SlideShare a Scribd company logo
Secure Multi Tenancy In the Cloud



               Boris Strongin
 VP Engineering and Co-founder, Hytrust Inc.
           bstrongin@hytrust.com
At-a-Glance Trends

                                                                                           Increased Insider Threat
     Do MORE with LESS


                                                                                              Increasing IT spend on cloud

                                                                                              IT budget remains almost flat


                       1H11                           2H11                  1H12                       2H12

      ~10-35% virtualized                  ~35-50% virtualized

                                                                               ~50-80% virtualized

                      Major vendors: Repurpose and Aggregate

                                                                    Major vendors: Purpose-built


          - Resource constraints        - Compliance             - Many point solutions
  Pain    - Lack of skills              - Loss of control        - Multi-tenancy
          - Access control              - Lack of visibility     - Data protection

          - Infrastructure/Platform (influenced by Security)      - Business Application Owner (approval by
  Buyer
          - Ad-hoc                                               Security/Compliance/Risk)
Virtualization Challenges and Opportunities
The blurring line between Security and Management

—  Need to manage the complexity also in Security
   −  Heterogeneous VM platforms create security complexity
   −  Vary in approach to security and management

—  Unstructured physical boundaries make it harder to protect services and data
   −  VM mobility/distribution, copying/cloning, memory protection, etc.
   −  Where can my data migrate to? And who are my neighbors?

—  Unstructured time dimension challenges integrity
   −  VM reversion can result in lost audit events, security configurations, security policies,
      etc.

—  Virtualization Servers are subject to regulatory controls
   −  Physical systems are at greater risk as VMs share hardware
   −  Enhanced need for segregation of duties - New level of administration is introduced with the
      Hypervisor / Privileged Partitions
   −  Implication of VM mobility to privacy laws.
Virtualization Platform Effects on Security




  Abstraction and                 Collapse of switches and         Faster deployment in
  Consolidation                   servers into one device          shared environment
  •  ↑ Capital and Operational    •  ↑ Flexibility                 •  ↑ IT responsiveness
     Cost Savings                 •  ↑ Cost-savings                •  ↓ Inconsistencies in
  •  ↓ New infrastructure layer   •  ↓ Lack of visibility and         configuration
     to be secured and subject       control for virtual network   •  ↓ Physical change
     to compliance                   and storage                      processes ineffective
  •  ↓ Greater impact of attack   •  ↓ No separation of church     •  ↓ Inadequate tenant
     or misconfiguration             and state (network,              segmentation
                                     security, storage
                                     administration)
Virtualization Containers Effects on Security




  Fuzzy time boundaries        VM Mobility                   VM Encapsulation
  •  ↑ Great availability /    •  ↑ Improved Service         •  ↑ Ease DR
     recovery mechanism           Levels                     •  ↑ Hardware Independence
  •  ↓ Security and audit      •  ↓ Identity divorced from   •  ↓ Outdated offline systems
     events can be lost           physical location          •  ↓ Unauthorized copy
  •  ↓ Changes in time are     •  ↓ Policies may not         •  ↓ Reconfiguring virtual
     not visible from inside      follow virtual machine        hardware and console
     the virtual server                                         access are over the network
                                                                operations
New Security and Control Challenges in the Cloud

—  Investment in Cloud is growing due to agility, economic and operational benefits
   −  Enterprises adopt private cloud first, with strategy to go to hybrid and public cloud in the future

—  Tenants need to retain control and audit capabilities
   −  Tenants are ultimately responsible for compliance and standard of care of their workloads
   −  Automation and self-service capabilities are required

—  Providers need to manage complexity and enforce security
   −  Infrastructure as a service management including hypervisor and VM containers
   −  Compliance and security management as a premium service
                                                                                                                                                                                                             public	
  cloud	
  
                                                                                                                                                                 app	
  3	
  
                                                                                                                                                                                app	
  3	
   app	
  1	
      app	
  1	
        app	
  2	
  
                                                                                                                                                  app	
  3	
                            customer	
  1	
   customer	
  2	
   customer	
  n	
  
                                                           enterprise	
  private	
  cloud	
                                        app	
  3	
  



                 enterprise	
  datacenter	
                    app	
  1	
       app	
  2	
        app	
  3	
  
                                                                                                                    app	
  3	
  
                                                                                                                                                                                                   hyper	
  visor	
  
                                                                 app	
  1	
        app	
  2	
        app	
  3	
  

                                                                                                                                                                                                             hardware
             app1	
       app2	
      app3	
  
                                                                       hyper	
  visor	
  
                                                                        hyper	
  visor	
  
            hardwar      hardwar     hardwar                                                                                                                                                       iam
               e	
          e	
         e	
                                       hardware
                                                                                hardware 	
  

                                                 iam	
  
Co-management
  Accountability
   •    Access rules per resource; identities, credentials, roles, groups

  Transparency
   •    Workload location, infrastructure segmentation and segregation

  Visibility
   •    Per-tenant audit logs and reporting
Secure Multi-Tenancy

— Logical infrastructure segregation to provide tenant-level
  separation for service providers as well as application and
  line-of-business multi-tenancy for enterprises
— Policy labels used to provide resource-level classification
  (tenant, application tier, security zone, etc.) which provide
  compute, network and resource segregation
— Persistent policy labels for mobile VM workloads (hybrid
  cloud)
— Self service tied to tenant- and resource-level policy labels
— Per-tenant audit logging for virtual infrastructure and VM-
  level administrative changes
Security zones and multi-tenant policies in the
“shared” model
                             Security Requirements:

                             “Shared” Model: User can select default security policy
                             for each instance of sandbox/template within a shared
                             compute pool.

                             Security Zone (non-optional) has defined security policy.
                             Compute, storage and network resources shared as a
                             pool with ability to offer isolation.

                             Security Policy Enforcement:

                             Each sandbox and VM/server instance gets
                             classified during provisioning by applying tags.
                                   a)  Tenant/departmental ownership
                                   b)  Zone requirements
                                   c)  Custom security posture requirements
                                   d)  Real-time tags based on internal
                                       VM metadata
                             Security policy gets enforced by HyTrust Appliance
                             in real time based on sandbox tags (policies are global
                             and/or tenant specific). Policy includes segmentation of
                             resource pool/zone and network.
Security zones and multi-tenant policies in the
“dedicated” model
                             Security Requirements:
                             “Dedicated” Model: Each Compute Pool (configured on a
                             per-tenant basis) has a Security Zone and Policy.

                             Complete isolation between the tenants.

                             Security Policy Enforcement:

                             “Dedicated” Model (higher security) - Each compute
                             pool gets labeled based on tenant ownership and
                             security configuration.
                                 a)  Policy includes segmentation by resource
                                      pool/zone and network.
                                 b)  Security policy gets enforced by HyTrust
                                      Appliance in real time based on sandbox tags
                                      (policies are global and/or tenant specific).
                                 c)  The policies enforce access control and
                                      compliance (controlling privileged access to the
                                      host, separation of duties, audit reporting, etc).
                                 d)  Security policies (tags) are selected by a
                                      service consumer as a part of reservation
                                      management process (low, medium, high) for
                                      the type of workload (web, database, etc.)
                                      requested.

More Related Content

PDF
Intel Cloud Summit: Greg Brown McAfee
PDF
Regulatory compliant cloud computing rethinking web application architectures...
PDF
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
PDF
Security & Virtualization in the Data Center
PDF
Netflow analyzer- Datasheet
PDF
Turning Technology Threats into Opportunities – The Licensing View
PPT
Session Delivery Networks for the Enterprise
PPTX
Technical Cyber Defense Strategies Explained!
Intel Cloud Summit: Greg Brown McAfee
Regulatory compliant cloud computing rethinking web application architectures...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
Security & Virtualization in the Data Center
Netflow analyzer- Datasheet
Turning Technology Threats into Opportunities – The Licensing View
Session Delivery Networks for the Enterprise
Technical Cyber Defense Strategies Explained!

What's hot (17)

PPTX
BayThreat Why The Cloud Changes Everything
PPTX
Softchoice Webinar Series: VMware vSphere 5.1 Changes
PDF
Five Must Haves to Prevent Encryption Disasters
PDF
Antivirus específicos para entornos virtualizados
PDF
Four Must Know Certificate and Key Management Threats That Can Bring Down You...
PDF
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
PPTX
Trend micro v2
PPT
CCNA Security - Chapter 7
PDF
Juniper Enterprise Guest Access
PDF
BOI 2011 - Be what's next
PDF
Datacryptor Ethernet Layer 2 Rel 4.5
PPTX
PDF
Streamline it & save with virtualization
PDF
ccmigration_09186a008033a3b4
PPT
Refense Security Risk Briefing July 2009
PPTX
Managed vs customer presentation
PDF
Cloud servers-new-risk-considerations
BayThreat Why The Cloud Changes Everything
Softchoice Webinar Series: VMware vSphere 5.1 Changes
Five Must Haves to Prevent Encryption Disasters
Antivirus específicos para entornos virtualizados
Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
Trend micro v2
CCNA Security - Chapter 7
Juniper Enterprise Guest Access
BOI 2011 - Be what's next
Datacryptor Ethernet Layer 2 Rel 4.5
Streamline it & save with virtualization
ccmigration_09186a008033a3b4
Refense Security Risk Briefing July 2009
Managed vs customer presentation
Cloud servers-new-risk-considerations
Ad

Viewers also liked (19)

PPT
Storage Multi-Tenancy For Cloud Service Providers
PPT
Requirements of Storage Multitenancy
PPTX
PPTX
Transforming the CSO Role to Business Enabler
PPTX
Simplifying Security Management in the Virtual Data Center
PPTX
Rethinking Security: The Cloud Infrastructure Effect
PDF
HyTrust and VMware-Providing a Secure Virtual Infrastructure
PDF
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
PPTX
SDDC Study: SDDC Goes Mainstream
PDF
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
PPTX
Outcome of democracy
PDF
VMware Outlines Its Own Journey to the Cloud
PDF
Multi-tenancy in the cloud
PPTX
Control the Creep: Streamline Security and Compliance by Sharing the Workload
PDF
Enemy from Within: Managing and Controlling Access
PPTX
Multi Tenancy In The Cloud
PDF
Protecting the Software-Defined Data Center from Data Breach
PDF
Multi-tenancy in Java
PDF
Cyber security threats for 2017
Storage Multi-Tenancy For Cloud Service Providers
Requirements of Storage Multitenancy
Transforming the CSO Role to Business Enabler
Simplifying Security Management in the Virtual Data Center
Rethinking Security: The Cloud Infrastructure Effect
HyTrust and VMware-Providing a Secure Virtual Infrastructure
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
SDDC Study: SDDC Goes Mainstream
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Outcome of democracy
VMware Outlines Its Own Journey to the Cloud
Multi-tenancy in the cloud
Control the Creep: Streamline Security and Compliance by Sharing the Workload
Enemy from Within: Managing and Controlling Access
Multi Tenancy In The Cloud
Protecting the Software-Defined Data Center from Data Breach
Multi-tenancy in Java
Cyber security threats for 2017
Ad

Similar to Secure Multi Tenancy In the Cloud (20)

PDF
Build the foundation for Private Cloud
PDF
XS Japan 2008 Ganeti English
PDF
Windows Azure Overview
PDF
S24 – Virtualiza.on Security from the Auditor Perspec.ve
PPTX
Harness the Power of the Cloud
PDF
Decrease TCO w/ Server-side App Virtualization
PDF
Virtual sharp cloud aware bc dr up 2012 cloud
PDF
Server Virtualization in Manufacturing Operations
PDF
Using Server Virtualization for Manufacturing Operations
PPTX
Windows Azure'a Giriş
PPTX
Windows Azure'a Giriş
PDF
Cloud Architectures for Alpha Dogs!
PDF
V c loudapi_coffeetalk__pimplaskar_may2010
PDF
2nd day 2 - bsm overview
PPTX
DaaS/IaaS Forum Moscow - Ivo Murris
PPTX
Cloud computing
PPTX
The Ever Changing Cloud, CloudExpo 2012
PDF
AppZero & GoGrid: Moving Windows Server Apps to Cloud in 3 Easy Steps
PDF
Cloud Foundry Open Tour India 2012 , Keynote
PDF
Intel IT OpenStack Journey - OpenStack Fall 2012 Summit.pdf
Build the foundation for Private Cloud
XS Japan 2008 Ganeti English
Windows Azure Overview
S24 – Virtualiza.on Security from the Auditor Perspec.ve
Harness the Power of the Cloud
Decrease TCO w/ Server-side App Virtualization
Virtual sharp cloud aware bc dr up 2012 cloud
Server Virtualization in Manufacturing Operations
Using Server Virtualization for Manufacturing Operations
Windows Azure'a Giriş
Windows Azure'a Giriş
Cloud Architectures for Alpha Dogs!
V c loudapi_coffeetalk__pimplaskar_may2010
2nd day 2 - bsm overview
DaaS/IaaS Forum Moscow - Ivo Murris
Cloud computing
The Ever Changing Cloud, CloudExpo 2012
AppZero & GoGrid: Moving Windows Server Apps to Cloud in 3 Easy Steps
Cloud Foundry Open Tour India 2012 , Keynote
Intel IT OpenStack Journey - OpenStack Fall 2012 Summit.pdf

More from Roger Xia (20)

PPTX
机器学习推动金融数据智能
PPTX
Code reviews
PPTX
Python introduction
PPT
Learning notes ruby
PDF
Converged open platform for enterprise
PPTX
Code reviews
PDF
E commerce search strategies
PDF
Saml
PDF
JavaEE6
PDF
Indefero source code_managment
PDF
Web Services Atomic Transactio
DOCX
Web service through cxf
PDF
Q con london2011-matthewwall-whyichosemongodbforguardiancouk
PDF
Spring one2gx2010 spring-nonrelational_data
PDF
Consistency-New-Generation-Databases
PDF
Java explore
PDF
Mongo db实战
PDF
Ca siteminder
PDF
Fixing twitter
DOCX
Eclipse plug in mylyn & tasktop
机器学习推动金融数据智能
Code reviews
Python introduction
Learning notes ruby
Converged open platform for enterprise
Code reviews
E commerce search strategies
Saml
JavaEE6
Indefero source code_managment
Web Services Atomic Transactio
Web service through cxf
Q con london2011-matthewwall-whyichosemongodbforguardiancouk
Spring one2gx2010 spring-nonrelational_data
Consistency-New-Generation-Databases
Java explore
Mongo db实战
Ca siteminder
Fixing twitter
Eclipse plug in mylyn & tasktop

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Approach and Philosophy of On baking technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Big Data Technologies - Introduction.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
A Presentation on Artificial Intelligence
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Electronic commerce courselecture one. Pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Cloud computing and distributed systems.
Understanding_Digital_Forensics_Presentation.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Approach and Philosophy of On baking technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Digital-Transformation-Roadmap-for-Companies.pptx
MYSQL Presentation for SQL database connectivity
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Big Data Technologies - Introduction.pptx
Empathic Computing: Creating Shared Understanding
Mobile App Security Testing_ A Comprehensive Guide.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
A Presentation on Artificial Intelligence
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Electronic commerce courselecture one. Pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Cloud computing and distributed systems.

Secure Multi Tenancy In the Cloud

  • 1. Secure Multi Tenancy In the Cloud Boris Strongin VP Engineering and Co-founder, Hytrust Inc. bstrongin@hytrust.com
  • 2. At-a-Glance Trends Increased Insider Threat Do MORE with LESS Increasing IT spend on cloud IT budget remains almost flat 1H11 2H11 1H12 2H12 ~10-35% virtualized ~35-50% virtualized ~50-80% virtualized Major vendors: Repurpose and Aggregate Major vendors: Purpose-built - Resource constraints - Compliance - Many point solutions Pain - Lack of skills - Loss of control - Multi-tenancy - Access control - Lack of visibility - Data protection - Infrastructure/Platform (influenced by Security) - Business Application Owner (approval by Buyer - Ad-hoc Security/Compliance/Risk)
  • 3. Virtualization Challenges and Opportunities The blurring line between Security and Management —  Need to manage the complexity also in Security −  Heterogeneous VM platforms create security complexity −  Vary in approach to security and management —  Unstructured physical boundaries make it harder to protect services and data −  VM mobility/distribution, copying/cloning, memory protection, etc. −  Where can my data migrate to? And who are my neighbors? —  Unstructured time dimension challenges integrity −  VM reversion can result in lost audit events, security configurations, security policies, etc. —  Virtualization Servers are subject to regulatory controls −  Physical systems are at greater risk as VMs share hardware −  Enhanced need for segregation of duties - New level of administration is introduced with the Hypervisor / Privileged Partitions −  Implication of VM mobility to privacy laws.
  • 4. Virtualization Platform Effects on Security Abstraction and Collapse of switches and Faster deployment in Consolidation servers into one device shared environment •  ↑ Capital and Operational •  ↑ Flexibility •  ↑ IT responsiveness Cost Savings •  ↑ Cost-savings •  ↓ Inconsistencies in •  ↓ New infrastructure layer •  ↓ Lack of visibility and configuration to be secured and subject control for virtual network •  ↓ Physical change to compliance and storage processes ineffective •  ↓ Greater impact of attack •  ↓ No separation of church •  ↓ Inadequate tenant or misconfiguration and state (network, segmentation security, storage administration)
  • 5. Virtualization Containers Effects on Security Fuzzy time boundaries VM Mobility VM Encapsulation •  ↑ Great availability / •  ↑ Improved Service •  ↑ Ease DR recovery mechanism Levels •  ↑ Hardware Independence •  ↓ Security and audit •  ↓ Identity divorced from •  ↓ Outdated offline systems events can be lost physical location •  ↓ Unauthorized copy •  ↓ Changes in time are •  ↓ Policies may not •  ↓ Reconfiguring virtual not visible from inside follow virtual machine hardware and console the virtual server access are over the network operations
  • 6. New Security and Control Challenges in the Cloud —  Investment in Cloud is growing due to agility, economic and operational benefits −  Enterprises adopt private cloud first, with strategy to go to hybrid and public cloud in the future —  Tenants need to retain control and audit capabilities −  Tenants are ultimately responsible for compliance and standard of care of their workloads −  Automation and self-service capabilities are required —  Providers need to manage complexity and enforce security −  Infrastructure as a service management including hypervisor and VM containers −  Compliance and security management as a premium service public  cloud   app  3   app  3   app  1   app  1   app  2   app  3   customer  1   customer  2   customer  n   enterprise  private  cloud   app  3   enterprise  datacenter   app  1   app  2   app  3   app  3   hyper  visor   app  1   app  2   app  3   hardware app1   app2   app3   hyper  visor   hyper  visor   hardwar hardwar hardwar iam e   e   e   hardware hardware   iam  
  • 7. Co-management   Accountability •  Access rules per resource; identities, credentials, roles, groups   Transparency •  Workload location, infrastructure segmentation and segregation   Visibility •  Per-tenant audit logs and reporting
  • 8. Secure Multi-Tenancy — Logical infrastructure segregation to provide tenant-level separation for service providers as well as application and line-of-business multi-tenancy for enterprises — Policy labels used to provide resource-level classification (tenant, application tier, security zone, etc.) which provide compute, network and resource segregation — Persistent policy labels for mobile VM workloads (hybrid cloud) — Self service tied to tenant- and resource-level policy labels — Per-tenant audit logging for virtual infrastructure and VM- level administrative changes
  • 9. Security zones and multi-tenant policies in the “shared” model Security Requirements: “Shared” Model: User can select default security policy for each instance of sandbox/template within a shared compute pool. Security Zone (non-optional) has defined security policy. Compute, storage and network resources shared as a pool with ability to offer isolation. Security Policy Enforcement: Each sandbox and VM/server instance gets classified during provisioning by applying tags. a)  Tenant/departmental ownership b)  Zone requirements c)  Custom security posture requirements d)  Real-time tags based on internal VM metadata Security policy gets enforced by HyTrust Appliance in real time based on sandbox tags (policies are global and/or tenant specific). Policy includes segmentation of resource pool/zone and network.
  • 10. Security zones and multi-tenant policies in the “dedicated” model Security Requirements: “Dedicated” Model: Each Compute Pool (configured on a per-tenant basis) has a Security Zone and Policy. Complete isolation between the tenants. Security Policy Enforcement: “Dedicated” Model (higher security) - Each compute pool gets labeled based on tenant ownership and security configuration. a)  Policy includes segmentation by resource pool/zone and network. b)  Security policy gets enforced by HyTrust Appliance in real time based on sandbox tags (policies are global and/or tenant specific). c)  The policies enforce access control and compliance (controlling privileged access to the host, separation of duties, audit reporting, etc). d)  Security policies (tags) are selected by a service consumer as a part of reservation management process (low, medium, high) for the type of workload (web, database, etc.) requested.