Cloud
Guest Blog // Selected Security Content Provided By Intel
What's This?
7/16/2014
04:45 PM
Tom Quillin
Tom Quillin
Guest Blogs
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Create a Foundation for Cloud Security

Security and operations don't have to be at odds. You can turn security into an operations tool, creating a secure and agile environment that extends your tools and processes.

Statistics and trends support the notion that cloud computing has become a business requirement, rather than an optional capability. However, the adoption of cloud services continues to be inhibited by lack of trust and confidence related to concerns around the security of sensitive data and regulatory issues.

There appear to be two main culprits: the inability of traditional data center security tools to adapt to cloud services models and a lack of transparency and control. Both issues affect public, private, and hybrid clouds. The traditional data center security environment is static, slow to change, contained (e.g., DMZ), single tenant, and physical. Cloud security environments are dynamic (e.g., live-migration, burst), fast (e.g., automated, scale change), distributed (e.g., hybrid), multi-tenant, and abstracted. On top of these differences, managing external cloud service providers brings coordination costs and risks. Cloud service providers and users must agree on how to create confidence that implementations are trustworthy from top to bottom.

Within these challenges lies an opportunity. We are used to thinking of security as a tradeoff -- better security is often considered synonymous with worse performance, agility, and user experience. As a result, there is a constant tug-of-war between operations and security. The opportunity is to turn security into a tool for operations, resulting in an environment that is more secure, more agile, and extends tools and processes.

To do this, instead of thinking in terms of managing security based on physical objects (that is, specific servers), you can substitute logical objects for them. A logical object attribute could be a "trusted server" that's established via measured boot and attestation process characteristics. We can associate other configuration information with the trustworthiness of the server (e.g., its physical location or tenant association). We can now create pools of trusted servers and manage against the pool association of a given server (e.g., deploy pools of workloads of certain types on predefined resource pools = "trusted compute pools"), as opposed to against that server's specific identity. Management applications can consume the trust attributes to execute policy and record event logs. This approach leverages measured boot -- a protection against attacks that target lower levels of the launch environment to form pools of trusted servers that can be used securely for mission-critical workloads.

What action can I take today? If you have an interest in implementing secure, trusted computing environments, either within your own infrastructure or working with cloud providers, the Trusted Computing Group offers resources for implementing standards-based architecture and solution stacks.

Follow me on Twitter: @TomQuillin.

Tom is responsible for identifying and addressing Intel product security risks as well as planning products that solve tomorrow's security challenges and also manages Intel's policy positions on security and privacy. View Full Bio
Comment  | 
Print  | 
More Insights
More Blogs from Guest Blogs
Why Is Privacy Important to Security Practitioners & Professionals?
David Hoffman, director of Intel's security policy and global privacy office, shares his ideas on how organizations can achieve data security, along with privacy protections that enhance business potential.
We Are the Perimeter
End users, not technology, define the boundaries of the enterprise. Security strategies must protect this new perimeter.
Identifying and Protecting Sensitive Data
You already know the story: enterprises need strong security to keep their secrets secret, but data protection is a tough beast to tame. There are countless variables to consider, and different data types require different treatment. Add the constant x factor of human unpredictability and you have a potentially feral pack of valuable data, complexity, and fallibility.
Machine Resiliency as a Defense
If you follow news on cyber security, you might be led to think PCs and endpoints have become increasingly vulnerable.
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0607
Published: 2014-07-24
Unrestricted file upload vulnerability in Attachmate Verastream Process Designer (VPD) before R6 SP1 Hotfix 1 allows remote attackers to execute arbitrary code by uploading and launching an executable file.

CVE-2014-1419
Published: 2014-07-24
Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.

CVE-2014-2360
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage.

CVE-2014-2361
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.

CVE-2014-2362
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.