|By Denis Martin||
|July 6, 2010 10:15 AM EDT||
Cloud Infrastructure as a Service (IaaS) provides compelling cost and strategic benefits. These include scalability with reduced capital expenditure, more efficient use of IT resources, and the ability for an organization to focus on their enterprise's core competency. Despite fears to the contrary, many well-established security technologies and procedures can be applied cloud computing and provide enterprise-class security. In many cases the cloud vendor may even provide better security in a virtualized environment than the individual enterprise can achieve in a purely physical architecture.
The most effective security is a comprehensive, layered defense based on a framework. A cloud platform can leverage specialized tools to protect the integrity of virtual machines and Internet communications. Virtualization creates logical abstraction layers that allow for multi-tier security policies in order to provide true defense in depth. Enterprises with limited IT resources may not be able to afford the same security measures as a cloud provider and remain competitive. Deploying cloud-based IaaS represents an opportunity for the enterprise to build in security from the ground up.
Increasing Demands on IT Require Security Frameworks
IT must become more responsive to business drivers originating beyond IT, such as a greater role in meeting compliance requirements. Compliance legislation for different business types, even departments within the enterprise, will dictate some security requirements: FISMA/NIST guidelines for US Federal agencies, Sarbanes-Oxley reporting for publicly held companies, PCI DSS or HIPAA for those dealing with Personally Identifiable Information (PII) - the list goes on.
The better way to approach security is working within a comprehensive framework. Though virtualization does present some unique threat surfaces, defensive layers using new tools must be organized within these frameworks.
Hypervisors provide a consolidated, logical view of multiple virtual machines (VMs). VMs running on the same physical machines must be guaranteed to remain isolated from one another, through omission, mis-configuration, or intentional breach.
The Center for Internet Security and the Defense Information Systems Agency (DISA), as well as hypervisor vendors, publish "hardening" guidelines. Hardening examples include how to correctly protect memory segmentation using container rings, and familiar steps like best-practice configurations, deploying the latest patches, and proper cleaning up of de-provisioned virtual machines and resources.
A virtual network switch can provide further layers of platform defense to the same level as a physical switch. An "intelligent" switch can "lock down" Machine Access Codes (MAC), and perform dynamic inspections of the Address Resolution Protocols (ARP). Used with other authentication protocols, they mitigate man-in-the-middle attacks and ARP cache poisoning.
Hardening helps guarantee virtual machine isolation and challenges penetration from without. Properly hardened hypervisor layers prevent IaaS end users from inadvertently mapping IP addresses across virtual machines, IP spoofing, or intentionally leveraging Network Address Table (NAT) mapping to hijack communications. Hardening makes it difficult to install "eavesdropping programs" to monitor virtual machine memory space.
The hypervisor can also rapidly propagate new configurations, patches, or layered security policies across the infrastructure. Employed correctly, this level of abstraction can strengthen IaaS security.
Identity Management and Administrative Access Control
Identity management takes on increased urgency in the virtual environment; administrative access control is crucial. Best practices include multi-factor authentication and role-based access management. Role-based access instantiates existing written policies, and provides an additional layer of user discrimination - and detection - in system access.
Segregation of duties for the server, network, and security administration is required. Strict employee screening and qualification is key. It's critical to manage access of privileged third parties; best practices have all third-party activity monitored by your staff.
Ideally you should deploy Privileged Identity Management (PIM) software. A PIM application can enforce administrative access rules throughout a virtual environment - greatly mitigating the risk of undocumented or malicious access.
PIM software can also support Information Technology Infrastructure Library (ITIL) best practices, such as audit trails required for compliance regulations SOX, FISMA, PCI-DSS and HIPAA. The more advanced packages can perform continuous discovery across new hardware and software applications, and can rapidly and comprehensively propagate changed passwords after third-party access or staff turnover.
Network Segmentation and Traffic Protection
It is critical to segregate and protect the data flowing through virtual or private virtual LANs (VLANs or PVLANs). The hardening process secures machine access code (MAC) assignments and Network Address Translation (NAT) mapping. Further inter-VLAN protection comes from firewalls between VLANs (over and above port-forwarding within a VLAN).
Application firewalls should be placed monitoring web application traffic. Application firewall functions such as cookie consistency, buffer overflow protection, and HTML checks permit only defined application behavior (at least in regards to web traffic). Besides critical application protection, they provide fundamental IaaS defense against distributed denial of service (DDoS) attacks.
Security can be configured into a virtual IaaS by using application firewalls to "lock down" data entry by web users. An example would be monitoring credit card number entries on a shopping cart payment page. The application firewall can be "trained" to recognize a set number of numeric characters only - any other data is prevented from reaching the web server. Locking down data entry prevents "cross-sight scripts" from penetrating the IaaS.
Proactive System Management
The biggest risks to enterprise security come not from virtualized architecture but are operational, usually involve mis-configuration (or configuration not aligned with the security framework), and poor change management resulting in out of date patches.
Systematically mitigating such vulnerabilities is another benefit of working within a time-tested security framework. Where vulnerability due to error or omission can proliferate rapidly across VMs, strong change management is crucial. Leverage guidelines provided by a service management framework such as ITIL.
The compulsory entry of change data should be part of the user interface wherever possible. Logging change data - not just patches, but to firewalls, provisioning of machines, IP addresses, NAT mapping, administrative access, etc., is imperative for the tracking of incidents, errors and process improvement. More and more compliance requirements require the ability to audit system changes.
The strongest defense is proactive system management. A strong security posture has never been a static endeavor. You must continue to invest in ongoing system and security training. A proactive security posture includes a documented, standards-based (like ITIL) incident escalation and notification procedure. Regular automated vulnerability scans and third-party penetration testing, file-integrity software, and anti-virus software - all provide preemptive layers of security - and not just in virtual environments.
The cost benefits of virtual IaaS continue to drive enterprises to cloud deployments. Mid-size and large enterprises can enjoy the business advantages of elasticity and leverage the security investment and expertise of the vendor.
The most effective security is still a layered defense based on a framework. Security technology and procedures are augmenting security frameworks to accommodate virtual architectures. There is the opportunity for the enterprise to build in security from the ground up. Properly configured and managed, security in the cloud from an experienced vendor will be better than what could be achieved in-house.
- See "Security Compliance in a Virtual World: Best Practices to Build a Solid Foundation", RSA Security Brief, 2009.
- See "Privileged Identity Management in the Cloud", Steve Staso, pgs 19-20, April, 2010.
- For an overview of IT security and current compliance regulations see Information Security Standards and Certifications in Contracting, May 26, 2010 by W. Scott Blackmer.
- COBIT standards are published by the IT Governance Institute and the Information Systems Audit and Control Association (ISACA): http://www.isaca.org/Knowledge-Center/COBIT/Pages/Overview.aspx
- "Top Threats to Cloud Computing V1.0": the Cloud Security Alliance: http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
- "Cloud Computing Information Assurance Framework", The European Network and Information Security Agency (ENISA): http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment
- "Security Compliance in a Virtual World: Best Practices to Build a Solid Foundation", RSA Security Brief, August, 2009.
- "Privileged Identity Management in the Cloud", Steve Staso, April, 2010.
- The ITIL Best Practices website including Change Management: http://www.best-management-practice.com/
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
Aug. 26, 2016 03:15 PM EDT Reads: 365
Pulzze Systems was happy to participate in such a premier event and thankful to be receiving the winning investment and global network support from G-Startup Worldwide. It is an exciting time for Pulzze to showcase the effectiveness of innovative technologies and enable them to make the world smarter and better. The reputable contest is held to identify promising startups around the globe that are assured to change the world through their innovative products and disruptive technologies. There w...
Aug. 26, 2016 11:30 AM EDT Reads: 556
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
Aug. 26, 2016 10:15 AM EDT Reads: 3,574
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Aug. 26, 2016 09:45 AM EDT Reads: 1,828
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni...
Aug. 26, 2016 07:00 AM EDT Reads: 3,915
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
Aug. 26, 2016 05:00 AM EDT Reads: 3,035
Personalization has long been the holy grail of marketing. Simply stated, communicate the most relevant offer to the right person and you will increase sales. To achieve this, you must understand the individual. Consequently, digital marketers developed many ways to gather and leverage customer information to deliver targeted experiences. In his session at @ThingsExpo, Lou Casal, Founder and Principal Consultant at Practicala, discussed how the Internet of Things (IoT) has accelerated our abil...
Aug. 26, 2016 02:15 AM EDT Reads: 1,969
With so much going on in this space you could be forgiven for thinking you were always working with yesterday’s technologies. So much change, so quickly. What do you do if you have to build a solution from the ground up that is expected to live in the field for at least 5-10 years? This is the challenge we faced when we looked to refresh our existing 10-year-old custom hardware stack to measure the fullness of trash cans and compactors.
Aug. 26, 2016 01:30 AM EDT Reads: 1,679
The emerging Internet of Everything creates tremendous new opportunities for customer engagement and business model innovation. However, enterprises must overcome a number of critical challenges to bring these new solutions to market. In his session at @ThingsExpo, Michael Martin, CTO/CIO at nfrastructure, outlined these key challenges and recommended approaches for overcoming them to achieve speed and agility in the design, development and implementation of Internet of Everything solutions wi...
Aug. 26, 2016 01:00 AM EDT Reads: 1,975
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Aug. 26, 2016 12:45 AM EDT Reads: 2,282
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
Aug. 26, 2016 12:30 AM EDT Reads: 2,909
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…
Aug. 25, 2016 11:45 PM EDT Reads: 2,301
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Aug. 25, 2016 10:15 PM EDT Reads: 1,729
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Aug. 25, 2016 09:15 PM EDT Reads: 2,220
Is the ongoing quest for agility in the data center forcing you to evaluate how to be a part of infrastructure automation efforts? As organizations evolve toward bimodal IT operations, they are embracing new service delivery models and leveraging virtualization to increase infrastructure agility. Therefore, the network must evolve in parallel to become equally agile. Read this essential piece of Gartner research for recommendations on achieving greater agility.
Aug. 25, 2016 05:15 PM EDT Reads: 729
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
Aug. 25, 2016 03:30 PM EDT Reads: 1,512
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
Aug. 25, 2016 01:00 PM EDT Reads: 2,611
SYS-CON Events announced today Telecom Reseller has been named “Media Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
Aug. 25, 2016 09:00 AM EDT Reads: 602
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Aug. 25, 2016 08:45 AM EDT Reads: 2,143
Akana has announced the availability of version 8 of its API Management solution. The Akana Platform provides an end-to-end API Management solution for designing, implementing, securing, managing, monitoring, and publishing APIs. It is available as a SaaS platform, on-premises, and as a hybrid deployment. Version 8 introduces a lot of new functionality, all aimed at offering customers the richest API Management capabilities in a way that is easier than ever for API and app developers to use.
Aug. 25, 2016 06:00 AM EDT Reads: 1,462