Managing Cloud Security:
Intrusion Detection Services in a
Public Cloud
Datapipe Cloud Services Stack




                  2
Comprehensive Security

 IDS

 2 Factor Authentication                     “Strong security controls are a
 Vulnerability Scanning                           requirement for many
                                                     mission-critical IT
 Integrity Monitoring                             workloads. Customers
                                             demand that service providers
 Configuration Assessment (Tripwire)
                                             address security as they move
 Firewall                                    IT infrastructure to fully elastic
                                               public cloud environments”
 Antivirus

 Web Application Firewall                    - Joel Friedman, Datapipe CSO

 TDE – Transparent Database Encryption




                                         3
Broad Cloud Adoption: Inhibitors




                       4
Public Cloud Security Complexity
Security solutions must be built specifically for public cloud


                                                          elastic
                                                          scaling




                              utility                                                virtualized
                              pricing                                                computing




                                                       PUBLIC CLOUD
                                                         SECURITY
                                                      REQUIREMENTS
                      managed                                                               management
                     operations                                                             automation




                                        third-party                   self-service
                                        ownership                     provisioning




                                                          Page 5
                                                             5
Alert Logic for Amazon EC2


 Enabling:                                                     IDS for        LM for        VA for
 •   Traffic monitoring via                                     Cloud         Cloud         Cloud
     software-based network taps
 •   Log collection via a software agents
 •   Virtual appliances based data collection                 Virtual Appliances & Host Agents
 •   Host agents that continuously track the
     state of monitored instances
 •   Automated software and configuration                            Management API
     deployment via internal management APIs
 •   Multi-tenant aware provisioning API for
     integration with service provider                                   Provisioning API

 Provides:
 • Auto-scaling by tracking IP addresses of protected hosts
 • Load balancing & fail over between appliances
 • Transport-level data encryption
 • Centralized resource authorization via certificates                           for
                                                                                 Amazon Web
                                                                                 Services
                                                  Page 6
Datapipe IDS for EC2: Setup Process


                                API         TM        LM   SOC
                            Integration          UI

                      CMS



Deploy certificates
                      +          +                    +
Install software
packages and
virtual appliances




                            VPN Transport
Components



  Customer EC2 Environment       Collection/Cloud Management System




       Security Portal                         Incident


                             8
Attack Scenario




  Attacker
  (me)




                      VPN Transport




                  9
Sample Footer Here
10
11

Managing Cloud Security: Intrusion Detection Services in a Public Cloud

  • 1.
    Managing Cloud Security: IntrusionDetection Services in a Public Cloud
  • 2.
  • 3.
    Comprehensive Security IDS 2 Factor Authentication “Strong security controls are a Vulnerability Scanning requirement for many mission-critical IT Integrity Monitoring workloads. Customers demand that service providers Configuration Assessment (Tripwire) address security as they move Firewall IT infrastructure to fully elastic public cloud environments” Antivirus Web Application Firewall - Joel Friedman, Datapipe CSO TDE – Transparent Database Encryption 3
  • 4.
  • 5.
    Public Cloud SecurityComplexity Security solutions must be built specifically for public cloud elastic scaling utility virtualized pricing computing PUBLIC CLOUD SECURITY REQUIREMENTS managed management operations automation third-party self-service ownership provisioning Page 5 5
  • 6.
    Alert Logic forAmazon EC2 Enabling: IDS for LM for VA for • Traffic monitoring via Cloud Cloud Cloud software-based network taps • Log collection via a software agents • Virtual appliances based data collection Virtual Appliances & Host Agents • Host agents that continuously track the state of monitored instances • Automated software and configuration Management API deployment via internal management APIs • Multi-tenant aware provisioning API for integration with service provider Provisioning API Provides: • Auto-scaling by tracking IP addresses of protected hosts • Load balancing & fail over between appliances • Transport-level data encryption • Centralized resource authorization via certificates for Amazon Web Services Page 6
  • 7.
    Datapipe IDS forEC2: Setup Process API TM LM SOC Integration UI CMS Deploy certificates + + + Install software packages and virtual appliances VPN Transport
  • 8.
    Components CustomerEC2 Environment Collection/Cloud Management System Security Portal Incident 8
  • 9.
    Attack Scenario Attacker (me) VPN Transport 9
  • 10.
  • 11.