SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
VESPA: Multi-Layered Self-Protection
           for Cloud Resources
                                        Marc Lacoste
                                        Orange Labs
     Self-protection has raised growing interest as possible element of answer to the cloud protection
challenge. However, previous solutions miss flexible security policies, cross-layered defense,
multiple control granularities, and open security architectures.

        This talk presents VESPA, an open IaaS self-protection architecture and framework that
overcomes such limitations. Key features are regulation of security at two levels, both within and
across software layers; flexible coordination of multiple feedback loops enabling enforcement of a
rich spectrum of protection strategies; and an extensible architecture allowing simple integration of
commodity security components.

                                                          OW2Con’12, November 28-29, 2012
                                                           Orange Labs, Paris. www.ow2.org
Motivation



s   Security = #1 adoption stopper to cloud computing.



s   Mushrooming threats:
      From outside: rootkits, malware, intrusions…
      From inside: "honest-but-curious" legitimate users, over-privileged admins…



s   Heterogeneous defenses:
      Vertically:   layer-specific mechanisms.
      Horizontally: system. vs. network placement.


   Self-protection as possible next step of security management with promise of
    simpler, stronger, more efficient, But…flexible protection.
                                       more
                 …How to design self-protecting clouds?
           OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org           2
3 Major Challenges

                     Challenge #1: Multi-Layering
 Each cloud layer has its own security mechanisms, oblivious to other layers.
 But attacks may span several layers at once!




                     Challenge #2: Multi-Laterality
 Each cloud stakeholder has its own security objectives and policies.
 Flexiblility is needed in monitoring granularity and security policies!



                         Challenge #3: Openness
 Cloud stakeholder topology is dynamic, and threats may be unknown.
 Interoperability is needed with 3rd-party security policies/components!


          OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org        3
●   Principle
        Cloud Self-Protection Design Principles
                           Self-Protection
                           Policy-Based
                                                         Principle #2:
                            Principle #1:
                                                         Cross-Layer
                                                           Defense
                                       Self-Protecting Cloud
                          Principle #3:
                          Multiple Self-              Open Architecture
                        Protection Loops                Principle #4:




                 Principle #1: Policy-Based Self-Protection
                 Principle #3: #4: OpenSelf-Protection Loops
                     Principle #2: Cross-Layer Defense
                               Multiple Architecture
The self-protection architecture should be aperformed withinwell-defined securitybe but
   Multiple detectionreaction should not be refinement of a agranularity shouldsecurity
     Detection and and reaction strategies and mechanisms single third-partylayer,
        Several control loops of variable levels of supervision (e.g., software
    components)and coordinated. integrated in the security architecture.
      may also span several layers.
         defined should be easily
adaptation model based on policies.


                OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org       4
VESPA Goals
s   VESPA = Virtual Environments Self-Protecting Architecture:
    An autonomic security framework for regulating protection of IaaS resources.
     1.   Cross-layer approach to security.
     2.   Multiple levels of supervision granularity.
     3.   Open and flexible architecture for easy security interoperability.
s   Implementation: KVM-based IaaS infrastructure.
s   Typical application: risk-aware dynamic VM confinement.




             OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org       5
VESPA System Architecture




   1. Policy-based security regulation, with well-defined SP model.
   2. Automated protection at two levels, within and across IaaS layers.
   3. Flexible orchestration of multiple SP loops, for rich defense strategy.
   4. OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org integration.
        Layered, extensible architecture for easy security COTS                      6
Security Model

      Critical assets
        to protect
                                  PR                    DM


Threats impact
  one layer
   (or more)

                                SM                      PM


                                                        RM
                  Security supervision
                           DM: Detection
                            RM: Reaction                                 Policy-orientation
                       PM: Detection+Reaction
                                                                          of the framework
                 OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org              7
Agent Model
                                             DECISION-MAKING
 REACTION
REFINEMENT                                                              CONTEXT
                                                                      AGGREGATION




NFORCEMENT                                                                   SENSING



     Agents performs mediation between security and decision-making:
           Security context aggregation.
           Reaction policy refinement.
           API adaptation for easy infrastructure integration of security COTS.
           OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org             8
Implementing Risk-Aware VM Quarantine




Three levels of self-protection:
  1. Intra-layer [VM-level]: anti-virus for analysis and cleaning.
  2. Cross-layer [VM+hypervisor levels]: hypervisor firewalling for VM isolation.
  3. Cross-layer [VM+hypervisor levels]: hypervisor migration manager to move
     VM OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org
        to quarantine zone and back.                                            9
Conclusions
s   Key points:
       VESPA: architecture for effective and flexible SP of IaaS resources.




       Two-level tuning of security policies, within and across layers.




       Coordination of multiple loops allows rich spectrum of defense strategy.




       Multi-plane open design for easy integration of detection/reaction COTS.




s   Ongoing:
       VESPA v0 = 8000 Python LoC. Underlying infrastructure = KVM.




       C version under development using Fractal / Cecilia framework.




    Security services: IDS, anti-virus, log analysis, firewall, MAC.




       Extend VESPA to the multi-cloud setting using security domains.




s   More …
Available soon in open source! Check-out our ICAC 2012 paper!




[ICAC 12] Aurélien Wailly, Marc Lacoste, Hervé Debar.

           VESPA: Multi-Layered Self-Protection for Cloud Resources.

                                              OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org
           9th ACM International Conference on Autonomic Computing (ICAC),                                      10
           San José, California, September 2012.
Thanks!

Contact:
Marc Lacoste
Senior Research Scientist
Orange Labs, Security Dept.
E-mail: marc.lacoste@orange.com

Contenu connexe

Tendances

Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defenseZsolt Nemeth
 
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)Francesco Flammini
 
Safe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsASBIS SK
 
IBM Storwize V7000 Unified: Safeguarding your critical data
IBM Storwize V7000 Unified: Safeguarding your critical dataIBM Storwize V7000 Unified: Safeguarding your critical data
IBM Storwize V7000 Unified: Safeguarding your critical dataIBM India Smarter Computing
 
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...jzadeh
 
stackArmor MicroSummit - Niksun Network Monitoring - DPI
stackArmor MicroSummit - Niksun Network Monitoring - DPIstackArmor MicroSummit - Niksun Network Monitoring - DPI
stackArmor MicroSummit - Niksun Network Monitoring - DPIGaurav "GP" Pal
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Anindya Ghosh,
 
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...Kaspersky
 
Building a Cyber Range for training Cyber Defense Situation Awareness
Building a Cyber Range for training Cyber Defense Situation AwarenessBuilding a Cyber Range for training Cyber Defense Situation Awareness
Building a Cyber Range for training Cyber Defense Situation AwarenessThibault Debatty
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat managementRajendra Menon
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutionsZsolt Nemeth
 
The Duqu 2.0: Technical Details
The Duqu 2.0: Technical DetailsThe Duqu 2.0: Technical Details
The Duqu 2.0: Technical DetailsKaspersky
 
Flask: Flux Advanced Security Kernel
Flask: Flux Advanced Security KernelFlask: Flux Advanced Security Kernel
Flask: Flux Advanced Security KernelLuis Espinal
 
IBM Immune System
IBM Immune SystemIBM Immune System
IBM Immune SystemLuke Kenny
 
SEC599 - Breaking The Kill Chain
SEC599 - Breaking The Kill ChainSEC599 - Breaking The Kill Chain
SEC599 - Breaking The Kill ChainErik Van Buggenhout
 

Tendances (20)

36
3636
36
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
 
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
 
Safe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security Solutions
 
Chapter 1 2
Chapter 1 2Chapter 1 2
Chapter 1 2
 
IBM Storwize V7000 Unified: Safeguarding your critical data
IBM Storwize V7000 Unified: Safeguarding your critical dataIBM Storwize V7000 Unified: Safeguarding your critical data
IBM Storwize V7000 Unified: Safeguarding your critical data
 
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
 
stackArmor MicroSummit - Niksun Network Monitoring - DPI
stackArmor MicroSummit - Niksun Network Monitoring - DPIstackArmor MicroSummit - Niksun Network Monitoring - DPI
stackArmor MicroSummit - Niksun Network Monitoring - DPI
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
Security, Privacy and the Future Internet
Security, Privacy and the Future InternetSecurity, Privacy and the Future Internet
Security, Privacy and the Future Internet
 
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
 
Building a Cyber Range for training Cyber Defense Situation Awareness
Building a Cyber Range for training Cyber Defense Situation AwarenessBuilding a Cyber Range for training Cyber Defense Situation Awareness
Building a Cyber Range for training Cyber Defense Situation Awareness
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
 
The Duqu 2.0: Technical Details
The Duqu 2.0: Technical DetailsThe Duqu 2.0: Technical Details
The Duqu 2.0: Technical Details
 
Flask: Flux Advanced Security Kernel
Flask: Flux Advanced Security KernelFlask: Flux Advanced Security Kernel
Flask: Flux Advanced Security Kernel
 
IBM Immune System
IBM Immune SystemIBM Immune System
IBM Immune System
 
Steganography
SteganographySteganography
Steganography
 
SEC599 - Breaking The Kill Chain
SEC599 - Breaking The Kill ChainSEC599 - Breaking The Kill Chain
SEC599 - Breaking The Kill Chain
 

En vedette

Jaspersoft Open Source Business Intelligence
Jaspersoft Open Source Business IntelligenceJaspersoft Open Source Business Intelligence
Jaspersoft Open Source Business IntelligenceOW2
 
PR Campaign Case Study 수강후기
PR Campaign Case Study 수강후기PR Campaign Case Study 수강후기
PR Campaign Case Study 수강후기Matthew Chang
 
Putting Controlled Vocabulary To Work I Davis 2008
Putting Controlled Vocabulary To Work I Davis 2008Putting Controlled Vocabulary To Work I Davis 2008
Putting Controlled Vocabulary To Work I Davis 2008Ian Davis
 
Consistent service integration in your workflows with OW2 Scarbo 2.0, OW2con'...
Consistent service integration in your workflows with OW2 Scarbo 2.0, OW2con'...Consistent service integration in your workflows with OW2 Scarbo 2.0, OW2con'...
Consistent service integration in your workflows with OW2 Scarbo 2.0, OW2con'...OW2
 
ETICS- quality certification of open source cloud software, OW2con'12, Paris
ETICS- quality certification of open source cloud software, OW2con'12, ParisETICS- quality certification of open source cloud software, OW2con'12, Paris
ETICS- quality certification of open source cloud software, OW2con'12, ParisOW2
 
Dziękuję solidarności
Dziękuję solidarnościDziękuję solidarności
Dziękuję solidarnościCiszewski MSL
 
Chapter 12
Chapter 12Chapter 12
Chapter 12dphil002
 
Ciszewski internet credentials and case study eng
Ciszewski internet credentials and case study engCiszewski internet credentials and case study eng
Ciszewski internet credentials and case study engCiszewski MSL
 
Manage Traceability with Apache Atlas flexible metadata repository.
Manage Traceability with Apache Atlas flexible metadata repository.Manage Traceability with Apache Atlas flexible metadata repository.
Manage Traceability with Apache Atlas flexible metadata repository.OW2
 
To be Open Source or not to be ? OW2con’12, Paris
To be Open Source or not to be ? OW2con’12, ParisTo be Open Source or not to be ? OW2con’12, Paris
To be Open Source or not to be ? OW2con’12, ParisOW2
 
Starting for the Cloud, OW2 Conference Nov10
Starting for the Cloud, OW2 Conference Nov10Starting for the Cloud, OW2 Conference Nov10
Starting for the Cloud, OW2 Conference Nov10OW2
 
Salome TMF OW2 Conference Nov10
Salome TMF OW2 Conference Nov10Salome TMF OW2 Conference Nov10
Salome TMF OW2 Conference Nov10OW2
 
Talend bonitasoft-ow2-conference-nov10
Talend bonitasoft-ow2-conference-nov10Talend bonitasoft-ow2-conference-nov10
Talend bonitasoft-ow2-conference-nov10OW2
 
Sat4j: from the lab to desktop computers. OW2con'15, November 17, Paris.
Sat4j: from the lab to desktop computers. OW2con'15, November 17, Paris. Sat4j: from the lab to desktop computers. OW2con'15, November 17, Paris.
Sat4j: from the lab to desktop computers. OW2con'15, November 17, Paris. OW2
 
CHOReOS Large Scale Choreographies, OW2con11, Nov 24-25, 2011, Paris
CHOReOS Large Scale Choreographies, OW2con11, Nov 24-25, 2011, ParisCHOReOS Large Scale Choreographies, OW2con11, Nov 24-25, 2011, Paris
CHOReOS Large Scale Choreographies, OW2con11, Nov 24-25, 2011, ParisOW2
 
Social Media for Nutrition Bytes
Social Media for Nutrition BytesSocial Media for Nutrition Bytes
Social Media for Nutrition Bytestellem
 
Эволюция продукта
Эволюция продуктаЭволюция продукта
Эволюция продуктаPavel Antonenko
 

En vedette (20)

Jaspersoft Open Source Business Intelligence
Jaspersoft Open Source Business IntelligenceJaspersoft Open Source Business Intelligence
Jaspersoft Open Source Business Intelligence
 
PR Campaign Case Study 수강후기
PR Campaign Case Study 수강후기PR Campaign Case Study 수강후기
PR Campaign Case Study 수강후기
 
Putting Controlled Vocabulary To Work I Davis 2008
Putting Controlled Vocabulary To Work I Davis 2008Putting Controlled Vocabulary To Work I Davis 2008
Putting Controlled Vocabulary To Work I Davis 2008
 
Jaap
JaapJaap
Jaap
 
Consistent service integration in your workflows with OW2 Scarbo 2.0, OW2con'...
Consistent service integration in your workflows with OW2 Scarbo 2.0, OW2con'...Consistent service integration in your workflows with OW2 Scarbo 2.0, OW2con'...
Consistent service integration in your workflows with OW2 Scarbo 2.0, OW2con'...
 
ETICS- quality certification of open source cloud software, OW2con'12, Paris
ETICS- quality certification of open source cloud software, OW2con'12, ParisETICS- quality certification of open source cloud software, OW2con'12, Paris
ETICS- quality certification of open source cloud software, OW2con'12, Paris
 
Dziękuję solidarności
Dziękuję solidarnościDziękuję solidarności
Dziękuję solidarności
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Ciszewski internet credentials and case study eng
Ciszewski internet credentials and case study engCiszewski internet credentials and case study eng
Ciszewski internet credentials and case study eng
 
Manage Traceability with Apache Atlas flexible metadata repository.
Manage Traceability with Apache Atlas flexible metadata repository.Manage Traceability with Apache Atlas flexible metadata repository.
Manage Traceability with Apache Atlas flexible metadata repository.
 
To be Open Source or not to be ? OW2con’12, Paris
To be Open Source or not to be ? OW2con’12, ParisTo be Open Source or not to be ? OW2con’12, Paris
To be Open Source or not to be ? OW2con’12, Paris
 
Starting for the Cloud, OW2 Conference Nov10
Starting for the Cloud, OW2 Conference Nov10Starting for the Cloud, OW2 Conference Nov10
Starting for the Cloud, OW2 Conference Nov10
 
Salome TMF OW2 Conference Nov10
Salome TMF OW2 Conference Nov10Salome TMF OW2 Conference Nov10
Salome TMF OW2 Conference Nov10
 
Talend bonitasoft-ow2-conference-nov10
Talend bonitasoft-ow2-conference-nov10Talend bonitasoft-ow2-conference-nov10
Talend bonitasoft-ow2-conference-nov10
 
Tech talk: PHP
Tech talk: PHPTech talk: PHP
Tech talk: PHP
 
Sat4j: from the lab to desktop computers. OW2con'15, November 17, Paris.
Sat4j: from the lab to desktop computers. OW2con'15, November 17, Paris. Sat4j: from the lab to desktop computers. OW2con'15, November 17, Paris.
Sat4j: from the lab to desktop computers. OW2con'15, November 17, Paris.
 
CHOReOS Large Scale Choreographies, OW2con11, Nov 24-25, 2011, Paris
CHOReOS Large Scale Choreographies, OW2con11, Nov 24-25, 2011, ParisCHOReOS Large Scale Choreographies, OW2con11, Nov 24-25, 2011, Paris
CHOReOS Large Scale Choreographies, OW2con11, Nov 24-25, 2011, Paris
 
Social Media for Nutrition Bytes
Social Media for Nutrition BytesSocial Media for Nutrition Bytes
Social Media for Nutrition Bytes
 
Эволюция продукта
Эволюция продуктаЭволюция продукта
Эволюция продукта
 
Opportunity analysis
Opportunity analysisOpportunity analysis
Opportunity analysis
 

Similaire à VESPA- Multi-Layered Self-Protection for Cloud Resources, OW2con'12, Paris

Make your OpenStack Cloud Self-Defending with VESPA!
Make your OpenStack Cloud Self-Defending with VESPA!Make your OpenStack Cloud Self-Defending with VESPA!
Make your OpenStack Cloud Self-Defending with VESPA!mlacostma
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideJeremiah Grossman
 
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGYSECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGYijsrd.com
 
Security and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud ArchitectureSecurity and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud Architectureijsrd.com
 
Micro segmentation – a perfect fit for microservices
Micro segmentation – a perfect fit for microservicesMicro segmentation – a perfect fit for microservices
Micro segmentation – a perfect fit for microservicesAnthony Chow
 
Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)CloudMask inc.
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersCrawsec
 
Chaos engineering for cloud native security
Chaos engineering for cloud native securityChaos engineering for cloud native security
Chaos engineering for cloud native securityKennedy
 
General Security ConceptsChapter 2Principles of Comput.docx
General Security ConceptsChapter 2Principles of Comput.docxGeneral Security ConceptsChapter 2Principles of Comput.docx
General Security ConceptsChapter 2Principles of Comput.docxbudbarber38650
 
Avoiding Container Vulnerabilities
Avoiding Container VulnerabilitiesAvoiding Container Vulnerabilities
Avoiding Container VulnerabilitiesMighty Guides, Inc.
 
Security Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area NetworksSecurity Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area NetworksCSCJournals
 
Container Workload Security Solution Ideas by Mandy Sidana.pptx
Container Workload Security Solution Ideas by Mandy Sidana.pptxContainer Workload Security Solution Ideas by Mandy Sidana.pptx
Container Workload Security Solution Ideas by Mandy Sidana.pptxMandy Sidana
 
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET Journal
 
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...Skybox Security
 

Similaire à VESPA- Multi-Layered Self-Protection for Cloud Resources, OW2con'12, Paris (20)

Make your OpenStack Cloud Self-Defending with VESPA!
Make your OpenStack Cloud Self-Defending with VESPA!Make your OpenStack Cloud Self-Defending with VESPA!
Make your OpenStack Cloud Self-Defending with VESPA!
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers Guide
 
Tinysec
TinysecTinysec
Tinysec
 
Tinysec
TinysecTinysec
Tinysec
 
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGYSECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
 
Security and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud ArchitectureSecurity and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud Architecture
 
Micro segmentation – a perfect fit for microservices
Micro segmentation – a perfect fit for microservicesMicro segmentation – a perfect fit for microservices
Micro segmentation – a perfect fit for microservices
 
Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)
 
7 cloud security tips
7 cloud security tips7 cloud security tips
7 cloud security tips
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
 
Chaos engineering for cloud native security
Chaos engineering for cloud native securityChaos engineering for cloud native security
Chaos engineering for cloud native security
 
General Security ConceptsChapter 2Principles of Comput.docx
General Security ConceptsChapter 2Principles of Comput.docxGeneral Security ConceptsChapter 2Principles of Comput.docx
General Security ConceptsChapter 2Principles of Comput.docx
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 
Avoiding Container Vulnerabilities
Avoiding Container VulnerabilitiesAvoiding Container Vulnerabilities
Avoiding Container Vulnerabilities
 
Security Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area NetworksSecurity Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area Networks
 
Container Workload Security Solution Ideas by Mandy Sidana.pptx
Container Workload Security Solution Ideas by Mandy Sidana.pptxContainer Workload Security Solution Ideas by Mandy Sidana.pptx
Container Workload Security Solution Ideas by Mandy Sidana.pptx
 
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
 
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
 

Plus de OW2

OW2 and RIOS teaming up to boost the open source impact, Nov. 2022 in Roma
OW2 and RIOS teaming up to boost the open source impact, Nov. 2022 in RomaOW2 and RIOS teaming up to boost the open source impact, Nov. 2022 in Roma
OW2 and RIOS teaming up to boost the open source impact, Nov. 2022 in RomaOW2
 
The Open Source Good Governance Initiative presented at RIOS OS Week, Nov. 20...
The Open Source Good Governance Initiative presented at RIOS OS Week, Nov. 20...The Open Source Good Governance Initiative presented at RIOS OS Week, Nov. 20...
The Open Source Good Governance Initiative presented at RIOS OS Week, Nov. 20...OW2
 
GLPi v.10, les fonctionnalités principales et l'offre cloud
GLPi v.10, les fonctionnalités principales et l'offre cloudGLPi v.10, les fonctionnalités principales et l'offre cloud
GLPi v.10, les fonctionnalités principales et l'offre cloudOW2
 
Centreon: superviser le Cloud et le Legacy à partir d'une même plateforme, po...
Centreon: superviser le Cloud et le Legacy à partir d'une même plateforme, po...Centreon: superviser le Cloud et le Legacy à partir d'une même plateforme, po...
Centreon: superviser le Cloud et le Legacy à partir d'une même plateforme, po...OW2
 
FusionIAM : la gestion des identités et des accés open source
FusionIAM : la gestion des identités et des accés open sourceFusionIAM : la gestion des identités et des accés open source
FusionIAM : la gestion des identités et des accés open sourceOW2
 
OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...
OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...
OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...OW2
 
SFScon'20 Bringing the User into the Equation
SFScon'20 Bringing the User into the EquationSFScon'20 Bringing the User into the Equation
SFScon'20 Bringing the User into the EquationOW2
 
Towards a sustainable solution to open source sustainability, OW2online20, Ju...
Towards a sustainable solution to open source sustainability, OW2online20, Ju...Towards a sustainable solution to open source sustainability, OW2online20, Ju...
Towards a sustainable solution to open source sustainability, OW2online20, Ju...OW2
 
Advanced proactive and polymorphing cloud application adaptation with MORPHEM...
Advanced proactive and polymorphing cloud application adaptation with MORPHEM...Advanced proactive and polymorphing cloud application adaptation with MORPHEM...
Advanced proactive and polymorphing cloud application adaptation with MORPHEM...OW2
 
Open Source governance and the Eclipse Foundation, OW2online, June 2020
Open Source governance and the Eclipse Foundation, OW2online, June 2020Open Source governance and the Eclipse Foundation, OW2online, June 2020
Open Source governance and the Eclipse Foundation, OW2online, June 2020OW2
 
Open source contribution policies, OW2online, June 2020
Open source contribution policies, OW2online, June 2020Open source contribution policies, OW2online, June 2020
Open source contribution policies, OW2online, June 2020OW2
 
Software development at scale, pandemic lockdown and oss ecosystems, OW2onlin...
Software development at scale, pandemic lockdown and oss ecosystems, OW2onlin...Software development at scale, pandemic lockdown and oss ecosystems, OW2onlin...
Software development at scale, pandemic lockdown and oss ecosystems, OW2onlin...OW2
 
Overview of the OpenChain Reference Tooling Work Group, OW2online20, June 2020
Overview of the OpenChain Reference Tooling Work Group, OW2online20, June 2020Overview of the OpenChain Reference Tooling Work Group, OW2online20, June 2020
Overview of the OpenChain Reference Tooling Work Group, OW2online20, June 2020OW2
 
Open Source Compliance at Orange, OW2online, June 2020
Open Source Compliance at Orange, OW2online, June 2020Open Source Compliance at Orange, OW2online, June 2020
Open Source Compliance at Orange, OW2online, June 2020OW2
 
Ideas, methods and tools for OSS Compliance assessment, OW2online, June 2020
Ideas, methods and tools for OSS Compliance assessment, OW2online, June 2020Ideas, methods and tools for OSS Compliance assessment, OW2online, June 2020
Ideas, methods and tools for OSS Compliance assessment, OW2online, June 2020OW2
 
Intelligent package management with FASTEN, OW2online, June 2020
Intelligent package management with FASTEN, OW2online, June 2020Intelligent package management with FASTEN, OW2online, June 2020
Intelligent package management with FASTEN, OW2online, June 2020OW2
 
DECODER, a Smarter Environment for DevOps Teams , OW2online, June 2020
DECODER, a Smarter Environment for DevOps Teams , OW2online, June 2020DECODER, a Smarter Environment for DevOps Teams , OW2online, June 2020
DECODER, a Smarter Environment for DevOps Teams , OW2online, June 2020OW2
 
Enabling DevOps for IoT software development, powered by Open Source, OW2onli...
Enabling DevOps for IoT software development, powered by Open Source, OW2onli...Enabling DevOps for IoT software development, powered by Open Source, OW2onli...
Enabling DevOps for IoT software development, powered by Open Source, OW2onli...OW2
 
Upcoming Challenges in Artificial Intelligence Research and Development, OW2o...
Upcoming Challenges in Artificial Intelligence Research and Development, OW2o...Upcoming Challenges in Artificial Intelligence Research and Development, OW2o...
Upcoming Challenges in Artificial Intelligence Research and Development, OW2o...OW2
 
Cacti and Big Data at Orange France, OW2online, June 2020
Cacti and Big Data at Orange France, OW2online, June 2020Cacti and Big Data at Orange France, OW2online, June 2020
Cacti and Big Data at Orange France, OW2online, June 2020OW2
 

Plus de OW2 (20)

OW2 and RIOS teaming up to boost the open source impact, Nov. 2022 in Roma
OW2 and RIOS teaming up to boost the open source impact, Nov. 2022 in RomaOW2 and RIOS teaming up to boost the open source impact, Nov. 2022 in Roma
OW2 and RIOS teaming up to boost the open source impact, Nov. 2022 in Roma
 
The Open Source Good Governance Initiative presented at RIOS OS Week, Nov. 20...
The Open Source Good Governance Initiative presented at RIOS OS Week, Nov. 20...The Open Source Good Governance Initiative presented at RIOS OS Week, Nov. 20...
The Open Source Good Governance Initiative presented at RIOS OS Week, Nov. 20...
 
GLPi v.10, les fonctionnalités principales et l'offre cloud
GLPi v.10, les fonctionnalités principales et l'offre cloudGLPi v.10, les fonctionnalités principales et l'offre cloud
GLPi v.10, les fonctionnalités principales et l'offre cloud
 
Centreon: superviser le Cloud et le Legacy à partir d'une même plateforme, po...
Centreon: superviser le Cloud et le Legacy à partir d'une même plateforme, po...Centreon: superviser le Cloud et le Legacy à partir d'une même plateforme, po...
Centreon: superviser le Cloud et le Legacy à partir d'une même plateforme, po...
 
FusionIAM : la gestion des identités et des accés open source
FusionIAM : la gestion des identités et des accés open sourceFusionIAM : la gestion des identités et des accés open source
FusionIAM : la gestion des identités et des accés open source
 
OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...
OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...
OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...
 
SFScon'20 Bringing the User into the Equation
SFScon'20 Bringing the User into the EquationSFScon'20 Bringing the User into the Equation
SFScon'20 Bringing the User into the Equation
 
Towards a sustainable solution to open source sustainability, OW2online20, Ju...
Towards a sustainable solution to open source sustainability, OW2online20, Ju...Towards a sustainable solution to open source sustainability, OW2online20, Ju...
Towards a sustainable solution to open source sustainability, OW2online20, Ju...
 
Advanced proactive and polymorphing cloud application adaptation with MORPHEM...
Advanced proactive and polymorphing cloud application adaptation with MORPHEM...Advanced proactive and polymorphing cloud application adaptation with MORPHEM...
Advanced proactive and polymorphing cloud application adaptation with MORPHEM...
 
Open Source governance and the Eclipse Foundation, OW2online, June 2020
Open Source governance and the Eclipse Foundation, OW2online, June 2020Open Source governance and the Eclipse Foundation, OW2online, June 2020
Open Source governance and the Eclipse Foundation, OW2online, June 2020
 
Open source contribution policies, OW2online, June 2020
Open source contribution policies, OW2online, June 2020Open source contribution policies, OW2online, June 2020
Open source contribution policies, OW2online, June 2020
 
Software development at scale, pandemic lockdown and oss ecosystems, OW2onlin...
Software development at scale, pandemic lockdown and oss ecosystems, OW2onlin...Software development at scale, pandemic lockdown and oss ecosystems, OW2onlin...
Software development at scale, pandemic lockdown and oss ecosystems, OW2onlin...
 
Overview of the OpenChain Reference Tooling Work Group, OW2online20, June 2020
Overview of the OpenChain Reference Tooling Work Group, OW2online20, June 2020Overview of the OpenChain Reference Tooling Work Group, OW2online20, June 2020
Overview of the OpenChain Reference Tooling Work Group, OW2online20, June 2020
 
Open Source Compliance at Orange, OW2online, June 2020
Open Source Compliance at Orange, OW2online, June 2020Open Source Compliance at Orange, OW2online, June 2020
Open Source Compliance at Orange, OW2online, June 2020
 
Ideas, methods and tools for OSS Compliance assessment, OW2online, June 2020
Ideas, methods and tools for OSS Compliance assessment, OW2online, June 2020Ideas, methods and tools for OSS Compliance assessment, OW2online, June 2020
Ideas, methods and tools for OSS Compliance assessment, OW2online, June 2020
 
Intelligent package management with FASTEN, OW2online, June 2020
Intelligent package management with FASTEN, OW2online, June 2020Intelligent package management with FASTEN, OW2online, June 2020
Intelligent package management with FASTEN, OW2online, June 2020
 
DECODER, a Smarter Environment for DevOps Teams , OW2online, June 2020
DECODER, a Smarter Environment for DevOps Teams , OW2online, June 2020DECODER, a Smarter Environment for DevOps Teams , OW2online, June 2020
DECODER, a Smarter Environment for DevOps Teams , OW2online, June 2020
 
Enabling DevOps for IoT software development, powered by Open Source, OW2onli...
Enabling DevOps for IoT software development, powered by Open Source, OW2onli...Enabling DevOps for IoT software development, powered by Open Source, OW2onli...
Enabling DevOps for IoT software development, powered by Open Source, OW2onli...
 
Upcoming Challenges in Artificial Intelligence Research and Development, OW2o...
Upcoming Challenges in Artificial Intelligence Research and Development, OW2o...Upcoming Challenges in Artificial Intelligence Research and Development, OW2o...
Upcoming Challenges in Artificial Intelligence Research and Development, OW2o...
 
Cacti and Big Data at Orange France, OW2online, June 2020
Cacti and Big Data at Orange France, OW2online, June 2020Cacti and Big Data at Orange France, OW2online, June 2020
Cacti and Big Data at Orange France, OW2online, June 2020
 

Dernier

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 

Dernier (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 

VESPA- Multi-Layered Self-Protection for Cloud Resources, OW2con'12, Paris

  • 1. VESPA: Multi-Layered Self-Protection for Cloud Resources Marc Lacoste Orange Labs Self-protection has raised growing interest as possible element of answer to the cloud protection challenge. However, previous solutions miss flexible security policies, cross-layered defense, multiple control granularities, and open security architectures. This talk presents VESPA, an open IaaS self-protection architecture and framework that overcomes such limitations. Key features are regulation of security at two levels, both within and across software layers; flexible coordination of multiple feedback loops enabling enforcement of a rich spectrum of protection strategies; and an extensible architecture allowing simple integration of commodity security components. OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org
  • 2. Motivation s Security = #1 adoption stopper to cloud computing. s Mushrooming threats:  From outside: rootkits, malware, intrusions…  From inside: "honest-but-curious" legitimate users, over-privileged admins… s Heterogeneous defenses:  Vertically: layer-specific mechanisms.  Horizontally: system. vs. network placement.  Self-protection as possible next step of security management with promise of simpler, stronger, more efficient, But…flexible protection. more …How to design self-protecting clouds? OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org 2
  • 3. 3 Major Challenges Challenge #1: Multi-Layering  Each cloud layer has its own security mechanisms, oblivious to other layers.  But attacks may span several layers at once! Challenge #2: Multi-Laterality  Each cloud stakeholder has its own security objectives and policies.  Flexiblility is needed in monitoring granularity and security policies! Challenge #3: Openness  Cloud stakeholder topology is dynamic, and threats may be unknown.  Interoperability is needed with 3rd-party security policies/components! OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org 3
  • 4. Principle Cloud Self-Protection Design Principles Self-Protection Policy-Based Principle #2: Principle #1: Cross-Layer Defense Self-Protecting Cloud Principle #3: Multiple Self- Open Architecture Protection Loops Principle #4: Principle #1: Policy-Based Self-Protection Principle #3: #4: OpenSelf-Protection Loops Principle #2: Cross-Layer Defense Multiple Architecture The self-protection architecture should be aperformed withinwell-defined securitybe but Multiple detectionreaction should not be refinement of a agranularity shouldsecurity Detection and and reaction strategies and mechanisms single third-partylayer, Several control loops of variable levels of supervision (e.g., software components)and coordinated. integrated in the security architecture. may also span several layers. defined should be easily adaptation model based on policies. OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org 4
  • 5. VESPA Goals s VESPA = Virtual Environments Self-Protecting Architecture: An autonomic security framework for regulating protection of IaaS resources. 1. Cross-layer approach to security. 2. Multiple levels of supervision granularity. 3. Open and flexible architecture for easy security interoperability. s Implementation: KVM-based IaaS infrastructure. s Typical application: risk-aware dynamic VM confinement. OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org 5
  • 6. VESPA System Architecture 1. Policy-based security regulation, with well-defined SP model. 2. Automated protection at two levels, within and across IaaS layers. 3. Flexible orchestration of multiple SP loops, for rich defense strategy. 4. OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org integration. Layered, extensible architecture for easy security COTS 6
  • 7. Security Model Critical assets to protect PR DM Threats impact one layer (or more) SM PM RM Security supervision DM: Detection RM: Reaction Policy-orientation PM: Detection+Reaction of the framework OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org 7
  • 8. Agent Model DECISION-MAKING REACTION REFINEMENT CONTEXT AGGREGATION NFORCEMENT SENSING Agents performs mediation between security and decision-making:  Security context aggregation.  Reaction policy refinement.  API adaptation for easy infrastructure integration of security COTS. OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org 8
  • 9. Implementing Risk-Aware VM Quarantine Three levels of self-protection: 1. Intra-layer [VM-level]: anti-virus for analysis and cleaning. 2. Cross-layer [VM+hypervisor levels]: hypervisor firewalling for VM isolation. 3. Cross-layer [VM+hypervisor levels]: hypervisor migration manager to move VM OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org to quarantine zone and back. 9
  • 10. Conclusions s Key points:  VESPA: architecture for effective and flexible SP of IaaS resources.  Two-level tuning of security policies, within and across layers.  Coordination of multiple loops allows rich spectrum of defense strategy.  Multi-plane open design for easy integration of detection/reaction COTS. s Ongoing:  VESPA v0 = 8000 Python LoC. Underlying infrastructure = KVM.  C version under development using Fractal / Cecilia framework. Security services: IDS, anti-virus, log analysis, firewall, MAC.  Extend VESPA to the multi-cloud setting using security domains. s More … Available soon in open source! Check-out our ICAC 2012 paper! [ICAC 12] Aurélien Wailly, Marc Lacoste, Hervé Debar. VESPA: Multi-Layered Self-Protection for Cloud Resources. OW2Con’12, November 28-29, 2012 Orange Labs, Paris. www.ow2.org 9th ACM International Conference on Autonomic Computing (ICAC), 10 San José, California, September 2012.
  • 11. Thanks! Contact: Marc Lacoste Senior Research Scientist Orange Labs, Security Dept. E-mail: marc.lacoste@orange.com