real security in a virtual environment

57
Security in a Virtual Enviro By Mattias Geniar System Engineer @Nucleus

Upload: mattias-geniar

Post on 23-Jun-2015

396 views

Category:

Technology


3 download

DESCRIPTION

A general overview on the pitfalls in cloud security and everything that surrounds it.

TRANSCRIPT

Page 1: Real Security in a Virtual Environment

Real Security in a Virtual EnvironmentBy Mattias GeniarSystem Engineer @Nucleus

Page 2: Real Security in a Virtual Environment

Mattias Geniar

System Engineer at Nucleus(Cloud) Hosting provider

http://mattiasgeniar.be@mattiasgeniar

So ... Who am I?

Page 3: Real Security in a Virtual Environment

root@mattias:~#

My comfort zone.

Page 4: Real Security in a Virtual Environment

Not this.

Page 5: Real Security in a Virtual Environment

Now what’s this about?

Page 6: Real Security in a Virtual Environment

First: what is cloud computing?

Page 7: Real Security in a Virtual Environment

Infrastructure-as-a-Service

Page 8: Real Security in a Virtual Environment

Software-as-a-Service

Page 9: Real Security in a Virtual Environment

Platform-as-a-Service

Page 10: Real Security in a Virtual Environment

Hey dude, security?!

Page 11: Real Security in a Virtual Environment

Preventing this cloud ...

Page 12: Real Security in a Virtual Environment

From becoming this one.

Page 13: Real Security in a Virtual Environment

Whatcha talking ‘bout fool?

Page 14: Real Security in a Virtual Environment

Quote

Every security system that hasever been breached was oncethought infallible.

Page 15: Real Security in a Virtual Environment

It’s about layers. Many layers.

Page 16: Real Security in a Virtual Environment

A secure location.

Page 17: Real Security in a Virtual Environment

With sufficient power.

Page 18: Real Security in a Virtual Environment

And cooling.

Page 19: Real Security in a Virtual Environment

That is secure.

Page 20: Real Security in a Virtual Environment

But that’s just the bottom layer.

Page 21: Real Security in a Virtual Environment

Don’t forget this.

Page 22: Real Security in a Virtual Environment

How virtual is ‘virtual’?

Page 23: Real Security in a Virtual Environment

The heart: storage.

Page 24: Real Security in a Virtual Environment

Seperate network.

Page 25: Real Security in a Virtual Environment

But in a good way.

Page 26: Real Security in a Virtual Environment

Should it be encrypted?

Page 27: Real Security in a Virtual Environment

On your storage itself?

Page 28: Real Security in a Virtual Environment

Or within your VM?

Page 29: Real Security in a Virtual Environment

Key management.

Page 30: Real Security in a Virtual Environment

Redundant storage. Good x 2.

Page 31: Real Security in a Virtual Environment

RAIDs

Page 32: Real Security in a Virtual Environment

Have backups. Lots of them.

Page 33: Real Security in a Virtual Environment

The kidneys: connectivity.

Page 34: Real Security in a Virtual Environment

Walls of fire.

Page 35: Real Security in a Virtual Environment

Subnet example

This is youIP: 10.0.0.100Subnet: 255.255.255.0Gateway: 10.0.0.1

This is evil meIP: 10.0.0.105Subnet: 255.255.255.0Gateway: 10.0.0.1

The firewall: 10.0.0.1

Page 36: Real Security in a Virtual Environment

Firewall your firewall?

Page 37: Real Security in a Virtual Environment

Secure connections.

Page 38: Real Security in a Virtual Environment

Know what goes on.

Page 39: Real Security in a Virtual Environment

Find intruders.

Page 40: Real Security in a Virtual Environment

IDS & IPS

Page 41: Real Security in a Virtual Environment

We like graphs. And IDS.

Page 42: Real Security in a Virtual Environment

And boxes. With info.

Page 43: Real Security in a Virtual Environment

Even when the cloud ‘moves’.

Page 44: Real Security in a Virtual Environment

# diff ‘os-virt’ ‘hardware-virt’

Page 45: Real Security in a Virtual Environment

Oh hai root.root@srv:~# hostnamesrv.domain.be

root@srv:~# vzlist --allCTID NPROC STATUS IP_ADDR HOSTNAME 101 74 running 10.0.2.1 topsecret-srv

root@srv:~# vzctl enter 101-bash-3.1# hostnametopsecret-srv.domain.be-bash-3.1# iduid=0(root) gid=0(root)

Page 46: Real Security in a Virtual Environment

Who’s this?

Page 47: Real Security in a Virtual Environment
Page 48: Real Security in a Virtual Environment

Quote

The weakest link in any security system, is the person holding the information

Page 49: Real Security in a Virtual Environment

Developers that care.

Page 50: Real Security in a Virtual Environment

That don’t do stupid things.

Page 51: Real Security in a Virtual Environment

With secure API’s.

Page 52: Real Security in a Virtual Environment

And management.

Page 53: Real Security in a Virtual Environment

No no. Real management.

Page 54: Real Security in a Virtual Environment

Quote

Geeks don’t have interests.They have passions.

Page 55: Real Security in a Virtual Environment

So. Layers you said?

Page 56: Real Security in a Virtual Environment

Q & A

Page 57: Real Security in a Virtual Environment

root@mattias:~# logout

Thank you.

Twitter: @mattiasgeniar www.nucleus.be Mail: [email protected]