Lessons From the Infrastructure and Operations Playbook
Transcription
Lessons From the Infrastructure and Operations Playbook
WHAT SECURITY PROS CAN LEARN FROM SHADOW IT: LESSONS FROM THE INFRASTRUCTURE AND OPERATIONS PLAYBOOK Bo Skeel, Chief Evangelist [email protected] TOP IT INITIATIVES 2014 SECURITY & CLOUD ARE IN THE TOPS VIRTUALIZATION, CLOUD AND MOBILITY CLOUD & MOBILITY TWO MAJOR IT TRENDS End User Data access from any device Remote working Easy user experience Drivers DevOps Flexibility Instant provisioning Improved productivity CLOUD IS ATTRACTIVE • Designed for consumer or customers; continuous delivery • • • • App’s built/updated very rapidly Focused on functionality for users Wide variety, cross-platform Zero capital investment; scale to demand instantly • DevOps have the same goals • • Rapid try/fail try/grow cycle Scale with demand, no capital lag, approval process, etc. There is a high risk of corporate data being outside of corporate controls CLOUD AND SHADOW IT • Public cloud (IaaS/PaaS) is driving on ongoing explosion of services (SaaS) • Both DevOps (datacenter users) and end-users are embracing shadow IT • Traditional IT – including security - is being left behind Cloud Backup Evern ote DropB ox End-users Web mail Traditional IT = CONTROL IaaS Datacenter users PaaS Storage IT AS A SERVICE End Users • Embrace BYOD • Gain control of mobile devices • Provide services for end-users (large file transfer, edit-fromanywhere, etc.) IT epiphany Goals BYOD End-users Servic es DropB ox Web mail Traditional IT = CONTROL Datacenter users PaaS ITaaS Storage Poli cy WHAT NEEDS TO HAPPEN • Treat public cloud as an extension of the datacenter • Understand the needs of end-users • Treat DevOps as a customer • DON’T IGNORE INTERNAL CUSTOMER NEEDS SECURITY BEST PRACTICES • Asset tracking/lifecycle management • Common view of endpoint security • Elastic management • Define BYOD policy IMPROVING SECURITY THREAT OVERVIEW From 32.000 new unique malware every day to 390.000 in 6 years! Source: AV-Test in Germany. THREAT CONSEQUENCE 2015: 1GB disk space 150MB RAM @ idle 2009: 200MB disk space 40MB RAM @ idle AV SIGNATURE UPDATE FREQUENCY Every 24 hours Every 8 hours Every 8 hours Hourly Even with hourly updates present 16,250 possible infections per hour, when AV-Test is registering 390,000 new threats per day.. MALWARE IS NOW SERIOUS BIG BUSINESS Previously malware was used to prove capability, or to earn petty cash by stealing computer resources for manipulating banner advertising, SEO, renting botnets, etc. That’s still going on, but.. Now we have threats like Identity Theft, Credit Card Fraud, Ransomware, Advanced Persistent Threats and Industrial Espionage - and EVERYONE are at risk, by simply connecting to the Internet! “There are two kinds of big companies in the United States. There are those who've been hacked by the Chinese and those who don't know they've been hacked by the Chinese.” 60 minutes, October 5th 2014 SYMANTEC: AV IS DEAD CONCLUSION A: Signature based protection is dead! - There are simply too many new unique daily threats (390,000 according to AV-test) B: Infections are becoming a lot more dangerous - An infection is no longer a question of disruptive business, it poses serious financial threats. C: Local resource consumption is not unlimited - There is a limit to how much intelligent analysis you can run locally, detecting threats in business environments WE REALIZED THIS 4 YEARS AGO, SO THREAT MANAGEMENT SYSTEM The biggest, most advanced and fastest cloud-based security installation in the world. THREAT MANAGEMENT SYSTEM Project development started in 2010, fully implemented in 2014 Cloud requirement: Maximum response time of 20ms NIMBUS Infrastructure statistics 6 linked datacenters (5 running in AWS) + 1,200 virtual servers + 7 billion requests per day + 900k active connections at any given time + 80 TB of traffic per month + 100 different web services: Url checking, cleanset similarities, outbreak detection, antifraud, antispam, antiphishing, antitheft, real-time virus reporting, statistics, honeypots, etc. Multiple security technologies provide superior capabilities, speed and scaling Nimbus Security handles more than 7 billion requests daily Business GravityZone cloud-based multi-tenant manager Consumers Online or Shrink-wrapped GOAL: Higher protection level with a lower resource impact - Lighter and more aggressive local engines Faster reaction time: SPAM waves now detected in 10 seconds New range of products Unify Bitdefender technologies Consequence: Ranked #1 in detection since 2012, especially on zero-day-attacks Ranked #1 in performance, since 2013 NIMBUS “NOT ONLY A RANGE OF LOOKUP TOOLS, BUT A REFLECTIVE INTELLIGENT SYSTEM, CAPABLE OF MAKING ANALYTIC SECURITY DECISIONS BASED ON ADVANCED TECHNOLOGY, SUCH AS APPLICATION REPUTATION, EVENT COLORATION, MACHINE LEARNING AND MEMORY INTROSPECTION.” MERGING THE TECHNOLOGY INTO CUSTOMER BENEFITS NEW DELIVERY CONCEPT AV LEGACY MODEL Distribution AV Management New signature Local AV Installation - Local signature DB - Local scanning engines with signature dependency LEARN NIMBUS MODEL LEARN LEARN Local Bitdefender Installation - Local scanning engines without signature dependency - Local intelligence through B-Have and AVC (300+ heuristics) - NIMBUS queries and response - Local signature DB for offline usage NIMBUS MODEL “AS-A-SERVICE” Local Bitdefender Installation - Local scanning engines without signature dependency - Local intelligence through B-Have and AVC (300+ heuristics) - NIMBUS queries and response - Local signature DB for offline usage Security Virtual Appliance NIMBUS MODEL “AS-A-SERVICE” Local Bitdefender Installation - Security broker - User interface Security Virtual Appliance Major benefits - Very high protection at almost zero local resource impact - No AV maintenance needed on endpoint - Protection is now provided “as-a-service” from the network NIMBUS MODEL “AS-A-SERVICE” Security Virtual Appliance (SVA) • • • • • • Import into any hypervisor (VMware, Citrix, Microsoft, others) Loaded with all Bitdefender protective technologies Extremely fast on a firmware built Linux core Deploy multiple (unlimited): • Eliminates single-point-of-failure • Enables load-balance of protective services • Share knowledge on local endpoints through • Multi-level caching • Machine learning Will protect all major operating systems Will protect all computers on the network – physical or virtual NIMBUS MODEL “AS-A-SERVICE” NIMBUS MODEL “AS-A-SERVICE” Bitdefender Security Tools: A. Install on all physical computers B. Install on all virtual computers Now everything is protected is protected by the SVA instances…. and NIMBUS Result: a) Extremely high protection b) Unnoticeable local resource cost c) AV maintenance reduced to SVA instances d) High Availability and Load-Balancing included BITDEFENDER SECURITY TOOLS Minimum configuration for network service only Windows, Linux and Mac version Static installation – requires no updating 70~100 MB disk space inside each VM/Workstation/Server Three main components: Gateway (broker), allowing centralized engine to access the system Maximum 15MB memory footprint No CPU load Local tools (uncompressing, file move, file deletion, encryption, neutralizer, etc. Optional UI, including pop-up notification, policy controlled BITDEFENDER SECURITY TOOLS Additional options for physical, external and offline support 2-way firewall with Intrusion Detection System Local Active Virus Control components Device Control (Hardware Control) Content/Web Control Application Control Data Loss Protection All adjustable through security policies. When deployed with all scanning technologies, the actual protection can be provided either Central Scan Hybrid Scan Local Scan AV MANAGEMENT MADE EASY GRAVITYZONE VIRTUAL APPLIANCE BASED Server Roles LAN GravityZone Virtual Appliance D Database (MongoDB) C Communication Server U Update Server M Management Console VIRTUAL APPLIANCE BASED Server Roles LAN D M U C GravityZone Virtual Appliance D Database (MongoDB) C Communication Server U Update Server M Management Console VIRTUAL APPLIANCE BASED Server Roles AWS LAN D M GravityZone Virtual Appliance DMZ U C GravityZone Virtual Appliance D Database (MongoDB) C Communication Server U Update Server M Management Console Internet (SSL) Remote Devices BITDEFENDER PROPOSAL AND SUMMATION Near real-time protection against new threats using NIMBUS, B-Have and AVC Option for “Security-as-a-Service”, using virtual appliances • • • • • No AV maintenance needed on endpoints Remove single point of failure Provide Load-Balanced AV protection Minimal local resource consumption Support for all major operating systems – physical and virtual Fast, scalable and flexible management with GravityZone, extending even to cloud providers such as Amazon, etc. UNFOLLOW THE TRADITIONAL