Windows Azure Security Features And Functionality

3,912 views
3,627 views

Published on

Windows Azure Security Features And Functionality

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
3,912
On SlideShare
0
From Embeds
0
Number of Embeds
15
Actions
Shares
0
Downloads
154
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Services are isolated from other servicesCan only access resources declared in the service model .Local node resources – temp storageNetwork end-pointsIsolation using multiple mechanismsMuch of the traditional infrastructure security moves to the platform and application layersNetwork Access Control Lists and Firewalls become host packet filters and virtual firewallsMultiple, privileged accounts become pre-defined agent accounts controlled by the systemPlatform and network level encryption will still play a role, but the application developer becomes more responsible for defining how encryption is used end-to-endServices are isolated from other servicesCan only access resources declared in the service model .Local node resources – temp storageNetwork end-pointsIsolation using multiple mechanismsAutomatic application of windows security patchesRolling operating system image upgrades
  • Port Scanning/ Service EnumerationThe only ports open and addressable (internally or externally) on a Windows Azure VM are those explicitly defined in the Service Definition file. Windows Firewall is enabled on each VM in addition to enhanced VM switch packet filtering, which blocks unauthorized traffic Denial of Service Windows Azure’s load balancing will partially mitigate Denial of Service attacks from the Internet and internal networks. This mitigation is done in conjunction with the developer defining an appropriate Service Definition VM instance count scale-out. On the Internet, Windows Azure VMs are only accessible through public Virtual IP Addresses (VIPs). VIP traffic is routed through Windows Azure’s load-balancing infrastructure. Windows Azure monitors and detects internally initiated Denial of Service attacks and removes offending VMs/accounts from the network. As a further protection, the root host OS that controls guest VMs in the cloud is not directly addressable internally by other tenants on the Windows Azure network and the root host OS is not externally addressable.Windows Azure is also reviewing additional Distributed Denial of Service (DDoS) solutions available from Microsoft Global Foundation Services to help further protect against Denial of Service attacks.SpoofingVLANs are used to partition the internal network and segment it in a way that prevents compromised nodes from impersonating trusted systems such as the Fabric Controller. At the Hypervisor VM Switch, additional filters are in place to block broadcast and multicast traffic, with the exception of what is needed to maintain DHCP leases. Furthermore, the channel used by the Root OS to communicate with the Fabric Controller is encrypted and mutually authenticated over an HTTPS connection, and it provides a secure transfer path for configuration and certificate information that cannot be intercepted.Eavesdropping / Packet SniffingThe Hypervisor’s Virtual Switch prevents sniffer-based attacks against other VMs on the same physical host. Top-of-rack switches will be used to restrict which IP and MAC addresses can be used by the VMs and therefore mitigate spoofing attacks on internal networks. To sniff the wire inside the Windows Azure cloud environment, an attacker would first need to compromise a VM tenant in a way that elevated the attacker to an administrator on the VM, then use a vulnerability in the hypervisor to break into the physical machine root OS and obtain system account privileges. At that point the attacker would only be able to see traffic inbound to the compromised host destined for the dynamic IP addresses of the VM guests controlled by the hypervisor. Multi-tenant hosting and side-channel attacksInformation disclosure attacks (such as sniffing) are less severe than other forms of attack inside the Windows Azure datacenter because virtual machines are inherently untrusted by the Root OS Hypervisor. Microsoft has done a great deal of analysis to determine susceptibility to side-channel attacks. Timing attacks are the most difficult to mitigate. With timing attacks, an application carefully measures how long it takes some operations to complete and infers what is happening on another processor. By detecting cache misses, an attacker can figure out which cache lines are being accessed in code. With certain crypto implementations involving lookups from large tables, knowing the pattern of memory accesses - even at the granularity of cache lines - can reveal the key being used for encryption. While seemingly far-fetched, such attacks have been demonstrated under controlled conditions. There are a number of reasons why side-channel attacks are unlikely to succeed in Windows Azure: An attack works best in the context of hyper-threading, where the two threads share all of their caches. Many current CPUs implement fully independent cores, each with a substantial private cache. The CPU chips that Windows Azure runs on today have four cores per chip and share caches only in the third tier.Windows Azure runs on nodes containing pairs of quad-core CPUs, so there are three other CPUs sharing the cache, and seven CPUs sharing the memory bus. This level of sharing leads to a great deal of noise in any signal from one CPU to another because actions of multiple CPUs tend to obfuscate the signal.Windows Azure generally dedicates CPUs to particular VMs. Any system that takes advantage of the fact that few servers keep their CPUs busy all the time, and implements more logical CPUs than physical CPUs, might open the possibility of context switches exposing cache access patterns. Windows Azure operates differently. VMs can migrate from one CPU to another, but are unlikely to do so frequently enough to offer an attacker any information.
  • Windows Azure Security Features And Functionality

    1. 1. Windows Azure Security Features and Functionality<br />Vivek Bhatnagar <br />WW Lead Technical Sales Windows Azure <br />Microsoft Corporation<br />vivekbh@live.com<br />
    2. 2. Windows Azure Security…<br />
    3. 3. Windows Azure Combines Three Components<br />Compute – Think Stateless CPU in the Cloud<br /> (Rented by the CPU - hour)<br />Storage – Like a file system, but structured differently to support scalability and parallelism<br /> (Rented by the Gigabyte - Month)<br />SQL Azure – Another form of storage, accessed with SQL queries rather than file-like operations<br />Can be used separately, but more commonly a Compute tenant is layered atop Storage, SQL Azure, or both<br />There will likely be more components in the future<br />
    4. 4. Responsibility for Threat Mitigation<br />There are many threats to a traditional server<br />There are some additional threats in the case of cloud computing<br />Some threats are handled by Windows Azure; others remain the responsibility of the customer<br />
    5. 5. Threats We Worry About<br />Physical Attacks<br />On Servers<br />Central Admin<br />Users<br />Customer Admin<br />Windows Azure<br />Customer Tenant<br />External Web Site<br />
    6. 6. Attacks against Windows Azure<br />A successful attack on the infrastructure could compromise all of our customers<br />Windows Azure must secure its facilities against unauthorized access<br />Windows Azure must secure its interfaces against attacks over the network<br />Customer tenants breaking out of their VMs<br />Attackers successfully impersonating customer administrators or Windows Azure administrators<br />Customer administrators affecting other than their own tenants<br />Physical Attacks<br />On Servers<br />Users<br />Customer Admin<br />Windows Azure<br />Customer Tenant<br />
    7. 7. Abuse of Privilege by Windows Azure Administrators<br />Windows Azure administrators could make unauthorized access to customer data<br />Procedures involving customer consent when such access is necessary<br />Separation of Duty to prevent abuse by a single rogue administrator<br />Auditing to assure that unauthorized access will be discovered<br />Central Admin<br />Windows Azure<br />Customer Tenant<br />
    8. 8. Using Windows Azure as a Platform for Attacking Others<br />We will receive complaints of misbehavior by Windows Azure tenants<br />We proactively monitor outbound access to detect common cases (port scans, spam)<br />If a good customer’s tenant has been compromised (botted), we work with the customer to resolve the problem<br />If a customer intentionally attacks others, we ban them<br />Windows Azure<br />Customer Tenant<br />External Web Site<br />
    9. 9. Threats Customer Still Must Worry About<br />Users<br />Customer Admin<br />Windows Azure<br />Customer Tenant<br />
    10. 10. Attacks on a Customer’s Tenant<br />A tenant is much like a physical server. If there are bugs in its code, it can be compromised over the network<br />We can look for symptoms in some cases, but it is ultimately the customer’s responsibility<br />Users<br />Windows Azure<br />Customer Tenant<br />
    11. 11. Abuse of Privilege by a Customer Administrator<br />Customer administrators are authorized to update the code and access the data belonging to any customer tenant<br />Customer administrators are authenticated with cryptographic keys that the customer must protect<br />Customers should implement deployment practices as carefully as they would for applications in their own data centers<br />Customer Admin<br />Windows Azure<br />Customer Tenant<br />
    12. 12. Windows Azure Security Layers<br />Network ACLs: dedicated VLANS for tenant nodes<br />12<br />
    13. 13. How does it work?<br />For Windows Azure Storage and SQL Azure, like any other shared service<br />Storage or SQL account owned by some customer who sets access policy<br />Access policy is enforced by the code that parses and satisfies requests<br />For Windows Azure Compute, we create customer owned VMs, isolated by a hypervisor<br />
    14. 14. Underlying Hardware<br />Rack mounted servers<br />Each rack has a collection of identical nodes<br />Each node (currently) has 2 CPU chips with 4 cores each<br /> 16 Gig of memory<br /> Disks for local storage<br /> Network Interface to a Top of Rack Switch<br />
    15. 15. Hypervisor & VM Sandbox<br />All Guest access to network and disk is mediated by Root VM (via the Hypervisor)<br />Guest VM<br />Guest VM<br />Guest VM<br />Guest VM<br />Guest VM<br />Guest VM<br />Guest VM<br />Root VM<br />Hypervisor<br />Network/Disk<br />
    16. 16. Managing it all through the Fabric Controllers<br />
    17. 17. What does the world look like to a Guest VM?<br />1, 2, 4, or 8 CPUs; up to 14 GB or memory<br />Three disk drives:<br />C: (for temps; initially populated with config file)<br />D: (for OS code; initially as supplied by Windows Azure)<br />E: (for application code; initially as supplied by customer admin)<br />Network connectivity to Internet via NAT and to other VMs of same tenant<br />Guest agent accepts incoming HTTP/RPC connections from Root OS<br />
    18. 18. Handling Attacks by a Tenant<br />Not dependent on the security of Windows<br />Instead, dependent on the security of the Hypervisor and the exposed network and disk drivers<br />C:, D:, and E: are not really disks. They are VHD files in the root OS’s file system.<br />Attack surface is minimized by accepting few commands and supporting only a few hardware devices<br />
    19. 19. Windows Azure Storage<br />Runs on separate hardware with no network connectivity to compute except (logically) through Internet<br />Requests run over HTTP and optionally over SSL with server authentication<br />Storage is organized into storage accounts<br />A single customer may have many storage accounts<br />A single secret key controls all access to a storage account<br />
    20. 20. Access Control<br />Some accommodation to more fine-grained access controls:<br /><ul><li>Some data can be marked as world-readable
    21. 21. Shared access signatures supports some forms of limited delegation</li></ul>A customer wanting fine-grained access controls can implement a front end compute tenant that has full access to the storage account but mediates access to data items<br />
    22. 22. Windows Azure Storage Scalability<br />To reduce the need for locks when dealing with a conventional file system, Windows Azure storage implements the primitives: blobs, tables, and queues.<br />For backwards compatibility, it also implements an virtual drive with disk semantics for applications that have not been converted.<br />The customer is responsible for coordinating the assignment of virtual drives to VMs. A virtual drive can only be open for write from one VM at a time.<br />
    23. 23. Windows Azure Storage Security<br />Data from many customers is mixed in a single pool<br />Access to data in a specific account is only granted to entities having the secret key for that account<br />Storage keys are randomly generated when the storage account is created (or later at the request of the customer)<br />A storage account may have two active keys at any given time to support key rollover<br />Storage keys are used to HMAC sign each access request<br />
    24. 24. SQL Azure<br />As with storage, runs on separate hardware with no connectivity to compute except (logically) over the Internet<br />Developer portal can create databases and set an administrator password<br />SQL administrator can create additional user accounts, each authenticated with a password<br />Data from many customers is pooled in a single SQL instance, but they are treated as separate and access controlled independently<br />
    25. 25. Defenses Inherited by Windows Azure Tenants<br />Spoofing<br />Tampering & Disclosure<br />Elevation of Privilege<br />Denial of Service<br />Load-balanced Infrastructure<br />Network bandwidth throttling<br />CiscoGuard enabled on Storage nodes<br />Configurable scale-out<br />VM switch hardening<br />Certificate Services<br />Shared-Access Signatures<br />HTTPS <br />Sidechannel protections<br />VLANs<br />Top of Rack Switches<br />Custom packet filtering<br />Partial Trust Runtime<br />Hypervisor custom sandboxing<br />Virtual Service Accounts<br />Port Scanning/ Service Enumeration<br />Service Definition file, Windows Firewall, VM switch packet filtering <br />
    26. 26. © 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.<br />The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.<br />

    ×