SlideShare uma empresa Scribd logo
1 de 43
Baixar para ler offline
1 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Use Case : Cloud Security
Design and Implementation
Orgad Kimchi
ISV Engineering
Oracle Solaris 11
2 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
2 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Insert Information Protection Policy Classification from Slide 8
The following is intended to outline our general product direction. It is intended
for information purposes only, and may not be incorporated into any contract. It
is not a commitment to deliver any material, code, or functionality, and should
not be relied upon in making purchasing decisions. The development, release,
and timing of any features or functionality described for Oracle’s products
remains at the sole discretion of Oracle.
3 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Security Challenges
• Securing Data At Rest, In Transit, and In Use
• Minimize operating system attack surface
• Prevent denial of service attacks against their infrastructure
• Segregate network traffic between different cloud users
• Disable hostile code (e.g.’ rootkit’ attacks)
• Secure data deletions once we have done with our project
4 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Concerns With Public Cloud computing
Source : http://blogs.gartner.com/neil_macdonald/2010/12/16/security-is-the-top-concern-for-public-cloud-but-what-does-that-really-mean/
5 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Oracle Solaris Remote Lab
•Solaris Network Virtualization
– Segregate network traffic & secure VLAN per user
• Solaris Zones
– Isolates partner VMs in a secure environment
• Solaris ZFS
– Rapid & secure deployment of images in partner VMs
• Secure Global Desktop
– Separates communications channels
A secure cloud environment built on Solaris technologies
Now in the Cloud
6 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Cryptography
7 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
8 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Cryptographic Acceleration
Oracle SPARC T4 Processor
• Scalable Performance
– On-core, unprivileged, cryptographic instructions
– OpenSSL 5x faster than IBM POWER7
– ZFS encryption is 3x faster than Intel
• Most Industry Standard Algorithms
– Public Key Encryption: RSA, DSA, ECC, DH
– Symmetric Key Encryption: AES, 3DES, DES, Kasumi, Camellia
– Message Digests: CRC32c, MD5, SHA-1, SHA-224, SHA-256,
SHA-384, SHA-512
– Random number generation (FIPS 140-2 compliant)
9 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
SPARC T4 Cryptographic Acceleration
Significant Performance Gains for SSL
• Two-way SSL
• RSA-2048
• AES-256
10 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
ZFS: Next Generation File System
• Immense Capacity (128-bit)
• ZFS capacity: 256 quadrillion ZB (1ZB = 1 billion TB)
• Exceeds quantum limit of Earth-based storage.
• Dynamic Metadata
• No limits on files, directory entries, snapshots, etc.
• No tuning parameters to enable expansion.
• Parallel, constant-time directory operations.
• Pooled design – continuous future growth
Scalability
11 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
ZFS Encryption
• Encryption policy is set at the ZFS data set level
• Supports delegation of key management operations
• Leverages a dual key model: wrapping vs. encryption key
• Variety of options for format/location of the wrapping key
• Wrapping key inherited by child data sets
12 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
ZFS Encryption Example
# zfs create -o encryption=on -o dedup=on -o compression=on 
rpool/scratch
Enter passphrase for 'rpool/scratch':
Enter again:
# zfs get encryption,keysource,dedup,compression rpool/scratch
NAME PROPERTY VALUE SOURCE
rpool/scratch encryption on local
rpool/scratch keysource passphrase,prompt local
rpool/scratch dedup on local
rpool/scratch compression on local
# zfs key -u rpool/scratch
# zfs mount rpool/scratch
Enter passphrase for 'rpool/scratch':
13 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Assured Deletion with ZFS Encryption
# zfs create -o encryption=on rpool/scratch
Enter passphrase for 'rpool/scratch':
Enter again:
# zfs key -c -o keysource=raw,file:///dev/random rpool/scratch
# zfs get keysource rpool/scratch
NAME PROPERTY VALUE SOURCE
rpool/scratch keysource raw,file:///dev/random local
# zfs key –u rpool/scratch
# zfs destroy rpool/scratch
14 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Encrypted Swap and /tmp
$ awk '($4 == "swap") { print; }' /etc/vfstab
/dev/zvol/dsk/rpool/swap - - swap - no encrypted
$ swap –l
swapfile dev swaplo blocks free
/dev/lofi/1 145,1 8 2097128 2097128
$ lofiadm
Block Device File Options
/dev/lofi/1 /devices/pseudo/zfs@0:2 Encrypted
15 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Networking
16 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Network Secure by Default
• Expose only required services to the network
– Reduce the operating system network foot print
– Most services are disabled; a few are set to “local only”
• Integrated with Service Management Facility
– Common administrative model for all service operations
– Fully customizable based upon unique site requirements
• Foundation for Additional Protections and Configuration
17 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Network Architecture Strategies
18 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Network Virtualization
• Using network VLANs
• Combine with physical switches
• Layer 2 segregation
• # dladm create-vnic -l net0 vnic2 -v 2
Network segregation
19 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
IP Filters
• Ability to configure what ports
are open between system
• Simple to configure and SMF
service
• Can configure direction as
well as ports
20 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Network Resource Management
• Introducing network resource control
– Bandwidth control
– Flow control
• Split up large network pipes
• Guarantee types of network traffic for
your applications
• In the following example we limit the SSL traffic to 100Mb
on the vnic0 network interface
# dladm create-vnic vnic0 –l net0
# flowadm add-flow -l vnic0 –a 
transport=TCP,local_port=443 https-flow
# flowadm set-flowprop -p maxbw=100M https-flow
Control the Un-Controlable
21 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Data Link Protection
# dladm show-linkprop -p protection net0
LINK PROPERTY PERM VALUE DEFAULT POSSIBLE
net0 protection rw -- -- mac-nospoof,
restricted,
ip-nospoof,
dhcp-nospoof
# dladm set-linkprop -p allowed-ips=10.0.2.15
# dladm set-linkprop -p protection=mac-nospoof,ip-nospoof,
restricted net0
# ping 10.0.2.2
10.0.2.2 is alive
[set IP address manually to something other than 10.0.2.15.]
# ping 10.0.2.2
no answer from 10.0.2.2
22 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Designed-in Virtualization
Oracle Solaris Zones
23 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Integrated Virtualization
Security
Automated Install
Packaging Zones
Networking
ZFS
24 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Oracle Solaris Zones
• Built-in solution for
application deployment
• Compatibility environments
• Solaris 10 only
• Zones now more complete
• Delegated administration
• Observability
• NFS shares
• Network virtualization
25 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
• Restricted In-Zone Operations
– Individual operating system hardening, RBAC, auditing, etc.
– Prohibited from directly accessing kernel (modules), raw memory
• External Enforcement of Zone Configuration
– Configurable privileges, immutability, devices, file systems,
resource controls, virtual network security controls, etc.
• Observability with Integrity
– Protected audit trails, file integrity verification, global zone has
complete introspection capabilities
Solaris Zones Security Benefits
26 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Immutable Zones Example (1/2)
# zonecfg -z myzone 'set file-mac-profile=fixed-configuration’
# zoneadm -z myzone boot
# zlogin myzone
[Connected to zone 'myzone' pts/3]
myzone# rm /etc/passwd
rm: /etc/passwd: override protection 644 (yes/no)? y
rm: /etc/passwd not removed: Read-only file system
myzone# pkg install emacs
pkg install: Could not complete the operation on /var/pkg/lock:
read-only filesystem.
myzone# rm /usr/bin/vi
rm: /usr/bin/vi not removed: Read-only file system
27 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Immutable Zones Example (2/2)
myzone# touch /var/tmp/foo
myzone# touch /tmp/bar
myzone# svcadm disable ssh
root@solaris:~# svcs ssh
STATE STIME FMRI
disabled 6:52:53 svc:/network/ssh:default
28 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Data Architecture Strategies
29 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
ZFS Zone Root Encryption
# pktool genkey keystore=pkcs11 keytype=aes keylen=128 label=zoneroot
Enter PIN for Sun Software PKCS#11 softtoken:
# zfs create -o encryption=on -o keysource=raw,pkcs11:object=zoneroot 
rpool/zones
Enter PKCS#11 token PIN for 'rpool/zones':
# zonecfg -z myzone 'create; set zonepath=/rpool/zones/myzone’
# zoneadm –z myzone install
[… once install completes, the system is rebooted]
# zfs key -l rpool/zones
Enter PKCS#11 token PIN for 'rpool/zones':
# zfs mount –a
# zoneadm -z myzone boot
30 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Auditing
31 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Solaris Auditing
• Kernel-based, fine-grained introspection
• Captures commands, syscalls, admin. Actions
• Flexible audit policy for global and non-global zones
• Several audit trail formats: binary, text, XML, etc.
• New in Solaris 11
– Auditing on by default with no performance penalty
– Supports secure remote storage of audit trails
– Greater visibility into system events with less “noise”
32 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Per-User Auditing Policy
# userattr audit_flags gbrunett
#
# usermod –K audit_flags=lo,ad,ex:lo gbrunett
# userattr audit_flags gbrunett
lo,ad,ex:no
# su – gbrunett
$ exit
# auditreduce -r baz -c lo /var/audit/*not_term* | praudit -s
header,97,2,AUE_su,,testhost,2012-11-13 06:33:21.514 -08:00
subject,testuser,baz,staff,baz,staff,5243,2804137368,0 0 testhost
return,success,0
33 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Putting it all together
with Solaris 11 Security!
34 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Oracle Solaris Remote Lab – Schematic
35 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
OSRL - Data
• Single Zpool multiple
ZFS file systems
Resource
Sharing
• Data stored in ZFS SA
• Hybrid Storage
• Disk + SSD + RAM
• ZFS Cloning
Performance
• Encrypted ZFS
• Partner specific Key
• Each partner has their
own ZFS File System
Security
Create
Use
Delete
• Data isolated in VLAN
• Separate NFS server per
partner
• SGD - CDM
• All intra VM data
transfers self contained
in Blade chassis
• ZFS clones
- Share everything but the
changes
• ZFS Secure delete
• ZFS encrypt + Delete
almost instantaneous
operation
36 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
OSRL - Virtual Machines (Zones)
• Zone cloning
• less than 18 MB of RAM
• less than 100 MB of Disk
Resource
Sharing
• ZFS + Zone cloning
• new zone in minutes
Performance
• ZFS encryption for zone
file system
• Exclusive IP stack +
VNIC
Security
Create
Use
Delete
• All Zones isolated in
non-routable VLAN
• Secure global desktop
access
• Resource allocation
• network bandwidth
• Memory
• CPU
• Zone shares all OS
resources
- Single kernel
- Single storage
• ZFS Secure delete
• ZFS encrypt + Delete
almost instantaneous
operation
37 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
When 1 + 1 > 2
• Zone + ZFS
– Fast zone provisioning
– Very low overhead
– Encrypt file system as well as share resource
• Zones + Network virtualization
• Allows for sharing single physical network
• VLAN tagging allows for creating one VLAN/Partner
• Exclusive IP stack on shared physical network
38 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
When 1 + 1 > 2
• Zones + ZFS + NFS
• Each NFS server is a zone
• Single data store
• Single Physical server
• Multiple NFS file systems shared with ZFS
• ZFS supports NFS sharing
• Encryption + Cloning reduces overhead
• Zones + IPS
• Global Zone has IPS proxy
• Single IPS repository accessible from non routable VLAN
39 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Additional Resources
• Solaris 11 Security Hardening Guidelines
http://docs.oracle.com/cd/E26502_01/html/E29014/index.html
• Solaris 11 Secure Coding Guidelines for Developers
http://docs.oracle.com/cd/E26502_01/html/E29016/scode-1.html
• Glenn Faden’s Solaris 11.1 Hands On Security Lab
https://blogs.oracle.com/gfaden/entry/solaris_11_1_is_available
• Darren Moffat’s Solaris Security Blog
https://blogs.oracle.com/darren/tags/solaris+security
40 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
For More Information / Try Out Today
• Product overview and download
– oracle.com/solaris
• Oracle Technology Network
– oracle.com/technetwork/server-storage/solaris11
• System Administrators Community
– oracle.com/technetwork/systems
• @ORCL_Solaris
• facebook.com/oraclesolaris
• Oracle Solaris Insider
40
41 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Questions
42 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.
Acknowledgements
Special thanks to Darren Moffat and Glenn Faden, Angelo
Rajadurai and many others for sharing their ideas and
examples with the world.
43 Copyright © 2011, Oracle and/or its affiliates. All rights
reserved.

Mais conteúdo relacionado

Último

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Último (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

Destaque

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Destaque (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Use Case : Cloud Security Design and Implementation

  • 1. 1 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Use Case : Cloud Security Design and Implementation Orgad Kimchi ISV Engineering Oracle Solaris 11
  • 2. 2 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 2 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 8 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.
  • 3. 3 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Security Challenges • Securing Data At Rest, In Transit, and In Use • Minimize operating system attack surface • Prevent denial of service attacks against their infrastructure • Segregate network traffic between different cloud users • Disable hostile code (e.g.’ rootkit’ attacks) • Secure data deletions once we have done with our project
  • 4. 4 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Concerns With Public Cloud computing Source : http://blogs.gartner.com/neil_macdonald/2010/12/16/security-is-the-top-concern-for-public-cloud-but-what-does-that-really-mean/
  • 5. 5 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Oracle Solaris Remote Lab •Solaris Network Virtualization – Segregate network traffic & secure VLAN per user • Solaris Zones – Isolates partner VMs in a secure environment • Solaris ZFS – Rapid & secure deployment of images in partner VMs • Secure Global Desktop – Separates communications channels A secure cloud environment built on Solaris technologies Now in the Cloud
  • 6. 6 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Cryptography
  • 7. 7 Copyright © 2011, Oracle and/or its affiliates. All rights reserved.
  • 8. 8 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Cryptographic Acceleration Oracle SPARC T4 Processor • Scalable Performance – On-core, unprivileged, cryptographic instructions – OpenSSL 5x faster than IBM POWER7 – ZFS encryption is 3x faster than Intel • Most Industry Standard Algorithms – Public Key Encryption: RSA, DSA, ECC, DH – Symmetric Key Encryption: AES, 3DES, DES, Kasumi, Camellia – Message Digests: CRC32c, MD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512 – Random number generation (FIPS 140-2 compliant)
  • 9. 9 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. SPARC T4 Cryptographic Acceleration Significant Performance Gains for SSL • Two-way SSL • RSA-2048 • AES-256
  • 10. 10 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. ZFS: Next Generation File System • Immense Capacity (128-bit) • ZFS capacity: 256 quadrillion ZB (1ZB = 1 billion TB) • Exceeds quantum limit of Earth-based storage. • Dynamic Metadata • No limits on files, directory entries, snapshots, etc. • No tuning parameters to enable expansion. • Parallel, constant-time directory operations. • Pooled design – continuous future growth Scalability
  • 11. 11 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. ZFS Encryption • Encryption policy is set at the ZFS data set level • Supports delegation of key management operations • Leverages a dual key model: wrapping vs. encryption key • Variety of options for format/location of the wrapping key • Wrapping key inherited by child data sets
  • 12. 12 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. ZFS Encryption Example # zfs create -o encryption=on -o dedup=on -o compression=on rpool/scratch Enter passphrase for 'rpool/scratch': Enter again: # zfs get encryption,keysource,dedup,compression rpool/scratch NAME PROPERTY VALUE SOURCE rpool/scratch encryption on local rpool/scratch keysource passphrase,prompt local rpool/scratch dedup on local rpool/scratch compression on local # zfs key -u rpool/scratch # zfs mount rpool/scratch Enter passphrase for 'rpool/scratch':
  • 13. 13 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Assured Deletion with ZFS Encryption # zfs create -o encryption=on rpool/scratch Enter passphrase for 'rpool/scratch': Enter again: # zfs key -c -o keysource=raw,file:///dev/random rpool/scratch # zfs get keysource rpool/scratch NAME PROPERTY VALUE SOURCE rpool/scratch keysource raw,file:///dev/random local # zfs key –u rpool/scratch # zfs destroy rpool/scratch
  • 14. 14 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Encrypted Swap and /tmp $ awk '($4 == "swap") { print; }' /etc/vfstab /dev/zvol/dsk/rpool/swap - - swap - no encrypted $ swap –l swapfile dev swaplo blocks free /dev/lofi/1 145,1 8 2097128 2097128 $ lofiadm Block Device File Options /dev/lofi/1 /devices/pseudo/zfs@0:2 Encrypted
  • 15. 15 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Networking
  • 16. 16 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Network Secure by Default • Expose only required services to the network – Reduce the operating system network foot print – Most services are disabled; a few are set to “local only” • Integrated with Service Management Facility – Common administrative model for all service operations – Fully customizable based upon unique site requirements • Foundation for Additional Protections and Configuration
  • 17. 17 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Network Architecture Strategies
  • 18. 18 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Network Virtualization • Using network VLANs • Combine with physical switches • Layer 2 segregation • # dladm create-vnic -l net0 vnic2 -v 2 Network segregation
  • 19. 19 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. IP Filters • Ability to configure what ports are open between system • Simple to configure and SMF service • Can configure direction as well as ports
  • 20. 20 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Network Resource Management • Introducing network resource control – Bandwidth control – Flow control • Split up large network pipes • Guarantee types of network traffic for your applications • In the following example we limit the SSL traffic to 100Mb on the vnic0 network interface # dladm create-vnic vnic0 –l net0 # flowadm add-flow -l vnic0 –a transport=TCP,local_port=443 https-flow # flowadm set-flowprop -p maxbw=100M https-flow Control the Un-Controlable
  • 21. 21 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Data Link Protection # dladm show-linkprop -p protection net0 LINK PROPERTY PERM VALUE DEFAULT POSSIBLE net0 protection rw -- -- mac-nospoof, restricted, ip-nospoof, dhcp-nospoof # dladm set-linkprop -p allowed-ips=10.0.2.15 # dladm set-linkprop -p protection=mac-nospoof,ip-nospoof, restricted net0 # ping 10.0.2.2 10.0.2.2 is alive [set IP address manually to something other than 10.0.2.15.] # ping 10.0.2.2 no answer from 10.0.2.2
  • 22. 22 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Designed-in Virtualization Oracle Solaris Zones
  • 23. 23 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Integrated Virtualization Security Automated Install Packaging Zones Networking ZFS
  • 24. 24 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Oracle Solaris Zones • Built-in solution for application deployment • Compatibility environments • Solaris 10 only • Zones now more complete • Delegated administration • Observability • NFS shares • Network virtualization
  • 25. 25 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. • Restricted In-Zone Operations – Individual operating system hardening, RBAC, auditing, etc. – Prohibited from directly accessing kernel (modules), raw memory • External Enforcement of Zone Configuration – Configurable privileges, immutability, devices, file systems, resource controls, virtual network security controls, etc. • Observability with Integrity – Protected audit trails, file integrity verification, global zone has complete introspection capabilities Solaris Zones Security Benefits
  • 26. 26 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Immutable Zones Example (1/2) # zonecfg -z myzone 'set file-mac-profile=fixed-configuration’ # zoneadm -z myzone boot # zlogin myzone [Connected to zone 'myzone' pts/3] myzone# rm /etc/passwd rm: /etc/passwd: override protection 644 (yes/no)? y rm: /etc/passwd not removed: Read-only file system myzone# pkg install emacs pkg install: Could not complete the operation on /var/pkg/lock: read-only filesystem. myzone# rm /usr/bin/vi rm: /usr/bin/vi not removed: Read-only file system
  • 27. 27 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Immutable Zones Example (2/2) myzone# touch /var/tmp/foo myzone# touch /tmp/bar myzone# svcadm disable ssh root@solaris:~# svcs ssh STATE STIME FMRI disabled 6:52:53 svc:/network/ssh:default
  • 28. 28 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Data Architecture Strategies
  • 29. 29 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. ZFS Zone Root Encryption # pktool genkey keystore=pkcs11 keytype=aes keylen=128 label=zoneroot Enter PIN for Sun Software PKCS#11 softtoken: # zfs create -o encryption=on -o keysource=raw,pkcs11:object=zoneroot rpool/zones Enter PKCS#11 token PIN for 'rpool/zones': # zonecfg -z myzone 'create; set zonepath=/rpool/zones/myzone’ # zoneadm –z myzone install [… once install completes, the system is rebooted] # zfs key -l rpool/zones Enter PKCS#11 token PIN for 'rpool/zones': # zfs mount –a # zoneadm -z myzone boot
  • 30. 30 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Auditing
  • 31. 31 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Solaris Auditing • Kernel-based, fine-grained introspection • Captures commands, syscalls, admin. Actions • Flexible audit policy for global and non-global zones • Several audit trail formats: binary, text, XML, etc. • New in Solaris 11 – Auditing on by default with no performance penalty – Supports secure remote storage of audit trails – Greater visibility into system events with less “noise”
  • 32. 32 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Per-User Auditing Policy # userattr audit_flags gbrunett # # usermod –K audit_flags=lo,ad,ex:lo gbrunett # userattr audit_flags gbrunett lo,ad,ex:no # su – gbrunett $ exit # auditreduce -r baz -c lo /var/audit/*not_term* | praudit -s header,97,2,AUE_su,,testhost,2012-11-13 06:33:21.514 -08:00 subject,testuser,baz,staff,baz,staff,5243,2804137368,0 0 testhost return,success,0
  • 33. 33 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Putting it all together with Solaris 11 Security!
  • 34. 34 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Oracle Solaris Remote Lab – Schematic
  • 35. 35 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. OSRL - Data • Single Zpool multiple ZFS file systems Resource Sharing • Data stored in ZFS SA • Hybrid Storage • Disk + SSD + RAM • ZFS Cloning Performance • Encrypted ZFS • Partner specific Key • Each partner has their own ZFS File System Security Create Use Delete • Data isolated in VLAN • Separate NFS server per partner • SGD - CDM • All intra VM data transfers self contained in Blade chassis • ZFS clones - Share everything but the changes • ZFS Secure delete • ZFS encrypt + Delete almost instantaneous operation
  • 36. 36 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. OSRL - Virtual Machines (Zones) • Zone cloning • less than 18 MB of RAM • less than 100 MB of Disk Resource Sharing • ZFS + Zone cloning • new zone in minutes Performance • ZFS encryption for zone file system • Exclusive IP stack + VNIC Security Create Use Delete • All Zones isolated in non-routable VLAN • Secure global desktop access • Resource allocation • network bandwidth • Memory • CPU • Zone shares all OS resources - Single kernel - Single storage • ZFS Secure delete • ZFS encrypt + Delete almost instantaneous operation
  • 37. 37 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. When 1 + 1 > 2 • Zone + ZFS – Fast zone provisioning – Very low overhead – Encrypt file system as well as share resource • Zones + Network virtualization • Allows for sharing single physical network • VLAN tagging allows for creating one VLAN/Partner • Exclusive IP stack on shared physical network
  • 38. 38 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. When 1 + 1 > 2 • Zones + ZFS + NFS • Each NFS server is a zone • Single data store • Single Physical server • Multiple NFS file systems shared with ZFS • ZFS supports NFS sharing • Encryption + Cloning reduces overhead • Zones + IPS • Global Zone has IPS proxy • Single IPS repository accessible from non routable VLAN
  • 39. 39 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Additional Resources • Solaris 11 Security Hardening Guidelines http://docs.oracle.com/cd/E26502_01/html/E29014/index.html • Solaris 11 Secure Coding Guidelines for Developers http://docs.oracle.com/cd/E26502_01/html/E29016/scode-1.html • Glenn Faden’s Solaris 11.1 Hands On Security Lab https://blogs.oracle.com/gfaden/entry/solaris_11_1_is_available • Darren Moffat’s Solaris Security Blog https://blogs.oracle.com/darren/tags/solaris+security
  • 40. 40 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. For More Information / Try Out Today • Product overview and download – oracle.com/solaris • Oracle Technology Network – oracle.com/technetwork/server-storage/solaris11 • System Administrators Community – oracle.com/technetwork/systems • @ORCL_Solaris • facebook.com/oraclesolaris • Oracle Solaris Insider 40
  • 41. 41 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Questions
  • 42. 42 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Acknowledgements Special thanks to Darren Moffat and Glenn Faden, Angelo Rajadurai and many others for sharing their ideas and examples with the world.
  • 43. 43 Copyright © 2011, Oracle and/or its affiliates. All rights reserved.