SlideShare a Scribd company logo
1 of 137
Download to read offline
Practical Cloud Security
                                Jason Chan
                            chan@netflix.com




Tuesday, October 11, 2011
Agenda
                    • Background and Disclaimers
                    • Netflix in the Cloud
                    • Model-Driven Deployment Architecture
                    • APIs, Automation, and the Security Monkey
                    • Cloud Firewall and Connectivity Analysis
                    • Practical Cloud Security Gaps
Tuesday, October 11, 2011
Background and
                              Disclaimers


Tuesday, October 11, 2011
Background and
                              Disclaimers




Tuesday, October 11, 2011
Background and
                              Disclaimers
                    • No cloud definitions, but . . .




Tuesday, October 11, 2011
Background and
                              Disclaimers
                    • No cloud definitions, but . . .
                    • Focus on IaaS




Tuesday, October 11, 2011
Background and
                              Disclaimers
                    • No cloud definitions, but . . .
                    • Focus on IaaS
                    • Netflix uses Amazon Web Services



Tuesday, October 11, 2011
Background and
                              Disclaimers
                    • No cloud definitions, but . . .
                    • Focus on IaaS
                    • Netflix uses Amazon Web Services
                     • Guidance should be generally applicable


Tuesday, October 11, 2011
Background and
                                   Disclaimers
                    • No cloud definitions, but . . .
                    • Focus on IaaS
                    • Netflix uses Amazon Web Services
                     • Guidance should be generally applicable
                    • Works in progress, still many problems to
                            solve . . .


Tuesday, October 11, 2011
Netflix in the Cloud



Tuesday, October 11, 2011
Why is Netflix Using
                                  Cloud?


Tuesday, October 11, 2011
!"#"$%&'#&($




Tuesday, October 11, 2011
!"#"$%&'#&($




                Netflix could not build data centers fast enough




Tuesday, October 11, 2011
!"#"$%&'#&($




                Netflix could not build data centers fast enough
                Capacity requirements accelerating, unpredictable



Tuesday, October 11, 2011
!"#"$%&'#&($




                Netflix could not build data centers fast enough
                Capacity requirements accelerating, unpredictable
                Product launch spikes - iPhone, Wii, PS2, XBox


Tuesday, October 11, 2011
Outgrowing Data Center
                            http://techblog.netflix.com/2011/02/redesigning-netflix-api.html


                              Netflix API: Growth in Requests




Tuesday, October 11, 2011
Outgrowing Data Center
                            http://techblog.netflix.com/2011/02/redesigning-netflix-api.html


                              Netflix API: Growth in Requests




                                   37x Growth 1/10 - 1/11




Tuesday, October 11, 2011
Outgrowing Data Center
                            http://techblog.netflix.com/2011/02/redesigning-netflix-api.html


                              Netflix API: Growth in Requests




                                   37x Growth 1/10 - 1/11




Tuesday, October 11, 2011
Outgrowing Data Center
                            http://techblog.netflix.com/2011/02/redesigning-netflix-api.html


                              Netflix API: Growth in Requests




                                   37x Growth 1/10 - 1/11

                    !"#"$%&#%'(
                    )"*"$+#,(




Tuesday, October 11, 2011
netflix.com is now
                              ~100% Cloud



Tuesday, October 11, 2011
netflix.com is now
                              ~100% Cloud
                            Remaining components being migrated




Tuesday, October 11, 2011
Netflix Model-Driven
                          Architecture


Tuesday, October 11, 2011
Data Center Patterns




Tuesday, October 11, 2011
Data Center Patterns
                    • Long-lived, non-elastic systems




Tuesday, October 11, 2011
Data Center Patterns
                    • Long-lived, non-elastic systems
                    • Push code and config to running systems




Tuesday, October 11, 2011
Data Center Patterns
                    • Long-lived, non-elastic systems
                    • Push code and config to running systems
                    • Difficult to enforce deployment patterns



Tuesday, October 11, 2011
Data Center Patterns
                    • Long-lived, non-elastic systems
                    • Push code and config to running systems
                    • Difficult to enforce deployment patterns
                    • ‘Snowflake phenomenon’


Tuesday, October 11, 2011
Data Center Patterns
                    • Long-lived, non-elastic systems
                    • Push code and config to running systems
                    • Difficult to enforce deployment patterns
                    • ‘Snowflake phenomenon’
                    • Difficult to sync or reproduce
                            environments (e.g. test and prod)


Tuesday, October 11, 2011
Cloud Patterns




Tuesday, October 11, 2011
Cloud Patterns

                    • Ephemeral nodes




Tuesday, October 11, 2011
Cloud Patterns

                    • Ephemeral nodes
                    • Dynamic scaling




Tuesday, October 11, 2011
Cloud Patterns

                    • Ephemeral nodes
                    • Dynamic scaling
                    • Hardware is abstracted



Tuesday, October 11, 2011
Cloud Patterns

                    • Ephemeral nodes
                    • Dynamic scaling
                    • Hardware is abstracted
                    • Orchestration vs. manual steps


Tuesday, October 11, 2011
Cloud Patterns

                    • Ephemeral nodes
                    • Dynamic scaling
                    • Hardware is abstracted
                    • Orchestration vs. manual steps
                    • Trivial to clone environments

Tuesday, October 11, 2011
When Moving to the Cloud,
                        Leave Old Ways Behind . . .




Tuesday, October 11, 2011
When Moving to the Cloud,
                        Leave Old Ways Behind . . .
                            Generic forklift is generally a mistake




Tuesday, October 11, 2011
When Moving to the Cloud,
                        Leave Old Ways Behind . . .
                             Generic forklift is generally a mistake
                       Adapt development, deployment, and management
                                    models appropriately




Tuesday, October 11, 2011
When Moving to the Cloud,
                        Leave Old Ways Behind . . .
                             Generic forklift is generally a mistake
                       Adapt development, deployment, and management
                                    models appropriately




Tuesday, October 11, 2011
Netflix Build and Deploy
                             http://techblog.netflix.com/2011/08/building-with-legos.html




Tuesday, October 11, 2011
Netflix Build and Deploy
                             http://techblog.netflix.com/2011/08/building-with-legos.html




       Perforce

          SCM




Tuesday, October 11, 2011
Netflix Build and Deploy
                             http://techblog.netflix.com/2011/08/building-with-legos.html



             Continuous
             Integration

                Jenkins




       Perforce

          SCM




Tuesday, October 11, 2011
Netflix Build and Deploy
                             http://techblog.netflix.com/2011/08/building-with-legos.html



             Continuous
             Integration

                Jenkins




       Perforce                      Artifactory

          SCM                          Binary
                                     Repository




Tuesday, October 11, 2011
Netflix Build and Deploy
                             http://techblog.netflix.com/2011/08/building-with-legos.html


                                       App-Specific
             Continuous                Packages and
             Integration               Configuration

                Jenkins                     Yum




       Perforce                      Artifactory

          SCM                          Binary
                                     Repository




Tuesday, October 11, 2011
Netflix Build and Deploy
                             http://techblog.netflix.com/2011/08/building-with-legos.html


                                       App-Specific
             Continuous                Packages and
             Integration               Configuration

                Jenkins                     Yum




       Perforce                      Artifactory                  Bakery

          SCM                          Binary               Combine Base and
                                     Repository               App-Specific
                                                              Configuration



Tuesday, October 11, 2011
Netflix Build and Deploy
                             http://techblog.netflix.com/2011/08/building-with-legos.html


                                       App-Specific                Customized,
             Continuous                Packages and               Cloud-Ready
             Integration               Configuration                  Image

                Jenkins                     Yum                        AMI




       Perforce                      Artifactory                  Bakery

          SCM                          Binary               Combine Base and
                                     Repository               App-Specific
                                                              Configuration



Tuesday, October 11, 2011
Netflix Build and Deploy
                             http://techblog.netflix.com/2011/08/building-with-legos.html


                                       App-Specific                Customized,
             Continuous                Packages and               Cloud-Ready
             Integration               Configuration                  Image

                Jenkins                     Yum                        AMI




       Perforce                      Artifactory                  Bakery                    ASG

          SCM                          Binary               Combine Base and               Dynamic
                                     Repository               App-Specific                  Scaling
                                                              Configuration



Tuesday, October 11, 2011
Netflix Build and Deploy
                             http://techblog.netflix.com/2011/08/building-with-legos.html


                                       App-Specific                Customized,
             Continuous                Packages and               Cloud-Ready
             Integration                                             Image                 Live System!
                                       Configuration

                Jenkins                     Yum                        AMI                  Instance




       Perforce                      Artifactory                  Bakery                    ASG

          SCM                          Binary               Combine Base and               Dynamic
                                     Repository               App-Specific                  Scaling
                                                              Configuration



Tuesday, October 11, 2011
Netflix Build and Deploy
                             http://techblog.netflix.com/2011/08/building-with-legos.html


                                       App-Specific                Customized,
             Continuous                Packages and               Cloud-Ready
             Integration                                             Image                 Live System!
                                       Configuration

                Jenkins                     Yum                        AMI                  Instance




       Perforce                      Artifactory                  Bakery                    ASG

          SCM                          Binary               Combine Base and               Dynamic
                                     Repository               App-Specific                  Scaling
                                                              Configuration

                             Every change is a new push
Tuesday, October 11, 2011
Results




Tuesday, October 11, 2011
Results

                    • No changes to running systems




Tuesday, October 11, 2011
Results

                    • No changes to running systems
                    • No CMDB



Tuesday, October 11, 2011
Results

                    • No changes to running systems
                    • No CMDB
                    • No systems management infrastructure


Tuesday, October 11, 2011
Results

                    • No changes to running systems
                    • No CMDB
                    • No systems management infrastructure
                    • Fewer logins to prod systems

Tuesday, October 11, 2011
Impact on Security




Tuesday, October 11, 2011
Impact on Security

                    • File integrity monitoring




Tuesday, October 11, 2011
Impact on Security

                    • File integrity monitoring
                    • User activity monitoring



Tuesday, October 11, 2011
Impact on Security

                    • File integrity monitoring
                    • User activity monitoring
                    • Vulnerability management


Tuesday, October 11, 2011
Impact on Security

                    • File integrity monitoring
                    • User activity monitoring
                    • Vulnerability management
                    • Patch management

Tuesday, October 11, 2011
APIs, Automation, and
                       the Security Monkey


Tuesday, October 11, 2011
Common Challenges for
                              Security Engineers




Tuesday, October 11, 2011
Common Challenges for
                              Security Engineers

                    • Lots of data from different sources, in
                            different formats




Tuesday, October 11, 2011
Common Challenges for
                              Security Engineers

                    • Lots of data from different sources, in
                            different formats
                    • Too many administrative interfaces and
                            disconnected systems




Tuesday, October 11, 2011
Common Challenges for
                              Security Engineers

                    • Lots of data from different sources, in
                            different formats
                    • Too many administrative interfaces and
                            disconnected systems
                    • Too few options for scalable automation

Tuesday, October 11, 2011
Enter the Cloud . . .



Tuesday, October 11, 2011
How do you . . .




Tuesday, October 11, 2011
How do you . . .
                    •       Add a user account?




Tuesday, October 11, 2011
How do you . . .
                    •       Add a user account?

                    •       Inventory systems?




Tuesday, October 11, 2011
How do you . . .
                    •       Add a user account?

                    •       Inventory systems?

                    •       Change a firewall config?




Tuesday, October 11, 2011
How do you . . .
                    •       Add a user account?

                    •       Inventory systems?

                    •       Change a firewall config?

                    •       Snapshot a drive for
                            forensic analysis?




Tuesday, October 11, 2011
How do you . . .
                    •       Add a user account?

                    •       Inventory systems?

                    •       Change a firewall config?

                    •       Snapshot a drive for
                            forensic analysis?

                    •       Disable a multi-factor
                            authentication token?




Tuesday, October 11, 2011
How do you . . .
                    •       Add a user account?       •   CreateUser()

                    •       Inventory systems?

                    •       Change a firewall config?

                    •       Snapshot a drive for
                            forensic analysis?

                    •       Disable a multi-factor
                            authentication token?




Tuesday, October 11, 2011
How do you . . .
                    •       Add a user account?       •   CreateUser()

                    •       Inventory systems?        •   DescribeInstances()

                    •       Change a firewall config?

                    •       Snapshot a drive for
                            forensic analysis?

                    •       Disable a multi-factor
                            authentication token?




Tuesday, October 11, 2011
How do you . . .
                    •       Add a user account?       •   CreateUser()

                    •       Inventory systems?        •   DescribeInstances()

                    •       Change a firewall config?   •   AuthorizeSecurityGroup
                                                          Ingress()
                    •       Snapshot a drive for
                            forensic analysis?

                    •       Disable a multi-factor
                            authentication token?




Tuesday, October 11, 2011
How do you . . .
                    •       Add a user account?       •   CreateUser()

                    •       Inventory systems?        •   DescribeInstances()

                    •       Change a firewall config?   •   AuthorizeSecurityGroup
                                                          Ingress()
                    •       Snapshot a drive for
                            forensic analysis?        •   CreateSnapshot()

                    •       Disable a multi-factor
                            authentication token?




Tuesday, October 11, 2011
How do you . . .
                    •       Add a user account?       •   CreateUser()

                    •       Inventory systems?        •   DescribeInstances()

                    •       Change a firewall config?   •   AuthorizeSecurityGroup
                                                          Ingress()
                    •       Snapshot a drive for
                            forensic analysis?        •   CreateSnapshot()

                    •       Disable a multi-factor    •   DeactivateMFADevice()
                            authentication token?




Tuesday, October 11, 2011
Security Monkey
                            http://techblog.netflix.com/2011/07/netflix-simian-army.html




Tuesday, October 11, 2011
Security Monkey
                            http://techblog.netflix.com/2011/07/netflix-simian-army.html




                    • Leverages cloud APIs




Tuesday, October 11, 2011
Security Monkey
                              http://techblog.netflix.com/2011/07/netflix-simian-army.html




                    • Leverages cloud APIs
                    • Centralized framework for cloud security
                            monitoring and analysis




Tuesday, October 11, 2011
Security Monkey
                              http://techblog.netflix.com/2011/07/netflix-simian-army.html




                    • Leverages cloud APIs
                    • Centralized framework for cloud security
                            monitoring and analysis
                    • Certificate and cipher monitoring



Tuesday, October 11, 2011
Security Monkey
                              http://techblog.netflix.com/2011/07/netflix-simian-army.html




                    • Leverages cloud APIs
                    • Centralized framework for cloud security
                            monitoring and analysis
                    • Certificate and cipher monitoring
                    • Firewall configuration checks


Tuesday, October 11, 2011
Security Monkey
                              http://techblog.netflix.com/2011/07/netflix-simian-army.html




                    • Leverages cloud APIs
                    • Centralized framework for cloud security
                            monitoring and analysis
                    • Certificate and cipher monitoring
                    • Firewall configuration checks
                    • User/group/policy monitoring
Tuesday, October 11, 2011
Cloud Firewall and
                        Connectivity Analysis


Tuesday, October 11, 2011
Analyzing Traditional
                                 Firewalls




Tuesday, October 11, 2011
Analyzing Traditional
                                 Firewalls

                    • Positioned at network chokepoints,
                            providing optimal internetwork visibility




Tuesday, October 11, 2011
Analyzing Traditional
                                 Firewalls

                    • Positioned at network chokepoints,
                            providing optimal internetwork visibility
                    • Use tools like tcpdump, NetFlow,
                            centralized logging to gather data




Tuesday, October 11, 2011
Analyzing Traditional
                                 Firewalls

                    • Positioned at network chokepoints,
                            providing optimal internetwork visibility
                    • Use tools like tcpdump, NetFlow,
                            centralized logging to gather data
                    • Review traffic patterns and optimize

Tuesday, October 11, 2011
AWS Firewalls (Briefly)




Tuesday, October 11, 2011
AWS Firewalls (Briefly)
                    • “Security Group” is unit of measure for
                            firewalling




Tuesday, October 11, 2011
AWS Firewalls (Briefly)
                    • “Security Group” is unit of measure for
                            firewalling
                    • Policy-driven and network-agnostic,
                            configuration follows an instance




Tuesday, October 11, 2011
AWS Firewalls (Briefly)
                    • “Security Group” is unit of measure for
                            firewalling
                    • Policy-driven and network-agnostic,
                            configuration follows an instance
                    • Network diagram irrelevant


Tuesday, October 11, 2011
AWS Firewalls (Briefly)
                    • “Security Group” is unit of measure for
                            firewalling
                    • Policy-driven and network-agnostic,
                            configuration follows an instance
                    • Network diagram irrelevant
                    • Chokepoints and sniffing are not possible

Tuesday, October 11, 2011
AWS Firewalls (Briefly)
                    • “Security Group” is unit of measure for
                            firewalling
                    • Policy-driven and network-agnostic,
                            configuration follows an instance
                    • Network diagram irrelevant
                    • Chokepoints and sniffing are not possible
                    • Outbound connections not filterable (!)
Tuesday, October 11, 2011
Security Group Analysis




Tuesday, October 11, 2011
Security Group Analysis
                    • Use config and inventory to map reachability




Tuesday, October 11, 2011
Security Group Analysis
                    • Use config and inventory to map reachability
                    • Leverage APIs to evaluate reachability and
                            detect violations:




Tuesday, October 11, 2011
Security Group Analysis
                    • Use config and inventory to map reachability
                    • Leverage APIs to evaluate reachability and
                            detect violations:
                            • Security groups with no members



Tuesday, October 11, 2011
Security Group Analysis
                    • Use config and inventory to map reachability
                    • Leverage APIs to evaluate reachability and
                            detect violations:
                            • Security groups with no members
                            • “Insecure” services (e.g. Telnet, FTP)


Tuesday, October 11, 2011
Security Group Analysis
                    • Use config and inventory to map reachability
                    • Leverage APIs to evaluate reachability and
                            detect violations:
                            • Security groups with no members
                            • “Insecure” services (e.g. Telnet, FTP)
                            • Rules that use “any” keyword

Tuesday, October 11, 2011
Security Group Analysis
                    • Use config and inventory to map reachability
                    • Leverage APIs to evaluate reachability and
                            detect violations:
                            • Security groups with no members
                            • “Insecure” services (e.g. Telnet, FTP)
                            • Rules that use “any” keyword
                    • Visualize config into data flow diagram
Tuesday, October 11, 2011
Reachability & Violation
                              Analysis




Tuesday, October 11, 2011
Connectivity Analysis




Tuesday, October 11, 2011
Connectivity Analysis

                    • Reachability shows what “can” communicate




Tuesday, October 11, 2011
Connectivity Analysis

                    • Reachability shows what “can” communicate
                    • What about what is communicating?




Tuesday, October 11, 2011
Connectivity Analysis

                    • Reachability shows what “can” communicate
                    • What about what is communicating?
                    • Take same approach, leverage APIs for
                            firewall and inventory and combine with
                            host data




Tuesday, October 11, 2011
Connectivity Analysis

                    • Reachability shows what “can” communicate
                    • What about what is communicating?
                    • Take same approach, leverage APIs for
                            firewall and inventory and combine with
                            host data
                    • Visualize data into connectivity diagram
Tuesday, October 11, 2011
Connectivity Analysis




Tuesday, October 11, 2011
‘Practical’ Cloud
                              Security Gaps


Tuesday, October 11, 2011
Common Security
                             Product Model




Tuesday, October 11, 2011
Common Security
                             Product Model
                    • Examples - AV, FIM, etc.




Tuesday, October 11, 2011
Common Security
                             Product Model
                    • Examples - AV, FIM, etc.
                    • “Management” station with client “nodes”




Tuesday, October 11, 2011
Common Security
                             Product Model
                    • Examples - AV, FIM, etc.
                    • “Management” station with client “nodes”
                     • Limited tagging or abstraction



Tuesday, October 11, 2011
Common Security
                             Product Model
                    • Examples - AV, FIM, etc.
                    • “Management” station with client “nodes”
                     • Limited tagging or abstraction
                     • Strong “manager” and “managed” model


Tuesday, October 11, 2011
Common Security
                             Product Model
                    • Examples - AV, FIM, etc.
                    • “Management” station with client “nodes”
                     • Limited tagging or abstraction
                     • Strong “manager” and “managed” model
                    • Push and pull approaches

Tuesday, October 11, 2011
Common Security
                             Product Model
                    • Examples - AV, FIM, etc.
                    • “Management” station with client “nodes”
                     • Limited tagging or abstraction
                     • Strong “manager” and “managed” model
                    • Push and pull approaches
                    • Per node licensing
Tuesday, October 11, 2011
“Thundering Herd”




Tuesday, October 11, 2011
“Thundering Herd”

                    • Mass deployments




Tuesday, October 11, 2011
“Thundering Herd”

                    • Mass deployments
                     • “Red/Black” push - concurrent clusters of
                            500+ nodes




Tuesday, October 11, 2011
“Thundering Herd”

                    • Mass deployments
                     • “Red/Black” push - concurrent clusters of
                            500+ nodes
                    • Elasticity related to traffic spikes


Tuesday, October 11, 2011
“Thundering Herd”

                    • Mass deployments
                     • “Red/Black” push - concurrent clusters of
                            500+ nodes
                    • Elasticity related to traffic spikes
                    • Licensing constraints

Tuesday, October 11, 2011
Node Ephemerality and
                  Service Abstraction




Tuesday, October 11, 2011
Node Ephemerality and
                  Service Abstraction

                    • Data related to individual nodes becomes
                            less important




Tuesday, October 11, 2011
Node Ephemerality and
                  Service Abstraction

                    • Data related to individual nodes becomes
                            less important
                    • Dealing with short-lived systems, IP and ID
                            reuse




Tuesday, October 11, 2011
Node Ephemerality and
                  Service Abstraction

                    • Data related to individual nodes becomes
                            less important
                    • Dealing with short-lived systems, IP and ID
                            reuse
                    • Event and log archives and data relationships

Tuesday, October 11, 2011
Resource Usage
                            Logging and Auditing




Tuesday, October 11, 2011
Resource Usage
                            Logging and Auditing
                    • Public-facing APIs make access controls
                            more difficult and more important




Tuesday, October 11, 2011
Resource Usage
                            Logging and Auditing
                    • Public-facing APIs make access controls
                            more difficult and more important
                    • Programmable infrastructure needs robust
                            logging and auditing capabilities




Tuesday, October 11, 2011
Resource Usage
                            Logging and Auditing
                    • Public-facing APIs make access controls
                            more difficult and more important
                    • Programmable infrastructure needs robust
                            logging and auditing capabilities
                    • Can metering data be repurposed?

Tuesday, October 11, 2011
Identity Integration




Tuesday, October 11, 2011
Identity Integration


                    • Federation use cases



Tuesday, October 11, 2011
Identity Integration


                    • Federation use cases
                    • On-instance credentials


Tuesday, October 11, 2011
“Trusted Cloud”




Tuesday, October 11, 2011
“Trusted Cloud”

                    • Various components related to providing
                            higher assurance/trust levels in the cloud




Tuesday, October 11, 2011
“Trusted Cloud”

                    • Various components related to providing
                            higher assurance/trust levels in the cloud
                    • Virtual TPM / hardware root of trust



Tuesday, October 11, 2011
“Trusted Cloud”

                    • Various components related to providing
                            higher assurance/trust levels in the cloud
                    • Virtual TPM / hardware root of trust
                    • Controlled execution


Tuesday, October 11, 2011
“Trusted Cloud”

                    • Various components related to providing
                            higher assurance/trust levels in the cloud
                    • Virtual TPM / hardware root of trust
                    • Controlled execution
                    • HSM in the cloud

Tuesday, October 11, 2011
Thanks!
                            Questions?
                             chan@netflix.com
                                (I’m hiring!)




Tuesday, October 11, 2011
References
                    • http://www.slideshare.net/adrianco
                    • http://aws.amazon.com
                    • http://techblog.netflix.com
                    • http://nordsecmob.tkk.fi/Thesisworks/Soren
                            %20Bleikertz.pdf
                    • https://cloudsecurityalliance.org/
                    • http://www.nist.gov/itl/cloud/index.cfm
Tuesday, October 11, 2011

More Related Content

Viewers also liked

AWS Security: A Practitioner's Perspective
AWS Security: A Practitioner's PerspectiveAWS Security: A Practitioner's Perspective
AWS Security: A Practitioner's PerspectiveJason Chan
 
The Psychology of Security Automation
The Psychology of Security AutomationThe Psychology of Security Automation
The Psychology of Security AutomationJason Chan
 
Splitting the Check on Compliance and Security
Splitting the Check on Compliance and SecuritySplitting the Check on Compliance and Security
Splitting the Check on Compliance and SecurityJason Chan
 
Real World Cloud Application Security
Real World Cloud Application SecurityReal World Cloud Application Security
Real World Cloud Application SecurityJason Chan
 
Resilience and Security @ Scale: Lessons Learned
Resilience and Security @ Scale: Lessons LearnedResilience and Security @ Scale: Lessons Learned
Resilience and Security @ Scale: Lessons LearnedJason Chan
 
Security at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at YahooSecurity at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at YahooAlex Stamos
 
Virtualization: Security and IT Audit Perspectives
Virtualization: Security and IT Audit PerspectivesVirtualization: Security and IT Audit Perspectives
Virtualization: Security and IT Audit PerspectivesJason Chan
 
Cloud Security @ Netflix
Cloud Security @ NetflixCloud Security @ Netflix
Cloud Security @ NetflixJason Chan
 
Cloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedJason Chan
 
Cloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedJason Chan
 
Cloud computing-Practical Example
Cloud computing-Practical ExampleCloud computing-Practical Example
Cloud computing-Practical ExampleTasawar Gulzar
 
Cloud computing in practice
Cloud computing in practiceCloud computing in practice
Cloud computing in practiceAndrzej Osmak
 
Cloud computing lab experiments
Cloud computing lab experimentsCloud computing lab experiments
Cloud computing lab experimentsrichendraravi
 
Cloud Native Data Pipelines (QCon Shanghai & Tokyo 2016)
Cloud Native Data Pipelines (QCon Shanghai & Tokyo 2016)Cloud Native Data Pipelines (QCon Shanghai & Tokyo 2016)
Cloud Native Data Pipelines (QCon Shanghai & Tokyo 2016)Sid Anand
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareTzar Umang
 
Careers in Security
Careers in SecurityCareers in Security
Careers in SecurityJason Chan
 
rgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab recordrgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab recordnaaaaz
 

Viewers also liked (17)

AWS Security: A Practitioner's Perspective
AWS Security: A Practitioner's PerspectiveAWS Security: A Practitioner's Perspective
AWS Security: A Practitioner's Perspective
 
The Psychology of Security Automation
The Psychology of Security AutomationThe Psychology of Security Automation
The Psychology of Security Automation
 
Splitting the Check on Compliance and Security
Splitting the Check on Compliance and SecuritySplitting the Check on Compliance and Security
Splitting the Check on Compliance and Security
 
Real World Cloud Application Security
Real World Cloud Application SecurityReal World Cloud Application Security
Real World Cloud Application Security
 
Resilience and Security @ Scale: Lessons Learned
Resilience and Security @ Scale: Lessons LearnedResilience and Security @ Scale: Lessons Learned
Resilience and Security @ Scale: Lessons Learned
 
Security at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at YahooSecurity at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at Yahoo
 
Virtualization: Security and IT Audit Perspectives
Virtualization: Security and IT Audit PerspectivesVirtualization: Security and IT Audit Perspectives
Virtualization: Security and IT Audit Perspectives
 
Cloud Security @ Netflix
Cloud Security @ NetflixCloud Security @ Netflix
Cloud Security @ Netflix
 
Cloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons Learned
 
Cloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons Learned
 
Cloud computing-Practical Example
Cloud computing-Practical ExampleCloud computing-Practical Example
Cloud computing-Practical Example
 
Cloud computing in practice
Cloud computing in practiceCloud computing in practice
Cloud computing in practice
 
Cloud computing lab experiments
Cloud computing lab experimentsCloud computing lab experiments
Cloud computing lab experiments
 
Cloud Native Data Pipelines (QCon Shanghai & Tokyo 2016)
Cloud Native Data Pipelines (QCon Shanghai & Tokyo 2016)Cloud Native Data Pipelines (QCon Shanghai & Tokyo 2016)
Cloud Native Data Pipelines (QCon Shanghai & Tokyo 2016)
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-ware
 
Careers in Security
Careers in SecurityCareers in Security
Careers in Security
 
rgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab recordrgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab record
 

Similar to Practical Cloud Security

Monitoring is easy, why are we so bad at it presentation
Monitoring is easy, why are we so bad at it  presentationMonitoring is easy, why are we so bad at it  presentation
Monitoring is easy, why are we so bad at it presentationTheo Schlossnagle
 
Conquistando el Servidor con Node.JS
Conquistando el Servidor con Node.JSConquistando el Servidor con Node.JS
Conquistando el Servidor con Node.JSCaridy Patino
 
Keeping Movies Running Amid Thunderstorms!
Keeping Movies Running Amid Thunderstorms!Keeping Movies Running Amid Thunderstorms!
Keeping Movies Running Amid Thunderstorms!Sid Anand
 
PHP Architect Virtual Cloud summit
PHP Architect Virtual Cloud summitPHP Architect Virtual Cloud summit
PHP Architect Virtual Cloud summitKirsten Hunter
 
The Fast, The Slow and the Lazy
The Fast, The Slow and the LazyThe Fast, The Slow and the Lazy
The Fast, The Slow and the LazyMaurício Linhares
 
A Look at the Future of HTML5
A Look at the Future of HTML5A Look at the Future of HTML5
A Look at the Future of HTML5Tim Wright
 
Migration from Fast ESP to Lucene Solr - Michael McIntosh
Migration from Fast ESP to Lucene Solr - Michael McIntoshMigration from Fast ESP to Lucene Solr - Michael McIntosh
Migration from Fast ESP to Lucene Solr - Michael McIntoshlucenerevolution
 
CMPE 297 Lecture: Building Infrastructure Clouds with OpenStack
CMPE 297 Lecture: Building Infrastructure Clouds with OpenStackCMPE 297 Lecture: Building Infrastructure Clouds with OpenStack
CMPE 297 Lecture: Building Infrastructure Clouds with OpenStackJoe Arnold
 
node.js for front-end developers
node.js for front-end developersnode.js for front-end developers
node.js for front-end developersGarann Means
 
SplunkLive New York 2011: DealerTrack
SplunkLive New York 2011: DealerTrackSplunkLive New York 2011: DealerTrack
SplunkLive New York 2011: DealerTrackSplunk
 
JavaSE - The road forward
JavaSE - The road forwardJavaSE - The road forward
JavaSE - The road forwardeug3n_cojocaru
 
High quality iOS development
High quality iOS developmentHigh quality iOS development
High quality iOS developmentRobin Lu
 
PHP Development In The Cloud (php|tek edition)
PHP Development In The Cloud (php|tek edition)PHP Development In The Cloud (php|tek edition)
PHP Development In The Cloud (php|tek edition)Ivo Jansch
 
Are Your Tests Really Helping You?
Are Your Tests Really Helping You?Are Your Tests Really Helping You?
Are Your Tests Really Helping You?LB Denker
 
Integrating ECM (WebCenter Content) with your Enterprise! 5 Tips to Try, 5 Tr...
Integrating ECM (WebCenter Content) with your Enterprise! 5 Tips to Try, 5 Tr...Integrating ECM (WebCenter Content) with your Enterprise! 5 Tips to Try, 5 Tr...
Integrating ECM (WebCenter Content) with your Enterprise! 5 Tips to Try, 5 Tr...Brian Huff
 
Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)Antigone Peyton
 
Deploying large payloads at scale
Deploying large payloads at scaleDeploying large payloads at scale
Deploying large payloads at scaleramonvanalteren
 

Similar to Practical Cloud Security (20)

Monitoring is easy, why are we so bad at it presentation
Monitoring is easy, why are we so bad at it  presentationMonitoring is easy, why are we so bad at it  presentation
Monitoring is easy, why are we so bad at it presentation
 
Caridy patino - node-js
Caridy patino - node-jsCaridy patino - node-js
Caridy patino - node-js
 
Conquistando el Servidor con Node.JS
Conquistando el Servidor con Node.JSConquistando el Servidor con Node.JS
Conquistando el Servidor con Node.JS
 
Keeping Movies Running Amid Thunderstorms!
Keeping Movies Running Amid Thunderstorms!Keeping Movies Running Amid Thunderstorms!
Keeping Movies Running Amid Thunderstorms!
 
PHP Architect Virtual Cloud summit
PHP Architect Virtual Cloud summitPHP Architect Virtual Cloud summit
PHP Architect Virtual Cloud summit
 
The Fast, The Slow and the Lazy
The Fast, The Slow and the LazyThe Fast, The Slow and the Lazy
The Fast, The Slow and the Lazy
 
A Look at the Future of HTML5
A Look at the Future of HTML5A Look at the Future of HTML5
A Look at the Future of HTML5
 
Migration from Fast ESP to Lucene Solr - Michael McIntosh
Migration from Fast ESP to Lucene Solr - Michael McIntoshMigration from Fast ESP to Lucene Solr - Michael McIntosh
Migration from Fast ESP to Lucene Solr - Michael McIntosh
 
CMPE 297 Lecture: Building Infrastructure Clouds with OpenStack
CMPE 297 Lecture: Building Infrastructure Clouds with OpenStackCMPE 297 Lecture: Building Infrastructure Clouds with OpenStack
CMPE 297 Lecture: Building Infrastructure Clouds with OpenStack
 
node.js for front-end developers
node.js for front-end developersnode.js for front-end developers
node.js for front-end developers
 
SplunkLive New York 2011: DealerTrack
SplunkLive New York 2011: DealerTrackSplunkLive New York 2011: DealerTrack
SplunkLive New York 2011: DealerTrack
 
JavaSE - The road forward
JavaSE - The road forwardJavaSE - The road forward
JavaSE - The road forward
 
High quality iOS development
High quality iOS developmentHigh quality iOS development
High quality iOS development
 
PHP Development In The Cloud (php|tek edition)
PHP Development In The Cloud (php|tek edition)PHP Development In The Cloud (php|tek edition)
PHP Development In The Cloud (php|tek edition)
 
Are Your Tests Really Helping You?
Are Your Tests Really Helping You?Are Your Tests Really Helping You?
Are Your Tests Really Helping You?
 
Integrating ECM (WebCenter Content) with your Enterprise! 5 Tips to Try, 5 Tr...
Integrating ECM (WebCenter Content) with your Enterprise! 5 Tips to Try, 5 Tr...Integrating ECM (WebCenter Content) with your Enterprise! 5 Tips to Try, 5 Tr...
Integrating ECM (WebCenter Content) with your Enterprise! 5 Tips to Try, 5 Tr...
 
Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)
 
CSS Power Tools
CSS Power ToolsCSS Power Tools
CSS Power Tools
 
Deploying large payloads at scale
Deploying large payloads at scaleDeploying large payloads at scale
Deploying large payloads at scale
 
Iwmn architecture
Iwmn architectureIwmn architecture
Iwmn architecture
 

Recently uploaded

Escort Service in Al Jaddaf +971509530047 UAE
Escort Service in Al Jaddaf +971509530047 UAEEscort Service in Al Jaddaf +971509530047 UAE
Escort Service in Al Jaddaf +971509530047 UAEvecevep119
 
Iffco Chowk Call Girls : ☎ 8527673949, Low rate Call Girls
Iffco Chowk Call Girls : ☎ 8527673949, Low rate Call GirlsIffco Chowk Call Girls : ☎ 8527673949, Low rate Call Girls
Iffco Chowk Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
Call Girls In Laxmi Nagar 8375860717 Escorts Service Free Home Delivery
Call Girls In Laxmi Nagar 8375860717 Escorts Service Free Home DeliveryCall Girls In Laxmi Nagar 8375860717 Escorts Service Free Home Delivery
Call Girls In Laxmi Nagar 8375860717 Escorts Service Free Home Deliverydoor45step
 
Jvc Call Girl +971528604116 Indian Call Girl in Jvc By Dubai Call Girl
Jvc Call Girl +971528604116 Indian Call Girl in Jvc By Dubai Call GirlJvc Call Girl +971528604116 Indian Call Girl in Jvc By Dubai Call Girl
Jvc Call Girl +971528604116 Indian Call Girl in Jvc By Dubai Call Girllijeho2176
 
Bobbie goods colorinsssssssssssg book.pdf
Bobbie goods colorinsssssssssssg book.pdfBobbie goods colorinsssssssssssg book.pdf
Bobbie goods colorinsssssssssssg book.pdflunavro0105
 
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 60009654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000Sapana Sha
 
The Masque of the Red Death Storyboard 2023
The Masque of the Red Death Storyboard 2023The Masque of the Red Death Storyboard 2023
The Masque of the Red Death Storyboard 2023magalybtapia
 
Aiims Call Girls : ☎ 8527673949, Low rate Call Girls
Aiims Call Girls : ☎ 8527673949, Low rate Call GirlsAiims Call Girls : ☎ 8527673949, Low rate Call Girls
Aiims Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
Escort Service in Al Barsha +971509530047 UAE
Escort Service in Al Barsha +971509530047 UAEEscort Service in Al Barsha +971509530047 UAE
Escort Service in Al Barsha +971509530047 UAEvecevep119
 
Anand Vihar Call Girls : ☎ 8527673949, Low rate Call Girls
Anand Vihar Call Girls : ☎ 8527673949, Low rate Call GirlsAnand Vihar Call Girls : ☎ 8527673949, Low rate Call Girls
Anand Vihar Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
Karol Bagh Call Girls : ☎ 8527673949, Low rate Call Girls
Karol Bagh Call Girls : ☎ 8527673949, Low rate Call GirlsKarol Bagh Call Girls : ☎ 8527673949, Low rate Call Girls
Karol Bagh Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
Value Aspiration And Culture Theory of Architecture
Value Aspiration And Culture Theory of ArchitectureValue Aspiration And Culture Theory of Architecture
Value Aspiration And Culture Theory of ArchitectureDarrenMasbate
 
Govindpuri Call Girls : ☎ 8527673949, Low rate Call Girls
Govindpuri Call Girls : ☎ 8527673949, Low rate Call GirlsGovindpuri Call Girls : ☎ 8527673949, Low rate Call Girls
Govindpuri Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
Russian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts ServiceRussian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts Servicedoor45step
 
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Service
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts ServiceIndian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Service
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Servicedoor45step
 
Escort Service in Abu Dhabi +971509530047 UAE
Escort Service in Abu Dhabi +971509530047 UAEEscort Service in Abu Dhabi +971509530047 UAE
Escort Service in Abu Dhabi +971509530047 UAEvecevep119
 
Gurgaon Call Girls : ☎ 8527673949, Low rate Call Girls
Gurgaon Call Girls : ☎ 8527673949, Low rate Call GirlsGurgaon Call Girls : ☎ 8527673949, Low rate Call Girls
Gurgaon Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
Hauz Khas Call Girls : ☎ 8527673949, Low rate Call Girls
Hauz Khas Call Girls : ☎ 8527673949, Low rate Call GirlsHauz Khas Call Girls : ☎ 8527673949, Low rate Call Girls
Hauz Khas Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
A Selection of Tim Walsh's Recent Paintings
A Selection of Tim Walsh's  Recent PaintingsA Selection of Tim Walsh's  Recent Paintings
A Selection of Tim Walsh's Recent PaintingsTim Walsh
 
Strip Zagor Extra 322 - Dva ortaka.pdf
Strip   Zagor Extra 322 - Dva ortaka.pdfStrip   Zagor Extra 322 - Dva ortaka.pdf
Strip Zagor Extra 322 - Dva ortaka.pdfStripovizijacom
 

Recently uploaded (20)

Escort Service in Al Jaddaf +971509530047 UAE
Escort Service in Al Jaddaf +971509530047 UAEEscort Service in Al Jaddaf +971509530047 UAE
Escort Service in Al Jaddaf +971509530047 UAE
 
Iffco Chowk Call Girls : ☎ 8527673949, Low rate Call Girls
Iffco Chowk Call Girls : ☎ 8527673949, Low rate Call GirlsIffco Chowk Call Girls : ☎ 8527673949, Low rate Call Girls
Iffco Chowk Call Girls : ☎ 8527673949, Low rate Call Girls
 
Call Girls In Laxmi Nagar 8375860717 Escorts Service Free Home Delivery
Call Girls In Laxmi Nagar 8375860717 Escorts Service Free Home DeliveryCall Girls In Laxmi Nagar 8375860717 Escorts Service Free Home Delivery
Call Girls In Laxmi Nagar 8375860717 Escorts Service Free Home Delivery
 
Jvc Call Girl +971528604116 Indian Call Girl in Jvc By Dubai Call Girl
Jvc Call Girl +971528604116 Indian Call Girl in Jvc By Dubai Call GirlJvc Call Girl +971528604116 Indian Call Girl in Jvc By Dubai Call Girl
Jvc Call Girl +971528604116 Indian Call Girl in Jvc By Dubai Call Girl
 
Bobbie goods colorinsssssssssssg book.pdf
Bobbie goods colorinsssssssssssg book.pdfBobbie goods colorinsssssssssssg book.pdf
Bobbie goods colorinsssssssssssg book.pdf
 
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 60009654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
 
The Masque of the Red Death Storyboard 2023
The Masque of the Red Death Storyboard 2023The Masque of the Red Death Storyboard 2023
The Masque of the Red Death Storyboard 2023
 
Aiims Call Girls : ☎ 8527673949, Low rate Call Girls
Aiims Call Girls : ☎ 8527673949, Low rate Call GirlsAiims Call Girls : ☎ 8527673949, Low rate Call Girls
Aiims Call Girls : ☎ 8527673949, Low rate Call Girls
 
Escort Service in Al Barsha +971509530047 UAE
Escort Service in Al Barsha +971509530047 UAEEscort Service in Al Barsha +971509530047 UAE
Escort Service in Al Barsha +971509530047 UAE
 
Anand Vihar Call Girls : ☎ 8527673949, Low rate Call Girls
Anand Vihar Call Girls : ☎ 8527673949, Low rate Call GirlsAnand Vihar Call Girls : ☎ 8527673949, Low rate Call Girls
Anand Vihar Call Girls : ☎ 8527673949, Low rate Call Girls
 
Karol Bagh Call Girls : ☎ 8527673949, Low rate Call Girls
Karol Bagh Call Girls : ☎ 8527673949, Low rate Call GirlsKarol Bagh Call Girls : ☎ 8527673949, Low rate Call Girls
Karol Bagh Call Girls : ☎ 8527673949, Low rate Call Girls
 
Value Aspiration And Culture Theory of Architecture
Value Aspiration And Culture Theory of ArchitectureValue Aspiration And Culture Theory of Architecture
Value Aspiration And Culture Theory of Architecture
 
Govindpuri Call Girls : ☎ 8527673949, Low rate Call Girls
Govindpuri Call Girls : ☎ 8527673949, Low rate Call GirlsGovindpuri Call Girls : ☎ 8527673949, Low rate Call Girls
Govindpuri Call Girls : ☎ 8527673949, Low rate Call Girls
 
Russian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts ServiceRussian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts Service
 
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Service
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts ServiceIndian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Service
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Service
 
Escort Service in Abu Dhabi +971509530047 UAE
Escort Service in Abu Dhabi +971509530047 UAEEscort Service in Abu Dhabi +971509530047 UAE
Escort Service in Abu Dhabi +971509530047 UAE
 
Gurgaon Call Girls : ☎ 8527673949, Low rate Call Girls
Gurgaon Call Girls : ☎ 8527673949, Low rate Call GirlsGurgaon Call Girls : ☎ 8527673949, Low rate Call Girls
Gurgaon Call Girls : ☎ 8527673949, Low rate Call Girls
 
Hauz Khas Call Girls : ☎ 8527673949, Low rate Call Girls
Hauz Khas Call Girls : ☎ 8527673949, Low rate Call GirlsHauz Khas Call Girls : ☎ 8527673949, Low rate Call Girls
Hauz Khas Call Girls : ☎ 8527673949, Low rate Call Girls
 
A Selection of Tim Walsh's Recent Paintings
A Selection of Tim Walsh's  Recent PaintingsA Selection of Tim Walsh's  Recent Paintings
A Selection of Tim Walsh's Recent Paintings
 
Strip Zagor Extra 322 - Dva ortaka.pdf
Strip   Zagor Extra 322 - Dva ortaka.pdfStrip   Zagor Extra 322 - Dva ortaka.pdf
Strip Zagor Extra 322 - Dva ortaka.pdf
 

Practical Cloud Security

  • 1. Practical Cloud Security Jason Chan chan@netflix.com Tuesday, October 11, 2011
  • 2. Agenda • Background and Disclaimers • Netflix in the Cloud • Model-Driven Deployment Architecture • APIs, Automation, and the Security Monkey • Cloud Firewall and Connectivity Analysis • Practical Cloud Security Gaps Tuesday, October 11, 2011
  • 3. Background and Disclaimers Tuesday, October 11, 2011
  • 4. Background and Disclaimers Tuesday, October 11, 2011
  • 5. Background and Disclaimers • No cloud definitions, but . . . Tuesday, October 11, 2011
  • 6. Background and Disclaimers • No cloud definitions, but . . . • Focus on IaaS Tuesday, October 11, 2011
  • 7. Background and Disclaimers • No cloud definitions, but . . . • Focus on IaaS • Netflix uses Amazon Web Services Tuesday, October 11, 2011
  • 8. Background and Disclaimers • No cloud definitions, but . . . • Focus on IaaS • Netflix uses Amazon Web Services • Guidance should be generally applicable Tuesday, October 11, 2011
  • 9. Background and Disclaimers • No cloud definitions, but . . . • Focus on IaaS • Netflix uses Amazon Web Services • Guidance should be generally applicable • Works in progress, still many problems to solve . . . Tuesday, October 11, 2011
  • 10. Netflix in the Cloud Tuesday, October 11, 2011
  • 11. Why is Netflix Using Cloud? Tuesday, October 11, 2011
  • 13. !"#"$%&'#&($ Netflix could not build data centers fast enough Tuesday, October 11, 2011
  • 14. !"#"$%&'#&($ Netflix could not build data centers fast enough Capacity requirements accelerating, unpredictable Tuesday, October 11, 2011
  • 15. !"#"$%&'#&($ Netflix could not build data centers fast enough Capacity requirements accelerating, unpredictable Product launch spikes - iPhone, Wii, PS2, XBox Tuesday, October 11, 2011
  • 16. Outgrowing Data Center http://techblog.netflix.com/2011/02/redesigning-netflix-api.html Netflix API: Growth in Requests Tuesday, October 11, 2011
  • 17. Outgrowing Data Center http://techblog.netflix.com/2011/02/redesigning-netflix-api.html Netflix API: Growth in Requests 37x Growth 1/10 - 1/11 Tuesday, October 11, 2011
  • 18. Outgrowing Data Center http://techblog.netflix.com/2011/02/redesigning-netflix-api.html Netflix API: Growth in Requests 37x Growth 1/10 - 1/11 Tuesday, October 11, 2011
  • 19. Outgrowing Data Center http://techblog.netflix.com/2011/02/redesigning-netflix-api.html Netflix API: Growth in Requests 37x Growth 1/10 - 1/11 !"#"$%&#%'( )"*"$+#,( Tuesday, October 11, 2011
  • 20. netflix.com is now ~100% Cloud Tuesday, October 11, 2011
  • 21. netflix.com is now ~100% Cloud Remaining components being migrated Tuesday, October 11, 2011
  • 22. Netflix Model-Driven Architecture Tuesday, October 11, 2011
  • 23. Data Center Patterns Tuesday, October 11, 2011
  • 24. Data Center Patterns • Long-lived, non-elastic systems Tuesday, October 11, 2011
  • 25. Data Center Patterns • Long-lived, non-elastic systems • Push code and config to running systems Tuesday, October 11, 2011
  • 26. Data Center Patterns • Long-lived, non-elastic systems • Push code and config to running systems • Difficult to enforce deployment patterns Tuesday, October 11, 2011
  • 27. Data Center Patterns • Long-lived, non-elastic systems • Push code and config to running systems • Difficult to enforce deployment patterns • ‘Snowflake phenomenon’ Tuesday, October 11, 2011
  • 28. Data Center Patterns • Long-lived, non-elastic systems • Push code and config to running systems • Difficult to enforce deployment patterns • ‘Snowflake phenomenon’ • Difficult to sync or reproduce environments (e.g. test and prod) Tuesday, October 11, 2011
  • 30. Cloud Patterns • Ephemeral nodes Tuesday, October 11, 2011
  • 31. Cloud Patterns • Ephemeral nodes • Dynamic scaling Tuesday, October 11, 2011
  • 32. Cloud Patterns • Ephemeral nodes • Dynamic scaling • Hardware is abstracted Tuesday, October 11, 2011
  • 33. Cloud Patterns • Ephemeral nodes • Dynamic scaling • Hardware is abstracted • Orchestration vs. manual steps Tuesday, October 11, 2011
  • 34. Cloud Patterns • Ephemeral nodes • Dynamic scaling • Hardware is abstracted • Orchestration vs. manual steps • Trivial to clone environments Tuesday, October 11, 2011
  • 35. When Moving to the Cloud, Leave Old Ways Behind . . . Tuesday, October 11, 2011
  • 36. When Moving to the Cloud, Leave Old Ways Behind . . . Generic forklift is generally a mistake Tuesday, October 11, 2011
  • 37. When Moving to the Cloud, Leave Old Ways Behind . . . Generic forklift is generally a mistake Adapt development, deployment, and management models appropriately Tuesday, October 11, 2011
  • 38. When Moving to the Cloud, Leave Old Ways Behind . . . Generic forklift is generally a mistake Adapt development, deployment, and management models appropriately Tuesday, October 11, 2011
  • 39. Netflix Build and Deploy http://techblog.netflix.com/2011/08/building-with-legos.html Tuesday, October 11, 2011
  • 40. Netflix Build and Deploy http://techblog.netflix.com/2011/08/building-with-legos.html Perforce SCM Tuesday, October 11, 2011
  • 41. Netflix Build and Deploy http://techblog.netflix.com/2011/08/building-with-legos.html Continuous Integration Jenkins Perforce SCM Tuesday, October 11, 2011
  • 42. Netflix Build and Deploy http://techblog.netflix.com/2011/08/building-with-legos.html Continuous Integration Jenkins Perforce Artifactory SCM Binary Repository Tuesday, October 11, 2011
  • 43. Netflix Build and Deploy http://techblog.netflix.com/2011/08/building-with-legos.html App-Specific Continuous Packages and Integration Configuration Jenkins Yum Perforce Artifactory SCM Binary Repository Tuesday, October 11, 2011
  • 44. Netflix Build and Deploy http://techblog.netflix.com/2011/08/building-with-legos.html App-Specific Continuous Packages and Integration Configuration Jenkins Yum Perforce Artifactory Bakery SCM Binary Combine Base and Repository App-Specific Configuration Tuesday, October 11, 2011
  • 45. Netflix Build and Deploy http://techblog.netflix.com/2011/08/building-with-legos.html App-Specific Customized, Continuous Packages and Cloud-Ready Integration Configuration Image Jenkins Yum AMI Perforce Artifactory Bakery SCM Binary Combine Base and Repository App-Specific Configuration Tuesday, October 11, 2011
  • 46. Netflix Build and Deploy http://techblog.netflix.com/2011/08/building-with-legos.html App-Specific Customized, Continuous Packages and Cloud-Ready Integration Configuration Image Jenkins Yum AMI Perforce Artifactory Bakery ASG SCM Binary Combine Base and Dynamic Repository App-Specific Scaling Configuration Tuesday, October 11, 2011
  • 47. Netflix Build and Deploy http://techblog.netflix.com/2011/08/building-with-legos.html App-Specific Customized, Continuous Packages and Cloud-Ready Integration Image Live System! Configuration Jenkins Yum AMI Instance Perforce Artifactory Bakery ASG SCM Binary Combine Base and Dynamic Repository App-Specific Scaling Configuration Tuesday, October 11, 2011
  • 48. Netflix Build and Deploy http://techblog.netflix.com/2011/08/building-with-legos.html App-Specific Customized, Continuous Packages and Cloud-Ready Integration Image Live System! Configuration Jenkins Yum AMI Instance Perforce Artifactory Bakery ASG SCM Binary Combine Base and Dynamic Repository App-Specific Scaling Configuration Every change is a new push Tuesday, October 11, 2011
  • 50. Results • No changes to running systems Tuesday, October 11, 2011
  • 51. Results • No changes to running systems • No CMDB Tuesday, October 11, 2011
  • 52. Results • No changes to running systems • No CMDB • No systems management infrastructure Tuesday, October 11, 2011
  • 53. Results • No changes to running systems • No CMDB • No systems management infrastructure • Fewer logins to prod systems Tuesday, October 11, 2011
  • 54. Impact on Security Tuesday, October 11, 2011
  • 55. Impact on Security • File integrity monitoring Tuesday, October 11, 2011
  • 56. Impact on Security • File integrity monitoring • User activity monitoring Tuesday, October 11, 2011
  • 57. Impact on Security • File integrity monitoring • User activity monitoring • Vulnerability management Tuesday, October 11, 2011
  • 58. Impact on Security • File integrity monitoring • User activity monitoring • Vulnerability management • Patch management Tuesday, October 11, 2011
  • 59. APIs, Automation, and the Security Monkey Tuesday, October 11, 2011
  • 60. Common Challenges for Security Engineers Tuesday, October 11, 2011
  • 61. Common Challenges for Security Engineers • Lots of data from different sources, in different formats Tuesday, October 11, 2011
  • 62. Common Challenges for Security Engineers • Lots of data from different sources, in different formats • Too many administrative interfaces and disconnected systems Tuesday, October 11, 2011
  • 63. Common Challenges for Security Engineers • Lots of data from different sources, in different formats • Too many administrative interfaces and disconnected systems • Too few options for scalable automation Tuesday, October 11, 2011
  • 64. Enter the Cloud . . . Tuesday, October 11, 2011
  • 65. How do you . . . Tuesday, October 11, 2011
  • 66. How do you . . . • Add a user account? Tuesday, October 11, 2011
  • 67. How do you . . . • Add a user account? • Inventory systems? Tuesday, October 11, 2011
  • 68. How do you . . . • Add a user account? • Inventory systems? • Change a firewall config? Tuesday, October 11, 2011
  • 69. How do you . . . • Add a user account? • Inventory systems? • Change a firewall config? • Snapshot a drive for forensic analysis? Tuesday, October 11, 2011
  • 70. How do you . . . • Add a user account? • Inventory systems? • Change a firewall config? • Snapshot a drive for forensic analysis? • Disable a multi-factor authentication token? Tuesday, October 11, 2011
  • 71. How do you . . . • Add a user account? • CreateUser() • Inventory systems? • Change a firewall config? • Snapshot a drive for forensic analysis? • Disable a multi-factor authentication token? Tuesday, October 11, 2011
  • 72. How do you . . . • Add a user account? • CreateUser() • Inventory systems? • DescribeInstances() • Change a firewall config? • Snapshot a drive for forensic analysis? • Disable a multi-factor authentication token? Tuesday, October 11, 2011
  • 73. How do you . . . • Add a user account? • CreateUser() • Inventory systems? • DescribeInstances() • Change a firewall config? • AuthorizeSecurityGroup Ingress() • Snapshot a drive for forensic analysis? • Disable a multi-factor authentication token? Tuesday, October 11, 2011
  • 74. How do you . . . • Add a user account? • CreateUser() • Inventory systems? • DescribeInstances() • Change a firewall config? • AuthorizeSecurityGroup Ingress() • Snapshot a drive for forensic analysis? • CreateSnapshot() • Disable a multi-factor authentication token? Tuesday, October 11, 2011
  • 75. How do you . . . • Add a user account? • CreateUser() • Inventory systems? • DescribeInstances() • Change a firewall config? • AuthorizeSecurityGroup Ingress() • Snapshot a drive for forensic analysis? • CreateSnapshot() • Disable a multi-factor • DeactivateMFADevice() authentication token? Tuesday, October 11, 2011
  • 76. Security Monkey http://techblog.netflix.com/2011/07/netflix-simian-army.html Tuesday, October 11, 2011
  • 77. Security Monkey http://techblog.netflix.com/2011/07/netflix-simian-army.html • Leverages cloud APIs Tuesday, October 11, 2011
  • 78. Security Monkey http://techblog.netflix.com/2011/07/netflix-simian-army.html • Leverages cloud APIs • Centralized framework for cloud security monitoring and analysis Tuesday, October 11, 2011
  • 79. Security Monkey http://techblog.netflix.com/2011/07/netflix-simian-army.html • Leverages cloud APIs • Centralized framework for cloud security monitoring and analysis • Certificate and cipher monitoring Tuesday, October 11, 2011
  • 80. Security Monkey http://techblog.netflix.com/2011/07/netflix-simian-army.html • Leverages cloud APIs • Centralized framework for cloud security monitoring and analysis • Certificate and cipher monitoring • Firewall configuration checks Tuesday, October 11, 2011
  • 81. Security Monkey http://techblog.netflix.com/2011/07/netflix-simian-army.html • Leverages cloud APIs • Centralized framework for cloud security monitoring and analysis • Certificate and cipher monitoring • Firewall configuration checks • User/group/policy monitoring Tuesday, October 11, 2011
  • 82. Cloud Firewall and Connectivity Analysis Tuesday, October 11, 2011
  • 83. Analyzing Traditional Firewalls Tuesday, October 11, 2011
  • 84. Analyzing Traditional Firewalls • Positioned at network chokepoints, providing optimal internetwork visibility Tuesday, October 11, 2011
  • 85. Analyzing Traditional Firewalls • Positioned at network chokepoints, providing optimal internetwork visibility • Use tools like tcpdump, NetFlow, centralized logging to gather data Tuesday, October 11, 2011
  • 86. Analyzing Traditional Firewalls • Positioned at network chokepoints, providing optimal internetwork visibility • Use tools like tcpdump, NetFlow, centralized logging to gather data • Review traffic patterns and optimize Tuesday, October 11, 2011
  • 88. AWS Firewalls (Briefly) • “Security Group” is unit of measure for firewalling Tuesday, October 11, 2011
  • 89. AWS Firewalls (Briefly) • “Security Group” is unit of measure for firewalling • Policy-driven and network-agnostic, configuration follows an instance Tuesday, October 11, 2011
  • 90. AWS Firewalls (Briefly) • “Security Group” is unit of measure for firewalling • Policy-driven and network-agnostic, configuration follows an instance • Network diagram irrelevant Tuesday, October 11, 2011
  • 91. AWS Firewalls (Briefly) • “Security Group” is unit of measure for firewalling • Policy-driven and network-agnostic, configuration follows an instance • Network diagram irrelevant • Chokepoints and sniffing are not possible Tuesday, October 11, 2011
  • 92. AWS Firewalls (Briefly) • “Security Group” is unit of measure for firewalling • Policy-driven and network-agnostic, configuration follows an instance • Network diagram irrelevant • Chokepoints and sniffing are not possible • Outbound connections not filterable (!) Tuesday, October 11, 2011
  • 94. Security Group Analysis • Use config and inventory to map reachability Tuesday, October 11, 2011
  • 95. Security Group Analysis • Use config and inventory to map reachability • Leverage APIs to evaluate reachability and detect violations: Tuesday, October 11, 2011
  • 96. Security Group Analysis • Use config and inventory to map reachability • Leverage APIs to evaluate reachability and detect violations: • Security groups with no members Tuesday, October 11, 2011
  • 97. Security Group Analysis • Use config and inventory to map reachability • Leverage APIs to evaluate reachability and detect violations: • Security groups with no members • “Insecure” services (e.g. Telnet, FTP) Tuesday, October 11, 2011
  • 98. Security Group Analysis • Use config and inventory to map reachability • Leverage APIs to evaluate reachability and detect violations: • Security groups with no members • “Insecure” services (e.g. Telnet, FTP) • Rules that use “any” keyword Tuesday, October 11, 2011
  • 99. Security Group Analysis • Use config and inventory to map reachability • Leverage APIs to evaluate reachability and detect violations: • Security groups with no members • “Insecure” services (e.g. Telnet, FTP) • Rules that use “any” keyword • Visualize config into data flow diagram Tuesday, October 11, 2011
  • 100. Reachability & Violation Analysis Tuesday, October 11, 2011
  • 102. Connectivity Analysis • Reachability shows what “can” communicate Tuesday, October 11, 2011
  • 103. Connectivity Analysis • Reachability shows what “can” communicate • What about what is communicating? Tuesday, October 11, 2011
  • 104. Connectivity Analysis • Reachability shows what “can” communicate • What about what is communicating? • Take same approach, leverage APIs for firewall and inventory and combine with host data Tuesday, October 11, 2011
  • 105. Connectivity Analysis • Reachability shows what “can” communicate • What about what is communicating? • Take same approach, leverage APIs for firewall and inventory and combine with host data • Visualize data into connectivity diagram Tuesday, October 11, 2011
  • 107. ‘Practical’ Cloud Security Gaps Tuesday, October 11, 2011
  • 108. Common Security Product Model Tuesday, October 11, 2011
  • 109. Common Security Product Model • Examples - AV, FIM, etc. Tuesday, October 11, 2011
  • 110. Common Security Product Model • Examples - AV, FIM, etc. • “Management” station with client “nodes” Tuesday, October 11, 2011
  • 111. Common Security Product Model • Examples - AV, FIM, etc. • “Management” station with client “nodes” • Limited tagging or abstraction Tuesday, October 11, 2011
  • 112. Common Security Product Model • Examples - AV, FIM, etc. • “Management” station with client “nodes” • Limited tagging or abstraction • Strong “manager” and “managed” model Tuesday, October 11, 2011
  • 113. Common Security Product Model • Examples - AV, FIM, etc. • “Management” station with client “nodes” • Limited tagging or abstraction • Strong “manager” and “managed” model • Push and pull approaches Tuesday, October 11, 2011
  • 114. Common Security Product Model • Examples - AV, FIM, etc. • “Management” station with client “nodes” • Limited tagging or abstraction • Strong “manager” and “managed” model • Push and pull approaches • Per node licensing Tuesday, October 11, 2011
  • 116. “Thundering Herd” • Mass deployments Tuesday, October 11, 2011
  • 117. “Thundering Herd” • Mass deployments • “Red/Black” push - concurrent clusters of 500+ nodes Tuesday, October 11, 2011
  • 118. “Thundering Herd” • Mass deployments • “Red/Black” push - concurrent clusters of 500+ nodes • Elasticity related to traffic spikes Tuesday, October 11, 2011
  • 119. “Thundering Herd” • Mass deployments • “Red/Black” push - concurrent clusters of 500+ nodes • Elasticity related to traffic spikes • Licensing constraints Tuesday, October 11, 2011
  • 120. Node Ephemerality and Service Abstraction Tuesday, October 11, 2011
  • 121. Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important Tuesday, October 11, 2011
  • 122. Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP and ID reuse Tuesday, October 11, 2011
  • 123. Node Ephemerality and Service Abstraction • Data related to individual nodes becomes less important • Dealing with short-lived systems, IP and ID reuse • Event and log archives and data relationships Tuesday, October 11, 2011
  • 124. Resource Usage Logging and Auditing Tuesday, October 11, 2011
  • 125. Resource Usage Logging and Auditing • Public-facing APIs make access controls more difficult and more important Tuesday, October 11, 2011
  • 126. Resource Usage Logging and Auditing • Public-facing APIs make access controls more difficult and more important • Programmable infrastructure needs robust logging and auditing capabilities Tuesday, October 11, 2011
  • 127. Resource Usage Logging and Auditing • Public-facing APIs make access controls more difficult and more important • Programmable infrastructure needs robust logging and auditing capabilities • Can metering data be repurposed? Tuesday, October 11, 2011
  • 129. Identity Integration • Federation use cases Tuesday, October 11, 2011
  • 130. Identity Integration • Federation use cases • On-instance credentials Tuesday, October 11, 2011
  • 132. “Trusted Cloud” • Various components related to providing higher assurance/trust levels in the cloud Tuesday, October 11, 2011
  • 133. “Trusted Cloud” • Various components related to providing higher assurance/trust levels in the cloud • Virtual TPM / hardware root of trust Tuesday, October 11, 2011
  • 134. “Trusted Cloud” • Various components related to providing higher assurance/trust levels in the cloud • Virtual TPM / hardware root of trust • Controlled execution Tuesday, October 11, 2011
  • 135. “Trusted Cloud” • Various components related to providing higher assurance/trust levels in the cloud • Virtual TPM / hardware root of trust • Controlled execution • HSM in the cloud Tuesday, October 11, 2011
  • 136. Thanks! Questions? chan@netflix.com (I’m hiring!) Tuesday, October 11, 2011
  • 137. References • http://www.slideshare.net/adrianco • http://aws.amazon.com • http://techblog.netflix.com • http://nordsecmob.tkk.fi/Thesisworks/Soren %20Bleikertz.pdf • https://cloudsecurityalliance.org/ • http://www.nist.gov/itl/cloud/index.cfm Tuesday, October 11, 2011