Cloud
Guest Blog // Selected Security Content Provided By Intel
What's This?
7/16/2014
04:45 PM
Tom Quillin
Tom Quillin
Guest Blogs
Connect Directly
LinkedIn
Twitter
RSS
E-Mail
100%
0%

Create a Foundation for Cloud Security

Security and operations don't have to be at odds. You can turn security into an operations tool, creating a secure and agile environment that extends your tools and processes.

Statistics and trends support the notion that cloud computing has become a business requirement, rather than an optional capability. However, the adoption of cloud services continues to be inhibited by lack of trust and confidence related to concerns around the security of sensitive data and regulatory issues.

There appear to be two main culprits: the inability of traditional data center security tools to adapt to cloud services models and a lack of transparency and control. Both issues affect public, private, and hybrid clouds. The traditional data center security environment is static, slow to change, contained (e.g., DMZ), single tenant, and physical. Cloud security environments are dynamic (e.g., live-migration, burst), fast (e.g., automated, scale change), distributed (e.g., hybrid), multi-tenant, and abstracted. On top of these differences, managing external cloud service providers brings coordination costs and risks. Cloud service providers and users must agree on how to create confidence that implementations are trustworthy from top to bottom.

Within these challenges lies an opportunity. We are used to thinking of security as a tradeoff -- better security is often considered synonymous with worse performance, agility, and user experience. As a result, there is a constant tug-of-war between operations and security. The opportunity is to turn security into a tool for operations, resulting in an environment that is more secure, more agile, and extends tools and processes.

To do this, instead of thinking in terms of managing security based on physical objects (that is, specific servers), you can substitute logical objects for them. A logical object attribute could be a "trusted server" that's established via measured boot and attestation process characteristics. We can associate other configuration information with the trustworthiness of the server (e.g., its physical location or tenant association). We can now create pools of trusted servers and manage against the pool association of a given server (e.g., deploy pools of workloads of certain types on predefined resource pools = "trusted compute pools"), as opposed to against that server's specific identity. Management applications can consume the trust attributes to execute policy and record event logs. This approach leverages measured boot -- a protection against attacks that target lower levels of the launch environment to form pools of trusted servers that can be used securely for mission-critical workloads.

What action can I take today? If you have an interest in implementing secure, trusted computing environments, either within your own infrastructure or working with cloud providers, the Trusted Computing Group offers resources for implementing standards-based architecture and solution stacks.

Follow me on Twitter: @TomQuillin.

Tom Quillin is the Director of Cyber Security for Technologies and Initiatives at Intel Corp. He is responsible for identifying security risks, as well as contributing to product planning that addresses future security challenges. He also manages Intel's policy positions on ... View Full Bio
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1978
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Simple PHP Agenda 2.2.8 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator via a request to auth/process.php, (2) delete an administrator via a request to auth/admi...

CVE-2015-0741
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Cisco Prime Central for Hosted Collaboration Solution (PC4HCS) 10.6(1) and earlier allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCut04596.

CVE-2015-0742
Published: 2015-05-21
The Protocol Independent Multicast (PIM) application in Cisco Adaptive Security Appliance (ASA) Software 9.2(0.0), 9.2(0.104), 9.2(3.1), 9.2(3.4), 9.3(1.105), 9.3(2.100), 9.4(0.115), 100.13(0.21), 100.13(20.3), 100.13(21.9), and 100.14(1.1) does not properly implement multicast-forwarding registrati...

CVE-2015-0746
Published: 2015-05-21
The REST API in Cisco Access Control Server (ACS) 5.5(0.46.2) allows remote attackers to cause a denial of service (API outage) by sending many requests, aka Bug ID CSCut62022.

CVE-2015-0915
Published: 2015-05-21
Cross-site scripting (XSS) vulnerability in RAKUS MailDealer 11.2.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted attachment filename.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.