Security principles for cloud architectures The use of external providers to augment or replace internally provided services is rapidly becoming the norm. The value proposition ranges from cost-savings from reducing physical footprint in local data centers to the simplification of deployment strategies by leveraging the flexibility to rapidly provision services. The way security is built into these new paradigms has to change as well so as to help deliver on that value without taking on excessive risk. At the highest level, the responsibilities of an information security organization can be boiled down to the prevention of, detection of, and response to activities that are counter to established information protection policies and requirements. These responsibilities of prevention, detection and response correspond to the sequential stages of the cyber attack life cycle (often referred to as the cyber kill chain). The level of effort and where it is applied across these three high level capabilities is based on an understanding of the threats the organization faces and the risk associated with those threats, balanced against the operational needs of the organization. In HUIT Security, we have focused more, though not exclusively, on the detection and response aspects of this life cycle. This has been due to the wide range of operational needs of the community and the limitations on controls that can be broadly enforced across the community. However, for high-risk data (e.g. SSNs and other data with substantial regulatory controls), policy dictates and HUIT supports controls that fall within the prevention category as well. Required For all data For high-risk data Capability Prevent (P) Detect (D) Respond (R) Related technical capabilities Network and application firewalls, configuration management, intrusion prevention, antimalware, vulnerability scanning, application whitelisting Intelligence analysis, centralized system and network logging, intrusion detection, change detection, system analysis and interrogation Centralized system and network logging, forensic system analysis capabilities Presented here is the current understanding of some of the specific technical capabilities that HUIT Security is expected to be able to deliver, regardless of where servers or services are located. The way these capabilities will be realized will very likely need to change with the transition to cloud deployments, and the cost/benefit analysis of delivering some of these capabilities may need to be revisited. It should also be noted that how we achieve some of these capabilities today is incomplete or flawed – the transition to the cloud represents a mechanism whereby these mechanisms can potentially be improved. Technical capability Principle Current mechanism Value proposition High level association Insight into network traffic accessing and being accessed by Harvard resources There must be a means for the identification of traffic flows into and out of cloud networks SPAN ports from perimeter routers feeding into QRadar/Splunk Insight into actions being performed on systems and services Systems and applications must use centralized logging services and log security related activity Centralized logging into Splunk Ability to uniquely associate traffic observed on the network with a specific system Private (RFC1918) IP addresses assigned to cloud resources should not overlap NOC controls internal routing Ability to identify a business/technical owner responsible for a system A point of contact who can provide technical and business details must be identified for each system Network registration process Ability to control ingress and egress traffic from a system There must be a means to control traffic in a stateful fashion at least up to layer 4 in the network stack between any system and the Internet Cisco/Fortinet firewalls in place at various points in the network Router ACLs at perimeter Network traffic enables the identification of potentially compromised systems based on intelligence about malicious activity and allows for the development of intelligence based on analyzing the traffic from compromised systems Log data from systems enables the identification of compromised systems and allows for forensic analysis to determine the extent of compromise and data loss Ability to associate observed traffic with a specific system enables the other capabilities on this list Ability to assess suspected compromised systems and to determine impact if the system is removed from the network Ability to limit traffic to and from systems to that which is required for the systems function Ability to restrict known malicious activity based on D, R D, R D, R R P Ability to provide security protection and gain situational awareness through standard services Wherever feasible, HUIT provided services (e.g. DNS) should be used Various services (DNS, IAM, AD, Puppet, Chef, etc.) Ability to provide additional layer 7 network security controls between systems As security needs and capabilities change, there should be a means to provide additional types of protection into the network where warranted Separation of duties between application owners, system owners and security providers Various methods based on control of the network Some examples today include FireEye and TippingPoint IDS Limitation to the extent to which a single individual can undermine the security controls of a system Ownership of network firewalls and ACLs is in the NOC, host-based firewalls and controls in the SOC, application controls in the development group Numerous system level controls (authentication and authorization, hardening and patching, etc.) are also affected by this capability port, protocol, source and destination Ability to leverage intelligence to detect malicious activity Ability to provide protection based on intelligence Ability to enforce security controls Ability to introduce services into the security stack as needed (e.g. WAF, IDS/IPS) Ability to enforce security controls Ability to limit impact of loss of credentials/insider threat P, D, R P, D, R P (may impact D and R depending on the control)