Virtualization Security
to Enable the Private Cloud
Virtualization and Cloud:
Business Drivers


                        • Scalable

                        • Multi-Tenancy

                        • Efficiency

                        • Elastic

                        • Self-Service



                               Landscape of cloud security may
                           change based on the cloud implementation


2   Copyright © 2012, Intel Corporation. All rights reserved.
Virtualization Challenge

                                                                Server Virtualization
                                                                  Increases efficiency
                                                                Concentrates our assets

                                                           OPTIMIZATION CHALLENGE
          Efficiency                                                                      Controls

                                                                       Asset
                                                                      Density




3   Copyright © 2012, Intel Corporation. All rights reserved.
Virtualization Security Challenges:
    Key Risks


                                                         Technology:
                                                         Hypervisor integrity, multi-tenancy


                                                         Infrastructure:
                                                         Shared resources, management interfaces,
                                                         automation and support code


                                                         Operational:
                                                         Separation of duties, administrative access, path to
                                                         production, image protection and life-cycle


                                                         Application:
                                                         Code quality, development practices, application
                                                         characterization, pre-existing vulnerabilities

4   Copyright © 2012, Intel Corporation. All rights reserved.
Security Challenges:
Controls

Security is a balancing act between business needs and risk

                                                   •        Key controls
                                                   •        Careful trust segmentation
                                                   •        Application risk reviews
                                                   •        Identity and access controls
                                                   •        Proper classified data handling
                                                   •        Security event and incident logging




                   Intel IT’s “Protect to Enable” Security Strategy


5   Copyright © 2012, Intel Corporation. All rights reserved.
Security Challenges:
Implementation
Based on risks and controls how do we virtualize?

        Trust:
        Resistance to Compromise
        •      How much do we Trust an application or server?
        •      How much do we Trust the virtual environment?




        Consequence:
        Impact of Compromise
        •      How much Risk can a server or application accept?
        •      How much Risk does a virtual environment assume?




6   Copyright © 2012, Intel Corporation. All rights reserved.
Security Challenges:
Implementation
                                                  Granular Trust Environments

                                  High Trust Zone (HTZ):
                 Secured virtual environment, highest controls, managed risk


                             Medium Trust Zone (e.g. DMZ):
                  Secured virtual environment, high controls, managed risk


                                      Low Trust Zone (LTZ):
                       General virtual environment, low controls, varying risk



                                         Granular Trust Environments allow
                                         for balance of risk versus controls


7   Copyright © 2012, Intel Corporation. All rights reserved.
High Trust Zone:
Need and Concept

    • Controls relative to Risk Posture
     – Limited logical access, extra physical separation, more extensive
       monitoring, better vetting of applications
    • Solution
     – Create a trust zone for virtual
       servers and apps that
       require greater protection
    • Delivers
     – Granular Trust Enablement
     – Levels of controls are
       proportionate to value of assets
     – Strengthen application implementation security



8    Copyright © 2012, Intel Corporation. All rights reserved.
Lessons Learned

    • Holistic view of risk and vulnerability is required

    • Virtualization technology is still maturing

    • Virtualization administrators must be
      treated as a “super admin”

    • Applications and systems landing in the
      environment must be hardened




                                                 There are still functions that
                                                    cannot be virtualized

9   Copyright © 2012, Intel Corporation. All rights reserved.
To Learn More…
                Virtualizing High Security Servers radio show

                Looking into the Cloud radio show

                Virtualizing High-Security Servers paper




10   Copyright © 2012, Intel Corporation. All rights reserved.
More Resources
                 Enterprise Private Cloud Architecture

                 Rethinking Information Security

                 Information Security Protect to Enable Strategy video




               Learn more about Intel IT’s Initiatives at Intel.com/IT

11   Copyright © 2012, Intel Corporation. All rights reserved.
Legal Notices




This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.


Intel, and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
* Other names and brands may be claimed as the property of others.
Copyright © 2012, Intel Corporation. All rights reserved.




12   Copyright © 2012, Intel Corporation. All rights reserved.
Best Practices for Cloud Security

More Related Content

PDF
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
PPT
Cio ciso security_strategyv1.1
PDF
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
PDF
Enterprise Strategy for Cloud Security
PDF
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
PDF
HyTrust and VMware-Providing a Secure Virtual Infrastructure
PDF
Trend micro deep security
PDF
Trend Micro Dec 6 Toronto VMUG
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Cio ciso security_strategyv1.1
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Enterprise Strategy for Cloud Security
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
HyTrust and VMware-Providing a Secure Virtual Infrastructure
Trend micro deep security
Trend Micro Dec 6 Toronto VMUG

What's hot (20)

PDF
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
PDF
Trend Micro - Virtualization and Security Compliance
PPTX
From Physical to Virtual to Cloud
PDF
Cloud Security Checklist and Planning Guide Summary
PDF
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
PDF
Introduction - Trend Micro Deep Security
PDF
Defense Foundation Product Brief
PPTX
Trend micro v2
PPTX
Sådan undgår du misbrug af kundedata og fortrolig information
PPT
Ibm security overview 2012 jan-18 sellers deck
PPTX
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
PDF
Cloud Security: Perception VS Reality
PDF
Intel Cloud Summit: Greg Brown McAfee
PPTX
Cloud securityperspectives cmg
PDF
Axoss Network Vulnerability Assessment Services
PDF
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
PPT
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
PPT
Microsoft Forefront - Secure Endpoint Solution Presentation
PDF
Isc2conferancepremay15final
PPT
Trend micro real time threat management press presentation
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Trend Micro - Virtualization and Security Compliance
From Physical to Virtual to Cloud
Cloud Security Checklist and Planning Guide Summary
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Introduction - Trend Micro Deep Security
Defense Foundation Product Brief
Trend micro v2
Sådan undgår du misbrug af kundedata og fortrolig information
Ibm security overview 2012 jan-18 sellers deck
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Cloud Security: Perception VS Reality
Intel Cloud Summit: Greg Brown McAfee
Cloud securityperspectives cmg
Axoss Network Vulnerability Assessment Services
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Microsoft Forefront - Secure Endpoint Solution Presentation
Isc2conferancepremay15final
Trend micro real time threat management press presentation
Ad

Viewers also liked (20)

PPT
halloween
PPTX
jThree announcment 4-24
PPT
HNW_LiekeMuller001
PDF
How indie developer can conquer mobile tops with VK game platform
PPSX
Laws of interest to security professionals
PDF
Jamming on Collaboration
PPTX
Kb2 konsep tumbuh kembang
PDF
Lundi de la sorbonne Décembre 2016
PPTX
Monthly Games Platforms in the media - 2015 edition
PPTX
Talent mapping, for growing startups
PPTX
Game settings design
PDF
IT@Intel: Creating Smart Spaces with All-in-Ones
PPTX
Materi biologi x bab 2 struktur dan fungsi tumbuhan
PPTX
Producing for indies
PPSX
Moving from Flash to HTML5 – converting large projects
PPTX
Applied music: how to speak the composer’s language
PPT
Integrating Sustainable Consumption & Production
PDF
Вебинар ИБ АСУ ТП NON-STOP. Серия №11
PDF
2015 for Kickstarter
PDF
ИБ АСУ ТП NON-STOP. Серия 8. Требования по обеспечению ИБ систем автоматическ...
halloween
jThree announcment 4-24
HNW_LiekeMuller001
How indie developer can conquer mobile tops with VK game platform
Laws of interest to security professionals
Jamming on Collaboration
Kb2 konsep tumbuh kembang
Lundi de la sorbonne Décembre 2016
Monthly Games Platforms in the media - 2015 edition
Talent mapping, for growing startups
Game settings design
IT@Intel: Creating Smart Spaces with All-in-Ones
Materi biologi x bab 2 struktur dan fungsi tumbuhan
Producing for indies
Moving from Flash to HTML5 – converting large projects
Applied music: how to speak the composer’s language
Integrating Sustainable Consumption & Production
Вебинар ИБ АСУ ТП NON-STOP. Серия №11
2015 for Kickstarter
ИБ АСУ ТП NON-STOP. Серия 8. Требования по обеспечению ИБ систем автоматическ...
Ad

Similar to Best Practices for Cloud Security (20)

PDF
Securing virtualization in real world environments
PDF
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
PDF
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
PDF
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
PDF
Vss Security And Compliance For The Cloud
PDF
Vmware Seminar Security & Compliance for the cloud with Trend Micro
PDF
Ibm security virtual server protection
PDF
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
PDF
Day 3 p2 - security
PDF
Day 3 p2 - security
PPTX
Virtualizing Business cCritical Applications_ Darren Thomson
PPTX
Private cloud day session 5 a solution for private cloud security
PDF
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
PDF
Using Server Virtualization for Manufacturing Operations
PDF
Server Virtualization in Manufacturing Operations
PPTX
Data Centre Evolution: Securing Your Journey to the Cloud
PDF
Smau Bari 2012 Marco Soldi
PDF
Symantec Virtualization Launch VMworld 2012
PDF
Joe Honan Virtualization Trends
PPSX
The Evolution Of Server Virtualization By Hitendra Molleti
Securing virtualization in real world environments
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Vss Security And Compliance For The Cloud
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Ibm security virtual server protection
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
Day 3 p2 - security
Day 3 p2 - security
Virtualizing Business cCritical Applications_ Darren Thomson
Private cloud day session 5 a solution for private cloud security
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
Using Server Virtualization for Manufacturing Operations
Server Virtualization in Manufacturing Operations
Data Centre Evolution: Securing Your Journey to the Cloud
Smau Bari 2012 Marco Soldi
Symantec Virtualization Launch VMworld 2012
Joe Honan Virtualization Trends
The Evolution Of Server Virtualization By Hitendra Molleti

More from IT@Intel (12)

PPTX
Unlock Hidden Potential through Big Data and Analytics
PPTX
Intel and IT- key industry trends driving business transformation
PDF
IT@Intel: Introducing IT on the Go
PDF
Enterprise Video Hosting: Introducing the Intel Video Portal
PDF
How to Self-Provision over WLAN with Intel(R) vPro(TM) Technology
PDF
Accelerating Our Path to Multi Platform Benefits
PPTX
Deploying Intel Architecture-based Tablets with Windows* 8 at Intel
PPTX
Nurturing Innovation at Intel through Mindfulness
PPTX
Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets
PPTX
Six Irrefutable Laws of Information Security
PPTX
It tools slideshare
PPTX
Can Information Security Survive
Unlock Hidden Potential through Big Data and Analytics
Intel and IT- key industry trends driving business transformation
IT@Intel: Introducing IT on the Go
Enterprise Video Hosting: Introducing the Intel Video Portal
How to Self-Provision over WLAN with Intel(R) vPro(TM) Technology
Accelerating Our Path to Multi Platform Benefits
Deploying Intel Architecture-based Tablets with Windows* 8 at Intel
Nurturing Innovation at Intel through Mindfulness
Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets
Six Irrefutable Laws of Information Security
It tools slideshare
Can Information Security Survive

Recently uploaded (20)

PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
substrate PowerPoint Presentation basic one
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PPTX
Internet of Everything -Basic concepts details
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Ensemble model-based arrhythmia classification with local interpretable model...
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
CEH Module 2 Footprinting CEH V13, concepts
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PPTX
Build automations faster and more reliably with UiPath ScreenPlay
PDF
Human Computer Interaction Miterm Lesson
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Lung cancer patients survival prediction using outlier detection and optimize...
A symptom-driven medical diagnosis support model based on machine learning te...
substrate PowerPoint Presentation basic one
giants, standing on the shoulders of - by Daniel Stenberg
Internet of Everything -Basic concepts details
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
SGT Report The Beast Plan and Cyberphysical Systems of Control
Ensemble model-based arrhythmia classification with local interpretable model...
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
Electrocardiogram sequences data analytics and classification using unsupervi...
Introduction to MCP and A2A Protocols: Enabling Agent Communication
CEH Module 2 Footprinting CEH V13, concepts
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
LMS bot: enhanced learning management systems for improved student learning e...
Build automations faster and more reliably with UiPath ScreenPlay
Human Computer Interaction Miterm Lesson
Module 1 Introduction to Web Programming .pptx
Dell Pro Micro: Speed customer interactions, patient processing, and learning...

Best Practices for Cloud Security

  • 2. Virtualization and Cloud: Business Drivers • Scalable • Multi-Tenancy • Efficiency • Elastic • Self-Service Landscape of cloud security may change based on the cloud implementation 2 Copyright © 2012, Intel Corporation. All rights reserved.
  • 3. Virtualization Challenge Server Virtualization Increases efficiency Concentrates our assets OPTIMIZATION CHALLENGE Efficiency Controls Asset Density 3 Copyright © 2012, Intel Corporation. All rights reserved.
  • 4. Virtualization Security Challenges: Key Risks Technology: Hypervisor integrity, multi-tenancy Infrastructure: Shared resources, management interfaces, automation and support code Operational: Separation of duties, administrative access, path to production, image protection and life-cycle Application: Code quality, development practices, application characterization, pre-existing vulnerabilities 4 Copyright © 2012, Intel Corporation. All rights reserved.
  • 5. Security Challenges: Controls Security is a balancing act between business needs and risk • Key controls • Careful trust segmentation • Application risk reviews • Identity and access controls • Proper classified data handling • Security event and incident logging Intel IT’s “Protect to Enable” Security Strategy 5 Copyright © 2012, Intel Corporation. All rights reserved.
  • 6. Security Challenges: Implementation Based on risks and controls how do we virtualize? Trust: Resistance to Compromise • How much do we Trust an application or server? • How much do we Trust the virtual environment? Consequence: Impact of Compromise • How much Risk can a server or application accept? • How much Risk does a virtual environment assume? 6 Copyright © 2012, Intel Corporation. All rights reserved.
  • 7. Security Challenges: Implementation Granular Trust Environments High Trust Zone (HTZ): Secured virtual environment, highest controls, managed risk Medium Trust Zone (e.g. DMZ): Secured virtual environment, high controls, managed risk Low Trust Zone (LTZ): General virtual environment, low controls, varying risk Granular Trust Environments allow for balance of risk versus controls 7 Copyright © 2012, Intel Corporation. All rights reserved.
  • 8. High Trust Zone: Need and Concept • Controls relative to Risk Posture – Limited logical access, extra physical separation, more extensive monitoring, better vetting of applications • Solution – Create a trust zone for virtual servers and apps that require greater protection • Delivers – Granular Trust Enablement – Levels of controls are proportionate to value of assets – Strengthen application implementation security 8 Copyright © 2012, Intel Corporation. All rights reserved.
  • 9. Lessons Learned • Holistic view of risk and vulnerability is required • Virtualization technology is still maturing • Virtualization administrators must be treated as a “super admin” • Applications and systems landing in the environment must be hardened There are still functions that cannot be virtualized 9 Copyright © 2012, Intel Corporation. All rights reserved.
  • 10. To Learn More… Virtualizing High Security Servers radio show Looking into the Cloud radio show Virtualizing High-Security Servers paper 10 Copyright © 2012, Intel Corporation. All rights reserved.
  • 11. More Resources Enterprise Private Cloud Architecture Rethinking Information Security Information Security Protect to Enable Strategy video Learn more about Intel IT’s Initiatives at Intel.com/IT 11 Copyright © 2012, Intel Corporation. All rights reserved.
  • 12. Legal Notices This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Intel, and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries. * Other names and brands may be claimed as the property of others. Copyright © 2012, Intel Corporation. All rights reserved. 12 Copyright © 2012, Intel Corporation. All rights reserved.

Editor's Notes

  • #4: Virtualization and Cloud Aside from the technology, the main challenge with Virtualization is the flipside of benefits. With greater Efficiency comes greater asset density. And with greater asset density comes a larger attack surface. So the goal for us is figuring out the right level of controls that we need to expand and adopt.
  • #7: The key guidance for implementing controls steams from how we decide to handle Trust and Consequence.Before we build out our environments we consider the amount of trust that we want to build into them.And as we move servers and applications into these environment we consider how much risk they can assume.
  • #8: We came up with 3 kinds of virtualization environments. Low Trust Zones, High Trust Zones and something in between.In the case of the DMZ we started with a virtualization environment that at its core had a lot of risk from exposure to the internet. So we created multiple zones of consequence within that environment.In the case of the HTZ (High Trust Zone) we sough to create an environment that can be considered trustworthy. I’ll go into a little more detail on each of these next.
  • #9: The High Trust Zone came about from the need for virtualizing Internal Enterprise applications and servers that hosted Mission Critical data or business functions or systems and servers that hosted highly classified data. In our road down virtualization we hit a security limiter and needed to create a solution.