SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Immutability for PCF: Security in a Cloud
Native World
By Tom Gillis
Bracket Computing
Bracket Security Software
GHOST
DIRTY COW
STACK CLASH
MALWARE
KBEAST
LATERAL SPREAD
If even .01% gets in, it will
burrow and persist…
3
GHOST
DIRTY COW
STACK CLASH
MALWARE
KBEAST
LATERAL SPREAD
APP
OS
Embedded in
the OS where
security can
be fooled
4
If even .01% gets in, it will
burrow and persist…
GHOST
DIRTY COW
STACK CLASH
MALWARE
KBEAST
LATERAL SPREAD
5
GHOST
DIRTY COW
STACK CLASH
MALWARE
KBEAST
LATERAL SPREAD
Equifax, Sony, DNC have one thing in
common… PERSISTENCE.
6
SERVERSERVER
7
Attack Process
APP
OS
APP
OS
SERVERSERVER
8
Attack Process
APP
OS
APP
OS
SERVERSERVER
9
Attack Process
APP
OS
APP
OS
The OS Cannot Protect Itself…
CSP OR ON PREM HYPERVISOR
10
…So Move the Security Outside.
CSP OR ON PREM HYPERVISOR
METAVISOR Security Layer
11
METAVISOR
CSP OR ON PREM HYPERVISOR
Server
Guard
Network
Guard
Data
Guard
Optimized for…
12
13
Consistent Controls with Separation of Duties
 Single set of controls across
hybrid cloud environments
 Seamless experience for
users, granular controls for
IT security
Security
SERVER
2551
METAVISOR
Kernel
NETWORKPREOCESS TABLES
SHELL SHELL
APACHE
SYSCALL TABLES
Root
Processes
User
Processes
Net
Ports
44380
SHELL
SHELLSEC AGENT
FILE SYSTEM
X
14
Server Guard for Stem and Diego Cells
SERVER
2551
METAVISOR
Kernel
NETWORKPREOCESS TABLES
SHELL SHELL
APACHE
SYSCALL TABLES
Root
Processes
User
Processes
Net
Ports
44380
SHELL
80
SHELLSEC AGENT
FILE SYSTEM
APACHE
X
FILE SYSTEM
15
Server Guard for Stem and Diego Cells
SERVER
2551
METAVISOR
Kernel
NETWORKPREOCESS TABLES
SHELL SHELL
APACHE
SYSCALL TABLES
Root
Processes
User
Processes
Net
Ports
44380
SHELL
80
SHELLSEC AGENT
FILE SYSTEM
APACHE
X
FILE SYSTEM
16
Server Guard for Stem and Diego Cells
51
Server Guard for Stem and Diego Cells
2551
METAVISOR
Kernel
NETWORKPREOCESS TABLES
SHELL SHELL
SERVER
APACHE
SYSCALL TABLES
Root
Processes
User
Processes
Net
Ports
44380
SHELL
80
SHELLSEC AGENT
FILE SYSTEM
APACHE
X
FILE SYSTEM
51
17
18
Network Guard Dynamic Policies
Web Tier
App Tier
Data Tier
Dev Policy Can Be:
 Allow any:any network flows
 Server Guard in logging
mode
 No Data Encryption
BlockS3
METAVISOR METAVISOR
METAVISOR
“env”=“dev”
METAVISOR
19
Network Guard Dynamic Policies
Web Tier
App Tier
Data Tier
Prod Policy Can Be:
 Block unused ports
 Server Guard in enforcement
mode
 Quarantine suspect
workloads
 Admin changes only via
Metavisor API
BlockS3
METAVISOR METAVISOR
METAVISOR
“env”=“dev”
METAVISOR
BlockS3
METAVISOR METAVISOR
METAVISOR
“env”=“prod”
METAVISOR
20
Data Guard
Web Tier
App Tier
Data Tier
 Backed by HSM
 On-prem or hosted key
management
 Enable separation of duties
 Prevent S3 leaks
BlockS3RootEphemeral
HSM
ON
PREM
METAVISOR METAVISOR METAVISOR
METAVISOR METAVISOR
21
Data Guard–Data Protection and Policy
 Enforce data residency
 Comply with GDRS
 Policy follows data volumes
BlockS3
METAVISOR
Data access
request
22
Data Guard–Data Protection and Policy
 Enforce data residency
 Comply with GDRS
 Policy follows data volumes
BlockS3
METAVISOR
”region”=“us-west”
“class”=“red”
“env”=“dev”
Policy VerificationPolicy Match
23
Data Guard–Data Protection and Policy
 Enforce data residency
 Comply with GDRS
 Policy follows data volumes
BlockS3
METAVISOR
Key released,
data decrypted
24
Multi-cloud Security with Pivotal Cloud Foundry
APPLICATION APPLICATION
OS
BRACKET METAVISOR
Server Guard Data Guard Network Guard
APPLICATION APPLICATION
OS
APPLICATION APPLICATION
OS
APPLICATION APPLICATION
OS
ON-PREM PHYSICAL INFRASTRUCTURE AWS PHYSICAL INFRASTRUCTURE GOOGLE PHYSICAL INFRASTRUCTURE
ON-PREM HYPERVISOR AWS HYPERVISOR GOOGLE HYPERVISOR AZURE HYPERVISOR
AZURE PHYSICAL INFRASTRUCTURE
BRACKET METAVISOR
Server Guard Data Guard Network Guard
BRACKET METAVISOR
Server Guard Data Guard Network Guard
BRACKET METAVISOR
Server Guard Data Guard Network Guard
Visibility
 Tagging allows for easy
visualization of complex
data centers
 See actual flow data,
allowed by policy and
blocked flows
 Interactive display -
clickable, searchable
Visibility
 Tagging allows for easy
visualization of complex
data centers
 See actual flow data,
allowed by policy and
blocked flows
 Interactive display -
clickable, searchable
Visibility
 Tagging allows for easy
visualization of complex
data centers
 See actual flow data,
allowed by policy and
blocked flows
 Interactive display -
clickable, searchable
28
Compliance Reporting and Forensics
 Full high-resolution
audit logs
 Event-driven memory
captures
 Real-time network
29
Bracket PCF Security
SHARED FOUNDATION
“PCI” Segment
BRACKET METAVISOR
Diego Cell
Container
“Non PCI” Segment
BRACKET METAVISOR
Diego Cell
Container
“Management” Segment
BRACKET METAVISOR
PCF Router
BRACKET METAVISOR
Ops Manager
Bracket
MCP
Ops Manager
Image +
Bracket Is…
 Immutable Security
- Can’t be turned off even
with root access
- Transparent to dev
and ops teams
- Aligned with PCF cloud
native ops
 Unique Security
- Protects the OS when the
OS can’t protect itself
- Tag based segmentation
and encryption built to
auto-scale
- Transparent crypto for PCF
 Multi-cloud Security
- One set of server, network
and data controls on every
major cloud
- Central policy administration
for separation of security
duties
- Goes where PCF goes
31

Weitere ähnliche Inhalte

Mehr von VMware Tanzu

Simplify and Scale Enterprise Apps in the Cloud | Boston 2023
Simplify and Scale Enterprise Apps in the Cloud | Boston 2023Simplify and Scale Enterprise Apps in the Cloud | Boston 2023
Simplify and Scale Enterprise Apps in the Cloud | Boston 2023VMware Tanzu
 
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023VMware Tanzu
 
tanzu_developer_connect.pptx
tanzu_developer_connect.pptxtanzu_developer_connect.pptx
tanzu_developer_connect.pptxVMware Tanzu
 
Tanzu Virtual Developer Connect Workshop - French
Tanzu Virtual Developer Connect Workshop - FrenchTanzu Virtual Developer Connect Workshop - French
Tanzu Virtual Developer Connect Workshop - FrenchVMware Tanzu
 
Tanzu Developer Connect Workshop - English
Tanzu Developer Connect Workshop - EnglishTanzu Developer Connect Workshop - English
Tanzu Developer Connect Workshop - EnglishVMware Tanzu
 
Virtual Developer Connect Workshop - English
Virtual Developer Connect Workshop - EnglishVirtual Developer Connect Workshop - English
Virtual Developer Connect Workshop - EnglishVMware Tanzu
 
Tanzu Developer Connect - French
Tanzu Developer Connect - FrenchTanzu Developer Connect - French
Tanzu Developer Connect - FrenchVMware Tanzu
 
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023VMware Tanzu
 
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring Boot
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring BootSpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring Boot
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring BootVMware Tanzu
 
SpringOne Tour: The Influential Software Engineer
SpringOne Tour: The Influential Software EngineerSpringOne Tour: The Influential Software Engineer
SpringOne Tour: The Influential Software EngineerVMware Tanzu
 
SpringOne Tour: Domain-Driven Design: Theory vs Practice
SpringOne Tour: Domain-Driven Design: Theory vs PracticeSpringOne Tour: Domain-Driven Design: Theory vs Practice
SpringOne Tour: Domain-Driven Design: Theory vs PracticeVMware Tanzu
 
SpringOne Tour: Spring Recipes: A Collection of Common-Sense Solutions
SpringOne Tour: Spring Recipes: A Collection of Common-Sense SolutionsSpringOne Tour: Spring Recipes: A Collection of Common-Sense Solutions
SpringOne Tour: Spring Recipes: A Collection of Common-Sense SolutionsVMware Tanzu
 
SpringOne Tour: Doing Progressive Delivery with your Team
SpringOne Tour: Doing Progressive Delivery with your TeamSpringOne Tour: Doing Progressive Delivery with your Team
SpringOne Tour: Doing Progressive Delivery with your TeamVMware Tanzu
 
SpringOne Tour: Make the Right Thing the Obvious Thing: The Journey to Intern...
SpringOne Tour: Make the Right Thing the Obvious Thing: The Journey to Intern...SpringOne Tour: Make the Right Thing the Obvious Thing: The Journey to Intern...
SpringOne Tour: Make the Right Thing the Obvious Thing: The Journey to Intern...VMware Tanzu
 
SpringOne Tour: An Introduction to Azure Spring Apps Enterprise
SpringOne Tour: An Introduction to Azure Spring Apps EnterpriseSpringOne Tour: An Introduction to Azure Spring Apps Enterprise
SpringOne Tour: An Introduction to Azure Spring Apps EnterpriseVMware Tanzu
 
SpringOne Tour: 10 Practical Tips for Building Native and Serverless Spring A...
SpringOne Tour: 10 Practical Tips for Building Native and Serverless Spring A...SpringOne Tour: 10 Practical Tips for Building Native and Serverless Spring A...
SpringOne Tour: 10 Practical Tips for Building Native and Serverless Spring A...VMware Tanzu
 
SpringOne Tour: Spring Boot 3 and Beyond
SpringOne Tour: Spring Boot 3 and BeyondSpringOne Tour: Spring Boot 3 and Beyond
SpringOne Tour: Spring Boot 3 and BeyondVMware Tanzu
 
SpringOne Tour 2023: Let's Get Streaming! A Guide to Orchestrating Spring Clo...
SpringOne Tour 2023: Let's Get Streaming! A Guide to Orchestrating Spring Clo...SpringOne Tour 2023: Let's Get Streaming! A Guide to Orchestrating Spring Clo...
SpringOne Tour 2023: Let's Get Streaming! A Guide to Orchestrating Spring Clo...VMware Tanzu
 
Tanzu Developer Connect | Public Sector | March 29, 2023.pdf
Tanzu Developer Connect | Public Sector | March 29, 2023.pdfTanzu Developer Connect | Public Sector | March 29, 2023.pdf
Tanzu Developer Connect | Public Sector | March 29, 2023.pdfVMware Tanzu
 
Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023
Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023
Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023VMware Tanzu
 

Mehr von VMware Tanzu (20)

Simplify and Scale Enterprise Apps in the Cloud | Boston 2023
Simplify and Scale Enterprise Apps in the Cloud | Boston 2023Simplify and Scale Enterprise Apps in the Cloud | Boston 2023
Simplify and Scale Enterprise Apps in the Cloud | Boston 2023
 
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023
 
tanzu_developer_connect.pptx
tanzu_developer_connect.pptxtanzu_developer_connect.pptx
tanzu_developer_connect.pptx
 
Tanzu Virtual Developer Connect Workshop - French
Tanzu Virtual Developer Connect Workshop - FrenchTanzu Virtual Developer Connect Workshop - French
Tanzu Virtual Developer Connect Workshop - French
 
Tanzu Developer Connect Workshop - English
Tanzu Developer Connect Workshop - EnglishTanzu Developer Connect Workshop - English
Tanzu Developer Connect Workshop - English
 
Virtual Developer Connect Workshop - English
Virtual Developer Connect Workshop - EnglishVirtual Developer Connect Workshop - English
Virtual Developer Connect Workshop - English
 
Tanzu Developer Connect - French
Tanzu Developer Connect - FrenchTanzu Developer Connect - French
Tanzu Developer Connect - French
 
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023
 
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring Boot
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring BootSpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring Boot
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring Boot
 
SpringOne Tour: The Influential Software Engineer
SpringOne Tour: The Influential Software EngineerSpringOne Tour: The Influential Software Engineer
SpringOne Tour: The Influential Software Engineer
 
SpringOne Tour: Domain-Driven Design: Theory vs Practice
SpringOne Tour: Domain-Driven Design: Theory vs PracticeSpringOne Tour: Domain-Driven Design: Theory vs Practice
SpringOne Tour: Domain-Driven Design: Theory vs Practice
 
SpringOne Tour: Spring Recipes: A Collection of Common-Sense Solutions
SpringOne Tour: Spring Recipes: A Collection of Common-Sense SolutionsSpringOne Tour: Spring Recipes: A Collection of Common-Sense Solutions
SpringOne Tour: Spring Recipes: A Collection of Common-Sense Solutions
 
SpringOne Tour: Doing Progressive Delivery with your Team
SpringOne Tour: Doing Progressive Delivery with your TeamSpringOne Tour: Doing Progressive Delivery with your Team
SpringOne Tour: Doing Progressive Delivery with your Team
 
SpringOne Tour: Make the Right Thing the Obvious Thing: The Journey to Intern...
SpringOne Tour: Make the Right Thing the Obvious Thing: The Journey to Intern...SpringOne Tour: Make the Right Thing the Obvious Thing: The Journey to Intern...
SpringOne Tour: Make the Right Thing the Obvious Thing: The Journey to Intern...
 
SpringOne Tour: An Introduction to Azure Spring Apps Enterprise
SpringOne Tour: An Introduction to Azure Spring Apps EnterpriseSpringOne Tour: An Introduction to Azure Spring Apps Enterprise
SpringOne Tour: An Introduction to Azure Spring Apps Enterprise
 
SpringOne Tour: 10 Practical Tips for Building Native and Serverless Spring A...
SpringOne Tour: 10 Practical Tips for Building Native and Serverless Spring A...SpringOne Tour: 10 Practical Tips for Building Native and Serverless Spring A...
SpringOne Tour: 10 Practical Tips for Building Native and Serverless Spring A...
 
SpringOne Tour: Spring Boot 3 and Beyond
SpringOne Tour: Spring Boot 3 and BeyondSpringOne Tour: Spring Boot 3 and Beyond
SpringOne Tour: Spring Boot 3 and Beyond
 
SpringOne Tour 2023: Let's Get Streaming! A Guide to Orchestrating Spring Clo...
SpringOne Tour 2023: Let's Get Streaming! A Guide to Orchestrating Spring Clo...SpringOne Tour 2023: Let's Get Streaming! A Guide to Orchestrating Spring Clo...
SpringOne Tour 2023: Let's Get Streaming! A Guide to Orchestrating Spring Clo...
 
Tanzu Developer Connect | Public Sector | March 29, 2023.pdf
Tanzu Developer Connect | Public Sector | March 29, 2023.pdfTanzu Developer Connect | Public Sector | March 29, 2023.pdf
Tanzu Developer Connect | Public Sector | March 29, 2023.pdf
 
Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023
Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023
Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023
 

Kürzlich hochgeladen

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Immutability for PCF: Security in a Cloud Native World

  • 1. Immutability for PCF: Security in a Cloud Native World By Tom Gillis Bracket Computing
  • 3. GHOST DIRTY COW STACK CLASH MALWARE KBEAST LATERAL SPREAD If even .01% gets in, it will burrow and persist… 3
  • 4. GHOST DIRTY COW STACK CLASH MALWARE KBEAST LATERAL SPREAD APP OS Embedded in the OS where security can be fooled 4
  • 5. If even .01% gets in, it will burrow and persist… GHOST DIRTY COW STACK CLASH MALWARE KBEAST LATERAL SPREAD 5
  • 6. GHOST DIRTY COW STACK CLASH MALWARE KBEAST LATERAL SPREAD Equifax, Sony, DNC have one thing in common… PERSISTENCE. 6
  • 10. The OS Cannot Protect Itself… CSP OR ON PREM HYPERVISOR 10
  • 11. …So Move the Security Outside. CSP OR ON PREM HYPERVISOR METAVISOR Security Layer 11
  • 12. METAVISOR CSP OR ON PREM HYPERVISOR Server Guard Network Guard Data Guard Optimized for… 12
  • 13. 13 Consistent Controls with Separation of Duties  Single set of controls across hybrid cloud environments  Seamless experience for users, granular controls for IT security Security
  • 14. SERVER 2551 METAVISOR Kernel NETWORKPREOCESS TABLES SHELL SHELL APACHE SYSCALL TABLES Root Processes User Processes Net Ports 44380 SHELL SHELLSEC AGENT FILE SYSTEM X 14 Server Guard for Stem and Diego Cells
  • 15. SERVER 2551 METAVISOR Kernel NETWORKPREOCESS TABLES SHELL SHELL APACHE SYSCALL TABLES Root Processes User Processes Net Ports 44380 SHELL 80 SHELLSEC AGENT FILE SYSTEM APACHE X FILE SYSTEM 15 Server Guard for Stem and Diego Cells
  • 16. SERVER 2551 METAVISOR Kernel NETWORKPREOCESS TABLES SHELL SHELL APACHE SYSCALL TABLES Root Processes User Processes Net Ports 44380 SHELL 80 SHELLSEC AGENT FILE SYSTEM APACHE X FILE SYSTEM 16 Server Guard for Stem and Diego Cells 51
  • 17. Server Guard for Stem and Diego Cells 2551 METAVISOR Kernel NETWORKPREOCESS TABLES SHELL SHELL SERVER APACHE SYSCALL TABLES Root Processes User Processes Net Ports 44380 SHELL 80 SHELLSEC AGENT FILE SYSTEM APACHE X FILE SYSTEM 51 17
  • 18. 18 Network Guard Dynamic Policies Web Tier App Tier Data Tier Dev Policy Can Be:  Allow any:any network flows  Server Guard in logging mode  No Data Encryption BlockS3 METAVISOR METAVISOR METAVISOR “env”=“dev” METAVISOR
  • 19. 19 Network Guard Dynamic Policies Web Tier App Tier Data Tier Prod Policy Can Be:  Block unused ports  Server Guard in enforcement mode  Quarantine suspect workloads  Admin changes only via Metavisor API BlockS3 METAVISOR METAVISOR METAVISOR “env”=“dev” METAVISOR BlockS3 METAVISOR METAVISOR METAVISOR “env”=“prod” METAVISOR
  • 20. 20 Data Guard Web Tier App Tier Data Tier  Backed by HSM  On-prem or hosted key management  Enable separation of duties  Prevent S3 leaks BlockS3RootEphemeral HSM ON PREM METAVISOR METAVISOR METAVISOR METAVISOR METAVISOR
  • 21. 21 Data Guard–Data Protection and Policy  Enforce data residency  Comply with GDRS  Policy follows data volumes BlockS3 METAVISOR Data access request
  • 22. 22 Data Guard–Data Protection and Policy  Enforce data residency  Comply with GDRS  Policy follows data volumes BlockS3 METAVISOR ”region”=“us-west” “class”=“red” “env”=“dev” Policy VerificationPolicy Match
  • 23. 23 Data Guard–Data Protection and Policy  Enforce data residency  Comply with GDRS  Policy follows data volumes BlockS3 METAVISOR Key released, data decrypted
  • 24. 24 Multi-cloud Security with Pivotal Cloud Foundry APPLICATION APPLICATION OS BRACKET METAVISOR Server Guard Data Guard Network Guard APPLICATION APPLICATION OS APPLICATION APPLICATION OS APPLICATION APPLICATION OS ON-PREM PHYSICAL INFRASTRUCTURE AWS PHYSICAL INFRASTRUCTURE GOOGLE PHYSICAL INFRASTRUCTURE ON-PREM HYPERVISOR AWS HYPERVISOR GOOGLE HYPERVISOR AZURE HYPERVISOR AZURE PHYSICAL INFRASTRUCTURE BRACKET METAVISOR Server Guard Data Guard Network Guard BRACKET METAVISOR Server Guard Data Guard Network Guard BRACKET METAVISOR Server Guard Data Guard Network Guard
  • 25. Visibility  Tagging allows for easy visualization of complex data centers  See actual flow data, allowed by policy and blocked flows  Interactive display - clickable, searchable
  • 26. Visibility  Tagging allows for easy visualization of complex data centers  See actual flow data, allowed by policy and blocked flows  Interactive display - clickable, searchable
  • 27. Visibility  Tagging allows for easy visualization of complex data centers  See actual flow data, allowed by policy and blocked flows  Interactive display - clickable, searchable
  • 28. 28 Compliance Reporting and Forensics  Full high-resolution audit logs  Event-driven memory captures  Real-time network
  • 29. 29 Bracket PCF Security SHARED FOUNDATION “PCI” Segment BRACKET METAVISOR Diego Cell Container “Non PCI” Segment BRACKET METAVISOR Diego Cell Container “Management” Segment BRACKET METAVISOR PCF Router BRACKET METAVISOR Ops Manager Bracket MCP Ops Manager Image +
  • 30. Bracket Is…  Immutable Security - Can’t be turned off even with root access - Transparent to dev and ops teams - Aligned with PCF cloud native ops  Unique Security - Protects the OS when the OS can’t protect itself - Tag based segmentation and encryption built to auto-scale - Transparent crypto for PCF  Multi-cloud Security - One set of server, network and data controls on every major cloud - Central policy administration for separation of security duties - Goes where PCF goes
  • 31. 31

Hinweis der Redaktion

  1. Today’s security solutions are focused on keeping malware out, but that’s impossible to do 100%. Some attacks will get through and once in they will persist and snoop everything. Impossible to keep malware out completely.
  2. Today’s security solutions are focused on keeping malware out, but that’s impossible to do 100%. Some attacks will get through and once in they will persist and snoop everything. Impossible to keep malware out completely.
  3. Today’s security solutions are focused on keeping malware out, but that’s impossible to do 100%. Some attacks will get through and once in they will persist and snoop everything. Impossible to keep malware out completely.
  4. Today’s security solutions are focused on keeping malware out, but that’s impossible to do 100%. Some attacks will get through and once in they will persist and snoop everything. Impossible to keep malware out completely.
  5. Lockheed Martin And what of course this means is that Malware typically follows these steps
  6. Lockheed Martin And what of course this means is that Malware typically follows these steps
  7. Lockheed Martin And what of course this means is that Malware typically follows these steps
  8. Lockheed Martin And what of course this means is that Malware typically follows these steps
  9. Lockheed Martin And what of course this means is that Malware typically follows these steps
  10. Lockheed Martin And what of course this means is that Malware typically follows these steps
  11. Lockheed Martin And what of course this means is that Malware typically follows these steps