Ciso executive summit 2012

27
Scaling the Cloud Bill Burns Director, Information Security & Networking CISO Executive Summit Nov 27, 2012 Thursday, November 29, 12

description

Evolution of Netflix's cloud security strategy. Includes cloud-based key management and hybrid security controls that span traditional datacenter and public cloud.

Transcript of Ciso executive summit 2012

Page 1: Ciso executive summit 2012

Scaling the Cloud

Bill BurnsDirector, Information Security & Networking

CISO Executive SummitNov 27, 2012

Thursday, November 29, 12

Page 2: Ciso executive summit 2012

Agenda

•Netflix Background and Culture

•Why We Moved to the Cloud

• InfoSec Challenges, Solutions in a hybrid DataCenter/ IaaS Cloud: C.I.A.

• InfoSec Take-Aways: Running In The Cloud

Thursday, November 29, 12

Page 3: Ciso executive summit 2012

NetflixBusiness

• 30+ million members globally

• Streaming in 51 countries

• 1B hours streamed/month

•Watched on 1000+ devices

• 33% of US peak evening Internet traffic

(c) 2011 SandvineThursday, November 29, 12

Page 4: Ciso executive summit 2012

Background and Context

•High Performance Culture

•Fail Fast, Learn Fast ... Get Results

•Some core values:

•“Freedom & Responsibility”

•“Loosely-Coupled, Highly-Aligned”

•“Context not control”

Thursday, November 29, 12

Page 5: Ciso executive summit 2012

Engineering-Centric Culture

•Sought the Cloud for Availability, Capacity

• ...and also found Agility

•DevOps / NoOps means engineering teams own:

•New deployments and upgrades

•Capacity planning & procurement

Thursday, November 29, 12

Page 6: Ciso executive summit 2012

Freedom&

Responsibility

Thursday, November 29, 12

Page 7: Ciso executive summit 2012

Demand vs Capacity

37x growth in13 months

Then-current DataCenter

Capacity

Thursday, November 29, 12

Page 8: Ciso executive summit 2012

Cloud:On-Demand Capacity

1. Demand: Typical pattern of customer requests rise & fall over time

2. Reaction: System automatically adds, removes servers to the application pool

3. Result: Overall utilization stays constant

1

Demand

2

# Servers

3

Utilization

Thursday, November 29, 12

Page 9: Ciso executive summit 2012

Running In The Cloud :: InfoSec Perspective

Thursday, November 29, 12

Page 10: Ciso executive summit 2012

InfoSec In The Cloud :: Harder

1.“Your IP address attacked me yesterday. Please stop it!”2.Dealing with other people’s traffic at your front door 3.Herding ephemeral instances with vendor applications4.Trusting endpoints, infrastructure5.Key management

Thursday, November 29, 12

Page 11: Ciso executive summit 2012

InfoSec In our Cloud :: Easier

1.Reacting to business velocity

2.Detecting instance changes

3.Application ownership, management

4.Patching, updating

5.Availability, in a environment you don’t control

6.Embedding security controls

7.Least privilege enforcement

8.Testing/auditing for conformance

9.Consistency, conformity in environment

Thursday, November 29, 12

Page 12: Ciso executive summit 2012

InfoSec DevOps :: Staying Relevant

•“Communication is what the listener does” – Mark Horstman, Manager Tools podcast / Peter Drucker

•My team’s goal: InfoSec program adds value, deeper part of the business’ success, not a “bolt-on”

•Pain: Learning a new vocabulary, systems thinking

•End result: We like this model a lot!

Thursday, November 29, 12

Page 13: Ciso executive summit 2012

InfoSec Challenges In An IaaS CloudU"lity'

Authen"city'

Possession'

Confiden"ality'

Integrity'

Availability'

Thursday, November 29, 12

Page 14: Ciso executive summit 2012

InfoSec Challenge in an IaaS Cloud :: Availability

Thursday, November 29, 12

Page 15: Ciso executive summit 2012

Availability :: Assume failures

•You’re only good at what you regularly test for

•If you fear a failure mode, find a way to automate a test for that

•Chaos Monkey/Gorilla induce failures, help us practice recovery

•Include security control systems in your failure testing too!

(c) Courtesy Flikr - WintonThursday, November 29, 12

Page 16: Ciso executive summit 2012

The Netflix Simian Army & other Security Controls

•Striving for continuous testing, monitoring

• Identify and test common failure modes

•Automation everywhere

• Chaos Monkey - Randomly kills instances

• Chaos Gorilla - Evacuates entire data centers

• Janitor Monkey – Ensures a clean inventory

• Security Monkey – Various security checks

• Exploit Monkey – Under development

• Critical Systems – File integrity monitoring, HIDS, WAF baked in as needed

Thursday, November 29, 12

Page 17: Ciso executive summit 2012

InfoSec Challenge in an IaaS Cloud :: Integrity

Thursday, November 29, 12

Page 18: Ciso executive summit 2012

Key: Automation

Thursday, November 29, 12

Page 19: Ciso executive summit 2012

Integrity ::Patching

•Goal: Running instances do not get patched•Alternative:•Bake a new AMI for any change•Launch, test new instances in parallel•Kill the old instances

Thursday, November 29, 12

Page 20: Ciso executive summit 2012

Integrity ::Upgrades

• Bake a new AMI for any change

• Launch new instances in parallel

• Kill the old instances

Lesson Learned: Make the secure-and-consistent behavior the easier alternative.

Thursday, November 29, 12

Page 21: Ciso executive summit 2012

Embedding Security Controls

• Controls baked into our templates

• Places controls near the data

• Automation ensures coverage as machines born, replaced

• Security controls are “Data Center agnostic”

• Provide a single view of attack surface

• Evolving, work in progress

Thursday, November 29, 12

Page 22: Ciso executive summit 2012

Security Controls: WAF Example

• Sample Control: Web Application Firewall

• Software-only, baked-in AMI

• Control spans all environments, regions

• Consistent control, view

• Zero effort for developer to add protection

Thursday, November 29, 12

Page 23: Ciso executive summit 2012

Automation =Conformity &Consistency

• All apps, tiers are Highly Available

• Secure defaults applied automatically

• Replacement instances look just like the originals

• Includes security controls

Thursday, November 29, 12

Page 24: Ciso executive summit 2012

InfoSec Challenge in an IaaS Cloud :: Confidentiality/Possession

Thursday, November 29, 12

Page 25: Ciso executive summit 2012

Key Management :: Cloud Hardware Security Modules (HSMs)

• Problem:

• Need crypto keys near the Cloud

• HSMs are in the data center • Can’t entirely trust our CSP

• Motivation:

• Want to decouple DC and Cloud

• Want to trust our Cloud more fully

• If we want this, others will probably want it too.

• Solution:

• A real HSM: FIPS 140-2 certified hardware

• Keys stay in hardware

• “HSM as a Service”

Thursday, November 29, 12

Page 26: Ciso executive summit 2012

InfoSec CloudTake-Aways

• Our cloud operations and DevOps models were disruptive to:

• Engineering, Auditors, Vendors, and other Operations teams

• Our InfoSec team:

• Learned new cloud operational approaches, techniques, our PaaS

• Wrote/consumed APIs and services, learned a new AWS alphabet soup

• Had to tweak most software to fit this model; easier to start cloud first

• Worked with partners to implement new security controls

Thursday, November 29, 12