SlideShare a Scribd company logo
VESPA: Multi-Layered Self-Protection
           for Cloud Resources
                                        Marc Lacoste
                                        Orange Labs
     Self-protection has raised growing interest as possible element of answer to the cloud protection
challenge. However, previous solutions miss flexible security policies, cross-layered defense,
multiple control granularities, and open security architectures.

        This talk presents VESPA, an open IaaS self-protection architecture and framework that
overcomes such limitations. Key features are regulation of security at two levels, both within and
across software layers; flexible coordination of multiple feedback loops enabling enforcement of a
rich spectrum of protection strategies; and an extensible architecture allowing simple integration of
commodity security components.

                                                          OW2Con’12, November 28-29, 2012
                                                           Orange Labs, Paris. www.ow2.org
Motivation



s   Security = #1 adoption stopper to cloud computing.



s   Mushrooming threats:
      From outside: rootkits, malware, intrusions…
      From inside: "honest-but-curious" legitimate users, over-privileged admins…



s   Heterogeneous defenses:
      Vertically:   layer-specific mechanisms.
      Horizontally: system. vs. network placement.


   Self-protection as possible next step of security management with promise of
    simpler, stronger, more efficient, But…flexible protection.
                                       more
                 …How to design self-protecting clouds?
           OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org           2
3 Major Challenges

                     Challenge #1: Multi-Layering
 Each cloud layer has its own security mechanisms, oblivious to other layers.
 But attacks may span several layers at once!




                     Challenge #2: Multi-Laterality
 Each cloud stakeholder has its own security objectives and policies.
 Flexiblility is needed in monitoring granularity and security policies!



                         Challenge #3: Openness
 Cloud stakeholder topology is dynamic, and threats may be unknown.
 Interoperability is needed with 3rd-party security policies/components!


          OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org        3
●   Principle
        Cloud Self-Protection Design Principles
                           Self-Protection
                           Policy-Based
                                                         Principle #2:
                            Principle #1:
                                                         Cross-Layer
                                                           Defense
                                       Self-Protecting Cloud
                          Principle #3:
                          Multiple Self-              Open Architecture
                        Protection Loops                Principle #4:




                 Principle #1: Policy-Based Self-Protection
                 Principle #3: #4: OpenSelf-Protection Loops
                     Principle #2: Cross-Layer Defense
                               Multiple Architecture
The self-protection architecture should be aperformed withinwell-defined securitybe but
   Multiple detectionreaction should not be refinement of a agranularity shouldsecurity
     Detection and and reaction strategies and mechanisms single third-partylayer,
        Several control loops of variable levels of supervision (e.g., software
    components)and coordinated. integrated in the security architecture.
      may also span several layers.
         defined should be easily
adaptation model based on policies.


                OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org       4
VESPA Goals
s   VESPA = Virtual Environments Self-Protecting Architecture:
    An autonomic security framework for regulating protection of IaaS resources.
     1.   Cross-layer approach to security.
     2.   Multiple levels of supervision granularity.
     3.   Open and flexible architecture for easy security interoperability.
s   Implementation: KVM-based IaaS infrastructure.
s   Typical application: risk-aware dynamic VM confinement.




             OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org       5
VESPA System Architecture




   1. Policy-based security regulation, with well-defined SP model.
   2. Automated protection at two levels, within and across IaaS layers.
   3. Flexible orchestration of multiple SP loops, for rich defense strategy.
   4. OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org integration.
        Layered, extensible architecture for easy security COTS                      6
Security Model

      Critical assets
        to protect
                                  PR                    DM


Threats impact
  one layer
   (or more)

                                SM                      PM


                                                        RM
                  Security supervision
                           DM: Detection
                            RM: Reaction                                 Policy-orientation
                       PM: Detection+Reaction
                                                                          of the framework
                 OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org              7
Agent Model
                                             DECISION-MAKING
 REACTION
REFINEMENT                                                              CONTEXT
                                                                      AGGREGATION




NFORCEMENT                                                                   SENSING



     Agents performs mediation between security and decision-making:
           Security context aggregation.
           Reaction policy refinement.
           API adaptation for easy infrastructure integration of security COTS.
           OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org             8
Implementing Risk-Aware VM Quarantine




Three levels of self-protection:
  1. Intra-layer [VM-level]: anti-virus for analysis and cleaning.
  2. Cross-layer [VM+hypervisor levels]: hypervisor firewalling for VM isolation.
  3. Cross-layer [VM+hypervisor levels]: hypervisor migration manager to move
     VM OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org
        to quarantine zone and back.                                            9
Conclusions
s   Key points:
       VESPA: architecture for effective and flexible SP of IaaS resources.




       Two-level tuning of security policies, within and across layers.




       Coordination of multiple loops allows rich spectrum of defense strategy.




       Multi-plane open design for easy integration of detection/reaction COTS.




s   Ongoing:
       VESPA v0 = 8000 Python LoC. Underlying infrastructure = KVM.




       C version under development using Fractal / Cecilia framework.




    Security services: IDS, anti-virus, log analysis, firewall, MAC.




       Extend VESPA to the multi-cloud setting using security domains.




s   More …
Available soon in open source! Check-out our ICAC 2012 paper!




[ICAC 12] Aurélien Wailly, Marc Lacoste, Hervé Debar.

           VESPA: Multi-Layered Self-Protection for Cloud Resources.

                                              OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org
           9th ACM International Conference on Autonomic Computing (ICAC),                                      10
           San José, California, September 2012.
Thanks!

Contact:
Marc Lacoste
Senior Research Scientist
Orange Labs, Security Dept.
E-mail: marc.lacoste@orange.com

More Related Content

What's hot

36
3636
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
Zsolt Nemeth
 
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
Francesco Flammini
 
Safe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security Solutions
ASBIS SK
 
Chapter 1 2
Chapter 1 2Chapter 1 2
Chapter 1 2
Baggam Sailusha
 
IBM Storwize V7000 Unified: Safeguarding your critical data
IBM Storwize V7000 Unified: Safeguarding your critical dataIBM Storwize V7000 Unified: Safeguarding your critical data
IBM Storwize V7000 Unified: Safeguarding your critical data
IBM India Smarter Computing
 
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
jzadeh
 
stackArmor MicroSummit - Niksun Network Monitoring - DPI
stackArmor MicroSummit - Niksun Network Monitoring - DPIstackArmor MicroSummit - Niksun Network Monitoring - DPI
stackArmor MicroSummit - Niksun Network Monitoring - DPI
Gaurav "GP" Pal
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
Anindya Ghosh,
 
Security, Privacy and the Future Internet
Security, Privacy and the Future InternetSecurity, Privacy and the Future Internet
Security, Privacy and the Future Internet
Fraunhofer Institute for Secure Information Technology
 
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Kaspersky
 
Building a Cyber Range for training Cyber Defense Situation Awareness
Building a Cyber Range for training Cyber Defense Situation AwarenessBuilding a Cyber Range for training Cyber Defense Situation Awareness
Building a Cyber Range for training Cyber Defense Situation Awareness
Thibault Debatty
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
Rajendra Menon
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
Zsolt Nemeth
 
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
Trend Micro (EMEA) Limited
 
The Duqu 2.0: Technical Details
The Duqu 2.0: Technical DetailsThe Duqu 2.0: Technical Details
The Duqu 2.0: Technical Details
Kaspersky
 
Flask: Flux Advanced Security Kernel
Flask: Flux Advanced Security KernelFlask: Flux Advanced Security Kernel
Flask: Flux Advanced Security Kernel
Luis Espinal
 
IBM Immune System
IBM Immune SystemIBM Immune System
IBM Immune System
Luke Kenny
 
Steganography
SteganographySteganography
Steganography
kuttycreator
 
SEC599 - Breaking The Kill Chain
SEC599 - Breaking The Kill ChainSEC599 - Breaking The Kill Chain
SEC599 - Breaking The Kill Chain
Erik Van Buggenhout
 

What's hot (20)

36
3636
36
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
 
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
 
Safe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security Solutions
 
Chapter 1 2
Chapter 1 2Chapter 1 2
Chapter 1 2
 
IBM Storwize V7000 Unified: Safeguarding your critical data
IBM Storwize V7000 Unified: Safeguarding your critical dataIBM Storwize V7000 Unified: Safeguarding your critical data
IBM Storwize V7000 Unified: Safeguarding your critical data
 
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
 
stackArmor MicroSummit - Niksun Network Monitoring - DPI
stackArmor MicroSummit - Niksun Network Monitoring - DPIstackArmor MicroSummit - Niksun Network Monitoring - DPI
stackArmor MicroSummit - Niksun Network Monitoring - DPI
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
Security, Privacy and the Future Internet
Security, Privacy and the Future InternetSecurity, Privacy and the Future Internet
Security, Privacy and the Future Internet
 
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
 
Building a Cyber Range for training Cyber Defense Situation Awareness
Building a Cyber Range for training Cyber Defense Situation AwarenessBuilding a Cyber Range for training Cyber Defense Situation Awareness
Building a Cyber Range for training Cyber Defense Situation Awareness
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
 
The Duqu 2.0: Technical Details
The Duqu 2.0: Technical DetailsThe Duqu 2.0: Technical Details
The Duqu 2.0: Technical Details
 
Flask: Flux Advanced Security Kernel
Flask: Flux Advanced Security KernelFlask: Flux Advanced Security Kernel
Flask: Flux Advanced Security Kernel
 
IBM Immune System
IBM Immune SystemIBM Immune System
IBM Immune System
 
Steganography
SteganographySteganography
Steganography
 
SEC599 - Breaking The Kill Chain
SEC599 - Breaking The Kill ChainSEC599 - Breaking The Kill Chain
SEC599 - Breaking The Kill Chain
 

Viewers also liked

Jaspersoft Open Source Business Intelligence
Jaspersoft Open Source Business IntelligenceJaspersoft Open Source Business Intelligence
Jaspersoft Open Source Business Intelligence
OW2
 
PR Campaign Case Study 수강후기
PR Campaign Case Study 수강후기PR Campaign Case Study 수강후기
PR Campaign Case Study 수강후기
Matthew Chang
 
Putting Controlled Vocabulary To Work I Davis 2008
Putting Controlled Vocabulary To Work I Davis 2008Putting Controlled Vocabulary To Work I Davis 2008
Putting Controlled Vocabulary To Work I Davis 2008
Ian Davis
 
Jaap
JaapJaap
Consistent service integration in your workflows with OW2 Scarbo 2.0, OW2con'...
Consistent service integration in your workflows with OW2 Scarbo 2.0, OW2con'...Consistent service integration in your workflows with OW2 Scarbo 2.0, OW2con'...
Consistent service integration in your workflows with OW2 Scarbo 2.0, OW2con'...
OW2
 
ETICS- quality certification of open source cloud software, OW2con'12, Paris
ETICS- quality certification of open source cloud software, OW2con'12, ParisETICS- quality certification of open source cloud software, OW2con'12, Paris
ETICS- quality certification of open source cloud software, OW2con'12, Paris
OW2
 
Dziękuję solidarności
Dziękuję solidarnościDziękuję solidarności
Dziękuję solidarności
Ciszewski MSL
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
dphil002
 
Ciszewski internet credentials and case study eng
Ciszewski internet credentials and case study engCiszewski internet credentials and case study eng
Ciszewski internet credentials and case study eng
Ciszewski MSL
 
Manage Traceability with Apache Atlas flexible metadata repository.
Manage Traceability with Apache Atlas flexible metadata repository.Manage Traceability with Apache Atlas flexible metadata repository.
Manage Traceability with Apache Atlas flexible metadata repository.
OW2
 
To be Open Source or not to be ? OW2con’12, Paris
To be Open Source or not to be ? OW2con’12, ParisTo be Open Source or not to be ? OW2con’12, Paris
To be Open Source or not to be ? OW2con’12, Paris
OW2
 
Starting for the Cloud, OW2 Conference Nov10
Starting for the Cloud, OW2 Conference Nov10Starting for the Cloud, OW2 Conference Nov10
Starting for the Cloud, OW2 Conference Nov10
OW2
 
Salome TMF OW2 Conference Nov10
Salome TMF OW2 Conference Nov10Salome TMF OW2 Conference Nov10
Salome TMF OW2 Conference Nov10
OW2
 
Talend bonitasoft-ow2-conference-nov10
Talend bonitasoft-ow2-conference-nov10Talend bonitasoft-ow2-conference-nov10
Talend bonitasoft-ow2-conference-nov10
OW2
 
Tech talk: PHP
Tech talk: PHPTech talk: PHP
Tech talk: PHP
Jen Wei Lee
 
Sat4j: from the lab to desktop computers. OW2con'15, November 17, Paris.
Sat4j: from the lab to desktop computers. OW2con'15, November 17, Paris. Sat4j: from the lab to desktop computers. OW2con'15, November 17, Paris.
Sat4j: from the lab to desktop computers. OW2con'15, November 17, Paris.
OW2
 
CHOReOS Large Scale Choreographies, OW2con11, Nov 24-25, 2011, Paris
CHOReOS Large Scale Choreographies, OW2con11, Nov 24-25, 2011, ParisCHOReOS Large Scale Choreographies, OW2con11, Nov 24-25, 2011, Paris
CHOReOS Large Scale Choreographies, OW2con11, Nov 24-25, 2011, Paris
OW2
 
Social Media for Nutrition Bytes
Social Media for Nutrition BytesSocial Media for Nutrition Bytes
Social Media for Nutrition Bytes
tellem
 
Эволюция продукта
Эволюция продуктаЭволюция продукта
Эволюция продуктаPavel Antonenko
 
Opportunity analysis
Opportunity analysisOpportunity analysis
Opportunity analysis
Rahul Tom Joseph
 

Viewers also liked (20)

Jaspersoft Open Source Business Intelligence
Jaspersoft Open Source Business IntelligenceJaspersoft Open Source Business Intelligence
Jaspersoft Open Source Business Intelligence
 
PR Campaign Case Study 수강후기
PR Campaign Case Study 수강후기PR Campaign Case Study 수강후기
PR Campaign Case Study 수강후기
 
Putting Controlled Vocabulary To Work I Davis 2008
Putting Controlled Vocabulary To Work I Davis 2008Putting Controlled Vocabulary To Work I Davis 2008
Putting Controlled Vocabulary To Work I Davis 2008
 
Jaap
JaapJaap
Jaap
 
Consistent service integration in your workflows with OW2 Scarbo 2.0, OW2con'...
Consistent service integration in your workflows with OW2 Scarbo 2.0, OW2con'...Consistent service integration in your workflows with OW2 Scarbo 2.0, OW2con'...
Consistent service integration in your workflows with OW2 Scarbo 2.0, OW2con'...
 
ETICS- quality certification of open source cloud software, OW2con'12, Paris
ETICS- quality certification of open source cloud software, OW2con'12, ParisETICS- quality certification of open source cloud software, OW2con'12, Paris
ETICS- quality certification of open source cloud software, OW2con'12, Paris
 
Dziękuję solidarności
Dziękuję solidarnościDziękuję solidarności
Dziękuję solidarności
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Ciszewski internet credentials and case study eng
Ciszewski internet credentials and case study engCiszewski internet credentials and case study eng
Ciszewski internet credentials and case study eng
 
Manage Traceability with Apache Atlas flexible metadata repository.
Manage Traceability with Apache Atlas flexible metadata repository.Manage Traceability with Apache Atlas flexible metadata repository.
Manage Traceability with Apache Atlas flexible metadata repository.
 
To be Open Source or not to be ? OW2con’12, Paris
To be Open Source or not to be ? OW2con’12, ParisTo be Open Source or not to be ? OW2con’12, Paris
To be Open Source or not to be ? OW2con’12, Paris
 
Starting for the Cloud, OW2 Conference Nov10
Starting for the Cloud, OW2 Conference Nov10Starting for the Cloud, OW2 Conference Nov10
Starting for the Cloud, OW2 Conference Nov10
 
Salome TMF OW2 Conference Nov10
Salome TMF OW2 Conference Nov10Salome TMF OW2 Conference Nov10
Salome TMF OW2 Conference Nov10
 
Talend bonitasoft-ow2-conference-nov10
Talend bonitasoft-ow2-conference-nov10Talend bonitasoft-ow2-conference-nov10
Talend bonitasoft-ow2-conference-nov10
 
Tech talk: PHP
Tech talk: PHPTech talk: PHP
Tech talk: PHP
 
Sat4j: from the lab to desktop computers. OW2con'15, November 17, Paris.
Sat4j: from the lab to desktop computers. OW2con'15, November 17, Paris. Sat4j: from the lab to desktop computers. OW2con'15, November 17, Paris.
Sat4j: from the lab to desktop computers. OW2con'15, November 17, Paris.
 
CHOReOS Large Scale Choreographies, OW2con11, Nov 24-25, 2011, Paris
CHOReOS Large Scale Choreographies, OW2con11, Nov 24-25, 2011, ParisCHOReOS Large Scale Choreographies, OW2con11, Nov 24-25, 2011, Paris
CHOReOS Large Scale Choreographies, OW2con11, Nov 24-25, 2011, Paris
 
Social Media for Nutrition Bytes
Social Media for Nutrition BytesSocial Media for Nutrition Bytes
Social Media for Nutrition Bytes
 
Эволюция продукта
Эволюция продуктаЭволюция продукта
Эволюция продукта
 
Opportunity analysis
Opportunity analysisOpportunity analysis
Opportunity analysis
 

Similar to VESPA- Multi-Layered Self-Protection for Cloud Resources, OW2con'12, Paris

Make your OpenStack Cloud Self-Defending with VESPA!
Make your OpenStack Cloud Self-Defending with VESPA!Make your OpenStack Cloud Self-Defending with VESPA!
Make your OpenStack Cloud Self-Defending with VESPA!
mlacostma
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
Maganathin Veeraragaloo
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers Guide
Jeremiah Grossman
 
Tinysec
TinysecTinysec
Tinysec
Dhara Ladumor
 
Tinysec
TinysecTinysec
Tinysec
Dhara Ladumor
 
Security and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud ArchitectureSecurity and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud Architecture
ijsrd.com
 
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGYSECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
ijsrd.com
 
Micro segmentation – a perfect fit for microservices
Micro segmentation – a perfect fit for microservicesMicro segmentation – a perfect fit for microservices
Micro segmentation – a perfect fit for microservices
Anthony Chow
 
Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)
CloudMask inc.
 
7 cloud security tips
7 cloud security tips7 cloud security tips
7 cloud security tips
United Technology Group (UTG)
 
SHIELD_overview_presentation_INFOCOM2018.pptx
SHIELD_overview_presentation_INFOCOM2018.pptxSHIELD_overview_presentation_INFOCOM2018.pptx
SHIELD_overview_presentation_INFOCOM2018.pptx
officelifehq
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Crawsec
 
Chaos engineering for cloud native security
Chaos engineering for cloud native securityChaos engineering for cloud native security
Chaos engineering for cloud native security
Kennedy
 
General Security ConceptsChapter 2Principles of Comput.docx
General Security ConceptsChapter 2Principles of Comput.docxGeneral Security ConceptsChapter 2Principles of Comput.docx
General Security ConceptsChapter 2Principles of Comput.docx
budbarber38650
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
Ploynatcha Akkaraputtipat
 
Avoiding Container Vulnerabilities
Avoiding Container VulnerabilitiesAvoiding Container Vulnerabilities
Avoiding Container Vulnerabilities
Mighty Guides, Inc.
 
Security Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area NetworksSecurity Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area Networks
CSCJournals
 
Container Workload Security Solution Ideas by Mandy Sidana.pptx
Container Workload Security Solution Ideas by Mandy Sidana.pptxContainer Workload Security Solution Ideas by Mandy Sidana.pptx
Container Workload Security Solution Ideas by Mandy Sidana.pptx
Mandy Sidana
 
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET Journal
 

Similar to VESPA- Multi-Layered Self-Protection for Cloud Resources, OW2con'12, Paris (20)

Make your OpenStack Cloud Self-Defending with VESPA!
Make your OpenStack Cloud Self-Defending with VESPA!Make your OpenStack Cloud Self-Defending with VESPA!
Make your OpenStack Cloud Self-Defending with VESPA!
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers Guide
 
Tinysec
TinysecTinysec
Tinysec
 
Tinysec
TinysecTinysec
Tinysec
 
Security and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud ArchitectureSecurity and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud Architecture
 
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGYSECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
 
Micro segmentation – a perfect fit for microservices
Micro segmentation – a perfect fit for microservicesMicro segmentation – a perfect fit for microservices
Micro segmentation – a perfect fit for microservices
 
Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)
 
7 cloud security tips
7 cloud security tips7 cloud security tips
7 cloud security tips
 
SHIELD_overview_presentation_INFOCOM2018.pptx
SHIELD_overview_presentation_INFOCOM2018.pptxSHIELD_overview_presentation_INFOCOM2018.pptx
SHIELD_overview_presentation_INFOCOM2018.pptx
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
 
Chaos engineering for cloud native security
Chaos engineering for cloud native securityChaos engineering for cloud native security
Chaos engineering for cloud native security
 
General Security ConceptsChapter 2Principles of Comput.docx
General Security ConceptsChapter 2Principles of Comput.docxGeneral Security ConceptsChapter 2Principles of Comput.docx
General Security ConceptsChapter 2Principles of Comput.docx
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 
Avoiding Container Vulnerabilities
Avoiding Container VulnerabilitiesAvoiding Container Vulnerabilities
Avoiding Container Vulnerabilities
 
Security Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area NetworksSecurity Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area Networks
 
Container Workload Security Solution Ideas by Mandy Sidana.pptx
Container Workload Security Solution Ideas by Mandy Sidana.pptxContainer Workload Security Solution Ideas by Mandy Sidana.pptx
Container Workload Security Solution Ideas by Mandy Sidana.pptx
 
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
 

More from OW2

OW2 and RIOS teaming up to boost the open source impact, Nov. 2022 in Roma
OW2 and RIOS teaming up to boost the open source impact, Nov. 2022 in RomaOW2 and RIOS teaming up to boost the open source impact, Nov. 2022 in Roma
OW2 and RIOS teaming up to boost the open source impact, Nov. 2022 in Roma
OW2
 
The Open Source Good Governance Initiative presented at RIOS OS Week, Nov. 20...
The Open Source Good Governance Initiative presented at RIOS OS Week, Nov. 20...The Open Source Good Governance Initiative presented at RIOS OS Week, Nov. 20...
The Open Source Good Governance Initiative presented at RIOS OS Week, Nov. 20...
OW2
 
GLPi v.10, les fonctionnalités principales et l'offre cloud
GLPi v.10, les fonctionnalités principales et l'offre cloudGLPi v.10, les fonctionnalités principales et l'offre cloud
GLPi v.10, les fonctionnalités principales et l'offre cloud
OW2
 
Centreon: superviser le Cloud et le Legacy à partir d'une même plateforme, po...
Centreon: superviser le Cloud et le Legacy à partir d'une même plateforme, po...Centreon: superviser le Cloud et le Legacy à partir d'une même plateforme, po...
Centreon: superviser le Cloud et le Legacy à partir d'une même plateforme, po...
OW2
 
FusionIAM : la gestion des identités et des accés open source
FusionIAM : la gestion des identités et des accés open sourceFusionIAM : la gestion des identités et des accés open source
FusionIAM : la gestion des identités et des accés open source
OW2
 
OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...
OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...
OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...
OW2
 
SFScon'20 Bringing the User into the Equation
SFScon'20 Bringing the User into the EquationSFScon'20 Bringing the User into the Equation
SFScon'20 Bringing the User into the Equation
OW2
 
Towards a sustainable solution to open source sustainability, OW2online20, Ju...
Towards a sustainable solution to open source sustainability, OW2online20, Ju...Towards a sustainable solution to open source sustainability, OW2online20, Ju...
Towards a sustainable solution to open source sustainability, OW2online20, Ju...
OW2
 
Advanced proactive and polymorphing cloud application adaptation with MORPHEM...
Advanced proactive and polymorphing cloud application adaptation with MORPHEM...Advanced proactive and polymorphing cloud application adaptation with MORPHEM...
Advanced proactive and polymorphing cloud application adaptation with MORPHEM...
OW2
 
Open Source governance and the Eclipse Foundation, OW2online, June 2020
Open Source governance and the Eclipse Foundation, OW2online, June 2020Open Source governance and the Eclipse Foundation, OW2online, June 2020
Open Source governance and the Eclipse Foundation, OW2online, June 2020
OW2
 
Open source contribution policies, OW2online, June 2020
Open source contribution policies, OW2online, June 2020Open source contribution policies, OW2online, June 2020
Open source contribution policies, OW2online, June 2020
OW2
 
Software development at scale, pandemic lockdown and oss ecosystems, OW2onlin...
Software development at scale, pandemic lockdown and oss ecosystems, OW2onlin...Software development at scale, pandemic lockdown and oss ecosystems, OW2onlin...
Software development at scale, pandemic lockdown and oss ecosystems, OW2onlin...
OW2
 
Overview of the OpenChain Reference Tooling Work Group, OW2online20, June 2020
Overview of the OpenChain Reference Tooling Work Group, OW2online20, June 2020Overview of the OpenChain Reference Tooling Work Group, OW2online20, June 2020
Overview of the OpenChain Reference Tooling Work Group, OW2online20, June 2020
OW2
 
Open Source Compliance at Orange, OW2online, June 2020
Open Source Compliance at Orange, OW2online, June 2020Open Source Compliance at Orange, OW2online, June 2020
Open Source Compliance at Orange, OW2online, June 2020
OW2
 
Ideas, methods and tools for OSS Compliance assessment, OW2online, June 2020
Ideas, methods and tools for OSS Compliance assessment, OW2online, June 2020Ideas, methods and tools for OSS Compliance assessment, OW2online, June 2020
Ideas, methods and tools for OSS Compliance assessment, OW2online, June 2020
OW2
 
Intelligent package management with FASTEN, OW2online, June 2020
Intelligent package management with FASTEN, OW2online, June 2020Intelligent package management with FASTEN, OW2online, June 2020
Intelligent package management with FASTEN, OW2online, June 2020
OW2
 
DECODER, a Smarter Environment for DevOps Teams , OW2online, June 2020
DECODER, a Smarter Environment for DevOps Teams , OW2online, June 2020DECODER, a Smarter Environment for DevOps Teams , OW2online, June 2020
DECODER, a Smarter Environment for DevOps Teams , OW2online, June 2020
OW2
 
Enabling DevOps for IoT software development, powered by Open Source, OW2onli...
Enabling DevOps for IoT software development, powered by Open Source, OW2onli...Enabling DevOps for IoT software development, powered by Open Source, OW2onli...
Enabling DevOps for IoT software development, powered by Open Source, OW2onli...
OW2
 
Upcoming Challenges in Artificial Intelligence Research and Development, OW2o...
Upcoming Challenges in Artificial Intelligence Research and Development, OW2o...Upcoming Challenges in Artificial Intelligence Research and Development, OW2o...
Upcoming Challenges in Artificial Intelligence Research and Development, OW2o...
OW2
 
Cacti and Big Data at Orange France, OW2online, June 2020
Cacti and Big Data at Orange France, OW2online, June 2020Cacti and Big Data at Orange France, OW2online, June 2020
Cacti and Big Data at Orange France, OW2online, June 2020
OW2
 

More from OW2 (20)

OW2 and RIOS teaming up to boost the open source impact, Nov. 2022 in Roma
OW2 and RIOS teaming up to boost the open source impact, Nov. 2022 in RomaOW2 and RIOS teaming up to boost the open source impact, Nov. 2022 in Roma
OW2 and RIOS teaming up to boost the open source impact, Nov. 2022 in Roma
 
The Open Source Good Governance Initiative presented at RIOS OS Week, Nov. 20...
The Open Source Good Governance Initiative presented at RIOS OS Week, Nov. 20...The Open Source Good Governance Initiative presented at RIOS OS Week, Nov. 20...
The Open Source Good Governance Initiative presented at RIOS OS Week, Nov. 20...
 
GLPi v.10, les fonctionnalités principales et l'offre cloud
GLPi v.10, les fonctionnalités principales et l'offre cloudGLPi v.10, les fonctionnalités principales et l'offre cloud
GLPi v.10, les fonctionnalités principales et l'offre cloud
 
Centreon: superviser le Cloud et le Legacy à partir d'une même plateforme, po...
Centreon: superviser le Cloud et le Legacy à partir d'une même plateforme, po...Centreon: superviser le Cloud et le Legacy à partir d'une même plateforme, po...
Centreon: superviser le Cloud et le Legacy à partir d'une même plateforme, po...
 
FusionIAM : la gestion des identités et des accés open source
FusionIAM : la gestion des identités et des accés open sourceFusionIAM : la gestion des identités et des accés open source
FusionIAM : la gestion des identités et des accés open source
 
OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...
OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...
OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...
 
SFScon'20 Bringing the User into the Equation
SFScon'20 Bringing the User into the EquationSFScon'20 Bringing the User into the Equation
SFScon'20 Bringing the User into the Equation
 
Towards a sustainable solution to open source sustainability, OW2online20, Ju...
Towards a sustainable solution to open source sustainability, OW2online20, Ju...Towards a sustainable solution to open source sustainability, OW2online20, Ju...
Towards a sustainable solution to open source sustainability, OW2online20, Ju...
 
Advanced proactive and polymorphing cloud application adaptation with MORPHEM...
Advanced proactive and polymorphing cloud application adaptation with MORPHEM...Advanced proactive and polymorphing cloud application adaptation with MORPHEM...
Advanced proactive and polymorphing cloud application adaptation with MORPHEM...
 
Open Source governance and the Eclipse Foundation, OW2online, June 2020
Open Source governance and the Eclipse Foundation, OW2online, June 2020Open Source governance and the Eclipse Foundation, OW2online, June 2020
Open Source governance and the Eclipse Foundation, OW2online, June 2020
 
Open source contribution policies, OW2online, June 2020
Open source contribution policies, OW2online, June 2020Open source contribution policies, OW2online, June 2020
Open source contribution policies, OW2online, June 2020
 
Software development at scale, pandemic lockdown and oss ecosystems, OW2onlin...
Software development at scale, pandemic lockdown and oss ecosystems, OW2onlin...Software development at scale, pandemic lockdown and oss ecosystems, OW2onlin...
Software development at scale, pandemic lockdown and oss ecosystems, OW2onlin...
 
Overview of the OpenChain Reference Tooling Work Group, OW2online20, June 2020
Overview of the OpenChain Reference Tooling Work Group, OW2online20, June 2020Overview of the OpenChain Reference Tooling Work Group, OW2online20, June 2020
Overview of the OpenChain Reference Tooling Work Group, OW2online20, June 2020
 
Open Source Compliance at Orange, OW2online, June 2020
Open Source Compliance at Orange, OW2online, June 2020Open Source Compliance at Orange, OW2online, June 2020
Open Source Compliance at Orange, OW2online, June 2020
 
Ideas, methods and tools for OSS Compliance assessment, OW2online, June 2020
Ideas, methods and tools for OSS Compliance assessment, OW2online, June 2020Ideas, methods and tools for OSS Compliance assessment, OW2online, June 2020
Ideas, methods and tools for OSS Compliance assessment, OW2online, June 2020
 
Intelligent package management with FASTEN, OW2online, June 2020
Intelligent package management with FASTEN, OW2online, June 2020Intelligent package management with FASTEN, OW2online, June 2020
Intelligent package management with FASTEN, OW2online, June 2020
 
DECODER, a Smarter Environment for DevOps Teams , OW2online, June 2020
DECODER, a Smarter Environment for DevOps Teams , OW2online, June 2020DECODER, a Smarter Environment for DevOps Teams , OW2online, June 2020
DECODER, a Smarter Environment for DevOps Teams , OW2online, June 2020
 
Enabling DevOps for IoT software development, powered by Open Source, OW2onli...
Enabling DevOps for IoT software development, powered by Open Source, OW2onli...Enabling DevOps for IoT software development, powered by Open Source, OW2onli...
Enabling DevOps for IoT software development, powered by Open Source, OW2onli...
 
Upcoming Challenges in Artificial Intelligence Research and Development, OW2o...
Upcoming Challenges in Artificial Intelligence Research and Development, OW2o...Upcoming Challenges in Artificial Intelligence Research and Development, OW2o...
Upcoming Challenges in Artificial Intelligence Research and Development, OW2o...
 
Cacti and Big Data at Orange France, OW2online, June 2020
Cacti and Big Data at Orange France, OW2online, June 2020Cacti and Big Data at Orange France, OW2online, June 2020
Cacti and Big Data at Orange France, OW2online, June 2020
 

Recently uploaded

Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 

Recently uploaded (20)

Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 

VESPA- Multi-Layered Self-Protection for Cloud Resources, OW2con'12, Paris

  • 1. VESPA: Multi-Layered Self-Protection for Cloud Resources Marc Lacoste Orange Labs Self-protection has raised growing interest as possible element of answer to the cloud protection challenge. However, previous solutions miss flexible security policies, cross-layered defense, multiple control granularities, and open security architectures. This talk presents VESPA, an open IaaS self-protection architecture and framework that overcomes such limitations. Key features are regulation of security at two levels, both within and across software layers; flexible coordination of multiple feedback loops enabling enforcement of a rich spectrum of protection strategies; and an extensible architecture allowing simple integration of commodity security components. OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org
  • 2. Motivation s Security = #1 adoption stopper to cloud computing. s Mushrooming threats:  From outside: rootkits, malware, intrusions…  From inside: "honest-but-curious" legitimate users, over-privileged admins… s Heterogeneous defenses:  Vertically: layer-specific mechanisms.  Horizontally: system. vs. network placement.  Self-protection as possible next step of security management with promise of simpler, stronger, more efficient, But…flexible protection. more …How to design self-protecting clouds? OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org 2
  • 3. 3 Major Challenges Challenge #1: Multi-Layering  Each cloud layer has its own security mechanisms, oblivious to other layers.  But attacks may span several layers at once! Challenge #2: Multi-Laterality  Each cloud stakeholder has its own security objectives and policies.  Flexiblility is needed in monitoring granularity and security policies! Challenge #3: Openness  Cloud stakeholder topology is dynamic, and threats may be unknown.  Interoperability is needed with 3rd-party security policies/components! OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org 3
  • 4. Principle Cloud Self-Protection Design Principles Self-Protection Policy-Based Principle #2: Principle #1: Cross-Layer Defense Self-Protecting Cloud Principle #3: Multiple Self- Open Architecture Protection Loops Principle #4: Principle #1: Policy-Based Self-Protection Principle #3: #4: OpenSelf-Protection Loops Principle #2: Cross-Layer Defense Multiple Architecture The self-protection architecture should be aperformed withinwell-defined securitybe but Multiple detectionreaction should not be refinement of a agranularity shouldsecurity Detection and and reaction strategies and mechanisms single third-partylayer, Several control loops of variable levels of supervision (e.g., software components)and coordinated. integrated in the security architecture. may also span several layers. defined should be easily adaptation model based on policies. OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org 4
  • 5. VESPA Goals s VESPA = Virtual Environments Self-Protecting Architecture: An autonomic security framework for regulating protection of IaaS resources. 1. Cross-layer approach to security. 2. Multiple levels of supervision granularity. 3. Open and flexible architecture for easy security interoperability. s Implementation: KVM-based IaaS infrastructure. s Typical application: risk-aware dynamic VM confinement. OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org 5
  • 6. VESPA System Architecture 1. Policy-based security regulation, with well-defined SP model. 2. Automated protection at two levels, within and across IaaS layers. 3. Flexible orchestration of multiple SP loops, for rich defense strategy. 4. OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org integration. Layered, extensible architecture for easy security COTS 6
  • 7. Security Model Critical assets to protect PR DM Threats impact one layer (or more) SM PM RM Security supervision DM: Detection RM: Reaction Policy-orientation PM: Detection+Reaction of the framework OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org 7
  • 8. Agent Model DECISION-MAKING REACTION REFINEMENT CONTEXT AGGREGATION NFORCEMENT SENSING Agents performs mediation between security and decision-making:  Security context aggregation.  Reaction policy refinement.  API adaptation for easy infrastructure integration of security COTS. OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org 8
  • 9. Implementing Risk-Aware VM Quarantine Three levels of self-protection: 1. Intra-layer [VM-level]: anti-virus for analysis and cleaning. 2. Cross-layer [VM+hypervisor levels]: hypervisor firewalling for VM isolation. 3. Cross-layer [VM+hypervisor levels]: hypervisor migration manager to move VM OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org to quarantine zone and back. 9
  • 10. Conclusions s Key points:  VESPA: architecture for effective and flexible SP of IaaS resources.  Two-level tuning of security policies, within and across layers.  Coordination of multiple loops allows rich spectrum of defense strategy.  Multi-plane open design for easy integration of detection/reaction COTS. s Ongoing:  VESPA v0 = 8000 Python LoC. Underlying infrastructure = KVM.  C version under development using Fractal / Cecilia framework. Security services: IDS, anti-virus, log analysis, firewall, MAC.  Extend VESPA to the multi-cloud setting using security domains. s More … Available soon in open source! Check-out our ICAC 2012 paper! [ICAC 12] Aurélien Wailly, Marc Lacoste, Hervé Debar. VESPA: Multi-Layered Self-Protection for Cloud Resources. OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org 9th ACM International Conference on Autonomic Computing (ICAC), 10 San José, California, September 2012.
  • 11. Thanks! Contact: Marc Lacoste Senior Research Scientist Orange Labs, Security Dept. E-mail: marc.lacoste@orange.com