People First, Performance Now Ministry of Science, Technology and Innovation
T ruth and Consequences:
Clouds and Virtualization
Peter Rajnak, Guardtime
14 November 2013
ruth and Consequences: Information T Clouds and Virtualization - - PowerPoint PPT Presentation
People First, Ministry of Science, Performance Now Technology and Innovation ruth and Consequences: Information T Clouds and Virtualization Assurance Peter Rajnak, Guardtime 14 November 2013 Data trust and Audit Status Quo For 40
People First, Performance Now Ministry of Science, Technology and Innovation
Clouds and Virtualization
Peter Rajnak, Guardtime
14 November 2013
For 40 years we have relied on dedicated hardware and procedure based around access control. This is called the “perimeter model”. This no longer works in the dynamic world of cloud computing.
Background | Cloud Blurs the Existing Security Paradigm
10101010101 01010101010 10101010101 01010101010 10101010101 01010101010
1. Perimeter control 2. Trusted insiders 3. Data in vaults
10101010101 01010101010 10101010101 01010101010 10101010101 01010101010 10101010101 01010101010 10101010101 01010101010 10101010101 01010101010
1. Perimeter control ??? 2. Trusted insiders ??? 3. Data in vaults ???
Background | Data Integrity is Crucial for the Digital World
European Commission approved a measure to begin devotjng tjme, energy and funds toward establishing a lightly regulated cloud computjng market that is capable of servicing the 27 natjons in the E.U.
Cloud Computjng Challenges:
Data Security Residency and regulatjons Data Audit Potentjal loss of control with reliance on remote or foreign cloud computjng services Transparency - lack of informatjon about the infrastructure and services they are using might place them at risk for unknown variables and atuacks.
The commission's recommendatjons for proper cloud use and
Providers must meet certain standards and obligatjons to be eligible for E.U. business (E.U. data privacy regime) Locatjon lists detailing where data will be processed in any event Data is only accessible by authorized partjes (no exceptjons) Contracts can be immediately terminated if any unapproved changes are made Cloud providers are held accountable for cross-border data transfers Data auditjng rights are withheld by the E.U. countries / customers All sub-contractors (subsequent service providers) must be identjfjed and also be able to adhere to privacy standards
Home of Skype and NATO Cybersecurity HQ Cybersecurity and disaster recovery a national priority Centre of the European Union IT Agency
Source: Eurostat
government institutions have broadband connection
broadband connection (Statistics Estonia 2011)
made electronically
submitted via the e-Tax Board
Finland Sweden UK ESTONIA EU 27 Czech Republic Lithuania Hungary Latvia Poland 0% 20% 40% 60% 80% 100% 120% 96% 94% 92% 90% 87% 87% 87% 84% 82% 73% Enterprises with fixed broadband access 2011 Sweden Finland UK EU 27 ESTONIA Czech Republic Poland Hungary Latvia Lithuania 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 86% 81% 81% 67% 66% 63% 61% 61% 59% 57% Households with fixed broadband access, 2011
Ofger highest level of business continuity and
disaster recovery (BC/DR) by building two geographically remote, but architecturally similar centers in …… and Estonia
to allow for prioritized DR in an extreme case of local data loss
natural disaster threats Data center availability guaranteed by
continuous data replication between the separate data center locations
resilience for both power supply and water cooling systems, ensuring Tier IV availability
Employ some of the most advanced
technologies and standards to build a state-of-the-art cloud service provider, including:
sea level to protect from tsunamis, at least 60 meters underground to protect from EMP/IEMI
Facebook’s data center design
rest
platform
bandwidth and performance requirements
10101010101 01010101010 10101010101 01010101010 10101010101 01010101010
= +
Keyless Signature
10101010101 01010101010 10101010101 01010101010 10101010101 01010101010
Signed Electronic Data Electronic Data
Proves the time, integrity and authenticity of electronic data using formal mathematical methods without relying on keys or trusted humans
No keys, or key management
Verification of the KSI-based electronic evidence does not require cryptographic keys or key management – verification can be performed independently of any trusted third party or human being, using only formal mathematical methods.
Long-term integrity proof
All KSI-signed data can be archived in the cloud without a loss of legal strength or regulatory compliance for an unlimited time period on commodity storage hardware, making paper- or hardware based special archiving solutions obsolete and substantially reducing overall archiving costs.
Portability of the evidence
KSI-based data authentication is not tied to specific hardware or process - wherever the data goes, the proof goes along with it, simplifying and speeding up data processing and e-discovery processes
Massive scale
KSI-based real-time electronic data authentication solution for Cloud scales to trillions of events per second, supporting any size of the system today or in the future.
KSI Background | Unique Properties of KSI Signatures
KSI for Cloud | Complete Mutual Auditability in the Cloud
STORE STORE VM VM
Executable Integrity Event Integrity Storage Integrity
LOG LOG
KSI for Cloud | Core Value Across Public, Private & Hybrid Clouds
Executable Integrity Event Integrity Storage Integrity
“Am I deploying the authorized code?” “What has happened to my resources?” “Is my stored data OK?”
KSI provides a real-time authentication mechanism against external hacking and insider tampering of the Virtual Machine images prior to deployment in the Cloud. KSI establishes accountability for events in the Cloud, enabling parties to prove that the logs have not been compromised by external hacking or insider tampering. KSI enables independent authentication of every object in the Object Store, realizing regulatory compliance for data integrity, in commodity hardware, in the Cloud
KSI for Cloud | Executable Integrity
Virtual Machine Image CLOUD INFRASTRUCTURE Virtual Machine Image Repository Deployed Virtual Machine
10101010101 01010101010 10101010101 01010101010 10101010101 01010101010 10101010101 01010101010 10101010101 01010101010 10101010101 01010101010
KSI signature verification
VALUE KSI provides a mechanism against external hacking and insider tampering of the executable code inside the machine.
Real-time Data Signing
KSI for Cloud | Indemnification for Service Providers
Answers Questions:
Data
10101010101 01010101010 10101010101 01010101010 10101010101 01010101010
VALUE KSI provides necessary proof to indemnify the Service Provider in a breach related incident in the Cloud.
KSI signature verification
KSI for Cloud | Use Case for Executable Integrity
Customer Application Value Joyent Public Cloud Assured Virtual Machine Image Integrity. KSI is integrated right into Joyent’s Cloud platform, assuring the customers that the implemented security measures for the virtual environment have worked, that the operating policies are being enforced, that only approved and validated virtual machines are running in the environment. Business Continuity. Enables companies to safely host applications and data in the cloud, being assured that the executable environment is intact and has not been compromised by malicious or accidental tampering, neither by external nor internal parties. Reduced Risk of Liability. By having only tested, approved and signed Virtual Machines running within the virtual environment, the source and method behind any error, compromise, and loss cannot be questioned, instantly indemnifying the no-fault party. Safe Migration of Virtual Machines. KSI technology enables customers to validate the state of running Virtual Machine and provide a tamper-evident audit trail when suspending it and sending into another data center.
KSI for Cloud | Event Integrity
VALUE KSI establishes accountability for Cloud events, enabling a specific Cloud event to be presented as evidence along with a proof of the entire log file integrity, while keeping all other events in confidence.
KSI for Cloud | Use Case for Event Integrity
Customer Application Value SEB Bank Electronic Banking Log Archive. 98% of all customer banking transactions at SEB Bank are carried out electronically, tens of gigabytes of transaction logs are generated daily and archived for periods exceeding 10 years. SEB implemented KSI in their internal Cloud infrastructure to be able to prove long-term authenticity of these logs as well as to have legally strong evidence of the time and nature of each transaction. Indemnification and Non-repudiation. By signing its transaction logs using KSI technology, SEB is able to defend any claims as to time and integrity of its electronic logs, substantially mitigating potential downstream legal costs. Regulatory Compliance. KSI-enhanced electronic banking transaction log archive fully complies with data integrity related clauses of financial services regulations such as MiFID and Basel III. Increased Internal Control. Signing internal logs with KSI technology provides SEB with a strong level of internal control by reducing the threat of employees tampering with sensitive logs.
KSI for Cloud | Storage Integrity
KSI Enabled Object Store KSI Enabled Object Store Pre- processing Pre- processing Object Store Object Store KSI Signature Store KSI Signature Store
<hash, signature + metadata>
REST API file + metadata Client Client file + metadata
VALUE KSI enables independent authentication of every object in the Object Store, realizing regulatory compliance for data integrity, in commodity hardware, in the Cloud
KSI for Cloud | Use Case for Storage Integrity
Customer Application Value Parity Energy Inc. Call Recordings Archive. As a trader of energy derivatives in Wall Street, Parity Energy is required by various regulations - Todd Frank, most recently – to be able to present their communications records to the regulator and prove the integrity of their archive when requested. Instead of purchasing a dedicated data vault for their archived data, Parity Energy implemented KSI at the Object Store in the Cloud, so that every stored call recording along with its CDR record is signed and provable. Regulatory Compliance. KSI-enhanced data archive is compliant with regulatory requirements. Indemnification and non-repudiation. Parity Energy has evidence of events for non- repudiation and indemnification purposes; and can hold themselves harmless against accusations of CDR and call recordings archive tampering by presenting KSI based independent proof of record integrity. Ten-fold decrease in TCO. Being able to implement regulatory compliance and protection against legal trolling using the commodity Cloud-based storage, means that Parity Energy is saving a minimum of 10 times in purchase and maintenance costs
KSI for Cloud | Active IntegrityTM
VALUE An early warning system into the integrity breaches of VM images, Stored data and Cloud logs by constant re-verification of existing signatures, making it possible to discover and remedy any vulnerabilities before large-scale damages can occur and ensuring business continuance.
10101010101 01010101010 10101010101 01010101010 10101010101 01010101010
Guardtimed data Alert, if verification fails Signature verification
KSI for Cloud | Use Case for Active IntegrityTM
Customer Application Value Government of the Republic of Estonia Estonian Succession Registry is an official electronic database in the private Cloud infrastructure, containing over 14 million inheritance related documents and records with an unlimited retention period. All the data stored is signed using KSI technology and then re-verified every 5 minutes. Alert is issued to the Registry supervisors when any inconsistencies in the stored data are found. Provable Record Integrity means that the State to hold themselves harmless against accusations of database tampering or deletion by presenting KSI based independent proof of record integrity. Citizen Empowerment. Each person has an ability to verify the integrity of their records at State databases at will, independently of the State or any other third party. Increased Management Quality as Registry supervisors can be assured that they are notified of any data breaches due to external hacking or insider fraud immediately and can take measures to correct without relying on trusted systems administrators or other IT personnel.
KSI for Cloud | Hybrid Clouds for Mobile Carriers & Enterprise Customers
ACTIVE INTEGRITYTM
KSI is the instrumentation that feeds early warning systems, notifying data integrity breaches by constant re-verification of existing file and log system signatures. KSI makes it possible to discover and remedy incidents in real-time to continue operations, before large-scale damage can occur.
CLOUD DATA PROOF & PRIVACY
Implementing KSI enables customers and third parties to forensically trace whether the data has been compromised without trusting the service provider or an administrator.
ACCOUNTABILITY & INDEMNIFICATION
A mathematically provable audit trail for Cloud operations. Accountability for any incident becomes undeniable and is coupled with automatic indemnification for the parties not responsible for the incident .
Summary | Data Integrity, Transparency, Accountability
regulations such as Basel II / III (global), MiFID (EU), Todd Frank (US), et al.
Peter Rajnak
GM Guardtime Pte Ltd Web: www.guardtime.com Emailpeter.rajnak@guardtime.com Web: www.openksi.org Email: info@openksi.org