SlideShare une entreprise Scribd logo
1  sur  24
Security Monitoring in IaaS
       How We Do It at RightScale




       Watch the video of this presentation



                                              #rightscale
#



Your Panel Today
Presenting
• Phil Cox, Director of Security & Compliance, RightScale
• Tony Spataro, Senior Security Engineer, RightScale

Q&A
• Spencer Adams, Account Manager, RightScale
• James Brown, Security Analyst, RightScale



           Please use the “Questions” window
               to ask questions any time!
                                                       #rightscale
#



Agenda
• Talk about the problem in general

• State general premise and assumptions

• Walk through the “Why?”, “How?”, and “What?”

• Conclusion




                                                 #rightscale
#



The problem
• Folks don't do security monitoring well in the first place

• Puzzlement about how to actually “do” security in Cloud and
  IaaS in particular
   • What do you do when you don't own the hardware or network


• Vendor cloud washing and sales FUD that is being perpetuated




                                                                 #rightscale
#



What is Security Monitoring?
• The ability to collect, analyze, and alert on security related
  system and application events




   •   System Logs         • Need a tool            • First 2 steps
   •   Databases           • The space                are worthless
   •   Applications          varies                   without this
   •   Host Network          widely, and
       Traffic               cost is an
                             issues
                           • Don't get too
                             complicated, y
                             ou'll give up



                                                               #rightscale
#



One More: Monitoring is log analysis
• In this context "monitoring” == "log analysis”

• Real question: How does one classify a log entry as
  "interesting"?

• Answer: You guessed it -> It depends
   • You need to know your environment and refer back to your “Why?”
     answers


• A couple examples I use:
   • Interactive login to our database server
   • Database access from an unsuspected system
   • Past staff user account access attempts

                                                                  #rightscale
#



Some starting premises
• Cloud, and thus IaaS, is a new way to deliver
  IT
   • If you try to shoehorn old solutions, you will likely fail


• Security fundamentals in cloud are similar to
  any other environment
   • There is no secret sauce!


• Monitoring in IaaS is a subset of monitoring in
  a traditional enterprise
   • Main difference is visibility into the network




                                                                  #rightscale
#



As in iRobot, start with "Why?"
• You need to start the whole process of by asking "Why?”
   •   Not "How?" or "What?”


• Answer the following question: Why are you implementing
  security monitoring?
   • Make sure to get buy-in from the entire organization as to this answer, you
     may be surprised what you hear.


       Detective Spooner: Why would you kill yourself?
       Dr. Alfred Lanning: That, detective, is the right
       question. Program terminated.




                                                                      #rightscale
#



Our "Why?"
• This part was easy, as I had done my
  homework

• We wanted
  •   To meet compliance requirements: SSAE 16
      and PCI
  •   To have a system that would notify us if
      something we knew was not supposed to
      happen did: Burglar Alarms
  •   To be able to look at past events if needed:
      Forensics


• No more, no less.


                                                     #rightscale
#



Some other “Why?” I have encountered
• Determine if folks are taking data via removable media

• Identify excessive file transfers outbound

• Identify abnormal print activity

• Identify abnormal user activity

• Identify anomalous network traffic

• Yours will be different and the same as others

                                                           #rightscale
#



Considerations for "How?"
• Once you determine “Why?”, the next step is to determine an
  architecture, the “How?
   • The things we care about and need


• Need to identify the things that are critical to ensuring you can
  meet your “Why?”
   •   Host Intrusion Detection System (HIDS)
   •   Application logs
   •   System logs
   •   Host network traffic
   •   Create a network choke point to pass all traffic
   •   Performance requirements
   •   Etc.


                                                             #rightscale
#



Our "How?”
• In our security monitoring environment, we identified the
  following critical items that needed consideration:

• Alert latency

• Bandwidth and data transfer costs

• Reliability of log stream

• Deployment models:
   • (A) Local agent & alerting, Central correlation & archive
   • (B) Local agent, Central alerting, correlation & archive
   • (C) Agentless, Central collection, alerting, correlation, & archive
                                                                           #rightscale
#



More on our "How?"
• Alert latency: Fire within 3 minutes of minutes of a “burglar
  alarm” event – Part of our SSAE 16 control

• Bandwidth: Limit cost by using systems in zones/regions that
  have free (ideally) or minimal cost for large bandwidth usage

• Reliability: Ensure that logs are available in a central store by
  using a reliable transport

• Deploy model: Have use for all three models – Help to
  accommodate our PCI and SSAE 16 compliance


                                                             #rightscale
#



How: Straight from the Source
• Many cloud workloads are an application of some sort

• The best burglar alarms come from inside your house
   •   Login, logout, lockout, signup
   •   Authorization successes and failures
   •   Role evolution
   •   Resource consumption


• Work with developers to build monitoring into your application




                                                          #rightscale
#



Lastly you decide on the "What?"
• After identifying "Why?" and "How?”
• This is about finding technology solutions that fit into your
  “How?” and meet your “Why?




       Vendor Products         Open Source                 Internally Develop



• Identify limitations of the technologies that are available to you
   •   Cost: What can you afford to do?
   •   Platform support: Is the desired solution supported by your platform?
   •   Product support: What type of product support will you need?
   •   Education: Can you get adequate education on the solutions?
                                                                         #rightscale
#



Our “What?”
• OSSEC standalone mode, rsyslog and RELP (Reliable Event
  Logging Protocol)
   • Local agent, local alerting, central correlation, central archive
   • Allows for more detailed alerting on our Critical servers (e.g., database
     servers)
• Commercial CloudPassage product Halo
   • Local agent, central alerting, central correlation, central archive
   • To meet PCI and give “additional” benefits for PCI compliance
• Syslog via RELP to a central log collector. OSSEC (server
  mode) for alerting and correlation
   • Deploy central collectors in locations that meet the "bandwidth cost
     reduction" requirement
   • Easiest for admin; deployed to all other systems


                                                                           #rightscale
#



Global OSSEC: It’s easy
• We use RightScale to configure every server to send syslogs to
  central server
• Use RightScale to scale syslog collectors as needed, and
  launch OSSEC servers as needed
• Use RightScale to configure Syslog servers to feed the “local”
  OSSEC server
• OSSEC configuration and rules are managed via Git for proper
  source control
   • We tuned all the noise out prior to rolling into production: Burglar Alarms
     are our focus
• Test new rules in Staging, then globally deploy to production
  with a click of a button
   • The beauty of RightScale!

                                                                        #rightscale
#



Local OSSEC: It’s focused
• One one our SSAE16 controls relies on it
• Use RightScale to install and configure OSSEC server in
  standalone mode
• OSSEC rules:
   • Same as global rules
   • Plus a couple specific to actions we don’t expect on the critical servers
   • Also File Integrity Monitoring of certain critical files
• OSSEC configuration and rules are managed via Git for proper
  source control
• Test new rules in Staging, then globally deploy to production
  with a click of a button



                                                                        #rightscale
#



CloudPassage: Provides added benefits
• Gives us alerting, plus more for our PCI compliance:
   •   Separation of duties
   •   Configuration review
   •   Malicious process watching
   •   Host based firewall management*


• It is a known and accepted cloud security tool, that PCI auditors
  are comfortable with




                                                           #rightscale
#



RELP caveats
• “Reliable” implies…
   • Buffered: extra disk and memory consumption at the source
   • Stateful: extra bandwidth consumption


• Gotcha’s
   • RELP is not compatible with TLS encryption, so had to use stunnel
   • Rsyslog versions built into distro’s are WAY behind
   • Have to tune the memory queues to avoid performance issues
       • 10 MBps logs + rsyslogd memory buffering + network hiccup = log bomb!
       • Needed a lot of testing, since the docs never really said what did and didn't work.
   • imfile plugin (which reads logs from apps that don't natively support syslog
     protocol) seems buggy when you give it a large file to consume
       • This is PROBABLY fixed in a later version, but haven’t confirmed yet




                                                                                               #rightscale
#



SSAE16 Control process
• Working with the auditors we identified certain actions and
  events that our customers would care about

• Need certain functionality on specific systems

• Need certain functionality for all systems in the platform

• We wrote custom OSSEC rules




                                                               #rightscale
#



Our OSSEC Burglar alarms
• Focus was the database (imagine that) and systems that directly
  access the database
• Decided that implementing specific local alerting on the critical
  systems was the best solution
• Some examples of these type of alerts:
   •   Successful interactive login
   •   Integrity of sensitive files
   •   Failed login to the database itself
   •   Failed DROP commands
   •   Etc.
• There are a number of default OSSEC alerts that are noise in
  our environment, as we ignore
   • 1002, 5710, 5706, 551, 5402, 17101, 5403, 5901, 5902, 17102

                                                                   #rightscale
#



Conclusion
• Must start with the "Why?" question

• Ease of administration, especially in a highly elastic IaaS
  environment, is very important

• Start with things you know are problems: limits false positives




                                                            #rightscale
#



Next Steps                                           Contact RightScale
                                                         (866) 720-0208
1. Learn: Read Phil’s blog                            sales@rightscale.com
                                                       www.rightscale.com
   blog.rightscale.com/author/philcoxrs/

2. Learn more: Visit our security supportal
   support.rightscale.com/Security
                                              The next big RightScale Community Event!
                                                     April 25-26 in San Francisco
3. Try: Free Edition                               www.RightScaleCompute.com
   www.rightscale.com/free                       •Attend technical breakout sessions
                                                       •Get RightScale training
                                                   •Talk with RightScale customers
                                                   •Ask questions at the Expert Bar




                                                                           #rightscale

Contenu connexe

Tendances

Cloud university intel security
Cloud university intel securityCloud university intel security
Cloud university intel security
Ingram Micro Cloud
 
Best-Practices-Web-Usability
Best-Practices-Web-UsabilityBest-Practices-Web-Usability
Best-Practices-Web-Usability
Larry Wilson
 
SAP Cloud security overview 2.0
SAP Cloud security overview 2.0SAP Cloud security overview 2.0
SAP Cloud security overview 2.0
Rasmi Swain
 

Tendances (20)

Cloud university intel security
Cloud university intel securityCloud university intel security
Cloud university intel security
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013
 
Best-Practices-Web-Usability
Best-Practices-Web-UsabilityBest-Practices-Web-Usability
Best-Practices-Web-Usability
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSec
 
TechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISETechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISE
 
Microsoft threat protection + wdatp+ aatp overview
Microsoft threat protection + wdatp+ aatp  overviewMicrosoft threat protection + wdatp+ aatp  overview
Microsoft threat protection + wdatp+ aatp overview
 
IT Security As A Service
IT Security As A ServiceIT Security As A Service
IT Security As A Service
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
MCAS High Level Architecture May 2021
MCAS High Level Architecture May 2021MCAS High Level Architecture May 2021
MCAS High Level Architecture May 2021
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to Hero
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor Technology
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's Guide
 
TechWiseTV Workshop: Stealthwatch Learning Network License
TechWiseTV Workshop: Stealthwatch Learning Network LicenseTechWiseTV Workshop: Stealthwatch Learning Network License
TechWiseTV Workshop: Stealthwatch Learning Network License
 
Tour to Azure Security Center
Tour to Azure Security CenterTour to Azure Security Center
Tour to Azure Security Center
 
SAP Cloud security overview 2.0
SAP Cloud security overview 2.0SAP Cloud security overview 2.0
SAP Cloud security overview 2.0
 
Azure Sentinel Tips
Azure Sentinel Tips Azure Sentinel Tips
Azure Sentinel Tips
 
Getting Started with Azure Security Center
Getting Started with Azure Security CenterGetting Started with Azure Security Center
Getting Started with Azure Security Center
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
CSA Standards Development Summary
CSA Standards Development SummaryCSA Standards Development Summary
CSA Standards Development Summary
 
Webinar compiled powerpoint
Webinar compiled powerpointWebinar compiled powerpoint
Webinar compiled powerpoint
 

Similaire à RightScale Webinar: Security Monitoring in the Cloud: How RightScale Does It

The economies of scaling software - Abdel Remani
The economies of scaling software - Abdel RemaniThe economies of scaling software - Abdel Remani
The economies of scaling software - Abdel Remani
jaxconf
 
The Economies of Scaling Software
The Economies of Scaling SoftwareThe Economies of Scaling Software
The Economies of Scaling Software
Abdelmonaim Remani
 
IT security for all. Bootcamp slides
IT security for all. Bootcamp slidesIT security for all. Bootcamp slides
IT security for all. Bootcamp slides
Wallarm
 
Mr. desmond cloud security_format
Mr. desmond cloud security_formatMr. desmond cloud security_format
Mr. desmond cloud security_format
MULTIMATICS_ID
 
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja WarriorsRyan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins
 

Similaire à RightScale Webinar: Security Monitoring in the Cloud: How RightScale Does It (20)

The economies of scaling software - Abdel Remani
The economies of scaling software - Abdel RemaniThe economies of scaling software - Abdel Remani
The economies of scaling software - Abdel Remani
 
The Economies of Scaling Software
The Economies of Scaling SoftwareThe Economies of Scaling Software
The Economies of Scaling Software
 
The Joy of Proactive Security
The Joy of Proactive SecurityThe Joy of Proactive Security
The Joy of Proactive Security
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?
 
IT security for all. Bootcamp slides
IT security for all. Bootcamp slidesIT security for all. Bootcamp slides
IT security for all. Bootcamp slides
 
Mr. desmond cloud security_format
Mr. desmond cloud security_formatMr. desmond cloud security_format
Mr. desmond cloud security_format
 
Owasp joy of proactive security
Owasp joy of proactive securityOwasp joy of proactive security
Owasp joy of proactive security
 
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja WarriorsRyan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
 
How to Leverage Log Data for Effective Threat Detection
How to Leverage Log Data for Effective Threat DetectionHow to Leverage Log Data for Effective Threat Detection
How to Leverage Log Data for Effective Threat Detection
 
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud Security
 
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
 
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
 
Non-Functional Requirements
Non-Functional RequirementsNon-Functional Requirements
Non-Functional Requirements
 
Beyond the Scan: The Value Proposition of Vulnerability Assessment
Beyond the Scan: The Value Proposition of Vulnerability AssessmentBeyond the Scan: The Value Proposition of Vulnerability Assessment
Beyond the Scan: The Value Proposition of Vulnerability Assessment
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...
 
Functionality, security and performance monitoring of web assets (e.g. Joomla...
Functionality, security and performance monitoring of web assets (e.g. Joomla...Functionality, security and performance monitoring of web assets (e.g. Joomla...
Functionality, security and performance monitoring of web assets (e.g. Joomla...
 
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
 

Plus de RightScale

Plus de RightScale (20)

10 Must-Have Automated Cloud Policies for IT Governance
10 Must-Have Automated Cloud Policies for IT Governance10 Must-Have Automated Cloud Policies for IT Governance
10 Must-Have Automated Cloud Policies for IT Governance
 
Kubernetes and Terraform in the Cloud: How RightScale Does DevOps
Kubernetes and Terraform in the Cloud: How RightScale Does DevOpsKubernetes and Terraform in the Cloud: How RightScale Does DevOps
Kubernetes and Terraform in the Cloud: How RightScale Does DevOps
 
Optimize Software, SaaS, and Cloud with Flexera and RightScale
Optimize Software, SaaS, and Cloud with Flexera and RightScaleOptimize Software, SaaS, and Cloud with Flexera and RightScale
Optimize Software, SaaS, and Cloud with Flexera and RightScale
 
Prepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About Now
Prepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About NowPrepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About Now
Prepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About Now
 
How to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your EnterpriseHow to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your Enterprise
 
Multi-Cloud Management with RightScale CMP (Demo)
Multi-Cloud Management with RightScale CMP (Demo)Multi-Cloud Management with RightScale CMP (Demo)
Multi-Cloud Management with RightScale CMP (Demo)
 
Comparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBM
Comparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBMComparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBM
Comparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBM
 
How to Allocate and Report Cloud Costs with RightScale Optima
How to Allocate and Report Cloud Costs with RightScale OptimaHow to Allocate and Report Cloud Costs with RightScale Optima
How to Allocate and Report Cloud Costs with RightScale Optima
 
Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...
Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...
Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...
 
Using RightScale CMP with Cloud Provider Tools
Using RightScale CMP with Cloud Provider ToolsUsing RightScale CMP with Cloud Provider Tools
Using RightScale CMP with Cloud Provider Tools
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and Compliance
 
Automating Multi-Cloud Policies for AWS, Azure, Google, and More
Automating Multi-Cloud Policies for AWS, Azure, Google, and MoreAutomating Multi-Cloud Policies for AWS, Azure, Google, and More
Automating Multi-Cloud Policies for AWS, Azure, Google, and More
 
The 5 Stages of Cloud Management for Enterprises
The 5 Stages of Cloud Management for EnterprisesThe 5 Stages of Cloud Management for Enterprises
The 5 Stages of Cloud Management for Enterprises
 
9 Ways to Reduce Cloud Storage Costs
9 Ways to Reduce Cloud Storage Costs9 Ways to Reduce Cloud Storage Costs
9 Ways to Reduce Cloud Storage Costs
 
Serverless Comparison: AWS vs Azure vs Google vs IBM
Serverless Comparison: AWS vs Azure vs Google vs IBMServerless Comparison: AWS vs Azure vs Google vs IBM
Serverless Comparison: AWS vs Azure vs Google vs IBM
 
Best Practices for Cloud Managed Services Providers: The Path to CMP Success
Best Practices for Cloud Managed Services Providers: The Path to CMP SuccessBest Practices for Cloud Managed Services Providers: The Path to CMP Success
Best Practices for Cloud Managed Services Providers: The Path to CMP Success
 
Cloud Storage Comparison: AWS vs Azure vs Google vs IBM
Cloud Storage Comparison: AWS vs Azure vs Google vs IBMCloud Storage Comparison: AWS vs Azure vs Google vs IBM
Cloud Storage Comparison: AWS vs Azure vs Google vs IBM
 
2018 Cloud Trends: RightScale State of the Cloud Report
2018 Cloud Trends: RightScale State of the Cloud Report2018 Cloud Trends: RightScale State of the Cloud Report
2018 Cloud Trends: RightScale State of the Cloud Report
 
Got a Multi-Cloud Strategy? How RightScale CMP Helps
Got a Multi-Cloud Strategy? How RightScale CMP HelpsGot a Multi-Cloud Strategy? How RightScale CMP Helps
Got a Multi-Cloud Strategy? How RightScale CMP Helps
 
How to Manage Cloud Costs with RightScale Optima
How to Manage Cloud Costs with RightScale OptimaHow to Manage Cloud Costs with RightScale Optima
How to Manage Cloud Costs with RightScale Optima
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

RightScale Webinar: Security Monitoring in the Cloud: How RightScale Does It

  • 1. Security Monitoring in IaaS How We Do It at RightScale Watch the video of this presentation #rightscale
  • 2. # Your Panel Today Presenting • Phil Cox, Director of Security & Compliance, RightScale • Tony Spataro, Senior Security Engineer, RightScale Q&A • Spencer Adams, Account Manager, RightScale • James Brown, Security Analyst, RightScale Please use the “Questions” window to ask questions any time! #rightscale
  • 3. # Agenda • Talk about the problem in general • State general premise and assumptions • Walk through the “Why?”, “How?”, and “What?” • Conclusion #rightscale
  • 4. # The problem • Folks don't do security monitoring well in the first place • Puzzlement about how to actually “do” security in Cloud and IaaS in particular • What do you do when you don't own the hardware or network • Vendor cloud washing and sales FUD that is being perpetuated #rightscale
  • 5. # What is Security Monitoring? • The ability to collect, analyze, and alert on security related system and application events • System Logs • Need a tool • First 2 steps • Databases • The space are worthless • Applications varies without this • Host Network widely, and Traffic cost is an issues • Don't get too complicated, y ou'll give up #rightscale
  • 6. # One More: Monitoring is log analysis • In this context "monitoring” == "log analysis” • Real question: How does one classify a log entry as "interesting"? • Answer: You guessed it -> It depends • You need to know your environment and refer back to your “Why?” answers • A couple examples I use: • Interactive login to our database server • Database access from an unsuspected system • Past staff user account access attempts #rightscale
  • 7. # Some starting premises • Cloud, and thus IaaS, is a new way to deliver IT • If you try to shoehorn old solutions, you will likely fail • Security fundamentals in cloud are similar to any other environment • There is no secret sauce! • Monitoring in IaaS is a subset of monitoring in a traditional enterprise • Main difference is visibility into the network #rightscale
  • 8. # As in iRobot, start with "Why?" • You need to start the whole process of by asking "Why?” • Not "How?" or "What?” • Answer the following question: Why are you implementing security monitoring? • Make sure to get buy-in from the entire organization as to this answer, you may be surprised what you hear. Detective Spooner: Why would you kill yourself? Dr. Alfred Lanning: That, detective, is the right question. Program terminated. #rightscale
  • 9. # Our "Why?" • This part was easy, as I had done my homework • We wanted • To meet compliance requirements: SSAE 16 and PCI • To have a system that would notify us if something we knew was not supposed to happen did: Burglar Alarms • To be able to look at past events if needed: Forensics • No more, no less. #rightscale
  • 10. # Some other “Why?” I have encountered • Determine if folks are taking data via removable media • Identify excessive file transfers outbound • Identify abnormal print activity • Identify abnormal user activity • Identify anomalous network traffic • Yours will be different and the same as others #rightscale
  • 11. # Considerations for "How?" • Once you determine “Why?”, the next step is to determine an architecture, the “How? • The things we care about and need • Need to identify the things that are critical to ensuring you can meet your “Why?” • Host Intrusion Detection System (HIDS) • Application logs • System logs • Host network traffic • Create a network choke point to pass all traffic • Performance requirements • Etc. #rightscale
  • 12. # Our "How?” • In our security monitoring environment, we identified the following critical items that needed consideration: • Alert latency • Bandwidth and data transfer costs • Reliability of log stream • Deployment models: • (A) Local agent & alerting, Central correlation & archive • (B) Local agent, Central alerting, correlation & archive • (C) Agentless, Central collection, alerting, correlation, & archive #rightscale
  • 13. # More on our "How?" • Alert latency: Fire within 3 minutes of minutes of a “burglar alarm” event – Part of our SSAE 16 control • Bandwidth: Limit cost by using systems in zones/regions that have free (ideally) or minimal cost for large bandwidth usage • Reliability: Ensure that logs are available in a central store by using a reliable transport • Deploy model: Have use for all three models – Help to accommodate our PCI and SSAE 16 compliance #rightscale
  • 14. # How: Straight from the Source • Many cloud workloads are an application of some sort • The best burglar alarms come from inside your house • Login, logout, lockout, signup • Authorization successes and failures • Role evolution • Resource consumption • Work with developers to build monitoring into your application #rightscale
  • 15. # Lastly you decide on the "What?" • After identifying "Why?" and "How?” • This is about finding technology solutions that fit into your “How?” and meet your “Why? Vendor Products Open Source Internally Develop • Identify limitations of the technologies that are available to you • Cost: What can you afford to do? • Platform support: Is the desired solution supported by your platform? • Product support: What type of product support will you need? • Education: Can you get adequate education on the solutions? #rightscale
  • 16. # Our “What?” • OSSEC standalone mode, rsyslog and RELP (Reliable Event Logging Protocol) • Local agent, local alerting, central correlation, central archive • Allows for more detailed alerting on our Critical servers (e.g., database servers) • Commercial CloudPassage product Halo • Local agent, central alerting, central correlation, central archive • To meet PCI and give “additional” benefits for PCI compliance • Syslog via RELP to a central log collector. OSSEC (server mode) for alerting and correlation • Deploy central collectors in locations that meet the "bandwidth cost reduction" requirement • Easiest for admin; deployed to all other systems #rightscale
  • 17. # Global OSSEC: It’s easy • We use RightScale to configure every server to send syslogs to central server • Use RightScale to scale syslog collectors as needed, and launch OSSEC servers as needed • Use RightScale to configure Syslog servers to feed the “local” OSSEC server • OSSEC configuration and rules are managed via Git for proper source control • We tuned all the noise out prior to rolling into production: Burglar Alarms are our focus • Test new rules in Staging, then globally deploy to production with a click of a button • The beauty of RightScale! #rightscale
  • 18. # Local OSSEC: It’s focused • One one our SSAE16 controls relies on it • Use RightScale to install and configure OSSEC server in standalone mode • OSSEC rules: • Same as global rules • Plus a couple specific to actions we don’t expect on the critical servers • Also File Integrity Monitoring of certain critical files • OSSEC configuration and rules are managed via Git for proper source control • Test new rules in Staging, then globally deploy to production with a click of a button #rightscale
  • 19. # CloudPassage: Provides added benefits • Gives us alerting, plus more for our PCI compliance: • Separation of duties • Configuration review • Malicious process watching • Host based firewall management* • It is a known and accepted cloud security tool, that PCI auditors are comfortable with #rightscale
  • 20. # RELP caveats • “Reliable” implies… • Buffered: extra disk and memory consumption at the source • Stateful: extra bandwidth consumption • Gotcha’s • RELP is not compatible with TLS encryption, so had to use stunnel • Rsyslog versions built into distro’s are WAY behind • Have to tune the memory queues to avoid performance issues • 10 MBps logs + rsyslogd memory buffering + network hiccup = log bomb! • Needed a lot of testing, since the docs never really said what did and didn't work. • imfile plugin (which reads logs from apps that don't natively support syslog protocol) seems buggy when you give it a large file to consume • This is PROBABLY fixed in a later version, but haven’t confirmed yet #rightscale
  • 21. # SSAE16 Control process • Working with the auditors we identified certain actions and events that our customers would care about • Need certain functionality on specific systems • Need certain functionality for all systems in the platform • We wrote custom OSSEC rules #rightscale
  • 22. # Our OSSEC Burglar alarms • Focus was the database (imagine that) and systems that directly access the database • Decided that implementing specific local alerting on the critical systems was the best solution • Some examples of these type of alerts: • Successful interactive login • Integrity of sensitive files • Failed login to the database itself • Failed DROP commands • Etc. • There are a number of default OSSEC alerts that are noise in our environment, as we ignore • 1002, 5710, 5706, 551, 5402, 17101, 5403, 5901, 5902, 17102 #rightscale
  • 23. # Conclusion • Must start with the "Why?" question • Ease of administration, especially in a highly elastic IaaS environment, is very important • Start with things you know are problems: limits false positives #rightscale
  • 24. # Next Steps Contact RightScale (866) 720-0208 1. Learn: Read Phil’s blog sales@rightscale.com www.rightscale.com blog.rightscale.com/author/philcoxrs/ 2. Learn more: Visit our security supportal support.rightscale.com/Security The next big RightScale Community Event! April 25-26 in San Francisco 3. Try: Free Edition www.RightScaleCompute.com www.rightscale.com/free •Attend technical breakout sessions •Get RightScale training •Talk with RightScale customers •Ask questions at the Expert Bar #rightscale

Notes de l'éditeur

  1. Telcos built point-2-point networks for their customers