Open stack security emea launch

31
OpenStack Security A Primer

Transcript of Open stack security emea launch

Page 1: Open stack security   emea launch

OpenStack SecurityA Primer

Page 2: Open stack security   emea launch

Me: Joshua McKentyTwitter: @jmckentyEmail: [email protected]

Former Chief Architect, NASA NebulaFounding Member, OpenStackOpenStack Project Policy Board

Page 3: Open stack security   emea launch

“If you think technology can solve your security problems,

then you don’t understand the problems and you don’t

understand the technology.” – Bruce Schneier

Page 4: Open stack security   emea launch
Page 5: Open stack security   emea launch

Theatre

“Proof”

Real Security

The Three Pillars of Security

Page 6: Open stack security   emea launch

“Bonus” Security Pillar

Theatre

“Proof”Real

Security

Forensics

Page 7: Open stack security   emea launch

Real Security

Assume everything goes wrong, even impossible things.

Page 8: Open stack security   emea launch

FIPS 199 Definition: Confidentiality Integrity Availability

Defining Security

Page 9: Open stack security   emea launch

Defining Vulnerability

Page 10: Open stack security   emea launch

Build on “Shared Nothing” to achieve “Trust No One” Also known as “Defense in Depth”

AUTOMATE EVERYTHING “Fat Fingers” == Plausible Deniability Automated == non-repudiable change control

Build to the OSI 7-layer model

Page 11: Open stack security   emea launch

Layer 1

Page 12: Open stack security   emea launch

Lock your doors Do your background checks Use separate physical networks for admin Network model and management

Use RFC 1918 address space when appropriate Use VLANs if necessary

Firewall every machine (ebtables, iptables) Border firewalls (port and protocol level)

Layer 1, 2 and 3

Page 13: Open stack security   emea launch

Never assume it’s bilateral

Page 14: Open stack security   emea launch

Control system access Best case: no host-based shell access AT ALL. Second-best: federated AUTH with 2-factor,

keys only Worst case: Host-level root login with

passwords Run IDS – on hosts and guests Scan Continuously – hosts and guests, on all

networks Proactively defend – Fail2Ban, etc. ( F2B-a-a-

S)

Layer 4, 5, 6 and 7

Page 15: Open stack security   emea launch

Don't trust the hypervisor (TXT / TPM) Conversely, don't trust the VM (blue-pill

exploits, etc.) Host-based FW within the VM (CloudPassage

"Halo") Access-control for VMs – same approaches

apply (Auth-as-a-Service)

Layer ‘V’

Page 16: Open stack security   emea launch

“Proof” and PolicyIn God We Trust – All Others, Bring Data.

Page 17: Open stack security   emea launch
Page 18: Open stack security   emea launch

Classic best practices – redundant, off-site log servers

Log aggregation and analysis / event detection

Logging-as-a-Service

Log early, log often

Page 19: Open stack security   emea launch

Make and verify your assertions (Coming soon…)

CloudAudit

Page 20: Open stack security   emea launch

Did you remember to delete his account?

Page 21: Open stack security   emea launch

Security Theatre

“Given enough hand-waving, all systems are secure.”

Page 22: Open stack security   emea launch
Page 23: Open stack security   emea launch

Crypto is useless – if keys are stored with the data

Private networks are useless – if doors aren’t locked

Certification only proves that you’re doing, what you said you were going to do. You can still be wrong.

Forget “Trust, but verify”. Just don’t trust.

Don’t get confused!

Page 24: Open stack security   emea launch

Bonus: ForensicsIt’s not an “If” – it’s a “When”

Page 25: Open stack security   emea launch

Have a chaos-monkey of compromise Can you perform forensics and remediation,

without impacting other users of your cloud? Spanning ports and extra storage “Graveyard” for recently deleted images,

instances

Bonus Section: Forensics

Page 26: Open stack security   emea launch

What’s in the CloudPipe?

“We can only see a short distance ahead, but we can see plenty there that needs to be done.”

– Alan Turing

Page 27: Open stack security   emea launch

The MachineAka “Sneaky Monkey”

Continuous Integration of penetration and vulnerability testing.

Page 28: Open stack security   emea launch

We’re doing “stuff” No… really.

Hardening

Page 29: Open stack security   emea launch

Outfoxing the fox Intel is working with many companies within

OpenStack, including Piston.

Trusted Execution

Page 30: Open stack security   emea launch

Questions?

Page 31: Open stack security   emea launch

Matt Linton – Nebula CSO Jesse Andrews – AnsoLabs Founder Soo Choi – 7120.7 Nazi Matt Chew- Spence – FIPS 199 Guru Keith Shackleford and James Williams Chris Kemp Bobby Cates, Dave Swagger, E. Lopez, Grace

De Leon, Guy with Gun #1, Guy with Gun #2…

Credits