Keystone Security
A Symantec Perspective on Securing Keystone
Keith Newstadt
Cloud Services Architect
Keystone Security – OpenStack Summit Atlanta
1
Symantec’s Cloud Platform Engineering Objectives
• We are building a consolidated cloud platform that provides infrastructure and
platform services for next generation Symantec products and services
– An exciting “greenfield” opportunity to re-invent our cloud infrastructure with strong
executive leadership and support
– Building a global team in the US, Europe, and Asia of top-notch, open source minded
engineers in the areas of cloud and big data
• Our development model is to use open source components as building blocks
– Identify capability gaps and contribute back to the community
• We have selected OpenStack as one of the underlying infrastructure services
layer
• We plan to analyze and help improve the overall security posture of OpenStack
components
• We are starting small, but will scale to thousands of nodes across multiple data
centers
OpenStack Summit - Atlanta
2
The Symantec Team
• Me
– In Security for nearly 15 years
– Norton Web Services
• Including the Norton Identity Provider
• Billions of requests, 100M+ users, 100M+ endpoints
• Under constant attack
– Now working on Symantec’s next generation cloud, using OpenStack
• The team
– Cloud Platform Engineering
– Symantec Compliance Suite
– Symantec Validation and ID Production (VIP)
– Symantec Product Security Group
– Global Security Organization (InfoSec)
Keystone Security – OpenStack Summit Atlanta
3
Brief Keystone Overview
Keystone
Validate Identity
OpenStack Service
Single point of auth for all
OpenStack services.
Single sign on to OpenStack
services
Authenticate
Identity
token
Identity
token
Common API layer on top of
various authentication protocols
Reduces exposure of credentials
and more…
Keystone Security – OpenStack Summit Atlanta
4
Keystone Security is Critical
Passwords
Keys
Certs
Tokens
DoS
Keystone Security – OpenStack Summit Atlanta
5
Symantec’s Approach to Securing Keystone
Threat Resilience
Multifactor Authentication
Application
Identity Standards
Infrastructure
Operating System
Environment
Auditing
Threat Modeling
Security Scans
Process
Compliance
Keystone Security – OpenStack Summit Atlanta
6
Process
Keystone Security – OpenStack Summit Atlanta
7
What are my assets?
What
am
I
trying
to
protect?
Is my particular deployment secure?
Where am I likely to be attacked?
Keystone Security – OpenStack Summit Atlanta
8
Threat Modeling
Could someone spoof the LDAP
server?
Mitigation option: LDAP server
authentication
Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Service
Elevation of Privileges
Keystone Security – OpenStack Summit Atlanta
9
Did I get the right images and distros?
Am ICould
running
what
I
think
I’m
running?
something malicious be injected into the
deployment process?
Am I running the most secure patch level?
Keystone Security – OpenStack Summit Atlanta
10
Security
Supply Chain Management
Download
Make sure it’s good.
Build
Make sure it’s secure
Questions around third party
component security is an
unsolved problem.
It seems obvious, but…
Deploy
Patch
Make sure you’ve validated
Stay on a secure patch level
Keystone Security – OpenStack Summit Atlanta
We’re using Symantec Control
Compliance Suite
Others: Qualys, Nessus, etc.
11
Environment
Keystone Security – OpenStack Summit Atlanta
12
Can someone change my deployment?
Is my
system
hardened
against
attacks?
What assets could be stolen from my environment?
Do I know what happened after I’ve been attacked?
Keystone Security – OpenStack Summit Atlanta
13
Keystone Compliance
Config Files
Log Files
Ports
Every deployment is different.
Start by following the trail
from keystone.conf
We’re using Symantec Data
Center Security for Linux and
OpenStack compliance.
Executables
Environment
Keystone Security – OpenStack Summit Atlanta
Other tools are out there as
well: SELinux, Tripwire, etc.
14
What high value assets are being transmitted?
IsWhat
my would
databe secure
while
in
motion?
the repercussions if these assets
were intercepted or tampered with?
How much of my environment do I trust?
Keystone Security – OpenStack Summit Atlanta
15
Security of Credentials on the Wire
Assets: credentials and tokens
POST /tokens
Attack vectors on both internal
and external networks.
Balance risk and cost.
Keystone
Keystone Security – OpenStack Summit Atlanta
Nova
Cinder
Swift
…
16
Application
Keystone Security – OpenStack Summit Atlanta
17
is attacking
me?
Will I knowWho
when
I’m under
attack?
(and
will target?
be…)
What isI their
How do I stop them?
Keystone Security – OpenStack Summit Atlanta
18
Keystone Intrusion Detection
How do you fend off an attack?
What will you need after an attack?
Rate limiting to impede
brute force attacks
Track users, token hashes,
source IP addresses
Challenges to foil automated
attacks
Aggregate logs in a central
location
Blacklist malicious IPs
Perform analytics,
correlation
Detect and block anomalous
user behavior
Prevention
Forensics
Security vs. privacy
Add request logging and blocking at a
proxy, load balancer, or in a Keystone filter
Keystone Security – OpenStack Summit Atlanta
19
Are passwords enough?
AmWhat
I effectively
validating
my
users?
additional kinds of auth should I support?
How should I implement it?
Keystone Security – OpenStack Summit Atlanta
20
Two Factor Auth
Authenticator
LDAP
Server
MySQL
DB
RSA
SecureID
RADIUS Server
Backend Driver
Identity Provider
LDAP
Server
LDAP
Driver
SQL
Driver
VIP
Service
Symantec VIP
Gateway
…
RADIUS
Driver
Keystone
Keystone Security – OpenStack Summit Atlanta
21
How do I delegate?
How do my services and scripts
authenticate
How do I controlthemselves?
access scope?
What is the technical and management cost of a
solution?
Keystone Security – OpenStack Summit Atlanta
22
Autonomous Authentication
Keystone
Credentials
Service
Token
Nova
Considerations:
• Secure cached credentials
• Limit scope
• Expiration
• Management
?
Delegation
Potential Solutions:
• Cached passwords
• EC2 key
• Trusts
• Keys
• Certificates
• ?
Keystone Security – OpenStack Summit Atlanta
23
Standards…
Keystone Security – OpenStack Summit Atlanta
24
Keystone and Standard Protocols
• Interest in industry standard Identity protocols for
OpenStack
– Symantec has been through a migration like this before
– Community has already summited blueprints
• Benefits
–
–
–
–
Single sign on
Improved integration
Control over credentials
Unified authentication experience
• Symantec will look to participate in this effort
Keystone Security – OpenStack Summit Atlanta
25
Protect your credentials everywhere
Parting thoughts
Securing your use of Keystone is an ongoing process
Share
Keystone Security – OpenStack Summit Atlanta
26
Q&A
Keystone Security – OpenStack Summit Atlanta
27
Thank you!
Keith Newstadt
keith_newstadt@symantec.com
Copyright © 2013 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Keystone Security – OpenStack Summit Atlanta
28