SlideShare a Scribd company logo
1 of 37
Public Cloud Security DIY
Amir Naftali, CTO FortyCloud
IaaS
IGT Meetup July 2013
1. What is a public cloud?
2. Network architectures
3. Two public cloud examples
4. Shared responsibility model
5. Security risks and threats
6. Network isolation techniques
7. VPCs
8. Secure access techniques
9. VPN access DIY example
10. Summary and Q&A
Agenda
IGT Meetup July 2013
IaaS
Wikipedia - A cloud is called a 'Public cloud'
when the services are rendered over a
network that is open for public use.
So What‟s a Public Cloud
IGT Meetup July 2013
IaaS
• Datacenter (Infrastructure) as-a service
• Virtualized
• Shared
• Mostly Compute, but also storage services
• Access to resources is done over the Internet
• Service enrollment is instantaneous
using web-based console
• Other services like DB, LB as a service,
Object Store…
So What‟s a Public Cloud (2)
IGT Meetup July 2013
IaaS
In a Public Cloud
• No infrastructure ownership
• Pay Per Use (CPU hourly , storage size, network
usage, etc.)
• Allocate resources at any given moment as much as
you need (e.g. adjust your resource allocation to current
demand)
In a Private Cloud
• Infrastructure is dedicated to you (including network
gear and software licenses)
• Scale is limited to the physical amount of resources you
lease or buy.
These are different financial and operational models
Public Vs. Private Clouds
Regions and Datacenters
IGT Meetup July 2013
• Datacenters are called regions
• Regions are independent
• Amazon , Rackspace, Google, Azure, HP all have
regions around the world
Network Architecture
IGT Meetup July 2013
Usually, a Region has a shared internal service
network and and a shared public internet access
Network Architecture Example - AWS
IGT Meetup July 2013
Network Architecture Example - Rackspace
IGT Meetup July 2013
Network Architecture
IGT Meetup July 2013
Basically, all VMs are reachable via the service
network and the public Internet
IaaS
IGT Meetup July 2013
“…In turn, you assume responsibility and management
of the guest operating system(including updates and security
patches), other associated application software, as well as…”
“…It is possible for
you to enhance security and/or meet more stringent compliance
requirements by leveraging technology such as host‐
based firewalls, host‐based intrusion detection/prevention, and encryption...”
Sources:
http://media.amazonwebservices.com/pdf/AWS_Security_Whitepaper.pdf
http://www.rackspace.com/security/
……..“security is a partnership”……
…“USERS MUST TAKE FULL RESPONSIBILITY FOR APPLICATION OF
ANY SERVICES AND/OR PROCESSES MENTIONED HEREIN…”
Shared Responsibility Model
A Shared Responsibility Model in IaaS
IGT Meetup July 2013
Application
Hosted operating system
Virtualization layer
Physical infrastructure
Customer
Responsibility
Cloud Provider
Responsibility
Security Risks and Threats
IGT Meetup July 2013
If I can access my VMs remotely anyone else can
access them too
• What TCP/IP ports are open on your cloud VMs?
• What protocols/applications are you using to access
your VMs?
• Are you using a secure protocol/application? Are you
using it in in a secure manner?
What can the bad guys do?
• DoS
• Steal or compromise your data
• Use your VMs to launch attacks on 3rd parties
It‟s a Jungle Out There
IGT Meetup July 2013
Simple measurements
performed in a few public datacenters show the
following results (per virtual server):
HTTP based attack vectors 40-200 per day
SSH auth attempts 200-400 per day
Non HTTP/SSH based attacks 1000-4000 per day
It‟s a Jungle Out There – Attack Example
IGT Meetup July 2013
Simple measurements
performed in a few public datacenters show
the following results (per virtual server):
A Typical Start-up Scenario
IGT Meetup July 2013
IGT Meetup July 2013
So what can be done to mitigate the threats?
Network Isolation Techniques
IGT Meetup July 2013
• IP Based filtering
• Server based Firewall
• Security Groups
• Private network (virtually)
• AWS VPC
• SDN solutions
EC2 Security Groups – The Basics
IGT Meetup July 2013
• Protocol and port based filtering
• Incoming traffic only
• Supports only TCP, UDP and ICMP
• White list - Everything is filtered unless declared open
• A single EC2 Security Group contains a list of rules
• Security Group serves also as a role that can be used as
source address in rules
• An instance can be associated with Multiple Security Groups
• Supports a REST based API
EC2 Security Groups – The Basics
IGT Meetup July 2013
Example:
EC2 Security Groups
IGT Meetup July 2013
• Provide IP Based filtering – your first line of defense
• Simple and easy to use (Role based, management console, API)
• Can add/delete rules anytime
• The only means to secure internal communication with
EC2 services like RDS, LB ….
• Platform independent (e.g. Windows, Linux)
• For management access, servers are still exposed
to public Internet
• Control incoming traffic only (output policy
is „allow all‟ based on stateful inspection)
• Doesn‟t protect against IP spoofing.
• Is hard or sometimes impossible to associate with identity (probably
not the right tool for Access Control).
• Security Groups are only associated with private addresses (when
used as source address)
• Can‟t add/delete groups after lunching an instance
• No logs
What is a VPC?
A VPC solution should provide us with an „enterprise-
like‟ environment where:
1. Cloud resources are isolated from public access
(access is via a DMZ)
2. Secure access for remote users (e.g. employees,
contractors, etc.)
3. Access control mechanism
IGT Meetup July 2013
AWS and Rackspace Examples
IGT Meetup July 2013
User-defined private subnets
Additional network configuration
Cloud Providers‟ VPC Implementation Discussed
IGT Meetup July 2013
• AWS provides the EC2 VPC solution a public cloud but with a VLAN
like network isolation.
• Rackspace has an SDN solution (based on OpenStack Quantum)
Using an isolated network may have some challenges
• Can‟t just simply move an existing resource to VPC, must recreate
them.
• Network architecture is different, configuration is not straightforward
(might impact design)
• Integration with provider‟s services should be revisited
• Does not extend across regions (and vendors)
• Access control and identity management solutions may still need to
be integrated by customer
Secure Access Techniques
IGT Meetup July 2013
• Access servers directly using a secure protocol and local/central
user store
• Servers are still exposed to the public internet
• Centralized access control – access your cloud via a VPN Gateway
• Servers are not exposed to public internet
VPN Access DIY
Using Open Source
The Before picture
IGT Meetup July 2013
The After picture
IGT Meetup July 2013
VPN access - the DIY toolkit
• Cloud Access
• Linux with packet forwarding capability
• VPN gateway is based on OpenSwan
(can also use StrongSwan, OpenVPN, Racoon)
• xl2tpd (L2TP server) for user authentication and dynamic IP
allocation (along with IPSec)
• NAT based on IP Tables all traffic flowing from users
to servers
• Intra Cloud protection – IP Based FW
• EC2 Security Groups
VPN Access DIY - EC2 example (Before)
This is how my servers‟ SG look like
before the change
IGT Meetup July 2013
VPN Access DIY - EC2 example (After)
Only my GW is open to the public Internet
My Servers are open only to the GW
IGT Meetup July 2013
VPN Access DIY - EC2 example (After)
Live Demo
What have we accomplished ?
• All IP Traffic from user to the public cloud is encrypted AND
secured (not protocol specific)
• Simple user based access and VPN
• No direct access to servers from the public internet
• Audit user access via Gateway‟s logs
Many companies have other challenges as well
IGT Meetup July 2013
• Deployment-wise
• Using several regions at the same time
• Using several clouds at the same time
• Must enable secure access to 3rd parties
• High Availability
• Security-wise
• Filtering is not good enough, complete isolation required
• Must encrypt all traffic even within the region
• Stronger authentication (OTP based 2 factor auth.) required
• Compliance (e.g. PCI, HIPAA, etc.)
• You can find detailed DIY examples on our blog and site
www.fortycloud.com
www.fortycloud.com/blog/
• Feel free to send us any cloud related security question to
support@fortycloud.com and we will do our best to answer.
• Join a free trial of our cloud security solution at
www.fortycloud.com/free-sign-up/
Contact details:
Amir Naftali
amir@fortycloud.com
@amirnaftali
Thanks

More Related Content

What's hot

Citrix Cloud XL - Running Ctirix in Public Cloud
Citrix Cloud XL - Running Ctirix in Public CloudCitrix Cloud XL - Running Ctirix in Public Cloud
Citrix Cloud XL - Running Ctirix in Public CloudMarius Sandbu
 
Netscaler and system center
Netscaler and system centerNetscaler and system center
Netscaler and system centerMarius Sandbu
 
Web API Management meets the Internet of Things
Web API Management meets the Internet of ThingsWeb API Management meets the Internet of Things
Web API Management meets the Internet of ThingsPaul Fremantle
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Bloombase
 
Azure virtual network
Azure virtual networkAzure virtual network
Azure virtual networkLalit Rawat
 
Integrating security into the application development process
Integrating security into the application development processIntegrating security into the application development process
Integrating security into the application development processJerod Brennen
 
An Introduction to OpenStack
An Introduction to OpenStackAn Introduction to OpenStack
An Introduction to OpenStackScott Lowe
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudPaulo Renato
 
CIS13: OpenStack API Security
CIS13: OpenStack API SecurityCIS13: OpenStack API Security
CIS13: OpenStack API SecurityCloudIDSummit
 
Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Canada
 
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...DevClub_lv
 
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015Evident.io
 
Mirantis OpenStack 4.0 Overview
Mirantis OpenStack 4.0 OverviewMirantis OpenStack 4.0 Overview
Mirantis OpenStack 4.0 OverviewMirantis
 
State of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User ComputingState of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User ComputingMarius Sandbu
 
Azure Low Lands 2019 - Building secure cloud applications with Azure Key Vault
Azure Low Lands 2019 - Building secure cloud applications with Azure Key VaultAzure Low Lands 2019 - Building secure cloud applications with Azure Key Vault
Azure Low Lands 2019 - Building secure cloud applications with Azure Key VaultTom Kerkhove
 
Azure Key Vault - Getting Started
Azure Key Vault - Getting StartedAzure Key Vault - Getting Started
Azure Key Vault - Getting StartedTaswar Bhatti
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the CloudSecurity Innovation
 

What's hot (20)

Citrix Cloud XL - Running Ctirix in Public Cloud
Citrix Cloud XL - Running Ctirix in Public CloudCitrix Cloud XL - Running Ctirix in Public Cloud
Citrix Cloud XL - Running Ctirix in Public Cloud
 
Netscaler and system center
Netscaler and system centerNetscaler and system center
Netscaler and system center
 
Web API Management meets the Internet of Things
Web API Management meets the Internet of ThingsWeb API Management meets the Internet of Things
Web API Management meets the Internet of Things
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
Azure virtual network
Azure virtual networkAzure virtual network
Azure virtual network
 
Integrating security into the application development process
Integrating security into the application development processIntegrating security into the application development process
Integrating security into the application development process
 
An Introduction to OpenStack
An Introduction to OpenStackAn Introduction to OpenStack
An Introduction to OpenStack
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 
CIS13: OpenStack API Security
CIS13: OpenStack API SecurityCIS13: OpenStack API Security
CIS13: OpenStack API Security
 
Basics of cloud
Basics of cloudBasics of cloud
Basics of cloud
 
Bitnami Bootcamp. OpenStack
Bitnami Bootcamp. OpenStackBitnami Bootcamp. OpenStack
Bitnami Bootcamp. OpenStack
 
Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop
 
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...
 
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
 
Mirantis OpenStack 4.0 Overview
Mirantis OpenStack 4.0 OverviewMirantis OpenStack 4.0 Overview
Mirantis OpenStack 4.0 Overview
 
State of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User ComputingState of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User Computing
 
Azure Low Lands 2019 - Building secure cloud applications with Azure Key Vault
Azure Low Lands 2019 - Building secure cloud applications with Azure Key VaultAzure Low Lands 2019 - Building secure cloud applications with Azure Key Vault
Azure Low Lands 2019 - Building secure cloud applications with Azure Key Vault
 
Azure Key Vault - Getting Started
Azure Key Vault - Getting StartedAzure Key Vault - Getting Started
Azure Key Vault - Getting Started
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
 

Similar to Public Cloud Security DIY @ IGT 2013

Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
AWS Cloud Solution - An Overview
AWS Cloud Solution - An OverviewAWS Cloud Solution - An Overview
AWS Cloud Solution - An OverviewDony Riyanto
 
Cloud computing & windows azure intro
Cloud computing & windows azure introCloud computing & windows azure intro
Cloud computing & windows azure introHaddy El-Haggan
 
1.Introduction to cloud computing converted
1.Introduction to cloud computing converted1.Introduction to cloud computing converted
1.Introduction to cloud computing convertedDrRajapraveen
 
Seminar on cloudcomputing
Seminar on cloudcomputingSeminar on cloudcomputing
Seminar on cloudcomputingBadam Anand
 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentCryptzone
 
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Priyanka Aash
 
Cloud Computing(Introduction)
Cloud Computing(Introduction)Cloud Computing(Introduction)
Cloud Computing(Introduction)Gaurav Uniyal
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud ComputingAnshi Bhadoria
 
[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업
[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업
[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업OpenStack Korea Community
 
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24
 
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...EC-Council
 
MUCLecture_2022_52127829.pdf
MUCLecture_2022_52127829.pdfMUCLecture_2022_52127829.pdf
MUCLecture_2022_52127829.pdfbigbull8577
 

Similar to Public Cloud Security DIY @ IGT 2013 (20)

Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
AWS Cloud Solution - An Overview
AWS Cloud Solution - An OverviewAWS Cloud Solution - An Overview
AWS Cloud Solution - An Overview
 
Cloud computing & windows azure intro
Cloud computing & windows azure introCloud computing & windows azure intro
Cloud computing & windows azure intro
 
1.Introduction to cloud computing converted
1.Introduction to cloud computing converted1.Introduction to cloud computing converted
1.Introduction to cloud computing converted
 
Seminar on cloudcomputing
Seminar on cloudcomputingSeminar on cloudcomputing
Seminar on cloudcomputing
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS Environment
 
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing(Introduction)
Cloud Computing(Introduction)Cloud Computing(Introduction)
Cloud Computing(Introduction)
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
SAAS Cloud
SAAS CloudSAAS Cloud
SAAS Cloud
 
[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업
[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업
[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업
 
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
 
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
MUCLecture_2022_52127829.pdf
MUCLecture_2022_52127829.pdfMUCLecture_2022_52127829.pdf
MUCLecture_2022_52127829.pdf
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Recently uploaded

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Public Cloud Security DIY @ IGT 2013

  • 1. Public Cloud Security DIY Amir Naftali, CTO FortyCloud
  • 2. IaaS IGT Meetup July 2013 1. What is a public cloud? 2. Network architectures 3. Two public cloud examples 4. Shared responsibility model 5. Security risks and threats 6. Network isolation techniques 7. VPCs 8. Secure access techniques 9. VPN access DIY example 10. Summary and Q&A Agenda
  • 3. IGT Meetup July 2013 IaaS Wikipedia - A cloud is called a 'Public cloud' when the services are rendered over a network that is open for public use. So What‟s a Public Cloud
  • 4. IGT Meetup July 2013 IaaS • Datacenter (Infrastructure) as-a service • Virtualized • Shared • Mostly Compute, but also storage services • Access to resources is done over the Internet • Service enrollment is instantaneous using web-based console • Other services like DB, LB as a service, Object Store… So What‟s a Public Cloud (2)
  • 5. IGT Meetup July 2013 IaaS In a Public Cloud • No infrastructure ownership • Pay Per Use (CPU hourly , storage size, network usage, etc.) • Allocate resources at any given moment as much as you need (e.g. adjust your resource allocation to current demand) In a Private Cloud • Infrastructure is dedicated to you (including network gear and software licenses) • Scale is limited to the physical amount of resources you lease or buy. These are different financial and operational models Public Vs. Private Clouds
  • 6. Regions and Datacenters IGT Meetup July 2013 • Datacenters are called regions • Regions are independent • Amazon , Rackspace, Google, Azure, HP all have regions around the world
  • 7. Network Architecture IGT Meetup July 2013 Usually, a Region has a shared internal service network and and a shared public internet access
  • 8. Network Architecture Example - AWS IGT Meetup July 2013
  • 9. Network Architecture Example - Rackspace IGT Meetup July 2013
  • 10. Network Architecture IGT Meetup July 2013 Basically, all VMs are reachable via the service network and the public Internet
  • 11. IaaS IGT Meetup July 2013 “…In turn, you assume responsibility and management of the guest operating system(including updates and security patches), other associated application software, as well as…” “…It is possible for you to enhance security and/or meet more stringent compliance requirements by leveraging technology such as host‐ based firewalls, host‐based intrusion detection/prevention, and encryption...” Sources: http://media.amazonwebservices.com/pdf/AWS_Security_Whitepaper.pdf http://www.rackspace.com/security/ ……..“security is a partnership”…… …“USERS MUST TAKE FULL RESPONSIBILITY FOR APPLICATION OF ANY SERVICES AND/OR PROCESSES MENTIONED HEREIN…” Shared Responsibility Model
  • 12. A Shared Responsibility Model in IaaS IGT Meetup July 2013 Application Hosted operating system Virtualization layer Physical infrastructure Customer Responsibility Cloud Provider Responsibility
  • 13. Security Risks and Threats IGT Meetup July 2013 If I can access my VMs remotely anyone else can access them too • What TCP/IP ports are open on your cloud VMs? • What protocols/applications are you using to access your VMs? • Are you using a secure protocol/application? Are you using it in in a secure manner? What can the bad guys do? • DoS • Steal or compromise your data • Use your VMs to launch attacks on 3rd parties
  • 14. It‟s a Jungle Out There IGT Meetup July 2013 Simple measurements performed in a few public datacenters show the following results (per virtual server): HTTP based attack vectors 40-200 per day SSH auth attempts 200-400 per day Non HTTP/SSH based attacks 1000-4000 per day
  • 15. It‟s a Jungle Out There – Attack Example IGT Meetup July 2013 Simple measurements performed in a few public datacenters show the following results (per virtual server):
  • 16. A Typical Start-up Scenario IGT Meetup July 2013
  • 17. IGT Meetup July 2013 So what can be done to mitigate the threats?
  • 18. Network Isolation Techniques IGT Meetup July 2013 • IP Based filtering • Server based Firewall • Security Groups • Private network (virtually) • AWS VPC • SDN solutions
  • 19. EC2 Security Groups – The Basics IGT Meetup July 2013 • Protocol and port based filtering • Incoming traffic only • Supports only TCP, UDP and ICMP • White list - Everything is filtered unless declared open • A single EC2 Security Group contains a list of rules • Security Group serves also as a role that can be used as source address in rules • An instance can be associated with Multiple Security Groups • Supports a REST based API
  • 20. EC2 Security Groups – The Basics IGT Meetup July 2013 Example:
  • 21. EC2 Security Groups IGT Meetup July 2013 • Provide IP Based filtering – your first line of defense • Simple and easy to use (Role based, management console, API) • Can add/delete rules anytime • The only means to secure internal communication with EC2 services like RDS, LB …. • Platform independent (e.g. Windows, Linux) • For management access, servers are still exposed to public Internet • Control incoming traffic only (output policy is „allow all‟ based on stateful inspection) • Doesn‟t protect against IP spoofing. • Is hard or sometimes impossible to associate with identity (probably not the right tool for Access Control). • Security Groups are only associated with private addresses (when used as source address) • Can‟t add/delete groups after lunching an instance • No logs
  • 22. What is a VPC? A VPC solution should provide us with an „enterprise- like‟ environment where: 1. Cloud resources are isolated from public access (access is via a DMZ) 2. Secure access for remote users (e.g. employees, contractors, etc.) 3. Access control mechanism IGT Meetup July 2013
  • 23. AWS and Rackspace Examples IGT Meetup July 2013 User-defined private subnets Additional network configuration
  • 24. Cloud Providers‟ VPC Implementation Discussed IGT Meetup July 2013 • AWS provides the EC2 VPC solution a public cloud but with a VLAN like network isolation. • Rackspace has an SDN solution (based on OpenStack Quantum) Using an isolated network may have some challenges • Can‟t just simply move an existing resource to VPC, must recreate them. • Network architecture is different, configuration is not straightforward (might impact design) • Integration with provider‟s services should be revisited • Does not extend across regions (and vendors) • Access control and identity management solutions may still need to be integrated by customer
  • 25. Secure Access Techniques IGT Meetup July 2013 • Access servers directly using a secure protocol and local/central user store • Servers are still exposed to the public internet • Centralized access control – access your cloud via a VPN Gateway • Servers are not exposed to public internet
  • 26. VPN Access DIY Using Open Source
  • 27. The Before picture IGT Meetup July 2013
  • 28. The After picture IGT Meetup July 2013
  • 29. VPN access - the DIY toolkit • Cloud Access • Linux with packet forwarding capability • VPN gateway is based on OpenSwan (can also use StrongSwan, OpenVPN, Racoon) • xl2tpd (L2TP server) for user authentication and dynamic IP allocation (along with IPSec) • NAT based on IP Tables all traffic flowing from users to servers • Intra Cloud protection – IP Based FW • EC2 Security Groups
  • 30. VPN Access DIY - EC2 example (Before) This is how my servers‟ SG look like before the change IGT Meetup July 2013
  • 31. VPN Access DIY - EC2 example (After) Only my GW is open to the public Internet My Servers are open only to the GW IGT Meetup July 2013
  • 32. VPN Access DIY - EC2 example (After)
  • 34. What have we accomplished ? • All IP Traffic from user to the public cloud is encrypted AND secured (not protocol specific) • Simple user based access and VPN • No direct access to servers from the public internet • Audit user access via Gateway‟s logs
  • 35. Many companies have other challenges as well IGT Meetup July 2013 • Deployment-wise • Using several regions at the same time • Using several clouds at the same time • Must enable secure access to 3rd parties • High Availability • Security-wise • Filtering is not good enough, complete isolation required • Must encrypt all traffic even within the region • Stronger authentication (OTP based 2 factor auth.) required • Compliance (e.g. PCI, HIPAA, etc.)
  • 36. • You can find detailed DIY examples on our blog and site www.fortycloud.com www.fortycloud.com/blog/ • Feel free to send us any cloud related security question to support@fortycloud.com and we will do our best to answer. • Join a free trial of our cloud security solution at www.fortycloud.com/free-sign-up/