Will Your Cloud Be Compliant? Scott Carlson – PayPal Evgeniya Shumakher - Mirantis OpenStack Cloud Compliance Evgeniya Shumakher Business Analyst © MIRANTIS 2013 What is ‘Compliance’? Compliance means conforming to a rule, such as a specification, policy, standard or law. Regulatory compliance describes the goal that organisations aspire to achieve in their efforts to ensure that they are aware of and take steps to comply with relevant laws and regulations. http://en.wikipedia.org/wiki/Regulatory_compliance Compliance <> Security Security Compliance It’s all about information Confidentiality Availability Integrity Example: The Payment Card Industry Data Security Standard (PCI DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent data security measures globally. Enterprise ecosystem Regulations People Applications Operating Systems OpenStack Processing and Memory, Data Storage, Network Physical facilities Business Processes Data Who is responsible? CloudStack Data Applications Operating Systems OpenStack Processing and Memory, Data Storage, Network Physical facilities Cloud user Cloud builder IaaS PaaS SaaS Standards • • • • • • PCI DSS HIPAA / HITECH SOX FedRAMP/FISMA ISO/IEC 27001-2005 NIST SP800-53 Typical structure Control #1.1 Standard Requirement #1 Control #1.2 Requirement #2 Control #1.N Requirement #N Controls are very similar • CLOUD CONTROLS MATRIX VERSION 3.0 Standards are pretty generic: PCI DSS Build and Maintain a Secure Network and Systems 1. Install and maintain a firewall configuration to protect cardholder data 2. Do not use vendorsupplied defaults for system passwords and other security parameters Protect Cardholder Data Maintain a Vulnerability Management Program Implement Strong Access Control Measures 3. Protect stored cardholder data 5. Protect all systems against malware and regularly update antivirus software or programs 4. Encrypt transmission of cardholder data across open, public networks 6. Develop and maintain secure systems and applications 7. Restrict access to cardholder data by business need to know 8. Identify and authenticate access to system components 9. Restrict physical access to cardholder data Regularly Monitor and Test Networks 10. Track and monitor all access to network resources and cardholder data 11. Regularly test security systems and processes Maintain an Information Security Policy 12. Maintain a policy that addresses information security for all personnel Cloud Guidelines • PCI DSS Virtualization Guidelines • PCI DSS Cloud Computing Guidelines • NIST Special Publication 800-144 Guidelines on Security and Privacy in Public Cloud Computing PCI DSS Cloud Guidelines Don’t store, process or transmit payment card data in the cloud. PCI DSS Virtualization Guidelines • Requirement 3: Protect stored cardholder data – As well as being present in known locations, cardholder data could exist in archived, off-line or dormant VM images, or be unknowingly moved between virtual systems via dynamic mechanisms such as live migration or storage migration tools. – Sensitive data, such as unencrypted PAN, sensitive authentication data, and cryptographic keys, could be inadvertently captured in active memory and replicated via VM imaging and snapshot functions... OpenStack Security Guidelines • OpenStack Security Guide • Securing OpenStack for compliance Q&A • email: eshumakher@mirantis.com • irc: eshumakher Private Cloud Compliance Scott Carlson - @relaxed137 © 2014 PayPal Inc. All rights reserved. Confidential and proprietary. 26 CURRENCIES SUPPORTED EUROPEAN UNION TAIWAN MEXICAN EURO NEW DOLLAR PESO AUSTRALIAN CHINESE DOLLAR RMB CANADIAN SWEDISH DOLLAR KRONA TURKISH LIRA SWISS FRANC 148M ACTIVE REGISTERED ACCOUNTS 193 MARKETS OFFER PAYPAL 80 LOCALIZED MARKETING SITES GLOBALLY NEW ZEALAND SINGAPORE DOLLAR DOLLAR HUNGARIAN PHILIPPINE FORINT PESO MALAYSIAN BRAZILIAN RINGGIT REAL UNITED KINGDOM RUSSIAN POUNDS STERLING RUBLE HONG KONG NORWEGIAN DOLLAR KRONE UNITED STATES JAPANESE POLISH DOLLAR YEN ZLOTY CZECH KORUNA ISRAELI NEW SHEKEL DANISH KRONE THAI BAHT Q1 2014 Financial Metrics 148M $1.8B ACTIVE ACCOUNTS1 PAYPAL REVENUES $6,688 IN PAYMENTS PROCESSED EVERY SECOND 2 20% YOY 9M PAYMENTS PROCESSED EVERY DAY 3 $52B TPV 2 26% YOY +6M NEW ACTIVE ACCOUNTS 1 PayPal Cloud & Software Defined Data Center Agility with Security VIRTUAL Cloud Design Principals Deploy from Templates Any Image, Anywhere ELASTIC Automatically scale up/down workloads Follow devops auto-deployments CI/CD Respond to intra-cloud events SECURE PCI-DSS 2.0 and 3.0 Local Country Requirements © 2014 PayPal Inc. All rights reserved. Confidential and proprietary. 20 Compliance requirements Compliant with PCI-DSS 2.0 Standards Non-US locations compliant with local country regulations Compliance Statement: http://www.visa.com/splisting/viewSPDetail.do?coName=PayPal © 2014 PayPal Inc. All rights reserved. Confidential and proprietary. 21 Basic Methodology Just pretend its infrastructure OpenStack has servers in it Hardware Configured and dedicated to the cloud Hypervisor/Build Image meeting NIST/CIS standard templates Vulnerability Scanning with third party tooling Patching 7, 30, 90 day windows with vendor provided patches to OS Configuration Management for important system files Password Management – non-default, complex and unique! OpenStack has Users in it Do not use shared accounts for anything. Just don’t Log everything (auth) about a user. Send it somewhere you can find it. Keep it a LONG time. © 2014 PayPal Inc. All rights reserved. Confidential and proprietary. 22 Basic Methodology Just pretend its infrastructure Hypervisor Components Its Just Linux. Treat it like hardened Linux and lock it down to standards (CIS, NIST) Have a separate management interface from your production traffic (physical or virtual) Do not combine security zones within a single hypervisor because then it’s ALL “in-scope” Audit Access, Audit changes, be ready to show your work Be ready to defend decisions to share ports for components OpenStack Software Stack Limited vulnerability scanning in a programmatic way, have to build our own (Fortify, AppScan) Getting code from Trunk = Open Source Happiness, but have your licenses reviewed! You still need to code review if CDE passes through here Avoid Avoid Avoid Actual data getting put in your cloud stack (not guest VM’s, those are ok) © 2014 PayPal Inc. All rights reserved. Confidential and proprietary. 23 Basic Methodology Just pretend its infrastructure Physical Network Components? Yep Firewall rules around the cloud to limit ingress and egress Monitor what happens on your firewalls, send it somewhere, keep it a LONG time Make sure the person building your network isn’t the person building your cloud (SOD) Configuration Guidelines exist for most physical installations (avoid virtual for now…) Automation is fine, but make sure you log it, and auto-ticket it. Virtual Network Components? Nope Too early in the testing process to rely on virtual versions of components at scale Okay for intra-tenant traffic with minimal rule set Same rules for physical apply to virtual. Has your third party pen-tested and certified their thing? © 2014 PayPal Inc. All rights reserved. Confidential and proprietary. 24 Basic Methodology Just pretend its infrastructure Data? If its Card-holder data, controls become interesting very quickly Storing things encrypted at rest in VM’s mean you can’t use OpenStack components HSM, crypto, key management required User management, controls over data, logging, all of the standard stuff needed © 2014 PayPal Inc. All rights reserved. Confidential and proprietary. 25 For more information, please contact: Scott Carlson sccarlson@paypal.com @relaxed137 © 2014 PayPal Inc. All rights reserved. Confidential and proprietary.