Securing the Telco Cloud
June 2017
Ng Hwee Ming Abhilash S V
Principal Technologist Cloud Solution Architect, Red Hat
APAC Office of Technology, Red Hat
THE CHANGING LANDSCAPENETWORK
SONET/TDM
WIREDWIRELESS
Gig-E
IPv6
IP
5G
NFV
WiFi/WiMax
Video
SDN
Hosted&
managed
Longdistance
(IXC)
Local(LEC)
Data(LECorIXC)
Video(MSO)
Security Storage
Voice Music Payments
Video Gaming
HYBRID CLOUD ENVIRONMENT
APPLICATIONSDEVICES
Handset/RJ45/Modem
CELL PHONESMARTPHONE PC/TABLET IoT/M2M
OLD LANDSCAPE
NEW LANDSCAPE
TELCO CLOUD SERVICES - PATHWAY TO NEW SERVICES
Enterprise
Telco Cloud
IaaS / PAAS
Branch Office
vCPE
Business Network
Services
V-EPC
GiLan
Cloud RAN / vRAN
MPN
Mobile Private
Network (MPN)
Media &
Gaming
Services
vCDN
IoT
SD-WAN
SD-WAN
SD-WAN
Internet
Mobile
Users
Devices
- NFV & SDN are disrupting the way telecom networks are going to be
built and managed becoming the foundation of modern networking
- Virtualization & Cloudification are key technologies to enable NFV
- Sharing resources is a major concern for security
- Cybersecurity national agencies want to define guidelines to ensure this
new foundation is secure before allowing mass roll-out of sensible
network functions e.g. Lawful Intercept capable VNFs
- NFV & SDN can also be a way to mitigate more efficiently security threats
- Bottom line is that security can slow down or even block NFV deployment
TELCO CLOUD INFRASTRUCTURE - RISKS
RISKS
POLICY
RISKS
GENERAL
RISKS
VIRTUALIZATION
RISKS
NON-CLOUD
SPECIFIC
RISKS
CLOUD
SPECIFIC
RISKS
LEGAL
RISKS
WHO IS LOOKING AT IT ? THE MAJOR NFV SECURITY
STAKEHOLDERS
FRAMEWORKS FOR CLOUD COMPUTING
• ISO/IEC 27017:2015 Information Technology-Security Techniques-Code of
Practice for Information Security Controls Based on ISO/IEC 27002 for Cloud
Services
• Organization for Economic Cooperation and Development-Privacy and Security
Guidelines
• Asia-Pacific Economic Cooperation Privacy Framework
• EU Data Protection Directive
BUILD CLOUD WITH SECURITY STANDARDS
• ISO/IEC 27001:2013
• ISO/IEC 27002:2013
• ISO/IEC 27017:2015
• SOC 1/SOC 2/SOC 3
• NIST SP 800-53
• PCI DSS
KEY SECURE CLOUD DESIGN PRINCIPLES
Protections to enable trust
Cross Platform Capabilities
Access, Administration,
Resiliency
Delegate or Federated Access
Secure and Ease of Access &
Adoption
Identification, Authentication,
Authorization, Administration,
Auditability
Elastic, Flexible, and Resilient,
supporting multitenant platforms
Multi level protection- Network, OS,
Application Security
1
2
3
4
5
6
8
7
CLOUD SECURITY - A LAYERED APPROACH - WHY ?
• Multitenancy
• Loss of Control
• Network Topology
• Logical Network Segmentation
• No physical endpoints
• Single Point of Access
PERIMETER NETWORK
PHYSICAL RESOURCES
HYPERVISOR
TENANT NETWORK
HOST OS
APPLICATION
DATA
CLOUD SECURITY - A LAYERED APPROACH -
INFRASTRUCTURE
• Infrastructure Layer
• VM attacks, Virtual network, Hypervisor attacks, VM-based rootkits
• Virtual switch attacks
• DoS attacks, Colocation
• Insecure Interfaces and APIs
• Denial of Service
CLOUD SECURITY - A LAYERED APPROACH -
APPLICATION PLATFORM
• System and resource isolation
• User level permissions
• User access management
• Protection against Malware, Backdoors and Trojans
CLOUD SECURITY - A LAYERED APPROACH -
SOFTWARE
• Data segregation
• Data Access and Policies
OWASP Top 10 Security Threats
• A1- Injection
• A2- Broken Authentication and Session Management
• A3- Cross-site Scripting(XSS)
• A4- Insecure Direct Object References
• A5- Security Misconfiguration
• A6- Sensitive Data Exposure
• A7- Missing Function Level Access Control
• A8-Cross-Site Request Forgery
• A9- Using Components with Known Vulnerabilities
• A10- Unvalidated Redirects and Forwards
COMMON PITFALLS - CLOUD SECURITY APPLICATION DEPLOYMENT
• On-Premises Does Not Always Transfer(and Vice Versa)
• Not All Apps are "Cloud-Ready"
• Lack of Training and Awareness
• Lack of Documentation and Guidelines
• Complexities of Integration
• Overarching Challenges
CLOUD DATA STORAGE, SECURITY & THREATS
TYPES OF STORAGE
• Volume Storage, Object Storage, Structured, Unstructured, Information Storage and
Management, Content and file storage, Ephemeral storage, Content Delivery Network, Raw
Storage, Long-Term Storage
DATA SECURITY
• DLP: Data Leakage Prevention or Data Loss Protection, Encryption, Obfuscation,
Anonymization, Tokenization, Masking
THREATS
• Unauthorized usage/access, Liability due to regulatory noncompliance, Denial of Service and
Distributed denial of service, Corruption, modification and destruction of data, Data leakage
and breaches, Theft or accidental loss of media, Malware attack or introduction, Improper
treatment or sanitization after end of use
CLOUD DATA STORAGE - ENCRYPTION &
SANITIZATION
• Data In Transit (Data In Motion)
• Data at Rest
• Cryptographic Erasure
• Data Overwriting
CLOUD DATA STORAGE - KEY MANAGEMENT &
ACCESS CONTROLS
Common Approaches to Key Management
• Remote Key Management Service(KMS)
• Client Side Key Management
IAM and Access Control
• Provisioning and deprovisioning
• Centralized directory services
• Privileged user management
• Authentication and access management
AUTOMATION USE CASES - SECURE CLOUD
Automation Starts with Notifications. When a vulnerability is detected:
• Its severity is assessed
• A security patch or an interim solution is provided
• This information is entered into a system
• Automated email notifications are sent to predefined accounts in a straightforward process
Areas for automation:
• Telco Cloud Orchestration
• Predicting failures
• Analysing Service Failures & Protecting SLAs
• Security Patch applicability
• Creation of tracking records and their assignment to predefined resolver groups, in-case of
matching
• Change record creation, change approval, change implementation
ANSIBLE
AUTOMATE
PROCESSES &
DEPLOYMENTS
ManageIQ
DELIVER SERVICES
ACROSS HYBRID
CLOUD
AUDITING THE CLOUD INFRA/SERVICES
• Internal Audit
• External Audit
CLOUDFO
DELIVER SERVICES ACROSS
YOUR HYBRID CLOUD
Hybrid Cloud Management
Self-Service Provisioning
Policy-driven Compliance
Summary
• Telco cloud is complex in terms of security
• Take a holistic layered approach towards security
• Automation is key
• Security is a continuous exercise
Thank You
Questions ?
hwng@redhat.com
nhweemin
asv@redhat.com
amAbhilash

Securing your telco cloud

  • 2.
    Securing the TelcoCloud June 2017 Ng Hwee Ming Abhilash S V Principal Technologist Cloud Solution Architect, Red Hat APAC Office of Technology, Red Hat
  • 3.
    THE CHANGING LANDSCAPENETWORK SONET/TDM WIREDWIRELESS Gig-E IPv6 IP 5G NFV WiFi/WiMax Video SDN Hosted& managed Longdistance (IXC) Local(LEC) Data(LECorIXC) Video(MSO) SecurityStorage Voice Music Payments Video Gaming HYBRID CLOUD ENVIRONMENT APPLICATIONSDEVICES Handset/RJ45/Modem CELL PHONESMARTPHONE PC/TABLET IoT/M2M OLD LANDSCAPE NEW LANDSCAPE
  • 4.
    TELCO CLOUD SERVICES- PATHWAY TO NEW SERVICES Enterprise Telco Cloud IaaS / PAAS Branch Office vCPE Business Network Services V-EPC GiLan Cloud RAN / vRAN MPN Mobile Private Network (MPN) Media & Gaming Services vCDN IoT SD-WAN SD-WAN SD-WAN Internet Mobile Users Devices
  • 5.
    - NFV &SDN are disrupting the way telecom networks are going to be built and managed becoming the foundation of modern networking - Virtualization & Cloudification are key technologies to enable NFV - Sharing resources is a major concern for security - Cybersecurity national agencies want to define guidelines to ensure this new foundation is secure before allowing mass roll-out of sensible network functions e.g. Lawful Intercept capable VNFs - NFV & SDN can also be a way to mitigate more efficiently security threats - Bottom line is that security can slow down or even block NFV deployment
  • 6.
    TELCO CLOUD INFRASTRUCTURE- RISKS RISKS POLICY RISKS GENERAL RISKS VIRTUALIZATION RISKS NON-CLOUD SPECIFIC RISKS CLOUD SPECIFIC RISKS LEGAL RISKS
  • 7.
    WHO IS LOOKINGAT IT ? THE MAJOR NFV SECURITY STAKEHOLDERS
  • 8.
    FRAMEWORKS FOR CLOUDCOMPUTING • ISO/IEC 27017:2015 Information Technology-Security Techniques-Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Cloud Services • Organization for Economic Cooperation and Development-Privacy and Security Guidelines • Asia-Pacific Economic Cooperation Privacy Framework • EU Data Protection Directive
  • 9.
    BUILD CLOUD WITHSECURITY STANDARDS • ISO/IEC 27001:2013 • ISO/IEC 27002:2013 • ISO/IEC 27017:2015 • SOC 1/SOC 2/SOC 3 • NIST SP 800-53 • PCI DSS
  • 10.
    KEY SECURE CLOUDDESIGN PRINCIPLES Protections to enable trust Cross Platform Capabilities Access, Administration, Resiliency Delegate or Federated Access Secure and Ease of Access & Adoption Identification, Authentication, Authorization, Administration, Auditability Elastic, Flexible, and Resilient, supporting multitenant platforms Multi level protection- Network, OS, Application Security 1 2 3 4 5 6 8 7
  • 11.
    CLOUD SECURITY -A LAYERED APPROACH - WHY ? • Multitenancy • Loss of Control • Network Topology • Logical Network Segmentation • No physical endpoints • Single Point of Access PERIMETER NETWORK PHYSICAL RESOURCES HYPERVISOR TENANT NETWORK HOST OS APPLICATION DATA
  • 12.
    CLOUD SECURITY -A LAYERED APPROACH - INFRASTRUCTURE • Infrastructure Layer • VM attacks, Virtual network, Hypervisor attacks, VM-based rootkits • Virtual switch attacks • DoS attacks, Colocation • Insecure Interfaces and APIs • Denial of Service
  • 13.
    CLOUD SECURITY -A LAYERED APPROACH - APPLICATION PLATFORM • System and resource isolation • User level permissions • User access management • Protection against Malware, Backdoors and Trojans
  • 14.
    CLOUD SECURITY -A LAYERED APPROACH - SOFTWARE • Data segregation • Data Access and Policies OWASP Top 10 Security Threats • A1- Injection • A2- Broken Authentication and Session Management • A3- Cross-site Scripting(XSS) • A4- Insecure Direct Object References • A5- Security Misconfiguration • A6- Sensitive Data Exposure • A7- Missing Function Level Access Control • A8-Cross-Site Request Forgery • A9- Using Components with Known Vulnerabilities • A10- Unvalidated Redirects and Forwards
  • 15.
    COMMON PITFALLS -CLOUD SECURITY APPLICATION DEPLOYMENT • On-Premises Does Not Always Transfer(and Vice Versa) • Not All Apps are "Cloud-Ready" • Lack of Training and Awareness • Lack of Documentation and Guidelines • Complexities of Integration • Overarching Challenges
  • 16.
    CLOUD DATA STORAGE,SECURITY & THREATS TYPES OF STORAGE • Volume Storage, Object Storage, Structured, Unstructured, Information Storage and Management, Content and file storage, Ephemeral storage, Content Delivery Network, Raw Storage, Long-Term Storage DATA SECURITY • DLP: Data Leakage Prevention or Data Loss Protection, Encryption, Obfuscation, Anonymization, Tokenization, Masking THREATS • Unauthorized usage/access, Liability due to regulatory noncompliance, Denial of Service and Distributed denial of service, Corruption, modification and destruction of data, Data leakage and breaches, Theft or accidental loss of media, Malware attack or introduction, Improper treatment or sanitization after end of use
  • 17.
    CLOUD DATA STORAGE- ENCRYPTION & SANITIZATION • Data In Transit (Data In Motion) • Data at Rest • Cryptographic Erasure • Data Overwriting
  • 18.
    CLOUD DATA STORAGE- KEY MANAGEMENT & ACCESS CONTROLS Common Approaches to Key Management • Remote Key Management Service(KMS) • Client Side Key Management IAM and Access Control • Provisioning and deprovisioning • Centralized directory services • Privileged user management • Authentication and access management
  • 19.
    AUTOMATION USE CASES- SECURE CLOUD Automation Starts with Notifications. When a vulnerability is detected: • Its severity is assessed • A security patch or an interim solution is provided • This information is entered into a system • Automated email notifications are sent to predefined accounts in a straightforward process Areas for automation: • Telco Cloud Orchestration • Predicting failures • Analysing Service Failures & Protecting SLAs • Security Patch applicability • Creation of tracking records and their assignment to predefined resolver groups, in-case of matching • Change record creation, change approval, change implementation ANSIBLE AUTOMATE PROCESSES & DEPLOYMENTS ManageIQ DELIVER SERVICES ACROSS HYBRID CLOUD
  • 20.
    AUDITING THE CLOUDINFRA/SERVICES • Internal Audit • External Audit CLOUDFO DELIVER SERVICES ACROSS YOUR HYBRID CLOUD Hybrid Cloud Management Self-Service Provisioning Policy-driven Compliance
  • 21.
    Summary • Telco cloudis complex in terms of security • Take a holistic layered approach towards security • Automation is key • Security is a continuous exercise
  • 22.