SecureClouud 2012 9-10 May On the Security of Data Stored in the Cloud Dr Srijith Nair Dr Theo Dimitrakos Senior Researcher Security Futures Practice BT Innovate & Design Head of Security Architectures Research Security Futures Practice BT Innovate & Design Contact: {srijith.nair,theo.dimitrakos}@bt.com Market evolution of Cloud computing Data Centre High-end Cloud Environment Virtual Data Centre We are here Cloud Islands Cloud V. Chain Cloud Horizontal Federation Cloud federation layer Cloud service broker Anticipated Cloud Market Evolution Slide 2 © British Telecommunications plc Cloud Computing Technology Innovation emphasis on security Commoditised virtualisation Cloud islands • Security API for hypervisor • Virtual Data Centre Service Management Layer • Commoditised elasticity • Commoditised data abstraction & data federation • User-defined hosting • On-demand Elasticity • Flexible charging model • Rapid provisioning / de-provisioning • Customer defined standalone cloud applications • Cloud islandspecific security indepth • Pre-customer isolation & multitenancy Common capabilities • Cloud –vs.– managed service delivery model • Reusable and customisable enabling services offered via a cloud service delivery model: • Identity & access, • Data & system security, • Data federation , • Performance monitoring, • Intelligent reporting • Auditing • Usage control, • Licensing, • Optimisation Virtual Private Clouds • Customer defined security and QoS • Customer-centric identity & access federation • Customer-aware process & data isolation • Customer-defined process and data federation • Secure private network overlay offered as a service over the internet • customer-centric loud application composition Community Clouds Cloud aware applications • Communityspecific virtual private clouds • In-cloud collaboration, community management & identity federation services • Vertical integration of hosting and community-specific cloud applications • Shared • Commoditisation of cloud application stores • Commoditisation of SDK for cloud applications • Take advantage of cloud IaaS or PaaS to develop SaaS • Ability deploy your cloud SaaS over a targeted SaaS / PaaS • SDK methods for on-demand elasticity, in-cloud hosting and dynamic resource provisioning Cloud service assembly • Standardisation of cloud service management interfaces • Commoditisation of cloud assembly processes & tools • Vertical value chain specific federation • Ability to mix-andmatch cloud infrastructure & incloud common capabilities when producing cloud applications • Ability to specify and rapidly provision mixed delivery models: eg. SaaS on 3rd party PaaS; PaaS on 3rd party IaaS Open cloud federation • Standardisation of • cloud common capabilities • cloud service management interfaces • cloud access management & federated identity models • cloud service monitoring & reporting • cloud license management services • Virtual Private “Local” Network over the Internet • User defined Virtual Private Cloud Cloud Aggregation Ecosystem • Standardised cloud charging models including auctions • Standardisation of cloud service assembly processes • Virtual Data Centres assembled over multiple IaaS clouds by different providers • PaaS over federated IaaS with integrated common capabilities by multiple 3rd parties • Commoditisation of “Make your own Cloud” capability Main Concerns of Cloud Computing (from way back then) Results of survey conducted by ENISA in 2009 Not Important Medium Importance Very Important Showstopper Main concerns in approaching the cloud Confidentiality of corporate data Privacy Integrity of services and/or data Availability of services and/or data Lack of liability of providers in case of security incidents Loss of control of services and/or data Intra-clouds (vendor lock-in) migration Inconsistency between trans national laws and regulations Unclear scheme in the pay per use approach Uncontrolled variable cost Cost and difficulty of migration to the cloud (legacy software … Repudiation 4 0% 50% 100% Jurisdictional exposure (location /breach) Segregation of data at rest Data sharding Main Data Challenges Data remanence Data loss or leakage Data provenance 5 Data classification, policy on what goes into (which) cloud Strong identity and access management Main Solutions Transparent encryption at SaaS level 6 Support for encryption of data at rest At the physical disk level At the virtual volume level Towards a comprehensive solution for cloud data hosting & sharing Bespoke service on customer cloud island Full integration to VDC Infrastructure Service delivery models Integrated with Customer’s corporate IT infrastructure Select cloud provider Monitor how policy is enforced in the cloud Enforce data access / key release policy Update data access / key release policy © British Telecommunications plc Define data store and security policy Encrypt data Mount data store to VM in the cloud Value add service on 3rd party clouds Example of virtual volume level encryption Overview: Secure Cloud Data Hosting (VDC enhancement) • The usage control of cloud storage is offered as a service • Customer in control of connection, protection and access to secure virtual storage • Keys and policy server are off the cloud data host • Decryption only possible when data is used in a specific “safe” environment following policy-based approval • Security is enforced by “sand-boxed” context-aware intelligent agents embedded in customer’s VM Offsite /Onsite Key Management Server Cloud Service Provider (VDC) Customer VM 1 Agent Internet Customer VM 2 Customer VM n Agent Hypervisor platform Shared data storage Policies (Rules) © British Telecommunications plc Customer experience Overview: Secure Cloud Data Hosting (VDC enhancement) • • • • Setup Once Data stored in non-ephemeral storage volumes are encrypted at file system level The encryption/decryption keys are stored off site. Decryption only possible when used in specific environment Rules-based approval (automatic or manual) before the keys are released to ensure release into safe envelope (IP address, VM provenance, presence of DLP software etc.) Encrypt volume • Encrypt a storage volume (iSCSI, NFS) at file system level Keep keys safe • Store decryption key outside the cloud in a Key Management Server Install secure cloud agent Create customer image Key request VM life time • Create a gold build Machine Image (e.g. VS template) with secure cloud agent installed • Create instances from this image as required • Agent requests keys when Virtual Machine is booted up Key provisioning • Keys may be released based on policy rules like IP address, OS type, CPU arch etc. Volume mounting • On receiving keys, the volume is attached to VM instance, in read or read/write mode. Key release • Key released by agent when it is stopped (eg. when VM shuts down). © British Telecommunications plc Extensions to the core service 2 BT patents pending including combination of data shredding and cloud encryption Secure Cloud (Shared) Storage: • Extend solution to federated storage that spans across • Multiple VDCs on the same cloud infrastructure • Cloud islands by different providers • Combine solution with data shredding, variants of key split / group encryption, and optimal data fragment distribution algorithms to ensure that: • if all nodes hosting fragments of a customer's files are off all other customers can continue to operate securely • root access all nodes hosting fragments of one customer's files will not provide enough fragments to reconstruct / decrypt another customers file • customers can inspect the integrity of their shredded data Secure Cloud Container: • Cover protection of VM images at rest • Cover integrity checks of data and VM image volumes • Hypervisor root-kit to cover encryption of communication between protected VMs in operation © British Telecommunications plc Cloud security innovation roadmap at BT Research & Technology Cloud Security Innovation Strategy Core activities Market evolution analysis Cloud information assurance metrics Technical innovation challenges & solutions Cloud federation In-cloud security cost-benefit analysis Cloud security risk assessment (eGov) Cloud Federation Fabric v1 Recommendations for High-level Secure Cloud Architecture for Government (IaaS) Secure Cloud Service Broker Virtual hosing on federated clouds (basic functionality) Cloud Security services Cloud Security infrastructure Secure Virtualisation Accountable Entitlement Management (in-cloud) Virtual Patching Hypervisor level Malware Detection Secure cloud storage service In-cloud malware scanning Hypervisor level Intrusion Prevention Cloud ecosystem security value network Market analysis revision Cloud security value network revision Recommendations for High-level Secure Cloud Architecture for Government (SaaS) Cloud Federation Fabric v2 Cloud Aggregation Environment (v1) Virtual hosing on federated clouds (enhanced functionality) In-Cloud Secure ESB fabric Cloud information assurance metrics Cloud security analytics Hypervisor level Data Leak Prevention Virtual community management Application aware Behavioural Malware detection (in-cloud) Use of trusted hardware in Virtual Data Centres & Cloud BT thought-leadership: Innovation Demonstrators Cloud brokerage & Federation • Secure Cloud Service Broker • In-cloud federation & coalition management • VHE on Federated Clouds © British Telecommunications plc Cloud Application Security Cloud Services Security Secure Virtualisation • Intelligent Protection • Accountable Entitlement Management • Behavioural monitoring for Malware detection • Secure cloud service management • Secure data storage service • Virtual Patching • Active Shielding • Hypervisor level Malware Detection • Hypervisor level Intrusion Prevention • Hypervisor level Data Leak Prevention BT thought-leadership: Overview of external collaborations • Co-authors of ENISA expert advisory report on Cloud Security Risk Analysis • Contributors to CSA security guidelines and lead of Virtualisation Security work stream • Contributors to ENISA expert group on Government use of Cloud computing • Leading Cloud Brokerage & Federation use case at OPTIMIS a €15 million collaborative R&D project • Led BEinGRID (Chief scientist / technical director) the largest R&D investment (€25 million) on next generation SOA in Europe • Invited speakers at events: InfoSec, CloudSecurity, RSA, e-Crime, Intellect, ISF, CSO Summit, etc. • 3 books and several technical papers in Cloud & Next Generation SOA BT IBM Microsoft Kaspersky UK NHS Google HP RSA Symantec ISSA cloudsecurity.org Baker & McKenzie © British Telecommunications plc Thank you for your attention For more information contact {srijith.nair,theo.dimitrakos}@bt.com Slide 15 © British Telecommunications plc Slide 16 © British Telecommunications plc BACKUP SLIDES Architectural Diagram of integration in Alpha Cloud platform at BT Research & Technology Towards a Secure Cloud blueprint Towards a Secure Cloud blueprint technical security subsystems