ruth and Consequences: Information T Clouds and Virtualization - - PowerPoint PPT Presentation

ruth and consequences information
SMART_READER_LITE
LIVE PREVIEW

ruth and Consequences: Information T Clouds and Virtualization - - PowerPoint PPT Presentation

People First, Ministry of Science, Performance Now Technology and Innovation ruth and Consequences: Information T Clouds and Virtualization Assurance Peter Rajnak, Guardtime 14 November 2013 Data trust and Audit Status Quo For 40


slide-1
SLIDE 1

People First, Performance Now Ministry of Science, Technology and Innovation

T ruth and Consequences:

Clouds and Virtualization

Peter Rajnak, Guardtime

14 November 2013

Information Assurance

slide-2
SLIDE 2

For 40 years we have relied on dedicated hardware and procedure based around access control. This is called the “perimeter model”. This no longer works in the dynamic world of cloud computing.

Data trust and Audit – Status Quo

slide-3
SLIDE 3

Background | Cloud Blurs the Existing Security Paradigm

10101010101 01010101010 10101010101 01010101010 10101010101 01010101010

1. Perimeter control 2. Trusted insiders 3. Data in vaults

10101010101 01010101010 10101010101 01010101010 10101010101 01010101010 10101010101 01010101010 10101010101 01010101010 10101010101 01010101010

1. Perimeter control ??? 2. Trusted insiders ??? 3. Data in vaults ???

slide-4
SLIDE 4

Background | Data Integrity is Crucial for the Digital World

slide-5
SLIDE 5

Cloud Status in EC and EU Countries

European Commission approved a measure to begin devotjng tjme, energy and funds toward establishing a lightly regulated cloud computjng market that is capable of servicing the 27 natjons in the E.U.

Cloud Computjng Challenges:

Data Security Residency and regulatjons Data Audit Potentjal loss of control with reliance on remote or foreign cloud computjng services Transparency - lack of informatjon about the infrastructure and services they are using might place them at risk for unknown variables and atuacks.

slide-6
SLIDE 6

Recommendatjons

The commission's recommendatjons for proper cloud use and

  • peratjon:

Providers must meet certain standards and obligatjons to be eligible for E.U. business (E.U. data privacy regime) Locatjon lists detailing where data will be processed in any event Data is only accessible by authorized partjes (no exceptjons) Contracts can be immediately terminated if any unapproved changes are made Cloud providers are held accountable for cross-border data transfers Data auditjng rights are withheld by the E.U. countries / customers All sub-contractors (subsequent service providers) must be identjfjed and also be able to adhere to privacy standards

slide-7
SLIDE 7

Home of Skype and NATO Cybersecurity HQ Cybersecurity and disaster recovery a national priority Centre of the European Union IT Agency

A Bit About Estonia

slide-8
SLIDE 8

e-Estonia

Early Adopters

Source: Eurostat

  • 100% of schools and

government institutions have broadband connection

  • 68% of households have

broadband connection (Statistics Estonia 2011)

  • 98% of bank transfers are

made electronically

  • 92% of income tax returns are

submitted via the e-Tax Board

  • 1,163,917 active ID cards
  • Digital signature legislation

Finland Sweden UK ESTONIA EU 27 Czech Republic Lithuania Hungary Latvia Poland 0% 20% 40% 60% 80% 100% 120% 96% 94% 92% 90% 87% 87% 87% 84% 82% 73% Enterprises with fixed broadband access 2011 Sweden Finland UK EU 27 ESTONIA Czech Republic Poland Hungary Latvia Lithuania 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 86% 81% 81% 67% 66% 63% 61% 61% 59% 57% Households with fixed broadband access, 2011

slide-9
SLIDE 9

Unique High Availability and Data Recovery Services

 Ofger highest level of business continuity and

disaster recovery (BC/DR) by building two geographically remote, but architecturally similar centers in …… and Estonia

  • Leverage Electro Magnetic Pulse shielding technologies to
  • ffer first in kind EMP/IEMI secure cloud services
  • Employ geo-synchronization between the two remote locations

to allow for prioritized DR in an extreme case of local data loss

  • Benefit from stable geological areas – Estonia has no real

natural disaster threats  Data center availability guaranteed by

continuous data replication between the separate data center locations

  • Focus on reliability and superior redundancy with N+2/N+3

resilience for both power supply and water cooling systems, ensuring Tier IV availability

slide-10
SLIDE 10

State-of-the-Art Technologies and Standards

 Employ some of the most advanced

technologies and standards to build a state-of-the-art cloud service provider, including:

  • Construction of facilities over 37 meters above

sea level to protect from tsunamis, at least 60 meters underground to protect from EMP/IEMI

  • Based on OpenCompute standards laid out by

Facebook’s data center design

  • Guardtime secured virtual machines and data at

rest

  • Employ SmartDataCenter cloud services

platform

  • 10/40 GbE to meet constantly increasing

bandwidth and performance requirements

slide-11
SLIDE 11

10101010101 01010101010 10101010101 01010101010 10101010101 01010101010

KSI | Data is the new perimeter

= +

Keyless Signature

10101010101 01010101010 10101010101 01010101010 10101010101 01010101010

Signed Electronic Data Electronic Data

Proves the time, integrity and authenticity of electronic data using formal mathematical methods without relying on keys or trusted humans

slide-12
SLIDE 12

KSI | Open Source, Open Standard, Open Infrastructure

slide-13
SLIDE 13

No keys, or key management

Verification of the KSI-based electronic evidence does not require cryptographic keys or key management – verification can be performed independently of any trusted third party or human being, using only formal mathematical methods.

Long-term integrity proof

All KSI-signed data can be archived in the cloud without a loss of legal strength or regulatory compliance for an unlimited time period on commodity storage hardware, making paper- or hardware based special archiving solutions obsolete and substantially reducing overall archiving costs.

Portability of the evidence

KSI-based data authentication is not tied to specific hardware or process - wherever the data goes, the proof goes along with it, simplifying and speeding up data processing and e-discovery processes

Massive scale

KSI-based real-time electronic data authentication solution for Cloud scales to trillions of events per second, supporting any size of the system today or in the future.

KSI Background | Unique Properties of KSI Signatures

slide-14
SLIDE 14

Cloud

KSI for Cloud | Complete Mutual Auditability in the Cloud

STORE STORE VM VM

Executable Integrity Event Integrity Storage Integrity

LOG LOG

slide-15
SLIDE 15

KSI for Cloud | Core Value Across Public, Private & Hybrid Clouds

Executable Integrity Event Integrity Storage Integrity

“Am I deploying the authorized code?” “What has happened to my resources?” “Is my stored data OK?”

KSI provides a real-time authentication mechanism against external hacking and insider tampering of the Virtual Machine images prior to deployment in the Cloud. KSI establishes accountability for events in the Cloud, enabling parties to prove that the logs have not been compromised by external hacking or insider tampering. KSI enables independent authentication of every object in the Object Store, realizing regulatory compliance for data integrity, in commodity hardware, in the Cloud

slide-16
SLIDE 16

KSI for Cloud | Executable Integrity

Virtual Machine Image CLOUD INFRASTRUCTURE Virtual Machine Image Repository Deployed Virtual Machine

10101010101 01010101010 10101010101 01010101010 10101010101 01010101010 10101010101 01010101010 10101010101 01010101010 10101010101 01010101010

KSI signature verification

VALUE KSI provides a mechanism against external hacking and insider tampering of the executable code inside the machine.

Real-time Data Signing

slide-17
SLIDE 17

KSI for Cloud | Indemnification for Service Providers

Answers Questions:

  • When and what data was stored?
  • Who authorized changes?
  • Has the data changed since authorization?

Data

10101010101 01010101010 10101010101 01010101010 10101010101 01010101010

VALUE KSI provides necessary proof to indemnify the Service Provider in a breach related incident in the Cloud.

KSI signature verification

slide-18
SLIDE 18

KSI for Cloud | Use Case for Executable Integrity

Customer Application Value Joyent Public Cloud Assured Virtual Machine Image Integrity. KSI is integrated right into Joyent’s Cloud platform, assuring the customers that the implemented security measures for the virtual environment have worked, that the operating policies are being enforced, that only approved and validated virtual machines are running in the environment. Business Continuity. Enables companies to safely host applications and data in the cloud, being assured that the executable environment is intact and has not been compromised by malicious or accidental tampering, neither by external nor internal parties. Reduced Risk of Liability. By having only tested, approved and signed Virtual Machines running within the virtual environment, the source and method behind any error, compromise, and loss cannot be questioned, instantly indemnifying the no-fault party. Safe Migration of Virtual Machines. KSI technology enables customers to validate the state of running Virtual Machine and provide a tamper-evident audit trail when suspending it and sending into another data center.

slide-19
SLIDE 19

KSI for Cloud | Event Integrity

VALUE KSI establishes accountability for Cloud events, enabling a specific Cloud event to be presented as evidence along with a proof of the entire log file integrity, while keeping all other events in confidence.

slide-20
SLIDE 20

KSI for Cloud | Use Case for Event Integrity

Customer Application Value SEB Bank Electronic Banking Log Archive. 98% of all customer banking transactions at SEB Bank are carried out electronically, tens of gigabytes of transaction logs are generated daily and archived for periods exceeding 10 years. SEB implemented KSI in their internal Cloud infrastructure to be able to prove long-term authenticity of these logs as well as to have legally strong evidence of the time and nature of each transaction. Indemnification and Non-repudiation. By signing its transaction logs using KSI technology, SEB is able to defend any claims as to time and integrity of its electronic logs, substantially mitigating potential downstream legal costs. Regulatory Compliance. KSI-enhanced electronic banking transaction log archive fully complies with data integrity related clauses of financial services regulations such as MiFID and Basel III. Increased Internal Control. Signing internal logs with KSI technology provides SEB with a strong level of internal control by reducing the threat of employees tampering with sensitive logs.

slide-21
SLIDE 21

KSI for Cloud | Storage Integrity

KSI Enabled Object Store KSI Enabled Object Store Pre- processing Pre- processing Object Store Object Store KSI Signature Store KSI Signature Store

<hash, signature + metadata>

REST API file + metadata Client Client file + metadata

VALUE KSI enables independent authentication of every object in the Object Store, realizing regulatory compliance for data integrity, in commodity hardware, in the Cloud

slide-22
SLIDE 22

KSI for Cloud | Use Case for Storage Integrity

Customer Application Value Parity Energy Inc. Call Recordings Archive. As a trader of energy derivatives in Wall Street, Parity Energy is required by various regulations - Todd Frank, most recently – to be able to present their communications records to the regulator and prove the integrity of their archive when requested. Instead of purchasing a dedicated data vault for their archived data, Parity Energy implemented KSI at the Object Store in the Cloud, so that every stored call recording along with its CDR record is signed and provable. Regulatory Compliance. KSI-enhanced data archive is compliant with regulatory requirements. Indemnification and non-repudiation. Parity Energy has evidence of events for non- repudiation and indemnification purposes; and can hold themselves harmless against accusations of CDR and call recordings archive tampering by presenting KSI based independent proof of record integrity. Ten-fold decrease in TCO. Being able to implement regulatory compliance and protection against legal trolling using the commodity Cloud-based storage, means that Parity Energy is saving a minimum of 10 times in purchase and maintenance costs

  • ver next 5 years.
slide-23
SLIDE 23

KSI for Cloud | Active IntegrityTM

VALUE An early warning system into the integrity breaches of VM images, Stored data and Cloud logs by constant re-verification of existing signatures, making it possible to discover and remedy any vulnerabilities before large-scale damages can occur and ensuring business continuance.

10101010101 01010101010 10101010101 01010101010 10101010101 01010101010

Guardtimed data Alert, if verification fails Signature verification

slide-24
SLIDE 24

KSI for Cloud | Use Case for Active IntegrityTM

Customer Application Value Government of the Republic of Estonia Estonian Succession Registry is an official electronic database in the private Cloud infrastructure, containing over 14 million inheritance related documents and records with an unlimited retention period. All the data stored is signed using KSI technology and then re-verified every 5 minutes. Alert is issued to the Registry supervisors when any inconsistencies in the stored data are found. Provable Record Integrity means that the State to hold themselves harmless against accusations of database tampering or deletion by presenting KSI based independent proof of record integrity. Citizen Empowerment. Each person has an ability to verify the integrity of their records at State databases at will, independently of the State or any other third party. Increased Management Quality as Registry supervisors can be assured that they are notified of any data breaches due to external hacking or insider fraud immediately and can take measures to correct without relying on trusted systems administrators or other IT personnel.

slide-25
SLIDE 25

KSI for Cloud | Hybrid Clouds for Mobile Carriers & Enterprise Customers

ACTIVE INTEGRITYTM

KSI is the instrumentation that feeds early warning systems, notifying data integrity breaches by constant re-verification of existing file and log system signatures. KSI makes it possible to discover and remedy incidents in real-time to continue operations, before large-scale damage can occur.

CLOUD DATA PROOF & PRIVACY

Implementing KSI enables customers and third parties to forensically trace whether the data has been compromised without trusting the service provider or an administrator.

ACCOUNTABILITY & INDEMNIFICATION

A mathematically provable audit trail for Cloud operations. Accountability for any incident becomes undeniable and is coupled with automatic indemnification for the parties not responsible for the incident .

slide-26
SLIDE 26

Summary | Data Integrity, Transparency, Accountability

  • KSI is a new technology for massive scale, real-time data authentication
  • Adopters get complete auditability and transparency without needing a trusted administrator
  • Fully complies with data integrity enforcement clauses in e.g. financial sector standards and

regulations such as Basel II / III (global), MiFID (EU), Todd Frank (US), et al.

  • The technology works at a massive scale and does not burden network traffic
  • No disclosure of critical data: data does not leave the network
slide-27
SLIDE 27

Information Assurance

Peter Rajnak

GM Guardtime Pte Ltd Web: www.guardtime.com Emailpeter.rajnak@guardtime.com Web: www.openksi.org Email: info@openksi.org

  • penKSI.org