ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
Protecting systems and applications on virtual data centres and in
the cloud: challenges, emerging solutions and lessons learnt


 Dr Fadi El-Moussa - Senior Researcher – Malware Detection and prevention Specialist

 Dr Theo Dimitrakos – Chief Security Researcher – Head of Security Architectures Research

                                                                                            ºÝºÝߣ 1
Cyber Security: More Important than Ever




  COMPROMISES THAT CAN BE STOPPED
  THROUGH PROPER CONFIGURATION AND

  PATCH MANAGEMENT             90%
© British Telecommunications
plc

                                           ºÝºÝߣ 2
Cyber Security: More Important than Ever




SONY PLAYSTATION –100M CUSTOMERS EXPOSED
                –20K CREDIT CARDS EXPOSED




   © British Telecommunications
   plc

                                             ºÝºÝߣ 3
A different perspective on solving security problems


  Hypervisor + Security API                  Better Context Mgmt
Issues with traditional protection methods
                                             • Protection by running outside OS
                                             • Isolated from most malware
                                             • Dependent on smaller, trustable
                                               codebase of hypervisor
    Context intermingling
    • Of protection engines that run in      Superior Visibility
      the same context as the malware
      they are protecting against
                                             • New interactions: CPU, Memory
                                             • Real-time interception
    Limited Visibility                         • view / modify / aggregate
                                               • network / storage / memory
    • Of OS and application by network-      • Context aggregation includes
      hosted protection solutions              • code in memory
    • Of other contexts by protection          • network traffic
      engines running in a safe context
      © British Telecommunications
      plc
                                               • process calls
                                                                      ºÝºÝߣ 4
Intelligent Protection overview




                            Round-trip of
                              protection
                             intelligence




                        Virtual Firewall
Core strengths & innovative features
                                                                      Intrusion Prevention
• Intercept interactions between the Guest OS and application processes and the physical server
• Intercept traffic between the Guest OS and the network
                                        Intelligent Protection (Beta)
• Detect and stop malware and rootkit at the hypervisor level before they infect the system
• Detection system outside the context of the attack: stealthy and more reliable detection
                      Virtual Patching
        © British Telecommunications
        plc                                                                Anti-malware
                                                                                              ºÝºÝߣ 5
Forthcoming extensions



           Anti-Malware:

          • Experimentation with integration of multiple AV
            virtual appliances and hypervisors
          • Exploit benefits of context of operation to improve
            effectiveness of detection
            • Performance against different obfuscation
              techniques: combinations of poly/paramorphism,
              encryption, memory injection, etc.
            • Performance against different forms of advanced
              evasion techniques


                               2 BT patents including extensions of
                               virtual patching to BIOS for devices
© British Telecommunications
plc

                                                                      ºÝºÝߣ 6
Forthcoming extensions



     Beyond the cloud:

    • Extend applicability to hybrid environments under
      the same security management offered via a
      Security Operations Management Portal as a SaaS:
      • Virtual Data Centre
      • Cloud
      • Corporate Servers
      • Mobile devices (laptops, smart-phones, etc.)


                               2 BT patents including extensions of
                               virtual patching to BIOS for devices
© British Telecommunications
plc

                                                                      ºÝºÝߣ 7
Forthcoming extensions



   Mega-Honeypot

   • Information about possible / actual attacks
     collected even if attacks are blocked
   • Filter, analyse, correlate information
     • about frequency / origin / form of attacks
     • about stability of security patches to
       OS/Application builds


© British Telecommunications
plc

                                              ºÝºÝߣ 8
General Considerations
and take-away points
             Strong points:

            • Hypervisor embedded security controls provide a improvement to
              the security of servers and applications that run on protected
              virtual machines. ‘Defence in depth’: Provided at the Hypervisor
              level
              • IDS
              • Firewall
              • Anti-Malware
              • Data Leakage prevention
            • Potential to enhance intrusion prevention within multi-tenancy
              Cloud architecture.
            • Flexible (agent-based/-less deployment) allows patches either
              Server or Hypervisor
            • Extremely efficient security patch application / removal (almost
              zero downtime)




  © British Telecommunications
  plc

                                                                          ºÝºÝߣ 9
General Considerations
and take-away points
             Remaining weaknesses:

            • Does not cover all possible security patches (e.g.
              Patches relating to internal OS modules or some
              aspects of application code)
            • Vulnerability/Patch Mapping / Frequency of updates
              depend upon effectiveness of Vendor Patch to
              vulnerability ‘accuracy’.
            • New security technologies will become target for the
              ‘next emerging threats’ – Attackers will be targeting
              hypervisor/security functionality.
            • May be dependent upon Hypervisor configuration and
              security management (Cloud Service Provide
              Administration teams).



  © British Telecommunications
  plc

                                                                 ºÝºÝߣ 10
© British Telecommunications
plc

                               ºÝºÝߣ 11

More Related Content

What's hot (14)

DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
Andris Soroka
Ìý
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
Symantec
Ìý
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
Kaspersky
Ìý
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
IT@Intel
Ìý
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
Amazon Web Services
Ìý
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Novell
Ìý
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
Rajendra Menon
Ìý
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentation
ShapeBlue
Ìý
Waterfall Security Solutions Overview Q1 2012
Waterfall Security Solutions   Overview Q1 2012Waterfall Security Solutions   Overview Q1 2012
Waterfall Security Solutions Overview Q1 2012
henkpieper
Ìý
Sb fortinet-nozomi
Sb fortinet-nozomiSb fortinet-nozomi
Sb fortinet-nozomi
Ivan Carmona
Ìý
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
Community Protection Forum
Ìý
Smau Bari 2012 Marco Soldi
Smau Bari 2012   Marco SoldiSmau Bari 2012   Marco Soldi
Smau Bari 2012 Marco Soldi
SMAU
Ìý
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
Ivan Carmona
Ìý
ENT-Data-Sheet_Features-Benefits
ENT-Data-Sheet_Features-BenefitsENT-Data-Sheet_Features-Benefits
ENT-Data-Sheet_Features-Benefits
ENT Technologies
Ìý
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
Andris Soroka
Ìý
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
Symantec
Ìý
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
Kaspersky
Ìý
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
IT@Intel
Ìý
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
Amazon Web Services
Ìý
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Novell
Ìý
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
Rajendra Menon
Ìý
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentation
ShapeBlue
Ìý
Waterfall Security Solutions Overview Q1 2012
Waterfall Security Solutions   Overview Q1 2012Waterfall Security Solutions   Overview Q1 2012
Waterfall Security Solutions Overview Q1 2012
henkpieper
Ìý
Sb fortinet-nozomi
Sb fortinet-nozomiSb fortinet-nozomi
Sb fortinet-nozomi
Ivan Carmona
Ìý
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
Community Protection Forum
Ìý
Smau Bari 2012 Marco Soldi
Smau Bari 2012   Marco SoldiSmau Bari 2012   Marco Soldi
Smau Bari 2012 Marco Soldi
SMAU
Ìý
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
Ivan Carmona
Ìý
ENT-Data-Sheet_Features-Benefits
ENT-Data-Sheet_Features-BenefitsENT-Data-Sheet_Features-Benefits
ENT-Data-Sheet_Features-Benefits
ENT Technologies
Ìý

Similar to Fadi El Moussa Secure Cloud 2012 V2 (20)

BreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionBreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing Solution
Ixia
Ìý
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
Digital Catapult
Ìý
Is it an internal affair
Is it an internal affairIs it an internal affair
Is it an internal affair
George Delikouras
Ìý
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
أحلام انصارى
Ìý
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
Marcel Winandy
Ìý
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
CloudExpoEurope
Ìý
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised Computing
IOSR Journals
Ìý
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
Jimmy Saigon
Ìý
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
ImamBahrudin5
Ìý
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ SwarmRevolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
HiveMQ
Ìý
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
Amazon Web Services
Ìý
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Baqar kazmi
Ìý
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Maliha Ali
Ìý
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Baqar Kazmi
Ìý
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Maliha Ali
Ìý
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
bakar kazmi
Ìý
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-Brochure
Baqar Kazmi
Ìý
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
Trend Micro
Ìý
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
Leonardo Antichi
Ìý
Ruijie Mini-firewall Does your data & network protected with traditional rout...
Ruijie Mini-firewall Does your data & network protected with traditional rout...Ruijie Mini-firewall Does your data & network protected with traditional rout...
Ruijie Mini-firewall Does your data & network protected with traditional rout...
Hem Infotech
Ìý
BreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionBreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing Solution
Ixia
Ìý
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
Digital Catapult
Ìý
Is it an internal affair
Is it an internal affairIs it an internal affair
Is it an internal affair
George Delikouras
Ìý
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
Marcel Winandy
Ìý
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised Computing
IOSR Journals
Ìý
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
Jimmy Saigon
Ìý
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
ImamBahrudin5
Ìý
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ SwarmRevolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
HiveMQ
Ìý
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
Amazon Web Services
Ìý
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Baqar kazmi
Ìý
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Maliha Ali
Ìý
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Baqar Kazmi
Ìý
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Maliha Ali
Ìý
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
bakar kazmi
Ìý
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-Brochure
Baqar Kazmi
Ìý
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
Trend Micro
Ìý
Ruijie Mini-firewall Does your data & network protected with traditional rout...
Ruijie Mini-firewall Does your data & network protected with traditional rout...Ruijie Mini-firewall Does your data & network protected with traditional rout...
Ruijie Mini-firewall Does your data & network protected with traditional rout...
Hem Infotech
Ìý

Fadi El Moussa Secure Cloud 2012 V2

  • 1. Protecting systems and applications on virtual data centres and in the cloud: challenges, emerging solutions and lessons learnt Dr Fadi El-Moussa - Senior Researcher – Malware Detection and prevention Specialist Dr Theo Dimitrakos – Chief Security Researcher – Head of Security Architectures Research ºÝºÝߣ 1
  • 2. Cyber Security: More Important than Ever COMPROMISES THAT CAN BE STOPPED THROUGH PROPER CONFIGURATION AND PATCH MANAGEMENT 90% © British Telecommunications plc ºÝºÝߣ 2
  • 3. Cyber Security: More Important than Ever SONY PLAYSTATION –100M CUSTOMERS EXPOSED –20K CREDIT CARDS EXPOSED © British Telecommunications plc ºÝºÝߣ 3
  • 4. A different perspective on solving security problems Hypervisor + Security API Better Context Mgmt Issues with traditional protection methods • Protection by running outside OS • Isolated from most malware • Dependent on smaller, trustable codebase of hypervisor Context intermingling • Of protection engines that run in Superior Visibility the same context as the malware they are protecting against • New interactions: CPU, Memory • Real-time interception Limited Visibility • view / modify / aggregate • network / storage / memory • Of OS and application by network- • Context aggregation includes hosted protection solutions • code in memory • Of other contexts by protection • network traffic engines running in a safe context © British Telecommunications plc • process calls ºÝºÝߣ 4
  • 5. Intelligent Protection overview Round-trip of protection intelligence Virtual Firewall Core strengths & innovative features Intrusion Prevention • Intercept interactions between the Guest OS and application processes and the physical server • Intercept traffic between the Guest OS and the network Intelligent Protection (Beta) • Detect and stop malware and rootkit at the hypervisor level before they infect the system • Detection system outside the context of the attack: stealthy and more reliable detection Virtual Patching © British Telecommunications plc Anti-malware ºÝºÝߣ 5
  • 6. Forthcoming extensions Anti-Malware: • Experimentation with integration of multiple AV virtual appliances and hypervisors • Exploit benefits of context of operation to improve effectiveness of detection • Performance against different obfuscation techniques: combinations of poly/paramorphism, encryption, memory injection, etc. • Performance against different forms of advanced evasion techniques 2 BT patents including extensions of virtual patching to BIOS for devices © British Telecommunications plc ºÝºÝߣ 6
  • 7. Forthcoming extensions Beyond the cloud: • Extend applicability to hybrid environments under the same security management offered via a Security Operations Management Portal as a SaaS: • Virtual Data Centre • Cloud • Corporate Servers • Mobile devices (laptops, smart-phones, etc.) 2 BT patents including extensions of virtual patching to BIOS for devices © British Telecommunications plc ºÝºÝߣ 7
  • 8. Forthcoming extensions Mega-Honeypot • Information about possible / actual attacks collected even if attacks are blocked • Filter, analyse, correlate information • about frequency / origin / form of attacks • about stability of security patches to OS/Application builds © British Telecommunications plc ºÝºÝߣ 8
  • 9. General Considerations and take-away points Strong points: • Hypervisor embedded security controls provide a improvement to the security of servers and applications that run on protected virtual machines. ‘Defence in depth’: Provided at the Hypervisor level • IDS • Firewall • Anti-Malware • Data Leakage prevention • Potential to enhance intrusion prevention within multi-tenancy Cloud architecture. • Flexible (agent-based/-less deployment) allows patches either Server or Hypervisor • Extremely efficient security patch application / removal (almost zero downtime) © British Telecommunications plc ºÝºÝߣ 9
  • 10. General Considerations and take-away points Remaining weaknesses: • Does not cover all possible security patches (e.g. Patches relating to internal OS modules or some aspects of application code) • Vulnerability/Patch Mapping / Frequency of updates depend upon effectiveness of Vendor Patch to vulnerability ‘accuracy’. • New security technologies will become target for the ‘next emerging threats’ – Attackers will be targeting hypervisor/security functionality. • May be dependent upon Hypervisor configuration and security management (Cloud Service Provide Administration teams). © British Telecommunications plc ºÝºÝߣ 10

Editor's Notes

  • #6: This diagram illustates the use of Vmware Vmsafe API’s – in essence methods for enforcing security functionality at the hypervisor - note the security virtual machine – has policy, firewall, AV and IP engines - Vmsafe enforces this functionallity.Change diagram to provide vShield agents – which communicate with the hypervisor to create closed user group – enforcing security policies for the group or Zone
  • #10: Apply patch at VM or Hypervisor – right place but need to decide which part of the system to apply the patch (add a caution note to this point).
  • #11: Apply patch at VM or Hypervisor – right place but need to decide which part of the system to apply the patch (add a caution note to this point).