SlideShare a Scribd company logo
Security that works with, not
against, your SaaS business
Dave Shackleford, Lead Faculty, IANS
Rand Wacker, VP Products, CloudPassage
10/2/2013
Who We Are
Dave Shackleford
Lead Faculty at IANS
Copyright © 2013 IANS. All rights reserved. 2
Rand Wacker
VP of Products at
CloudPassage
Virtualization: First step to Cloud
• Security is in
upheaval
• We must adapt to
cloud disruption
• Check out Dave’s
Cloud Security
classes with SANS
Copyright © 2013 IANS. All rights reserved. 3
Overview for Today
• Business imperatives for SaaS
• Cloud-based delivery architecture
• Security complexity in agile cloud environments
• Customer case studies with Halo Enterprise
• Q&A
Copyright © 2013 IANS. All rights reserved. 4
Moving to a SaaS Business
© 2013 CloudPassage Inc.
Two Sides of the SaaS Coin
What Custs Fear
– Loss of data / I.P.
– Their brand being caught
up in a compromise
– Failing their own audits
– Having to migrate to
another provider later…
What You Want
– Recurring revenue
– Organic incremental sales
– Nothing to ship, one
codebase to support
– Higher profit margins at
scale…
Data protection is often a new business
challenge for software providers.
© 2013 CloudPassage Inc.
SaaS Adoption and Fear Trends
SaaS is the primary cloud investment
• 82% of companies use SaaS providers
• 50% use SaaS for business-critical apps
Source: North Bridge Capital “Future of the Cloud” survey (June 2012)
Security, compliance still top concerns
• 55% consider security a major issue
• 38% view compliance as show-stopper
© 2013 CloudPassage Inc.
SaaS Adoption and Fear Trends
SaaS is the primary cloud investment
• 82% of companies use SaaS providers
• 50% use SaaS for business-critical apps
Source: North Bridge Capital “Future of the Cloud” survey (June 2012)
Security, compliance still top concerns
• 55% consider security a major issue
• 38% view compliance as show-stopper
Companies want to use SaaS
but fear security issues.
SaaS providers who get
security right are at a massive
advantage over competitors.
© 2013 CloudPassage Inc.
What SaaS Customers Demand
2700
2
Maintaining compliance is more complex in
dynamic cloud-based environments.
Building SaaS Today
© 2013 CloudPassage Inc.
Cloud Accelerates SaaS Dev
• SaaS feature development
must stay ahead of
competition
• DevOps and cloud
architectures enable agile
development
• Accelerates time-to-
market, but complicates
security…
© 2013 CloudPassage Inc.
Poll: SaaS Challenges
• What are your biggest challenges in
building/transitioning to a SaaS business
model? (Select all that apply)
– Organizational expertise in building SaaS offerings
– Security of service/customer data
– Transitioning customers from perpetual to subscription
– Cannibalization of existing revenue streams
– Other
Securing Cloud Development
Cloud Security Challenges
• There are many security challenges in cloud computing
• Some are more technical
– Tracking data migration from abc (mobility)
– Data/customer segmentation (Multi-tenancy)
– Identity and Access Management
– Incident response in multitenant environments
• Some are more “macro” level issues:
– Policy and Risk Assessment
– Governance
– Audit requirements
– Compliance
“If you’re a large
enterprise, somebody in
your organization is using
cloud computing, but
they’re not telling you.”
--James Staten, principal
analyst at Forrester
Research
The Role of Virtualization in the Cloud
• Virtualization is a cloud enabler
– Pooled resources
– Abstracted components and applications
– Shared infrastructure
– Resource and data migration and replication
• Virtualization technologies have security issues, too:
– More complexity, more moving parts
– New configuration controls
– Segmentation and separation
– Monitoring
Multi-tenancy: Security Issues
• One physical platform may host numerous
distinct entities’ data and services
• Critical needs arise for:
– Segmentation & Isolation
– Policy boundaries
– Monitoring (availability/security)
– Management
• Needs may differ for private vs. public cloud
types
Visibility
• Visibility is a challenge in cloud
environments – why?
– Customers do not have visibility into the
internal security controls in place at a cloud
provider facility
– Cloud providers need controls that are
flexible and dynamic across different
environments
Gaining Additional Visibility
• SaaS environments will employ IaaS principles
and infrastructure to host VMs and application
instances
• Monitoring these instances can be a challenge
as they migrate and balance across clusters
• Traditional tools for monitoring (IDS, for
example) may have difficulty “following” systems
or gaining visibility into virtual environments
• Monitoring at the individual VM level makes
more sense in a cloud infrastructure
Copyright © 2013 IANS. All rights reserved. 18
Change Management in the Cloud
• Change management is one of the most important
operational aspects of the cloud
• Cloud computing is built on a foundation of
consistency and uniformity
– Changes can affect this dramatically
• Issues:
– Virtualized infrastructure increases the rate of change due
to dynamic nature
– Virtualization and multi-tenancy add new levels of
complexity
• App Virtual OS Virtual Hardware Storage
Hypervisor Platform Physical Hardware
Automation and DevOps
• In many SaaS cloud environments today, numerous
small/rapid code pushes are becoming necessary
– Automating this process with proper test and risk
assessment is key
• DevOps strives for a number of goals and focal
areas:
– Automated provisioning
– No-downtime deployments
– Monitoring
– “Fail fast and often”
– Automated builds and testing
Traditional Security Breaks Cloud Ops
• Many traditional security tools and controls are
not well-suited to dynamic cloud operational
environments
• In general, many network-focused and larger
architectural controls can be slow to
change/adapt
– Orchestration tools can help, but API support is
required
Copyright © 2013 IANS. All rights reserved. 21
Host-Based Security in Cloud Environments
• For truly dynamic SaaS deployments, security
architecture will be a balance of network and
host controls
– Many are leaning more toward local system security
controls, though
• Some of the challenges include:
– Resource utilization
– Integration with virtualization platforms
– Testing with SaaS application instances
– Manageability
Copyright © 2013 IANS. All rights reserved. 22
Host-based Security Agents
• The biggest issue with host-based security
agents is resource consumption
– Too much RAM, CPU, etc.
– This is a serious issue in virtualized environments
• A lightweight, specially-adapted agent is needed
• Tight integration with the OS kernel and
components is also key
– Local scans and monitoring need to be as low-impact
as possible
– Scalability and centralized control are critical
© 2013 CloudPassage Inc.
Introducing
Halo Enterprise
© 2013 CloudPassage Inc.
Halo Enterprise automates
security for large, complex
private, public & hybrid clouds
• Visibility & control across any infrastructure
• Less time demanded from DevOps & Security
• More competitive SaaS offerings
• Meet compliance needs, remove sales
barriers
Confidential NDA material. Do not distribute.
Security and Compliance Automation
Protect servers and applications in any private,
public, or hybrid cloud environment
Server Account
Managements
Security Event
Alerting
File Integrity
Monitoring
REST API
Integrations
Broad set of security controls, critical for
securing cloud-hosted applications
Firewall Automation
System & Application
Config Security
Multi-Factor
Authentication
Vulnerability &
Patch Scanning
Private cloud &
SDDC
Virtualized & bare-metal
datacenterPublic cloud IaaS
Halo security
analytics engine
Halo administration
web portal
Halo REST
API gateway
HALO SECURITY MODULES
• Firewall policy orchestration
• Multi-factor authentication
• File integrity monitoring
• Configuration security monitoring
• Software vulnerability scanning
• System access management
Workload VM Instance
Operating System
Application Code
System Administration Services
Application
Engine
App Storage
Volume
System Storage
Volume
Halo Daemon
1
Halo activates firewall on boot, applies latest
policies, and orchestrates ongoing policy updates.
1
2
Halo secures privileged access via dynamic firewall
rules triggered by multi-factor user authentication.
2
4
Application configurations are scanned for
vulnerabilities and are continuously monitored.
4
5
Cryptographic integrity monitoring ensures app
code and binaries are not compromised.
5
6
Halo monitors system binary and config files for
correct ACLs, file integrity, and vulnerabilities.
6
Halo scans O.S. configurations for vulnerabilities
and continuously monitors O.S. state and activity.
3
3
7
Application data stores are monitored for access;
outbound firewall rules prevent data extrusion.
7
© 2013 CloudPassage Inc.
Solving Cloud Security Challenges
Cloud Complications
Virtualization and multi-
tenancy
Maintaining visibility
Taming change
management
Supporting automation &
DevOps
CloudPassage
Approach
Build security into cloud
stack
Design for
automation, portability, an
d scalability
Broad range of security
controls
Simplify compliance
management
© 2013 CloudPassage Inc.
Cloud Security
Case Studies
© 2013 CloudPassage Inc.
Poll: SaaS Offerings
• Today, what percentage of your
business is from a SaaS offering (vs
boxed product or other?)
– All
– More than half
– Less than half
– None
– Not applicable to our organization
© 2013 CloudPassage Inc.
Case Study: Enabling SaaSification
• Top 10 Fortune’s software list
• Corporate imperative move
boxed product to SaaS
• Security is paramount;
customers demand
SOC2, HIPAA, etc
• Running across mix of
AWS, VMware, and others
© 2013 CloudPassage Inc.
Case Study: Enabling SaaSification
Product
Line 1
Product
Line 2
Product
Line 3
SaaS
Product 1
SaaS
Product 2
SaaS
Product 3
Halo automates security
and compliance for each
BU running in cloud
Halo security
platform
Halo Benefits
• Enable fast and agile
DevOps model
• Security built into stack
for portability
• Ensures consistency of
servers, visibility, and
enables rapid response
© 2013 CloudPassage Inc.
Case Study: Securing Acquisitions
• B2B SaaS pioneer
• Core product in virtualized
datacenters, traditional
security practices
• 20+ acquisitions for growth:
most built in public cloud
• Must extend security and
compliance across any
infrastructure
© 2013 CloudPassage Inc.
Case Study: Securing Acquisitions
Core Product Datacenter
& IT Security Operations
Halo provides security
and compliance across
all environments
Acquisitions built in public &
private clouds
Halo Benefits
• Easily installs into any
cloud architecture
• No disruption to
development pace
• Extends existing
security operations to
cloud
Wrap Up
Summary
• SaaS businesses require strong security
• Cloud-based development complicates
traditional security
• Security and compliance must enhance, not
slow down, agile SaaS development
• Focus security architecture on automation,
portability, and visibility
Copyright © 2013 IANS. All rights reserved. 37
Q&A and Additional Information
Dave Shackleford
Lead Faculty, IANS
@ians_security
Copyright © 2013 IANS. All rights reserved. 38
cloudpassage.com/saas
Rand Wacker
VP, Producs
@cloudpassage
Securing SaaS whitepaper
Request a Halo demo or free trial
Thank You!

More Related Content

PDF
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
PDF
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
PPTX
Federal Webinar: Application monitoring for on-premises, hybrid, and multi-cl...
PPTX
Security and Compliance for Enterprise Cloud Infrastructure
PDF
From Disaster to Recovery: Preparing Your IT for the Unexpected
PPTX
Hi! Ho! Hi! Ho! SQL Server on Linux We Go!
PPTX
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
PDF
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Federal Webinar: Application monitoring for on-premises, hybrid, and multi-cl...
Security and Compliance for Enterprise Cloud Infrastructure
From Disaster to Recovery: Preparing Your IT for the Unexpected
Hi! Ho! Hi! Ho! SQL Server on Linux We Go!
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ

What's hot (20)

PPTX
GDPR Part 3: Practical Quest
PPTX
So you’ve successfully installed SCOM… Now what.
PPSX
VMware: my jsme “software defined”
PDF
Getting ready for Infrastructure Transformation with hyper-converged
PPTX
Federal Webinar: Technical Update and Demo of New Features
PPTX
Enterprise Security in Hybrid Cloud ISACA-SV 2012
PDF
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
PPTX
Federal Webinar: Improve IT Service Management and help meet Federal Standards
PPTX
Vormetric - Gherkin Event
PDF
Predicting the Future of Endpoint Management in a Mobile World
PDF
SAP Cloud security overview 2.0
PPT
Information Security
PDF
VMware Workspace One
PPTX
Government Webinar: Improving Security Compliance with IT Monitoring Tools
PDF
SSL VPN Evaluation Guide
PDF
Ensuring Rock-Solid Unified Endpoint Management
PDF
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
PPT
Testting application with a presentation downloaded from the internet
PPTX
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
GDPR Part 3: Practical Quest
So you’ve successfully installed SCOM… Now what.
VMware: my jsme “software defined”
Getting ready for Infrastructure Transformation with hyper-converged
Federal Webinar: Technical Update and Demo of New Features
Enterprise Security in Hybrid Cloud ISACA-SV 2012
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
Federal Webinar: Improve IT Service Management and help meet Federal Standards
Vormetric - Gherkin Event
Predicting the Future of Endpoint Management in a Mobile World
SAP Cloud security overview 2.0
Information Security
VMware Workspace One
Government Webinar: Improving Security Compliance with IT Monitoring Tools
SSL VPN Evaluation Guide
Ensuring Rock-Solid Unified Endpoint Management
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
Testting application with a presentation downloaded from the internet
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
Ad

Viewers also liked (6)

PPT
SaaS Implementation
PDF
Consumer Internet Insights - Jeyandran Venugopal
PPTX
Services Strategies for Saas Software Companies
PPTX
HRIS Implementation and Change Management
PPTX
Why Software as a Service (SaaS) requires a new approach to Application Manag...
PPTX
Best Practices for Managing SaaS Applications
SaaS Implementation
Consumer Internet Insights - Jeyandran Venugopal
Services Strategies for Saas Software Companies
HRIS Implementation and Change Management
Why Software as a Service (SaaS) requires a new approach to Application Manag...
Best Practices for Managing SaaS Applications
Ad

Similar to Security that works with, not against, your SaaS business (20)

PDF
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
PDF
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
PPT
Radu crahmaliuc 23feb2012
PPTX
security and compliance in the cloud
PDF
Architecting SaaS
PPTX
Evaluating the Cloud
PDF
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
PPTX
Webinar compiled powerpoint
PPTX
Becomming a cloud governance ninja linthicum interop fall 2013
PPTX
360 facility
PDF
Security - A Digital Transformation Enabler
PPTX
Best practices for application migration to public clouds interop presentation
PPTX
Sam Herath - Six Critical Criteria for Cloud Workload Security
PDF
Govern and Protect Your End User Information
PPTX
ShareResponsibilityModel.pptx
PPTX
Transforming cloud security into an advantage
PDF
Building the Agile Enterprise - Cloud Computing
PDF
Applying systems thinking to AWS enterprise application migration
PDF
Stefan Haase Cloud
PPTX
Migration into a Cloud
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Radu crahmaliuc 23feb2012
security and compliance in the cloud
Architecting SaaS
Evaluating the Cloud
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
Webinar compiled powerpoint
Becomming a cloud governance ninja linthicum interop fall 2013
360 facility
Security - A Digital Transformation Enabler
Best practices for application migration to public clouds interop presentation
Sam Herath - Six Critical Criteria for Cloud Workload Security
Govern and Protect Your End User Information
ShareResponsibilityModel.pptx
Transforming cloud security into an advantage
Building the Agile Enterprise - Cloud Computing
Applying systems thinking to AWS enterprise application migration
Stefan Haase Cloud
Migration into a Cloud

More from CloudPassage (20)

PPTX
CloudPassage Careers
PPTX
Transforming the CSO Role to Business Enabler
PPTX
Rethinking Security: The Cloud Infrastructure Effect
PPTX
SecDevOps: The New Black of IT
PPTX
Technologies You Need to Safely Use the Cloud
PPT
Cloud Security: Make Your CISO Successful
PDF
Secure Cloud Development Resources with DevOps
PPTX
45 Minutes to PCI Compliance in the Cloud
PPTX
Comprehensive Cloud Security Requires an Automated Approach
PPTX
Integrating Security into DevOps
PDF
What You Need To Know About The New PCI Cloud Guidelines
PPTX
What You Haven't Heard (Yet) About Cloud Security
PPTX
Meeting PCI DSS Requirements with AWS and CloudPassage
PPTX
Delivering Secure OpenStack IaaS for SaaS Products
PPTX
CloudPassage Overview
PPTX
PCI and the Cloud
PDF
Halo Installfest Slides
PPTX
Automating Security for the Cloud - Make it Easy, Make it Safe
PPTX
BSides SF - Automating Security for the Cloud
PPTX
Securing Your Cloud Servers with Halo NetSec
CloudPassage Careers
Transforming the CSO Role to Business Enabler
Rethinking Security: The Cloud Infrastructure Effect
SecDevOps: The New Black of IT
Technologies You Need to Safely Use the Cloud
Cloud Security: Make Your CISO Successful
Secure Cloud Development Resources with DevOps
45 Minutes to PCI Compliance in the Cloud
Comprehensive Cloud Security Requires an Automated Approach
Integrating Security into DevOps
What You Need To Know About The New PCI Cloud Guidelines
What You Haven't Heard (Yet) About Cloud Security
Meeting PCI DSS Requirements with AWS and CloudPassage
Delivering Secure OpenStack IaaS for SaaS Products
CloudPassage Overview
PCI and the Cloud
Halo Installfest Slides
Automating Security for the Cloud - Make it Easy, Make it Safe
BSides SF - Automating Security for the Cloud
Securing Your Cloud Servers with Halo NetSec

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPT
Teaching material agriculture food technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Big Data Technologies - Introduction.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Empathic Computing: Creating Shared Understanding
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Chapter 3 Spatial Domain Image Processing.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Encapsulation theory and applications.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Teaching material agriculture food technology
Advanced methodologies resolving dimensionality complications for autism neur...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Big Data Technologies - Introduction.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Review of recent advances in non-invasive hemoglobin estimation
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Empathic Computing: Creating Shared Understanding
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

Security that works with, not against, your SaaS business

  • 1. Security that works with, not against, your SaaS business Dave Shackleford, Lead Faculty, IANS Rand Wacker, VP Products, CloudPassage 10/2/2013
  • 2. Who We Are Dave Shackleford Lead Faculty at IANS Copyright © 2013 IANS. All rights reserved. 2 Rand Wacker VP of Products at CloudPassage
  • 3. Virtualization: First step to Cloud • Security is in upheaval • We must adapt to cloud disruption • Check out Dave’s Cloud Security classes with SANS Copyright © 2013 IANS. All rights reserved. 3
  • 4. Overview for Today • Business imperatives for SaaS • Cloud-based delivery architecture • Security complexity in agile cloud environments • Customer case studies with Halo Enterprise • Q&A Copyright © 2013 IANS. All rights reserved. 4
  • 5. Moving to a SaaS Business
  • 6. © 2013 CloudPassage Inc. Two Sides of the SaaS Coin What Custs Fear – Loss of data / I.P. – Their brand being caught up in a compromise – Failing their own audits – Having to migrate to another provider later… What You Want – Recurring revenue – Organic incremental sales – Nothing to ship, one codebase to support – Higher profit margins at scale… Data protection is often a new business challenge for software providers.
  • 7. © 2013 CloudPassage Inc. SaaS Adoption and Fear Trends SaaS is the primary cloud investment • 82% of companies use SaaS providers • 50% use SaaS for business-critical apps Source: North Bridge Capital “Future of the Cloud” survey (June 2012) Security, compliance still top concerns • 55% consider security a major issue • 38% view compliance as show-stopper
  • 8. © 2013 CloudPassage Inc. SaaS Adoption and Fear Trends SaaS is the primary cloud investment • 82% of companies use SaaS providers • 50% use SaaS for business-critical apps Source: North Bridge Capital “Future of the Cloud” survey (June 2012) Security, compliance still top concerns • 55% consider security a major issue • 38% view compliance as show-stopper Companies want to use SaaS but fear security issues. SaaS providers who get security right are at a massive advantage over competitors.
  • 9. © 2013 CloudPassage Inc. What SaaS Customers Demand 2700 2 Maintaining compliance is more complex in dynamic cloud-based environments.
  • 11. © 2013 CloudPassage Inc. Cloud Accelerates SaaS Dev • SaaS feature development must stay ahead of competition • DevOps and cloud architectures enable agile development • Accelerates time-to- market, but complicates security…
  • 12. © 2013 CloudPassage Inc. Poll: SaaS Challenges • What are your biggest challenges in building/transitioning to a SaaS business model? (Select all that apply) – Organizational expertise in building SaaS offerings – Security of service/customer data – Transitioning customers from perpetual to subscription – Cannibalization of existing revenue streams – Other
  • 14. Cloud Security Challenges • There are many security challenges in cloud computing • Some are more technical – Tracking data migration from abc (mobility) – Data/customer segmentation (Multi-tenancy) – Identity and Access Management – Incident response in multitenant environments • Some are more “macro” level issues: – Policy and Risk Assessment – Governance – Audit requirements – Compliance “If you’re a large enterprise, somebody in your organization is using cloud computing, but they’re not telling you.” --James Staten, principal analyst at Forrester Research
  • 15. The Role of Virtualization in the Cloud • Virtualization is a cloud enabler – Pooled resources – Abstracted components and applications – Shared infrastructure – Resource and data migration and replication • Virtualization technologies have security issues, too: – More complexity, more moving parts – New configuration controls – Segmentation and separation – Monitoring
  • 16. Multi-tenancy: Security Issues • One physical platform may host numerous distinct entities’ data and services • Critical needs arise for: – Segmentation & Isolation – Policy boundaries – Monitoring (availability/security) – Management • Needs may differ for private vs. public cloud types
  • 17. Visibility • Visibility is a challenge in cloud environments – why? – Customers do not have visibility into the internal security controls in place at a cloud provider facility – Cloud providers need controls that are flexible and dynamic across different environments
  • 18. Gaining Additional Visibility • SaaS environments will employ IaaS principles and infrastructure to host VMs and application instances • Monitoring these instances can be a challenge as they migrate and balance across clusters • Traditional tools for monitoring (IDS, for example) may have difficulty “following” systems or gaining visibility into virtual environments • Monitoring at the individual VM level makes more sense in a cloud infrastructure Copyright © 2013 IANS. All rights reserved. 18
  • 19. Change Management in the Cloud • Change management is one of the most important operational aspects of the cloud • Cloud computing is built on a foundation of consistency and uniformity – Changes can affect this dramatically • Issues: – Virtualized infrastructure increases the rate of change due to dynamic nature – Virtualization and multi-tenancy add new levels of complexity • App Virtual OS Virtual Hardware Storage Hypervisor Platform Physical Hardware
  • 20. Automation and DevOps • In many SaaS cloud environments today, numerous small/rapid code pushes are becoming necessary – Automating this process with proper test and risk assessment is key • DevOps strives for a number of goals and focal areas: – Automated provisioning – No-downtime deployments – Monitoring – “Fail fast and often” – Automated builds and testing
  • 21. Traditional Security Breaks Cloud Ops • Many traditional security tools and controls are not well-suited to dynamic cloud operational environments • In general, many network-focused and larger architectural controls can be slow to change/adapt – Orchestration tools can help, but API support is required Copyright © 2013 IANS. All rights reserved. 21
  • 22. Host-Based Security in Cloud Environments • For truly dynamic SaaS deployments, security architecture will be a balance of network and host controls – Many are leaning more toward local system security controls, though • Some of the challenges include: – Resource utilization – Integration with virtualization platforms – Testing with SaaS application instances – Manageability Copyright © 2013 IANS. All rights reserved. 22
  • 23. Host-based Security Agents • The biggest issue with host-based security agents is resource consumption – Too much RAM, CPU, etc. – This is a serious issue in virtualized environments • A lightweight, specially-adapted agent is needed • Tight integration with the OS kernel and components is also key – Local scans and monitoring need to be as low-impact as possible – Scalability and centralized control are critical
  • 24. © 2013 CloudPassage Inc. Introducing Halo Enterprise
  • 25. © 2013 CloudPassage Inc. Halo Enterprise automates security for large, complex private, public & hybrid clouds • Visibility & control across any infrastructure • Less time demanded from DevOps & Security • More competitive SaaS offerings • Meet compliance needs, remove sales barriers
  • 26. Confidential NDA material. Do not distribute. Security and Compliance Automation Protect servers and applications in any private, public, or hybrid cloud environment Server Account Managements Security Event Alerting File Integrity Monitoring REST API Integrations Broad set of security controls, critical for securing cloud-hosted applications Firewall Automation System & Application Config Security Multi-Factor Authentication Vulnerability & Patch Scanning
  • 27. Private cloud & SDDC Virtualized & bare-metal datacenterPublic cloud IaaS Halo security analytics engine Halo administration web portal Halo REST API gateway HALO SECURITY MODULES • Firewall policy orchestration • Multi-factor authentication • File integrity monitoring • Configuration security monitoring • Software vulnerability scanning • System access management
  • 28. Workload VM Instance Operating System Application Code System Administration Services Application Engine App Storage Volume System Storage Volume Halo Daemon 1 Halo activates firewall on boot, applies latest policies, and orchestrates ongoing policy updates. 1 2 Halo secures privileged access via dynamic firewall rules triggered by multi-factor user authentication. 2 4 Application configurations are scanned for vulnerabilities and are continuously monitored. 4 5 Cryptographic integrity monitoring ensures app code and binaries are not compromised. 5 6 Halo monitors system binary and config files for correct ACLs, file integrity, and vulnerabilities. 6 Halo scans O.S. configurations for vulnerabilities and continuously monitors O.S. state and activity. 3 3 7 Application data stores are monitored for access; outbound firewall rules prevent data extrusion. 7
  • 29. © 2013 CloudPassage Inc. Solving Cloud Security Challenges Cloud Complications Virtualization and multi- tenancy Maintaining visibility Taming change management Supporting automation & DevOps CloudPassage Approach Build security into cloud stack Design for automation, portability, an d scalability Broad range of security controls Simplify compliance management
  • 30. © 2013 CloudPassage Inc. Cloud Security Case Studies
  • 31. © 2013 CloudPassage Inc. Poll: SaaS Offerings • Today, what percentage of your business is from a SaaS offering (vs boxed product or other?) – All – More than half – Less than half – None – Not applicable to our organization
  • 32. © 2013 CloudPassage Inc. Case Study: Enabling SaaSification • Top 10 Fortune’s software list • Corporate imperative move boxed product to SaaS • Security is paramount; customers demand SOC2, HIPAA, etc • Running across mix of AWS, VMware, and others
  • 33. © 2013 CloudPassage Inc. Case Study: Enabling SaaSification Product Line 1 Product Line 2 Product Line 3 SaaS Product 1 SaaS Product 2 SaaS Product 3 Halo automates security and compliance for each BU running in cloud Halo security platform Halo Benefits • Enable fast and agile DevOps model • Security built into stack for portability • Ensures consistency of servers, visibility, and enables rapid response
  • 34. © 2013 CloudPassage Inc. Case Study: Securing Acquisitions • B2B SaaS pioneer • Core product in virtualized datacenters, traditional security practices • 20+ acquisitions for growth: most built in public cloud • Must extend security and compliance across any infrastructure
  • 35. © 2013 CloudPassage Inc. Case Study: Securing Acquisitions Core Product Datacenter & IT Security Operations Halo provides security and compliance across all environments Acquisitions built in public & private clouds Halo Benefits • Easily installs into any cloud architecture • No disruption to development pace • Extends existing security operations to cloud
  • 37. Summary • SaaS businesses require strong security • Cloud-based development complicates traditional security • Security and compliance must enhance, not slow down, agile SaaS development • Focus security architecture on automation, portability, and visibility Copyright © 2013 IANS. All rights reserved. 37
  • 38. Q&A and Additional Information Dave Shackleford Lead Faculty, IANS @ians_security Copyright © 2013 IANS. All rights reserved. 38 cloudpassage.com/saas Rand Wacker VP, Producs @cloudpassage Securing SaaS whitepaper Request a Halo demo or free trial