SlideShare a Scribd company logo
Protecting systems and applications on virtual data centres and in
the cloud: challenges, emerging solutions and lessons learnt


 Dr Fadi El-Moussa - Senior Researcher – Malware Detection and prevention Specialist

 Dr Theo Dimitrakos – Chief Security Researcher – Head of Security Architectures Research

                                                                                            Slide 1
Cyber Security: More Important than Ever




  COMPROMISES THAT CAN BE STOPPED
  THROUGH PROPER CONFIGURATION AND

  PATCH MANAGEMENT             90%
© British Telecommunications
plc

                                           Slide 2
Cyber Security: More Important than Ever




SONY PLAYSTATION –100M CUSTOMERS EXPOSED
                –20K CREDIT CARDS EXPOSED




   © British Telecommunications
   plc

                                             Slide 3
A different perspective on solving security problems


  Hypervisor + Security API                  Better Context Mgmt
Issues with traditional protection methods
                                             • Protection by running outside OS
                                             • Isolated from most malware
                                             • Dependent on smaller, trustable
                                               codebase of hypervisor
    Context intermingling
    • Of protection engines that run in      Superior Visibility
      the same context as the malware
      they are protecting against
                                             • New interactions: CPU, Memory
                                             • Real-time interception
    Limited Visibility                         • view / modify / aggregate
                                               • network / storage / memory
    • Of OS and application by network-      • Context aggregation includes
      hosted protection solutions              • code in memory
    • Of other contexts by protection          • network traffic
      engines running in a safe context
      © British Telecommunications
      plc
                                               • process calls
                                                                      Slide 4
Intelligent Protection overview




                            Round-trip of
                              protection
                             intelligence




                        Virtual Firewall
Core strengths & innovative features
                                                                      Intrusion Prevention
• Intercept interactions between the Guest OS and application processes and the physical server
• Intercept traffic between the Guest OS and the network
                                        Intelligent Protection (Beta)
• Detect and stop malware and rootkit at the hypervisor level before they infect the system
• Detection system outside the context of the attack: stealthy and more reliable detection
                      Virtual Patching
        © British Telecommunications
        plc                                                                Anti-malware
                                                                                              Slide 5
Forthcoming extensions



           Anti-Malware:

          • Experimentation with integration of multiple AV
            virtual appliances and hypervisors
          • Exploit benefits of context of operation to improve
            effectiveness of detection
            • Performance against different obfuscation
              techniques: combinations of poly/paramorphism,
              encryption, memory injection, etc.
            • Performance against different forms of advanced
              evasion techniques


                               2 BT patents including extensions of
                               virtual patching to BIOS for devices
© British Telecommunications
plc

                                                                      Slide 6
Forthcoming extensions



     Beyond the cloud:

    • Extend applicability to hybrid environments under
      the same security management offered via a
      Security Operations Management Portal as a SaaS:
      • Virtual Data Centre
      • Cloud
      • Corporate Servers
      • Mobile devices (laptops, smart-phones, etc.)


                               2 BT patents including extensions of
                               virtual patching to BIOS for devices
© British Telecommunications
plc

                                                                      Slide 7
Forthcoming extensions



   Mega-Honeypot

   • Information about possible / actual attacks
     collected even if attacks are blocked
   • Filter, analyse, correlate information
     • about frequency / origin / form of attacks
     • about stability of security patches to
       OS/Application builds


© British Telecommunications
plc

                                              Slide 8
General Considerations
and take-away points
             Strong points:

            • Hypervisor embedded security controls provide a improvement to
              the security of servers and applications that run on protected
              virtual machines. ‘Defence in depth’: Provided at the Hypervisor
              level
              • IDS
              • Firewall
              • Anti-Malware
              • Data Leakage prevention
            • Potential to enhance intrusion prevention within multi-tenancy
              Cloud architecture.
            • Flexible (agent-based/-less deployment) allows patches either
              Server or Hypervisor
            • Extremely efficient security patch application / removal (almost
              zero downtime)




  © British Telecommunications
  plc

                                                                          Slide 9
General Considerations
and take-away points
             Remaining weaknesses:

            • Does not cover all possible security patches (e.g.
              Patches relating to internal OS modules or some
              aspects of application code)
            • Vulnerability/Patch Mapping / Frequency of updates
              depend upon effectiveness of Vendor Patch to
              vulnerability ‘accuracy’.
            • New security technologies will become target for the
              ‘next emerging threats’ – Attackers will be targeting
              hypervisor/security functionality.
            • May be dependent upon Hypervisor configuration and
              security management (Cloud Service Provide
              Administration teams).



  © British Telecommunications
  plc

                                                                 Slide 10
© British Telecommunications
plc

                               Slide 11

More Related Content

What's hot

DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
Andris Soroka
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
Symantec
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
Kaspersky
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
IT@Intel
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
Amazon Web Services
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Novell
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
Rajendra Menon
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentation
ShapeBlue
 
Waterfall Security Solutions Overview Q1 2012
Waterfall Security Solutions   Overview Q1 2012Waterfall Security Solutions   Overview Q1 2012
Waterfall Security Solutions Overview Q1 2012
henkpieper
 
Sb fortinet-nozomi
Sb fortinet-nozomiSb fortinet-nozomi
Sb fortinet-nozomi
Ivan Carmona
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
Community Protection Forum
 
Smau Bari 2012 Marco Soldi
Smau Bari 2012   Marco SoldiSmau Bari 2012   Marco Soldi
Smau Bari 2012 Marco Soldi
SMAU
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
Ivan Carmona
 
ENT-Data-Sheet_Features-Benefits
ENT-Data-Sheet_Features-BenefitsENT-Data-Sheet_Features-Benefits
ENT-Data-Sheet_Features-Benefits
ENT Technologies
 

What's hot (14)

DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentation
 
Waterfall Security Solutions Overview Q1 2012
Waterfall Security Solutions   Overview Q1 2012Waterfall Security Solutions   Overview Q1 2012
Waterfall Security Solutions Overview Q1 2012
 
Sb fortinet-nozomi
Sb fortinet-nozomiSb fortinet-nozomi
Sb fortinet-nozomi
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Smau Bari 2012 Marco Soldi
Smau Bari 2012   Marco SoldiSmau Bari 2012   Marco Soldi
Smau Bari 2012 Marco Soldi
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
 
ENT-Data-Sheet_Features-Benefits
ENT-Data-Sheet_Features-BenefitsENT-Data-Sheet_Features-Benefits
ENT-Data-Sheet_Features-Benefits
 

Similar to Fadi El Moussa Secure Cloud 2012 V2

BreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionBreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing Solution
Ixia
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
Digital Catapult
 
Is it an internal affair
Is it an internal affairIs it an internal affair
Is it an internal affair
George Delikouras
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
أحلام انصارى
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
Marcel Winandy
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
CloudExpoEurope
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised Computing
IOSR Journals
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
Jimmy Saigon
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
ImamBahrudin5
 
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ SwarmRevolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
HiveMQ
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
Amazon Web Services
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-Brochure
Baqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Baqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Baqar kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Maliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
bakar kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Maliha Ali
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
Trend Micro
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
Leonardo Antichi
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS Reality
KVH Co. Ltd.
 

Similar to Fadi El Moussa Secure Cloud 2012 V2 (20)

BreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionBreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing Solution
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
Is it an internal affair
Is it an internal affairIs it an internal affair
Is it an internal affair
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised Computing
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ SwarmRevolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-Brochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS Reality
 

Fadi El Moussa Secure Cloud 2012 V2

  • 1. Protecting systems and applications on virtual data centres and in the cloud: challenges, emerging solutions and lessons learnt Dr Fadi El-Moussa - Senior Researcher – Malware Detection and prevention Specialist Dr Theo Dimitrakos – Chief Security Researcher – Head of Security Architectures Research Slide 1
  • 2. Cyber Security: More Important than Ever COMPROMISES THAT CAN BE STOPPED THROUGH PROPER CONFIGURATION AND PATCH MANAGEMENT 90% © British Telecommunications plc Slide 2
  • 3. Cyber Security: More Important than Ever SONY PLAYSTATION –100M CUSTOMERS EXPOSED –20K CREDIT CARDS EXPOSED © British Telecommunications plc Slide 3
  • 4. A different perspective on solving security problems Hypervisor + Security API Better Context Mgmt Issues with traditional protection methods • Protection by running outside OS • Isolated from most malware • Dependent on smaller, trustable codebase of hypervisor Context intermingling • Of protection engines that run in Superior Visibility the same context as the malware they are protecting against • New interactions: CPU, Memory • Real-time interception Limited Visibility • view / modify / aggregate • network / storage / memory • Of OS and application by network- • Context aggregation includes hosted protection solutions • code in memory • Of other contexts by protection • network traffic engines running in a safe context © British Telecommunications plc • process calls Slide 4
  • 5. Intelligent Protection overview Round-trip of protection intelligence Virtual Firewall Core strengths & innovative features Intrusion Prevention • Intercept interactions between the Guest OS and application processes and the physical server • Intercept traffic between the Guest OS and the network Intelligent Protection (Beta) • Detect and stop malware and rootkit at the hypervisor level before they infect the system • Detection system outside the context of the attack: stealthy and more reliable detection Virtual Patching © British Telecommunications plc Anti-malware Slide 5
  • 6. Forthcoming extensions Anti-Malware: • Experimentation with integration of multiple AV virtual appliances and hypervisors • Exploit benefits of context of operation to improve effectiveness of detection • Performance against different obfuscation techniques: combinations of poly/paramorphism, encryption, memory injection, etc. • Performance against different forms of advanced evasion techniques 2 BT patents including extensions of virtual patching to BIOS for devices © British Telecommunications plc Slide 6
  • 7. Forthcoming extensions Beyond the cloud: • Extend applicability to hybrid environments under the same security management offered via a Security Operations Management Portal as a SaaS: • Virtual Data Centre • Cloud • Corporate Servers • Mobile devices (laptops, smart-phones, etc.) 2 BT patents including extensions of virtual patching to BIOS for devices © British Telecommunications plc Slide 7
  • 8. Forthcoming extensions Mega-Honeypot • Information about possible / actual attacks collected even if attacks are blocked • Filter, analyse, correlate information • about frequency / origin / form of attacks • about stability of security patches to OS/Application builds © British Telecommunications plc Slide 8
  • 9. General Considerations and take-away points Strong points: • Hypervisor embedded security controls provide a improvement to the security of servers and applications that run on protected virtual machines. ‘Defence in depth’: Provided at the Hypervisor level • IDS • Firewall • Anti-Malware • Data Leakage prevention • Potential to enhance intrusion prevention within multi-tenancy Cloud architecture. • Flexible (agent-based/-less deployment) allows patches either Server or Hypervisor • Extremely efficient security patch application / removal (almost zero downtime) © British Telecommunications plc Slide 9
  • 10. General Considerations and take-away points Remaining weaknesses: • Does not cover all possible security patches (e.g. Patches relating to internal OS modules or some aspects of application code) • Vulnerability/Patch Mapping / Frequency of updates depend upon effectiveness of Vendor Patch to vulnerability ‘accuracy’. • New security technologies will become target for the ‘next emerging threats’ – Attackers will be targeting hypervisor/security functionality. • May be dependent upon Hypervisor configuration and security management (Cloud Service Provide Administration teams). © British Telecommunications plc Slide 10

Editor's Notes

  1. This diagram illustates the use of Vmware Vmsafe API’s – in essence methods for enforcing security functionality at the hypervisor - note the security virtual machine – has policy, firewall, AV and IP engines - Vmsafe enforces this functionallity.Change diagram to provide vShield agents – which communicate with the hypervisor to create closed user group – enforcing security policies for the group or Zone
  2. Apply patch at VM or Hypervisor – right place but need to decide which part of the system to apply the patch (add a caution note to this point).
  3. Apply patch at VM or Hypervisor – right place but need to decide which part of the system to apply the patch (add a caution note to this point).