they contain (.vmdk files)

=
Now

© Copyright 2013 EMC Corporation. All rights reserved.

23
Server Sprawl
 Virtualization makes adding servers easier

– Which inevitably results in more servers
– Which in turn means more copies of sensitive information
and a larger attack surface

=
Now

© Copyright 2013 EMC Corporation. All rights reserved.

24
Super Admins
 Previously, system admins only had
access to servers they were directly
responsible for
– With virtualization environments, VM
admins can access the files
representing the servers in the
domains they manage
– ‘Introspection’ capabilities provide
potential visibility into every VM

© Copyright 2013 EMC Corporation. All rights reserved.

25
Multi-tenancy
 Many virtual environments support
multiple different business
organizations in a single
environment
– Cloud providers

 Each environment may have
different security requirements; all
require segregation from the
others
© Copyright 2013 EMC Corporation. All rights reserved.

26
Securing &
Monitoring Your
Virtual Environment

© Copyright 2013 EMC Corporation. All rights reserved.

27
Securing & Monitoring
 Ensure solid foundations
 Understand the threats
 Protect & control access
 Monitor & respond
 Advanced solutions

© Copyright 2013 EMC Corporation. All rights reserved.

28
Ensure Solid Foundations
 There are a number of processes that need to be
solid before you can effectively secure a virtual (or
any) environment
–
–
–
–

Classification
Change control
Patch management
Configuration management

 Underlying all of these should be a solid
documentation foundation

– You can’t secure what you don’t understand!

© Copyright 2013 EMC Corporation. All rights reserved.

29
General Process Impact
 One of the biggest advantages of virtualization is that it tends to
simplify many processes
– What used to require accessing many physical servers can be easily
accomplished from a single VM management console
– But this can also be a weakness from a security perspective

 A common problem is that this simplification tends to lead to a
more lax approach to these processes
–
–
–
–

Change control
New server creation
Asset management
Patch management

 Which in turn reduces the effectiveness of these process controls

© Copyright 2013 EMC Corporation. All rights reserved.

30
Foundations: Classification
 Classification is the process of defining standard security
‘buckets’ based on broad protection requirements
– Usually 3-4 classification levels

 Example:
–
–
–
–

Restricted Internal
Company Confidential
Company Sensitive
Public

 Every asset should be assigned a classification

– Servers, databases, switches, etc.
– Based on the highest classification of information it ‘touches’

© Copyright 2013 EMC Corporation. All rights reserved.

31
Foundations: Classification (contd.)
 Need to define protection requirements for VMs based on
classification
– Each classification should mandate both general and
technology-specific standards
▪ Examples:
—

All OS instances that process information classified as ‘Company Confidential’ shall themselves
be classified ‘Company Confidential’
»
»

—
—

All attempted, successful and failed login attempts shall be logged and reviewed
All access changes must be reviewed and approved

Windows instances classified as ‘Company Confidential’ shall not run the following services:…
Linux instances classified as ‘Company Confidential’ shall not run the following daemons:…

 The VM environment itself should have a classification
– And associated security configuration standards

© Copyright 2013 EMC Corporation. All rights reserved.

32
Foundations: Change Control
 Automated, comprehensive & integrated change
control for VM environments
– Should cover ALL changes!
– Automated detection of changes (event logs) and
correlation to approved change requests
– Should include changes to the VM environment itself

 Change events should be sent to a SIEM system for
analysis and correlation
– Configuration change events as well as security events

© Copyright 2013 EMC Corporation. All rights reserved.

33
Foundations: Configuration Management
 Unmanaged/uncontrolled changes are one of the most
common sources of security vulnerabilities

– ‘Temporary’ changes to fight some fire that never get undone

 VM environment and VMs should be scanned regularly to
ensure compliance with define configuration standards
 Consider utilizing standards-based automated
configuration definition framework

– Security Configuration Automation Protocol (SCAP)
– XML-based NIST standard (submitted to ISO)

© Copyright 2013 EMC Corporation. All rights reserved.

34
Understand the Threats
 Virtualization adds an entirely new series of attack vectors to
your environment
– Understanding and monitoring potential threats is critical
– Both internal and external threats

 You need to be aware of new threats and be able to rapidly
adjust your security profile to address them
 You need to develop a threat intelligence team that monitors
threat news from multiple sources
– VMWare, McAfee, Symantec, hacker forums, Black Hat, etc.

 Be careful to distinguish between ‘threats’ and ‘vulnerabilities’

© Copyright 2013 EMC Corporation. All rights reserved.

35
Protect & Control Access
 Controlling who has access to what files and who can
perform which functions is critical
– Using tools like Introspection, VM admins become ‘super
admins’
– Can access files and data structures in any running VM

 Don’t forget the basics
–
–
–
–

Strong passwords
Password rotation
Avoid shared accounts
Multi-factor or risk-based authentication for privileged
accounts
– Document an map all accounts to specific users

© Copyright 2013 EMC Corporation. All rights reserved.

36
Protect & Control Access: Roles
 Role-based access control provides the ability to strongly segregate access
– Roles define which components a user can access and what they can (and can’t) do
– Users are assigned roles

 Most VM environments provide default roles

– Custom roles should be created to segregate access and control
– OS instance (VM) admins should be allowed access to only the VMs they’re
responsible for

 Implementing and managing fine-grained role-based access can be
complex, but critical
 VM host admins should be treated as some of the most sensitive accounts
in your environment!
– Strong authentication
– Full monitoring of all activities
– Restricted activities (e.g. web surfing)

© Copyright 2013 EMC Corporation. All rights reserved.

37
Sample Default Roles (VMWare)


No Access: A permanent role that is assigned to new users and groups. Prevents a user or group from viewing or making changes to an object



Read-Only: A permanent role that allows users to check the state of an object or view its details, but not make changes to it



Administrator: A permanent role that enables a user complete access to all of the objects on the server. The root user is assigned this role by default, as are
all of the users who are part of the local Windows Administrators group associated with vCenter Server. At least one user must have administrative
permissions in VMware.



Virtual Machine Administrator: A sample role that allows a user complete and total control of a virtual machine or a host, up to and including removing
that VM or host



Virtual Machine Power User: A sample role that grants a user access rights only to virtual machines; can alter the virtual hardware or create snapshots of
the VM



Virtual Machine User: Grants user access rights exclusively to VMs. The user can power on, power off, and reset the virtual machine, as well as run media
from the virtual discs.



Resource Pool Administrator: Allows the user to create resource pools (RAM and CPU reserved for use) and assign these pools to virtual machines



Datacenter Administrator: Permits a user to add new datacenter objects



VMware Consolidated Backup User: Required to allow VMware Consolidated Backup to run



Datastore Consumer: Allows the user to consume space on a datastore



Network Consumer: Allows the user to assign a network to a virtual machine or a host

© Copyright 2013 EMC Corporation. All rights reserved.

38
Protect & Control Access: Encryption
 Encryption can be thought of as a form of access
control

– Only actors with access to the decryption keys can access
the content

 Doing encryption right can be a challenge

– Need to understand the threats you’re trying to protect
against (use cases)
– One size does not fit all with encryption!
– Numerous potential ‘side effects’ that need to be
considered

© Copyright 2013 EMC Corporation. All rights reserved.

39
The Encryption Stack
• Encrypting at a given
layer tend to protect all
layers below
• High layer encryption
addresses more threat
profiles
• Cost and complexity tend
to go up as you move up
the stack
© Copyright 2013 EMC Corporation. All rights reserved.

40
Encryption: Considerations
 What are the drivers? (threats, regulations, policy, etc.)
 Key and algorithm strength
 Solution acquisition, implementation, management & impact costs
 Performance impact (encrypted data cannot be compressed)
 Protection Domains (where will the data be protected?)
 User Context/Access Control
 Transition
 Key Management (who has access, key rotation, key retention, etc.)
 Secondary Operations (backups, data de-duplication, replication, etc.)
 Government Regulations

© Copyright 2013 EMC Corporation. All rights reserved.

41
Monitor & Respond
 Continuous real-time monitoring of security-related events in a virtual
environment is critical to maintaining security

– Attacks happen fast
– The longer an attacker is active in your environment, the more damage that can be
done

 Monitoring is primarily a detective control, but may prevent further
damage by detecting early
 Need to define and document requirements (based on threat environment)
– What will be monitored?
– What events will be collected?
– What do the events mean?

 Modern complex environments generate huge amounts of event data
– Need to be able to make sense of it all
– Types of events collected should be based on classification

© Copyright 2013 EMC Corporation. All rights reserved.

42
Monitor & Respond: Event Monitoring
 Most obvious collection requirements are security events

– Focus on failures and errors
– For all critical components, not just host instances (e.g. network devices, VM events,
storage, etc.)

 However, management and change events can be just as critical
– Create new VM
– Change access permissions
– Accesses to VM files

 Numerous tools available

– Splunk, RSA Security Analytics, Catbird, etc.

 In a multi-tenancy environment, you may need to provide unique event
log feeds to each tenant
– All events relevant to their components (not just host events)

© Copyright 2013 EMC Corporation. All rights reserved.

43
Monitor & Respond: Responding
 Detecting a security event is meaningless unless it
can be addressed effectively
– Need to have a comprehensive structured incident
response plan

 The team responsible for the virtual environment
must be integrated into the response plan
 The use of VMs can actually simplify the forensic
process
– Easy to make a snapshot of impacted servers

© Copyright 2013 EMC Corporation. All rights reserved.

44
Advanced Solutions: Key Management
 In a multi-tenancy environment, some tenants may
require stronger protection of VMs
– Even if VM admin can’t access host OS, they can still
access the VM files

 Some vendors provide a split-key distributed key
management solution
– Allows each tenant to control a portion of their VM’s
encryption keys
– Afore Solutions is one example

© Copyright 2013 EMC Corporation. All rights reserved.

45
Advanced Solutions: SCIT
 Self-Cleansing Intrusion
Tolerance

– Invented by a team at George
Mason University
– Supports the assertion that you
will never be able to completely
prevent all intrusions, especially in
vulnerable servers (e.g. web
servers, DNS servers, etc.)

 Uses a rotating set of ‘gold
image’ VMs to regularly replace
potentially infected ones

© Copyright 2013 EMC Corporation. All rights reserved.

46
Summary
 Virtualization adds additional attack vectors to what
is already an extremely complex attack surface
 Basic foundational capabilities are critical to
effectively securing a virtual environment
 As with any technology you need to understand the
requirements and threats before you can secure it
 Controlling and protecting access and appropriate
monitoring are critical
© Copyright 2013 EMC Corporation. All rights reserved.

47
Visibility & Security for the Virtualized Enterprise

More Related Content

What's hot

IT Transformation and Puppet
IT Transformation and Puppet IT Transformation and Puppet
IT Transformation and Puppet Puppet
 
Big Data – General Introduction
Big Data – General IntroductionBig Data – General Introduction
Big Data – General IntroductionEMC
 
Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011
Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011
Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011EMC Forum India
 
Akamai 如何幫您的客戶用網站賺錢 how to monetize your site
Akamai 如何幫您的客戶用網站賺錢 how to monetize your siteAkamai 如何幫您的客戶用網站賺錢 how to monetize your site
Akamai 如何幫您的客戶用網站賺錢 how to monetize your site零壹科技股份有限公司
 
OneCommand Vision 2.1 webcast: Cutting edge LUN SLAs, AIX on PowerPC and flex...
OneCommand Vision 2.1 webcast: Cutting edge LUN SLAs, AIX on PowerPC and flex...OneCommand Vision 2.1 webcast: Cutting edge LUN SLAs, AIX on PowerPC and flex...
OneCommand Vision 2.1 webcast: Cutting edge LUN SLAs, AIX on PowerPC and flex...Emulex Corporation
 
The Rise of Big Data and On-Demand IT
The Rise of Big Data and On-Demand ITThe Rise of Big Data and On-Demand IT
The Rise of Big Data and On-Demand ITInnoTech
 
VMworld 2012 - Spotlight Session - EMC Transforms IT - Jeremy Burton
VMworld 2012 - Spotlight Session - EMC Transforms IT - Jeremy BurtonVMworld 2012 - Spotlight Session - EMC Transforms IT - Jeremy Burton
VMworld 2012 - Spotlight Session - EMC Transforms IT - Jeremy BurtonEMCTechMktg
 
Dancing With Clouds
Dancing With CloudsDancing With Clouds
Dancing With Cloudsjnoelatpna
 
Build Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business ApplicationBuild Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business Applicationbgalusha
 
Emc vi pr data services
Emc vi pr data servicesEmc vi pr data services
Emc vi pr data servicessolarisyougood
 
Emc World Evergreen Preso 5 16 07 With Demo Slides
Emc World Evergreen Preso 5 16 07 With Demo SlidesEmc World Evergreen Preso 5 16 07 With Demo Slides
Emc World Evergreen Preso 5 16 07 With Demo SlidesBlueFish
 
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityHow Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityNovell
 
EMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
EMC Forum India 2011, Day 2 - Welcome Note by Manoj ChughEMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
EMC Forum India 2011, Day 2 - Welcome Note by Manoj ChughEMC Forum India
 
Virtualization: where it came from and where it's going
Virtualization: where it came from and where it's goingVirtualization: where it came from and where it's going
Virtualization: where it came from and where it's goingKyle Smith
 
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...Xenesys
 
Cloud Back Up and Disaster Recovery
Cloud Back Up and Disaster RecoveryCloud Back Up and Disaster Recovery
Cloud Back Up and Disaster RecoveryTerell Jones
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...Eucalyptus Systems, Inc.
 

What's hot (20)

IT Transformation and Puppet
IT Transformation and Puppet IT Transformation and Puppet
IT Transformation and Puppet
 
Big Data – General Introduction
Big Data – General IntroductionBig Data – General Introduction
Big Data – General Introduction
 
Unit v
Unit vUnit v
Unit v
 
Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011
Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011
Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011
 
Agathi galani digital_trends_11
Agathi galani digital_trends_11Agathi galani digital_trends_11
Agathi galani digital_trends_11
 
Akamai 如何幫您的客戶用網站賺錢 how to monetize your site
Akamai 如何幫您的客戶用網站賺錢 how to monetize your siteAkamai 如何幫您的客戶用網站賺錢 how to monetize your site
Akamai 如何幫您的客戶用網站賺錢 how to monetize your site
 
OneCommand Vision 2.1 webcast: Cutting edge LUN SLAs, AIX on PowerPC and flex...
OneCommand Vision 2.1 webcast: Cutting edge LUN SLAs, AIX on PowerPC and flex...OneCommand Vision 2.1 webcast: Cutting edge LUN SLAs, AIX on PowerPC and flex...
OneCommand Vision 2.1 webcast: Cutting edge LUN SLAs, AIX on PowerPC and flex...
 
The Rise of Big Data and On-Demand IT
The Rise of Big Data and On-Demand ITThe Rise of Big Data and On-Demand IT
The Rise of Big Data and On-Demand IT
 
VMworld 2012 - Spotlight Session - EMC Transforms IT - Jeremy Burton
VMworld 2012 - Spotlight Session - EMC Transforms IT - Jeremy BurtonVMworld 2012 - Spotlight Session - EMC Transforms IT - Jeremy Burton
VMworld 2012 - Spotlight Session - EMC Transforms IT - Jeremy Burton
 
Dancing With Clouds
Dancing With CloudsDancing With Clouds
Dancing With Clouds
 
Build Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business ApplicationBuild Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business Application
 
Meta soft corporate profile
Meta soft  corporate profileMeta soft  corporate profile
Meta soft corporate profile
 
Emc vi pr data services
Emc vi pr data servicesEmc vi pr data services
Emc vi pr data services
 
Emc World Evergreen Preso 5 16 07 With Demo Slides
Emc World Evergreen Preso 5 16 07 With Demo SlidesEmc World Evergreen Preso 5 16 07 With Demo Slides
Emc World Evergreen Preso 5 16 07 With Demo Slides
 
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityHow Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
 
EMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
EMC Forum India 2011, Day 2 - Welcome Note by Manoj ChughEMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
EMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
 
Virtualization: where it came from and where it's going
Virtualization: where it came from and where it's goingVirtualization: where it came from and where it's going
Virtualization: where it came from and where it's going
 
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
 
Cloud Back Up and Disaster Recovery
Cloud Back Up and Disaster RecoveryCloud Back Up and Disaster Recovery
Cloud Back Up and Disaster Recovery
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
 

Viewers also liked

Pivotal CF on Vblock Systems
Pivotal CF on Vblock  Systems Pivotal CF on Vblock  Systems
Pivotal CF on Vblock Systems EMC
 
Intelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and ResponseIntelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and ResponseEMC
 
EMC Hybrid Cloud Solution with VMware: Hadoop Applications Solution Guide 2.5
EMC Hybrid Cloud Solution with VMware: Hadoop Applications Solution Guide 2.5EMC Hybrid Cloud Solution with VMware: Hadoop Applications Solution Guide 2.5
EMC Hybrid Cloud Solution with VMware: Hadoop Applications Solution Guide 2.5EMC
 
The Global IT Trust Curve survey - Comprehensive Results Presentation
The Global IT Trust Curve survey - Comprehensive Results PresentationThe Global IT Trust Curve survey - Comprehensive Results Presentation
The Global IT Trust Curve survey - Comprehensive Results PresentationEMC
 
Virtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationVirtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationEMC
 
Unemployment rates 2014
Unemployment rates 2014Unemployment rates 2014
Unemployment rates 2014Travis Klein
 
Friday atlas lesson
Friday atlas lessonFriday atlas lesson
Friday atlas lessonTravis Klein
 
Reasoning with rules - Application to N3/EYE and Stardog
Reasoning with rules - Application to N3/EYE and StardogReasoning with rules - Application to N3/EYE and Stardog
Reasoning with rules - Application to N3/EYE and StardogAna Roxin
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enoughEMC
 
конструктор українська мова_таблиці
конструктор українська мова_таблиціконструктор українська мова_таблиці
конструктор українська мова_таблиціТатьяна Глинская
 
産後が起点となる社会問題とマドレボニータの紹介20150613
産後が起点となる社会問題とマドレボニータの紹介20150613産後が起点となる社会問題とマドレボニータの紹介20150613
産後が起点となる社会問題とマドレボニータの紹介20150613Maco Yoshioka
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataEMC
 
201607アドミュージアム「世界を幸せにする広告」企画イベント「スタートアップ for Good」
201607アドミュージアム「世界を幸せにする広告」企画イベント「スタートアップ for Good」201607アドミュージアム「世界を幸せにする広告」企画イベント「スタートアップ for Good」
201607アドミュージアム「世界を幸せにする広告」企画イベント「スタートアップ for Good」Maco Yoshioka
 
Wed demand consumer surplus
Wed demand consumer surplusWed demand consumer surplus
Wed demand consumer surplusTravis Klein
 
1 comprensión de oraciones
1 comprensión de oraciones1 comprensión de oraciones
1 comprensión de oracionesIsabel Abanto
 

Viewers also liked (20)

Pivotal CF on Vblock Systems
Pivotal CF on Vblock  Systems Pivotal CF on Vblock  Systems
Pivotal CF on Vblock Systems
 
City bogota
City bogotaCity bogota
City bogota
 
Intelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and ResponseIntelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and Response
 
EMC Hybrid Cloud Solution with VMware: Hadoop Applications Solution Guide 2.5
EMC Hybrid Cloud Solution with VMware: Hadoop Applications Solution Guide 2.5EMC Hybrid Cloud Solution with VMware: Hadoop Applications Solution Guide 2.5
EMC Hybrid Cloud Solution with VMware: Hadoop Applications Solution Guide 2.5
 
The Global IT Trust Curve survey - Comprehensive Results Presentation
The Global IT Trust Curve survey - Comprehensive Results PresentationThe Global IT Trust Curve survey - Comprehensive Results Presentation
The Global IT Trust Curve survey - Comprehensive Results Presentation
 
Virtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationVirtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of Virtualization
 
Dehesa de los Canonigos - Wines tasting notes
Dehesa de los Canonigos - Wines tasting notesDehesa de los Canonigos - Wines tasting notes
Dehesa de los Canonigos - Wines tasting notes
 
Mon build factory
Mon build factoryMon build factory
Mon build factory
 
Unemployment rates 2014
Unemployment rates 2014Unemployment rates 2014
Unemployment rates 2014
 
Hyperinflation
HyperinflationHyperinflation
Hyperinflation
 
Friday atlas lesson
Friday atlas lessonFriday atlas lesson
Friday atlas lesson
 
Reasoning with rules - Application to N3/EYE and Stardog
Reasoning with rules - Application to N3/EYE and StardogReasoning with rules - Application to N3/EYE and Stardog
Reasoning with rules - Application to N3/EYE and Stardog
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
конструктор українська мова_таблиці
конструктор українська мова_таблиціконструктор українська мова_таблиці
конструктор українська мова_таблиці
 
Formulario sucursales
Formulario sucursalesFormulario sucursales
Formulario sucursales
 
産後が起点となる社会問題とマドレボニータの紹介20150613
産後が起点となる社会問題とマドレボニータの紹介20150613産後が起点となる社会問題とマドレボニータの紹介20150613
産後が起点となる社会問題とマドレボニータの紹介20150613
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud Data
 
201607アドミュージアム「世界を幸せにする広告」企画イベント「スタートアップ for Good」
201607アドミュージアム「世界を幸せにする広告」企画イベント「スタートアップ for Good」201607アドミュージアム「世界を幸せにする広告」企画イベント「スタートアップ for Good」
201607アドミュージアム「世界を幸せにする広告」企画イベント「スタートアップ for Good」
 
Wed demand consumer surplus
Wed demand consumer surplusWed demand consumer surplus
Wed demand consumer surplus
 
1 comprensión de oraciones
1 comprensión de oraciones1 comprensión de oraciones
1 comprensión de oraciones
 

Similar to Visibility & Security for the Virtualized Enterprise

Securing Java in the Server Room
Securing Java in the Server RoomSecuring Java in the Server Room
Securing Java in the Server RoomTim Ellison
 
JavaOne2013: Securing Java in the Server Room - Tim Ellison
JavaOne2013: Securing Java in the Server Room - Tim EllisonJavaOne2013: Securing Java in the Server Room - Tim Ellison
JavaOne2013: Securing Java in the Server Room - Tim EllisonChris Bailey
 
Layer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdfLayer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdfdistortdistort
 
Security in the Real World - JavaOne 2013
Security in the Real World - JavaOne 2013Security in the Real World - JavaOne 2013
Security in the Real World - JavaOne 2013MattKilner
 
Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?EMC
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityIBM Security
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microTheInevitableCloud
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardEMC
 
Virtualize Application Security Today - Hardware is No Longer Needed.pptx
 Virtualize Application Security Today - Hardware is No Longer Needed.pptx Virtualize Application Security Today - Hardware is No Longer Needed.pptx
Virtualize Application Security Today - Hardware is No Longer Needed.pptxAvi Networks
 
Sl virtual apps-131106
Sl virtual apps-131106Sl virtual apps-131106
Sl virtual apps-131106SL Corporation
 
Introduction to Cloud Security.pptx
Introduction to Cloud Security.pptxIntroduction to Cloud Security.pptx
Introduction to Cloud Security.pptxssuser0fc2211
 
Emc vi pr global data services
Emc vi pr global data servicesEmc vi pr global data services
Emc vi pr global data servicessolarisyougood
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security PresentationAjay p
 

Similar to Visibility & Security for the Virtualized Enterprise (20)

Securing Java in the Server Room
Securing Java in the Server RoomSecuring Java in the Server Room
Securing Java in the Server Room
 
JavaOne2013: Securing Java in the Server Room - Tim Ellison
JavaOne2013: Securing Java in the Server Room - Tim EllisonJavaOne2013: Securing Java in the Server Room - Tim Ellison
JavaOne2013: Securing Java in the Server Room - Tim Ellison
 
Cloud security
Cloud securityCloud security
Cloud security
 
Layer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdfLayer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdf
 
Security in the Real World - JavaOne 2013
Security in the Real World - JavaOne 2013Security in the Real World - JavaOne 2013
Security in the Real World - JavaOne 2013
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Virtualize Application Security Today - Hardware is No Longer Needed.pptx
 Virtualize Application Security Today - Hardware is No Longer Needed.pptx Virtualize Application Security Today - Hardware is No Longer Needed.pptx
Virtualize Application Security Today - Hardware is No Longer Needed.pptx
 
Sl virtual apps-131106
Sl virtual apps-131106Sl virtual apps-131106
Sl virtual apps-131106
 
Introduction to Cloud Security.pptx
Introduction to Cloud Security.pptxIntroduction to Cloud Security.pptx
Introduction to Cloud Security.pptx
 
Emc vi pr global data services
Emc vi pr global data servicesEmc vi pr global data services
Emc vi pr global data services
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 

More from EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 

More from EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Recently uploaded

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Recently uploaded (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Visibility & Security for the Virtualized Enterprise

  • 1. Visibility & Security for the Virtualized Enterprise John McDonald, CISSP © Copyright 2013 EMC Corporation. All rights reserved. 1
  • 2. Roadmap Information Disclaimer  EMC makes no representation and undertakes no obligations with regard to product planning information, anticipated product characteristics, performance specifications, or anticipated release dates (collectively, “Roadmap Information”).  Roadmap Information is provided by EMC as an accommodation to the recipient solely for purposes of discussion and without intending to be bound thereby.  Roadmap information is EMC Restricted Confidential and is provided under the terms, conditions and restrictions defined in the EMC NonDisclosure Agreement in place with your organization. © Copyright 2013 EMC Corporation. All rights reserved. 2
  • 3. Agenda  Foundations  How Virtualization Impacts Your Security  Securing & Monitoring Virtual Environments  Summary © Copyright 2013 EMC Corporation. All rights reserved. 3
  • 4. Foundations © Copyright 2013 EMC Corporation. All rights reserved. 4
  • 5. Foundations  Attack surface  High Value Assets  Types of Security Controls © Copyright 2013 EMC Corporation. All rights reserved. 5
  • 6. What is An Attack Surface?  Originally proposed by the Software Engineering Institute at Carnegie Mellon University  The attack surface of a system the set of ways in which an adversary can enter the ‘system’ and potentially cause damage – Intentional or unintentional  Hence, the larger the attack surface, the more difficult it is to secure the system © Copyright 2013 EMC Corporation. All rights reserved. 6
  • 7. Information is Created and Stored DMZ Attack Points: • OS (multiple) • Local storage • Web Server PII PHI PCI IP Networ k SAN Internet Custome r/Client /Patient Database Web Server Application Server Database Server Storage Array Infrastructure © Copyright 2013 EMC Corporation. All rights reserved. 7
  • 8. Information is Created and Stored DMZ Networ k Attack Points: • OS (multiple) • Local storage • Web Server Internet Customer/ Client /Patient SAN PII PHI PCI IP Web Server Database Application Server Attack Points: • OS (multiple) • Local storage • App (multiple) Database Server Storage Array Infrastructure © Copyright 2013 EMC Corporation. All rights reserved. 8
  • 9. Information is Created and Stored DMZ Attack Points: • OS (multiple) • Local storage • Web Server SAN Networ k PII PHI PCI IP Internet Customer/ Client /Patient Attack Points: • Switches • Routers •Sniffers Web Server Application Server Attack Points: • OS (multiple) • Local storage • App (multiple) Database Database Server Attack Points: • OS (multiple) • Local storage • DB (multiple) Storage Array Infrastructure © Copyright 2013 EMC Corporation. All rights reserved. 9
  • 10. Information is Created and Stored DMZ Attack Points: • OS (multiple) • Local storage • Web Server Attack Points: • Switches • Routers •Sniffers PII PHI PCI IP Internet Customer /Client /Patient SAN Networ k Web Server Application Server Attack Points: • OS (multiple) • Local storage • App (multiple) Database Server Attack Points: • OS (multiple) • Local storage • DB (multiple) Infrastructure © Copyright 2013 EMC Corporation. All rights reserved. Attack Points: • Switches • Controllers • Host Drivers Database Storage Array Attack Points: • Mgt Interface • Copies • Backups 10
  • 11. Information is Accessed and Managed DMZ Attack Points: • OS (multiple) • Local storage • Web Server Attack Points: • Switches • Routers •Sniffers SAN Networ k PII PHI Database PCI IP Internet Customer /Client /Patient Web Server Application Server Attack Points: • OS (multiple) • Local storage • App (multiple) Database Server Attack Points: • OS (multiple) • Local storage • DB (multiple) Infrastructure © Copyright 2013 EMC Corporation. All rights reserved. Attack Points: • Switches • Controllers • Host Drivers Storage Array Attack Points: • Mgt Interface • Copies • Backups 11
  • 12. Information is Accessed and Managed SAN PII PHI Database PCI IP Database Server Storage Array Infrastructure © Copyright 2013 EMC Corporation. All rights reserved. 12
  • 13. Numerous Attack Points Information is Accessed and Managed Partner s Customer Attack Points: • OS (multiple) Service • Service App Attack Points: • Intercepted email • Wrong addressee Emai l • Local storage SAN Attack Points: • OS (multiple) • Backup App • Snap/Clone Attack Points: • OS (multiple) • Lost/stolen device • Local storage PII PHI Database PCI IP Client s Employees Customer s Suppliers Portal/ Intranet Attack Points: • OS (multiple) • Web Server • Network © Copyright 2013 EMC Corporation. All rights reserved. Backup Server Database Server Attack Points: • Lost/Stolen • Unauthorized Access Copy Attack Points: Storag • Network Communications e Business Mobile Devices Array Attack Points: Attack Points: Attack Points: • Unauthorized DR • OS (multiple) • Device exploit Applications •Lost/stolen Access Infrastructure • Business App • Physical Theft Site device • Local storage 13
  • 14. What is an Information Attack Surface? The Information Attack Surface for a given type of information equals the combination of the attack surfaces of all components that ‘touch’ that type of information • For the entire lifecycle of that information • Virtualization adds another layer to the attack surface © Copyright 2013 EMC Corporation. All rights reserved. 14
  • 15. What are High-Value Assets? • An asset that, if compromised, will have a significant impact on: – – – – – Revenue/Critical Business Processes Intellectual Property/Trade Secrets Brand/Image Legal/Regulatory Compliance Total Customer Experience • Assets can be systems (HVSA) or information (HVIA) © Copyright 2013 EMC Corporation. All rights reserved. 15
  • 16. Types of Security Controls • Three types of security controls to consider – Preventive – Prevent compromise from occurring in the first place (Firewall, AV, Encryption, etc.) – Detective – Detects if compromise has or is occurring and what happened (SIEM, IDS/HDS, forensics, etc.) – Corrective – Allows environment to be returned to previous non-compromised state (e.g. AV, backups, DR, etc.) • Preventive provides the greatest value, but becoming increasingly difficult (e.g. 0-day vulnerabilities. APTs, etc.) © Copyright 2013 EMC Corporation. All rights reserved. 16
  • 17. How Virtualization Impacts Security © Copyright 2013 EMC Corporation. All rights reserved. 17
  • 18. Virtualization’s Impact  New threat landscape  Servers as files  Server sprawl  Super Admins  Multitenancy © Copyright 2013 EMC Corporation. All rights reserved. 18
  • 19. New Threat Landscape © Copyright 2013 EMC Corporation. All rights reserved. 19
  • 20. Virtualization Threat Modeling  You need to understand the changes the virtualization introduces into your threat model – Sources – Where the attack originates (don’t forget physical and accidents) – Objectives – The goals of the attack – Methods – How the attack is accomplished  ‘Objectives’ and ‘Methods’ tend to drive an attackers targets  Objectives that are focused on compromising sensitive assets or disrupting your environment can target your virtualization environment © Copyright 2013 EMC Corporation. All rights reserved. 20
  • 21. Threat Modeling Process Threat Modeling Process 1. Identify Assets (including VMs) Lead Designer, Business Owner 2. Create an Architecture Overview 3. Decompose the Attack Surface Designer Architect Security Lead 4. Identify the Threats Brainstorm Session 5. Document the Threats 6. Rate the Threats © Copyright 2013 EMC Corporation. All rights reserved. Designer, Development, Infrastructure, Documentation, Testers, Security, Project Management 21
  • 22. Physical Servers • Most organizations have good physical security • Physical servers are well protected from theft Data Center © Copyright 2013 EMC Corporation. All rights reserved. 22
  • 23. Virtualization Changes Server Security  Servers are now files, which can easily be copied/stolen – Locally or over a network – Along with the information they contain (.vmdk files) = Now © Copyright 2013 EMC Corporation. All rights reserved. 23
  • 24. Server Sprawl  Virtualization makes adding servers easier – Which inevitably results in more servers – Which in turn means more copies of sensitive information and a larger attack surface = Now © Copyright 2013 EMC Corporation. All rights reserved. 24
  • 25. Super Admins  Previously, system admins only had access to servers they were directly responsible for – With virtualization environments, VM admins can access the files representing the servers in the domains they manage – ‘Introspection’ capabilities provide potential visibility into every VM © Copyright 2013 EMC Corporation. All rights reserved. 25
  • 26. Multi-tenancy  Many virtual environments support multiple different business organizations in a single environment – Cloud providers  Each environment may have different security requirements; all require segregation from the others © Copyright 2013 EMC Corporation. All rights reserved. 26
  • 27. Securing & Monitoring Your Virtual Environment © Copyright 2013 EMC Corporation. All rights reserved. 27
  • 28. Securing & Monitoring  Ensure solid foundations  Understand the threats  Protect & control access  Monitor & respond  Advanced solutions © Copyright 2013 EMC Corporation. All rights reserved. 28
  • 29. Ensure Solid Foundations  There are a number of processes that need to be solid before you can effectively secure a virtual (or any) environment – – – – Classification Change control Patch management Configuration management  Underlying all of these should be a solid documentation foundation – You can’t secure what you don’t understand! © Copyright 2013 EMC Corporation. All rights reserved. 29
  • 30. General Process Impact  One of the biggest advantages of virtualization is that it tends to simplify many processes – What used to require accessing many physical servers can be easily accomplished from a single VM management console – But this can also be a weakness from a security perspective  A common problem is that this simplification tends to lead to a more lax approach to these processes – – – – Change control New server creation Asset management Patch management  Which in turn reduces the effectiveness of these process controls © Copyright 2013 EMC Corporation. All rights reserved. 30
  • 31. Foundations: Classification  Classification is the process of defining standard security ‘buckets’ based on broad protection requirements – Usually 3-4 classification levels  Example: – – – – Restricted Internal Company Confidential Company Sensitive Public  Every asset should be assigned a classification – Servers, databases, switches, etc. – Based on the highest classification of information it ‘touches’ © Copyright 2013 EMC Corporation. All rights reserved. 31
  • 32. Foundations: Classification (contd.)  Need to define protection requirements for VMs based on classification – Each classification should mandate both general and technology-specific standards ▪ Examples: — All OS instances that process information classified as ‘Company Confidential’ shall themselves be classified ‘Company Confidential’ » » — — All attempted, successful and failed login attempts shall be logged and reviewed All access changes must be reviewed and approved Windows instances classified as ‘Company Confidential’ shall not run the following services:… Linux instances classified as ‘Company Confidential’ shall not run the following daemons:…  The VM environment itself should have a classification – And associated security configuration standards © Copyright 2013 EMC Corporation. All rights reserved. 32
  • 33. Foundations: Change Control  Automated, comprehensive & integrated change control for VM environments – Should cover ALL changes! – Automated detection of changes (event logs) and correlation to approved change requests – Should include changes to the VM environment itself  Change events should be sent to a SIEM system for analysis and correlation – Configuration change events as well as security events © Copyright 2013 EMC Corporation. All rights reserved. 33
  • 34. Foundations: Configuration Management  Unmanaged/uncontrolled changes are one of the most common sources of security vulnerabilities – ‘Temporary’ changes to fight some fire that never get undone  VM environment and VMs should be scanned regularly to ensure compliance with define configuration standards  Consider utilizing standards-based automated configuration definition framework – Security Configuration Automation Protocol (SCAP) – XML-based NIST standard (submitted to ISO) © Copyright 2013 EMC Corporation. All rights reserved. 34
  • 35. Understand the Threats  Virtualization adds an entirely new series of attack vectors to your environment – Understanding and monitoring potential threats is critical – Both internal and external threats  You need to be aware of new threats and be able to rapidly adjust your security profile to address them  You need to develop a threat intelligence team that monitors threat news from multiple sources – VMWare, McAfee, Symantec, hacker forums, Black Hat, etc.  Be careful to distinguish between ‘threats’ and ‘vulnerabilities’ © Copyright 2013 EMC Corporation. All rights reserved. 35
  • 36. Protect & Control Access  Controlling who has access to what files and who can perform which functions is critical – Using tools like Introspection, VM admins become ‘super admins’ – Can access files and data structures in any running VM  Don’t forget the basics – – – – Strong passwords Password rotation Avoid shared accounts Multi-factor or risk-based authentication for privileged accounts – Document an map all accounts to specific users © Copyright 2013 EMC Corporation. All rights reserved. 36
  • 37. Protect & Control Access: Roles  Role-based access control provides the ability to strongly segregate access – Roles define which components a user can access and what they can (and can’t) do – Users are assigned roles  Most VM environments provide default roles – Custom roles should be created to segregate access and control – OS instance (VM) admins should be allowed access to only the VMs they’re responsible for  Implementing and managing fine-grained role-based access can be complex, but critical  VM host admins should be treated as some of the most sensitive accounts in your environment! – Strong authentication – Full monitoring of all activities – Restricted activities (e.g. web surfing) © Copyright 2013 EMC Corporation. All rights reserved. 37
  • 38. Sample Default Roles (VMWare)  No Access: A permanent role that is assigned to new users and groups. Prevents a user or group from viewing or making changes to an object  Read-Only: A permanent role that allows users to check the state of an object or view its details, but not make changes to it  Administrator: A permanent role that enables a user complete access to all of the objects on the server. The root user is assigned this role by default, as are all of the users who are part of the local Windows Administrators group associated with vCenter Server. At least one user must have administrative permissions in VMware.  Virtual Machine Administrator: A sample role that allows a user complete and total control of a virtual machine or a host, up to and including removing that VM or host  Virtual Machine Power User: A sample role that grants a user access rights only to virtual machines; can alter the virtual hardware or create snapshots of the VM  Virtual Machine User: Grants user access rights exclusively to VMs. The user can power on, power off, and reset the virtual machine, as well as run media from the virtual discs.  Resource Pool Administrator: Allows the user to create resource pools (RAM and CPU reserved for use) and assign these pools to virtual machines  Datacenter Administrator: Permits a user to add new datacenter objects  VMware Consolidated Backup User: Required to allow VMware Consolidated Backup to run  Datastore Consumer: Allows the user to consume space on a datastore  Network Consumer: Allows the user to assign a network to a virtual machine or a host © Copyright 2013 EMC Corporation. All rights reserved. 38
  • 39. Protect & Control Access: Encryption  Encryption can be thought of as a form of access control – Only actors with access to the decryption keys can access the content  Doing encryption right can be a challenge – Need to understand the threats you’re trying to protect against (use cases) – One size does not fit all with encryption! – Numerous potential ‘side effects’ that need to be considered © Copyright 2013 EMC Corporation. All rights reserved. 39
  • 40. The Encryption Stack • Encrypting at a given layer tend to protect all layers below • High layer encryption addresses more threat profiles • Cost and complexity tend to go up as you move up the stack © Copyright 2013 EMC Corporation. All rights reserved. 40
  • 41. Encryption: Considerations  What are the drivers? (threats, regulations, policy, etc.)  Key and algorithm strength  Solution acquisition, implementation, management & impact costs  Performance impact (encrypted data cannot be compressed)  Protection Domains (where will the data be protected?)  User Context/Access Control  Transition  Key Management (who has access, key rotation, key retention, etc.)  Secondary Operations (backups, data de-duplication, replication, etc.)  Government Regulations © Copyright 2013 EMC Corporation. All rights reserved. 41
  • 42. Monitor & Respond  Continuous real-time monitoring of security-related events in a virtual environment is critical to maintaining security – Attacks happen fast – The longer an attacker is active in your environment, the more damage that can be done  Monitoring is primarily a detective control, but may prevent further damage by detecting early  Need to define and document requirements (based on threat environment) – What will be monitored? – What events will be collected? – What do the events mean?  Modern complex environments generate huge amounts of event data – Need to be able to make sense of it all – Types of events collected should be based on classification © Copyright 2013 EMC Corporation. All rights reserved. 42
  • 43. Monitor & Respond: Event Monitoring  Most obvious collection requirements are security events – Focus on failures and errors – For all critical components, not just host instances (e.g. network devices, VM events, storage, etc.)  However, management and change events can be just as critical – Create new VM – Change access permissions – Accesses to VM files  Numerous tools available – Splunk, RSA Security Analytics, Catbird, etc.  In a multi-tenancy environment, you may need to provide unique event log feeds to each tenant – All events relevant to their components (not just host events) © Copyright 2013 EMC Corporation. All rights reserved. 43
  • 44. Monitor & Respond: Responding  Detecting a security event is meaningless unless it can be addressed effectively – Need to have a comprehensive structured incident response plan  The team responsible for the virtual environment must be integrated into the response plan  The use of VMs can actually simplify the forensic process – Easy to make a snapshot of impacted servers © Copyright 2013 EMC Corporation. All rights reserved. 44
  • 45. Advanced Solutions: Key Management  In a multi-tenancy environment, some tenants may require stronger protection of VMs – Even if VM admin can’t access host OS, they can still access the VM files  Some vendors provide a split-key distributed key management solution – Allows each tenant to control a portion of their VM’s encryption keys – Afore Solutions is one example © Copyright 2013 EMC Corporation. All rights reserved. 45
  • 46. Advanced Solutions: SCIT  Self-Cleansing Intrusion Tolerance – Invented by a team at George Mason University – Supports the assertion that you will never be able to completely prevent all intrusions, especially in vulnerable servers (e.g. web servers, DNS servers, etc.)  Uses a rotating set of ‘gold image’ VMs to regularly replace potentially infected ones © Copyright 2013 EMC Corporation. All rights reserved. 46
  • 47. Summary  Virtualization adds additional attack vectors to what is already an extremely complex attack surface  Basic foundational capabilities are critical to effectively securing a virtual environment  As with any technology you need to understand the requirements and threats before you can secure it  Controlling and protecting access and appropriate monitoring are critical © Copyright 2013 EMC Corporation. All rights reserved. 47