SlideShare a Scribd company logo
Cloud Computing and Virtualisation
Cloud Computing and Virtualisation
Security in Cloud Computing & Virtualization
LRP BASED ON
Speeches & Workshops
attended
Computer Society of
India
Institution of
Engineers
White Papers
& Friends
Institute of
Electronics &
Telecommunications
Engineers
If you can't explain it simply……
….you have not UNDERSTOOD it well enough
Basic
Introduction
Types &
Applications
SECURITY
Conclude
20 – 25 Min drive
CLOUD COMPUTING
• Offers Computing as a Service
• Provisions service in a timely on demand manner
VIRTUALISATION
• Provisions running multiple OS on a single Physical
System and share underlying hardware resources
Traditional Server
speed
performa
nce
Security in Virtualisation & Cloud Computing
slow
efficiency
Purana
zamana?
APPLN
OS STORAGE
HW PLATFORM
APPLN
OS STORAGE
HW PLATFORM
APPLN
OS STORAGE
HW PLATFORM
APPLN
OS STORAGE
HW PLATFORM
EMAIL
WINDOWS
EXCHANGE
WEB SERVER
WINDOWS IIS
APP SERVER
LINUX
GLASSFISH
DB SERVER
LINUX
MYSQL
APPLN
OS STORAGE
HW PLATFORM
APPLN
OS STORAGE
HW PLATFORM
APPLN
OS STORAGE
HW PLATFORM
APPLN
OS STORAGE
HW PLATFORM
EMAIL
WINDOWS
EXCHANGE
WEB SERVER
WINDOWS IIS
APP SERVER
LINUX
GLASSFISH
DB SERVER
LINUX
MYSQL
SYSTEM ADMINISTRATORS
• Servers taken as a whole unit that incl Hardware, the
OS,the Storage and the Applications
SERVERS
• Often referred to by their functions ie the Exchange
server, the SQL Server or the File Server etc.
OVERTAXED?
• If any of the servers is overtaxed,then the System
Administrator must add in a new server.
MULTIPLE SERVERS
• Unless there are multiple servers,if a service
experiences a HW failure, then the service is down.
CLUSTERING ?
• Clustering can be implemented to make them more
fault tolerant. However, even clusters have limits on
their scalability and not all applications work in a
clustered environment.
-Easy to Conceptualize
- Fairly easy to deploy
-Easy to backup
-Virtually any appln /
service can be run from
this type of setup
-Under utilized HW
-Vulnerable to HW
outrages
-Not Very scalable
-Difficult to replicate
-Redundancy issues
-Expensive
Virtual servers seek to encapsulate the
server software away from hardware
Servers end up as mere files stored on a
physical box
Can be serviced by one/more hosts & one
host may house one/more virtual servers
If built correctly,not affected by the loss of
host
Host may be removed and introduced at
will to accommodate maint
-Resource Pooling
- Highly reduntant
-High Avail
-Rapid and easy dply
-Reconfigurable
-Optimisation
-Harder to conceptualise
-Slightly costly
Offerings from many companies
Hardware Support
Fits well with the move to 64 bit
Virtualization is now a well established
technology
Platform Virtualization
Desktop Virtualization
Network Virtualization
Storage Virtualization
Resource Virtualization
Cloud Computing and Virtualisation
Cloud Computing and Virtualisation
Cloud Computing and Virtualisation
Cloud Computing and Virtualisation
No need to own the Hardware
Rent as needed
Option of Public Cloud
Can go for a Private Cloud
Types of Cloud Models
Private
Public
Security in Virtualisation & Cloud Computing
Hybrid
Cloud Computing and Virtualisation
Cloud Computing and Virtualisation
Based on the standard cloud computing model
Service provider makes resources, such as applications and
storage, available over the Internet
Services may be free or offered on a pay-per-usage model
Limited service providers like Microsoft, Google etc own all
Infrastructure at their Data Center and the access allowed
through Internet mode only
Cloud infrastructure operated solely for a single organization
Users "still have to buy, build, and manage them"
Designed to offer the same features and benefits of cloud
systems
Removes a number of objections to the cloud computing
model including control over enterprise and customer data,
worries about security
• Setup with a Credit Card
Various Providers let u create Virtual
Servers
• Choose the OS
• Choose the Software
• Instant start/Instant Close
U can create a Virtual Server
U Get the Bill
Cloud Computing and Virtualisation
• Many systems have variable
demands
• Web sites at peak Hours
Cost Control
• No need to buy HW
Reduce Risk
• Business Expansion
• Business change
Scalability@Business Agility
• Scaling Back =Scaling Up
Elasticity
Stick to Business
Y should TOI worry about IT
Avoid getting into NW Problems &
issues
Deployment Models
IaaS
SaaS
Security in Virtualisation & Cloud Computing
PaaS
CaaS
MaaS
Communication as a Service
Infrastructure as a Service
Monitoring as a Service
Platform as a Service
Software as a Service
Crime Ware as a Service
IT as a Service
Cloud Computing and Virtualisation
Many cloud deployments are build on
virtualised platforms
However it is not a requirement
Some SaaS dply are not virtualised
Virtualization is not a requirement of cloud computing, its ability to
efficiently share resources makes it an excellent foundation.
Cloud Computing and Virtualisation
Cloud Computing and Virtualisation
Cloud Computing and Virtualisation
Cloud Computing and Virtualisation
Cloud Computing and Virtualisation
Hypervisor, also called Virtual Machine
Manager (VMM)
One of many hardware
virtualization techniques allowing
Multiple Operating Systems
Conceptually one level higher than a
Supervisory program
Manages the execution of the guest
operating systems
Used to describe the interface provided by
the specific cloud computing functionality
infrastructure as a service (IaaS)
100% SECURITY IS A MYTH COL S K KAPOOR
…..Off course our answer sheets also came out to be myth
Crime as a Service (CaaS) is just like Software as a
Service (SaaS)
……………but instead of offering legal and helpful services though the Internet,
criminal syndicates are offering illegal and detrimental services
…such as infecting large quantities of
computers, sending spam and even launching
direct denial of service (DDoS) attacks
Infrastructure As (Crime) Service or Iaa(C)S, in which the criminals offer malicious services
(or infrastructures) to attack specified targets, services may include complex “traditional”
infrastructures such as botnets
….but also “innovative” large scale fashioned services such as DDoS or also sharper
services such as password cracking. Try to surf the web and you will discover how easy it is
to purchase such a criminal kind of services.
Security in the Cloud – Dealing with AAS
HOLES
Software As a (Crime) Service or Saa(C)S, in which the criminals offer malicious
software (and the needed support) as a service.
An example? The latest Zeus Variant dubbed Citadel provides the purchaser
with help desk and even a dedicated Social Network
Cloud Computing and Virtualisation
Cloud Computing and Virtualisation
Loose Control Over Assets
Trust ur data to Cloud Service Provider?
Loose control over Physical Security
In a Public Cloud u share with others!!!!
No knowledge of what runs where?
Sticky Services!!!!@incompatibility
Control over Encryption/Decryption Keys
No Stds yet!!!@OCC is there working
Internally developed Code in cloud?
Loose control over Physical Security
Msn critical applications in public cloud?
Audit Logs accessible to service provider
PCI DSS
Constant up gradation!!!
Payment Card Industry Data Security Standard
Data Residency in SaaS
Banking data to reside within country!!
Citizen data not on shared servers
Easier for attackers!!!
Double edged- Cloud & Virtualization
Patch Maintenance
Bharosa & Trust
Privileged User Access
• Inquire about who has spl access to data
• Who are the administrators and how r they hired?
Regulatory Compliance
• Is vendor willing to undergo external audits
• Security classification?
Data Location
• Does the provider allow any control over loc of data
Data Segregation
• Encryption policy, schemes and design
Recovery
• What happens in case of disaster
• Restoration Policies and Business Continuity Plans
Investigative Support
• Vendor’s ability to investigate any inappropriate or illegal activity ?
Long term Viability
• What happens if company goes out of Business?
• Risk Management
Security Monitoring and IR
• Notification of Sec Vulnerabilities
• IR Teams?
Data in Transit
Data at Rest
Data in Processing
Data Lineage@mapping
Data Remanence
Few Cases.....u should know
AWS
Google
Docs
Security in Virtualisation & Cloud Computing
Cevin
Internet Assigned Numbers Authority & RIR
Cloud Computing and Virtualisation
Cloud Computing and Virtualisation
Cloud Computing and Virtualisation
Cloud Computing and Virtualisation
Stealing keys to access and manage hosts
Attacking unpatched,vulnerable services
Hijacking accounts with weak pwds
Weak Firewalls
Deploying Trojans
Cloud Computing and Virtualisation
Cloud Computing and Virtualisation
Cloud Computing and Virtualisation
Cloud Computing and Virtualisation
Cloud Computing and Virtualisation
Langot’s@Microsoft, Windriver
CSI
IETE
Institution of Engineers,Kolkatta

More Related Content

Cloud Computing and Virtualisation

  • 3. Security in Cloud Computing & Virtualization LRP BASED ON Speeches & Workshops attended Computer Society of India Institution of Engineers White Papers & Friends Institute of Electronics & Telecommunications Engineers
  • 4. If you can't explain it simply…… ….you have not UNDERSTOOD it well enough
  • 6. CLOUD COMPUTING • Offers Computing as a Service • Provisions service in a timely on demand manner VIRTUALISATION • Provisions running multiple OS on a single Physical System and share underlying hardware resources
  • 7. Traditional Server speed performa nce Security in Virtualisation & Cloud Computing slow efficiency Purana zamana?
  • 8. APPLN OS STORAGE HW PLATFORM APPLN OS STORAGE HW PLATFORM APPLN OS STORAGE HW PLATFORM APPLN OS STORAGE HW PLATFORM EMAIL WINDOWS EXCHANGE WEB SERVER WINDOWS IIS APP SERVER LINUX GLASSFISH DB SERVER LINUX MYSQL
  • 9. APPLN OS STORAGE HW PLATFORM APPLN OS STORAGE HW PLATFORM APPLN OS STORAGE HW PLATFORM APPLN OS STORAGE HW PLATFORM EMAIL WINDOWS EXCHANGE WEB SERVER WINDOWS IIS APP SERVER LINUX GLASSFISH DB SERVER LINUX MYSQL
  • 10. SYSTEM ADMINISTRATORS • Servers taken as a whole unit that incl Hardware, the OS,the Storage and the Applications SERVERS • Often referred to by their functions ie the Exchange server, the SQL Server or the File Server etc. OVERTAXED? • If any of the servers is overtaxed,then the System Administrator must add in a new server.
  • 11. MULTIPLE SERVERS • Unless there are multiple servers,if a service experiences a HW failure, then the service is down. CLUSTERING ? • Clustering can be implemented to make them more fault tolerant. However, even clusters have limits on their scalability and not all applications work in a clustered environment.
  • 12. -Easy to Conceptualize - Fairly easy to deploy -Easy to backup -Virtually any appln / service can be run from this type of setup -Under utilized HW -Vulnerable to HW outrages -Not Very scalable -Difficult to replicate -Redundancy issues -Expensive
  • 13. Virtual servers seek to encapsulate the server software away from hardware Servers end up as mere files stored on a physical box Can be serviced by one/more hosts & one host may house one/more virtual servers If built correctly,not affected by the loss of host Host may be removed and introduced at will to accommodate maint
  • 14. -Resource Pooling - Highly reduntant -High Avail -Rapid and easy dply -Reconfigurable -Optimisation -Harder to conceptualise -Slightly costly
  • 15. Offerings from many companies Hardware Support Fits well with the move to 64 bit Virtualization is now a well established technology
  • 16. Platform Virtualization Desktop Virtualization Network Virtualization Storage Virtualization Resource Virtualization
  • 21. No need to own the Hardware Rent as needed Option of Public Cloud Can go for a Private Cloud
  • 22. Types of Cloud Models Private Public Security in Virtualisation & Cloud Computing Hybrid
  • 25. Based on the standard cloud computing model Service provider makes resources, such as applications and storage, available over the Internet Services may be free or offered on a pay-per-usage model Limited service providers like Microsoft, Google etc own all Infrastructure at their Data Center and the access allowed through Internet mode only
  • 26. Cloud infrastructure operated solely for a single organization Users "still have to buy, build, and manage them" Designed to offer the same features and benefits of cloud systems Removes a number of objections to the cloud computing model including control over enterprise and customer data, worries about security
  • 27. • Setup with a Credit Card Various Providers let u create Virtual Servers • Choose the OS • Choose the Software • Instant start/Instant Close U can create a Virtual Server U Get the Bill
  • 29. • Many systems have variable demands • Web sites at peak Hours Cost Control • No need to buy HW Reduce Risk
  • 30. • Business Expansion • Business change Scalability@Business Agility • Scaling Back =Scaling Up Elasticity
  • 31. Stick to Business Y should TOI worry about IT Avoid getting into NW Problems & issues
  • 32. Deployment Models IaaS SaaS Security in Virtualisation & Cloud Computing PaaS CaaS MaaS
  • 33. Communication as a Service Infrastructure as a Service Monitoring as a Service Platform as a Service Software as a Service Crime Ware as a Service IT as a Service
  • 35. Many cloud deployments are build on virtualised platforms However it is not a requirement Some SaaS dply are not virtualised Virtualization is not a requirement of cloud computing, its ability to efficiently share resources makes it an excellent foundation.
  • 41. Hypervisor, also called Virtual Machine Manager (VMM) One of many hardware virtualization techniques allowing Multiple Operating Systems Conceptually one level higher than a Supervisory program Manages the execution of the guest operating systems Used to describe the interface provided by the specific cloud computing functionality infrastructure as a service (IaaS)
  • 42. 100% SECURITY IS A MYTH COL S K KAPOOR …..Off course our answer sheets also came out to be myth
  • 43. Crime as a Service (CaaS) is just like Software as a Service (SaaS) ……………but instead of offering legal and helpful services though the Internet, criminal syndicates are offering illegal and detrimental services …such as infecting large quantities of computers, sending spam and even launching direct denial of service (DDoS) attacks
  • 44. Infrastructure As (Crime) Service or Iaa(C)S, in which the criminals offer malicious services (or infrastructures) to attack specified targets, services may include complex “traditional” infrastructures such as botnets ….but also “innovative” large scale fashioned services such as DDoS or also sharper services such as password cracking. Try to surf the web and you will discover how easy it is to purchase such a criminal kind of services. Security in the Cloud – Dealing with AAS HOLES
  • 45. Software As a (Crime) Service or Saa(C)S, in which the criminals offer malicious software (and the needed support) as a service. An example? The latest Zeus Variant dubbed Citadel provides the purchaser with help desk and even a dedicated Social Network
  • 48. Loose Control Over Assets Trust ur data to Cloud Service Provider? Loose control over Physical Security In a Public Cloud u share with others!!!! No knowledge of what runs where? Sticky Services!!!!@incompatibility Control over Encryption/Decryption Keys
  • 49. No Stds yet!!!@OCC is there working Internally developed Code in cloud? Loose control over Physical Security Msn critical applications in public cloud? Audit Logs accessible to service provider PCI DSS Constant up gradation!!! Payment Card Industry Data Security Standard
  • 50. Data Residency in SaaS Banking data to reside within country!! Citizen data not on shared servers Easier for attackers!!! Double edged- Cloud & Virtualization Patch Maintenance Bharosa & Trust
  • 51. Privileged User Access • Inquire about who has spl access to data • Who are the administrators and how r they hired? Regulatory Compliance • Is vendor willing to undergo external audits • Security classification? Data Location • Does the provider allow any control over loc of data Data Segregation • Encryption policy, schemes and design
  • 52. Recovery • What happens in case of disaster • Restoration Policies and Business Continuity Plans Investigative Support • Vendor’s ability to investigate any inappropriate or illegal activity ? Long term Viability • What happens if company goes out of Business? • Risk Management Security Monitoring and IR • Notification of Sec Vulnerabilities • IR Teams?
  • 53. Data in Transit Data at Rest Data in Processing Data Lineage@mapping Data Remanence
  • 54. Few Cases.....u should know AWS Google Docs Security in Virtualisation & Cloud Computing Cevin
  • 55. Internet Assigned Numbers Authority & RIR
  • 60. Stealing keys to access and manage hosts Attacking unpatched,vulnerable services Hijacking accounts with weak pwds Weak Firewalls Deploying Trojans