Security for Virtualized Distributed Systems Thse soutenue le 3 - - PowerPoint PPT Presentation

security for virtualized distributed systems
SMART_READER_LITE
LIVE PREVIEW

Security for Virtualized Distributed Systems Thse soutenue le 3 - - PowerPoint PPT Presentation

From Modelization to Deployment . Arnaud Lefray Workshop SEC2 - 4 Juillet 2016 Qirinus - Inria Sous la direction de : Ralise dans les quipes : Eddy Caron, Avalon - LIP - ENS Lyon Christian Toinard, SDS - LIFO - INSA CVL Jonathan


slide-1
SLIDE 1

Security for Virtualized Distributed Systems

From Modelization to Deployment

.

Arnaud Lefray Workshop SEC2 - 4 Juillet 2016 Qirinus - Inria

Thèse soutenue le 3 Novembre 2015 Sous la direction de : Réalisée dans les équipes : Eddy Caron, Avalon - LIP - ENS Lyon Christian Toinard, SDS - LIFO - INSA CVL Jonathan Rouzaud-Cornabas

slide-2
SLIDE 2

Context .

slide-3
SLIDE 3

A data breach story .

▶ Date: October 21st. 2015 ▶ Nb stolen records: 4 million ▶ Data types:

▶ personal infos (names, addresses, dates of birth) ▶ contact infos (email addresses, phone numbers) ▶ financial infos (credit card, bank details)

Hacker profile: 15 years old irish teen. Consequences: 10% share value drop. Previous breach: August 2015 TalkTalk: a Cloud provider for businesses

2/45

slide-4
SLIDE 4

A data breach story .

▶ Date: October 21st. 2015 ▶ Nb stolen records: 4 million ▶ Data types:

▶ personal infos (names, addresses, dates of birth) ▶ contact infos (email addresses, phone numbers) ▶ financial infos (credit card, bank details)

▶ Hacker profile: 15 years old irish teen. ▶ Consequences: 10% share value drop. ▶ Previous breach: August 2015

TalkTalk: a Cloud provider for businesses

2/45

slide-5
SLIDE 5

A data breach story .

▶ Date: October 21st. 2015 ▶ Nb stolen records: 4 million ▶ Data types:

▶ personal infos (names, addresses, dates of birth) ▶ contact infos (email addresses, phone numbers) ▶ financial infos (credit card, bank details)

▶ Hacker profile: 15 years old irish teen. ▶ Consequences: 10% share value drop. ▶ Previous breach: August 2015

TalkTalk: a Cloud provider for businesses

2/45

slide-6
SLIDE 6

Growing security breaches .

2015 Average cost per breach: $3.79 million 2015 Average cost per stolen record: $154

3/45

slide-7
SLIDE 7

Growing security breaches .

2015 Average cost per breach: $3.79 million 2015 Average cost per stolen record: $154

3/45

slide-8
SLIDE 8

From on-premise to Cloud .

Traditional model Data and services hosted

  • n-premise

Cloud model 1 resources/services provider for multiple clients

93% of organizations are running/experimenting Cloud. [RightScale2015]

Economical benefits Automatic management Loss of control Security complexification

4/45

slide-9
SLIDE 9

From on-premise to Cloud .

Traditional model Data and services hosted

  • n-premise

Cloud model 1 resources/services provider for multiple clients

93% of organizations are running/experimenting Cloud. [RightScale2015]

▶ Economical benefits ▶ Automatic management ▶ Loss of control ▶ Security complexification 4/45

slide-10
SLIDE 10

Cloud and Virtualization .

Cloud Characteristics

▶ On-demand resources

Infinite resources Pay per use Multitenant provisioning Key technology: Virtualization Virtual resources sharing real resources

5/45

slide-11
SLIDE 11

Cloud and Virtualization .

Cloud Characteristics

▶ On-demand resources ▶ Infinite resources

Pay per use Multitenant provisioning Key technology: Virtualization Virtual resources sharing real resources

5/45

slide-12
SLIDE 12

Cloud and Virtualization .

Cloud Characteristics

▶ On-demand resources ▶ Infinite resources ▶ Pay per use

Multitenant provisioning Key technology: Virtualization Virtual resources sharing real resources

5/45

slide-13
SLIDE 13

Cloud and Virtualization .

Cloud Characteristics

▶ On-demand resources ▶ Infinite resources ▶ Pay per use ▶ Multitenant provisioning

Key technology: Virtualization Virtual resources sharing real resources

5/45

slide-14
SLIDE 14

Cloud and Virtualization .

Cloud Characteristics

▶ On-demand resources ▶ Infinite resources ▶ Pay per use ▶ Multitenant provisioning

Key technology: Virtualization Virtual resources sharing real resources

5/45

slide-15
SLIDE 15

Security Issues .

Traditional model An IT managing security “by hand” (configuration, etc.) Threats

▶ External

Problems

▶ Oversight ▶ Misconfiguration ▶ Lack of expertise

Cloud model Currently, same as traditional Threats External Internal

Multitenancy 6/45

slide-16
SLIDE 16

Security Issues .

Traditional model An IT managing security “by hand” (configuration, etc.) Threats

▶ External

Problems

▶ Oversight ▶ Misconfiguration ▶ Lack of expertise

Cloud model Currently, same as traditional Threats

▶ External ▶ Internal Multitenancy 6/45

slide-17
SLIDE 17

What to Secure? .

Virtualized Distributed Systems

▶ Data ▶ Processes/Services ▶ VM ▶ Network

The vast majority of applications are distributed systems

7/45

slide-18
SLIDE 18

Cloud Security: Problem .

Problem How to provide a trusted end-to-end security of virtualized distributed systems?

▶ Transversal: secure from endpoints to services ▶ In-depth: secure all layers ▶ Temporal: secure whole lifecycle

Proposition: Automatic security enforcement User-centric approach Bridge the gap between the user’s security specification skills and complex configurations of security mechanisms. Distributed security with heterogeneous mechanisms

8/45

slide-19
SLIDE 19

Cloud Security: Problem .

Problem How to provide a trusted end-to-end security of virtualized distributed systems?

▶ Transversal: secure from endpoints to services ▶ In-depth: secure all layers ▶ Temporal: secure whole lifecycle

Proposition: Automatic security enforcement

▶ User-centric approach ▶ Bridge the gap between the user’s security specification

skills and complex configurations of security mechanisms.

▶ Distributed security with heterogeneous mechanisms 8/45

slide-20
SLIDE 20

The Seed4C Celtic+ European Project .

17 partners from 4 countries. From Apr. 2012 to Feb. 2015. France Finland Spain . South Korea

9/45

slide-21
SLIDE 21

The Seed4C Celtic+ European Project .

17 partners from 4 countries. From Apr. 2012 to Feb. 2015. France Finland Spain . South Korea

9/45

slide-22
SLIDE 22

The Seed4C Celtic+ European Project – Logical Architecture .

Idea Build a secure Cloud with cooperative points of enforcement.

10/45

slide-23
SLIDE 23

My Thesis: From Modelization To Deployment .

.

11/45

slide-24
SLIDE 24

Contributions .

slide-25
SLIDE 25

My Thesis – Modelization .

.

13/45

slide-26
SLIDE 26

Modelization - Why and What? .

Why?

▶ To apply algorithms (e.g., verification) ▶ To automate security configuration ▶ To automate application deployment 3D Printer

What?

14/45

slide-27
SLIDE 27

Modelization - Why and What? .

Why?

▶ To apply algorithms (e.g., verification) ▶ To automate security configuration ▶ To automate application deployment 3D Printer

What?

14/45

slide-28
SLIDE 28

What is Security? .

Security Policy What it means to be secure. Defined by security properties Security Properties Confidentiality: Absence of unauthorized disclosure Integrity: Absence of unauthorized alteration Isolation: Confidentiality + Integrity Availability: Absence of denial of use

15/45

slide-29
SLIDE 29

What is Security? .

Security Policy What it means to be secure. Defined by security properties Security Properties

▶ Confidentiality: Absence of unauthorized disclosure ▶ Integrity: Absence of unauthorized alteration ▶ Isolation: Confidentiality + Integrity ▶ Availability: Absence of denial of use 15/45

slide-30
SLIDE 30

What Security Model? .

  • Q. Can I read document File?

Access Control Explicit perms., implicit flows

  • A. Yes, access is granted.

Information Flow Control Implicit perms., explicit flows

  • A. Depends on previous flows.

Access Control checks place restrictions on the release of information but not its propagation.

16/45

slide-31
SLIDE 31

What Security Model? .

  • Q. Can I read document File?

Access Control Explicit perms., implicit flows

  • A. Yes, access is granted.

Information Flow Control Implicit perms., explicit flows

  • A. Depends on previous flows.

Access Control checks place restrictions on the release of information but not its propagation.

16/45

slide-32
SLIDE 32

What Security Model? .

  • Q. Can I read document File?

Access Control Explicit perms., implicit flows

  • A. Yes, access is granted.

Information Flow Control Implicit perms., explicit flows

  • A. Depends on previous flows.

Access Control checks place restrictions on the release of information but not its propagation.

16/45

slide-33
SLIDE 33

Model-driven Security - Lack of suitable models .

Existing models – Nguyen et al. [APSEC2013]

▶ Specific isolated security concerns (Not all security

properties)

▶ Lack of formality ▶ Incomplete integrated approach (automation,

process-integration, etc.) Problem No Models for Information Flow Properties on Virtualized Distributed Systems

17/45

slide-34
SLIDE 34

Sam4C - Security Aware Models for Clouds .

Solution A unified security-aware metamodel: Sam4C

18/45

slide-35
SLIDE 35

Unified Model – Metamodelisation .

Metamodel (Model of models) Reducing complex programming tasks by:

▶ abstracting system-specific constraints ▶ providing automatic transformation 19/45

slide-36
SLIDE 36

.

UseCase: Airport Management .

▶ Industrial UseCase (Ikusi Company) ▶ n-tier application (Standard for building enterprise software) 20/45

slide-37
SLIDE 37

Application Model Entities .

Client VM Domain (Madrid) AppDomain (System): Service (SSH) – Data (Logs)

21/45

slide-38
SLIDE 38

Application Model Entities (cont’d) .

VNet (Intranet) Composition VM and AppDom

22/45

slide-39
SLIDE 39

UseCase: Application Model .

23/45

slide-40
SLIDE 40

UseCase – Security Constraints .

70 properties for the AirportContentManager UseCase. Integrity Property Musik MAD application logs can only be modified by the Musik MAD service. Isolation Property The whole AirportContentManager framework is isolated from any other tenant in the hosting virtualized infrastructure.

24/45

slide-41
SLIDE 41

Security Model – Properties .

Context Identifier referring to a (single or) group of entities represented by a list of attributes Integrity Property Secured [, Authorized] Isolation Property Secured [, Authorized] . .

ctxServiceMusikMad

.

ctxLogMusikMad

Integrity(ctxLogMusikMAD,ctxServiceMusikMAD) Isolation({AirportContentManager})

25/45

slide-42
SLIDE 42

My Thesis – Formalization .

.

26/45

slide-43
SLIDE 43

Security Properties Interpretation .

Problem

▶ What is the definition/interpretation of security

properties? (e.g., Integrity)

▶ How to guarantee that ∑ localConfigs ≡ globalProperty?

(e.g., Isolation) Solution Use a formal language: Logic Unique interpretation Proof of equivalences (global/local)

27/45

slide-44
SLIDE 44

Security Properties Interpretation .

Problem

▶ What is the definition/interpretation of security

properties? (e.g., Integrity)

▶ How to guarantee that ∑ localConfigs ≡ globalProperty?

(e.g., Isolation) Solution Use a formal language: Logic

▶ Unique interpretation ▶ Proof of equivalences (global/local) 27/45

slide-45
SLIDE 45

Information Flows .

Flows

▶ B read A = (A > B) ▶ B write C = (B > C)

Types of Flows

▶ Direct (e.g., A > B) ▶ Indirect (e.g., A ≫ C) 28/45

slide-46
SLIDE 46

IF-PLTL: Information Flow Past Linear Time Logic .

Existing Logics not suitable

▶ Focus on Access Control (and not Information Flow Control) ▶ Do not tackle Indirect Flows (Transitive Closure)

IF-PLTL: a many-sorted first-order temporal logic first-order, Exists/Forall temporal, Condition(s) on past actions many-sorted, 2 sorts: Context (e.g., Alice, File) and Domain (e.g., Admins, Madrid)

29/45

slide-47
SLIDE 47

IF-PLTL: Information Flow Past Linear Time Logic .

Existing Logics not suitable

▶ Focus on Access Control (and not Information Flow Control) ▶ Do not tackle Indirect Flows (Transitive Closure)

IF-PLTL: a many-sorted first-order temporal logic

▶ first-order, Exists/Forall ▶ temporal, Condition(s) on past actions ▶ many-sorted, 2 sorts: Context (e.g., Alice, File) and Domain

(e.g., Admins, Madrid)

29/45

slide-48
SLIDE 48

Confidentiality, Integrity and Isolation Definitions .

Confidentiality (S,A) (∀ctxx ∈ S)(∀ctxy)(x > y) → (y ∈ S ∪ A) Integrity (S,A) (∀ctxx ∈ S)(∀ctxy)(x < y) → (y ∈ S ∪ A) Isolation (S,A) confidentiality(S, A) ∧ integrity(S, A)

30/45

slide-49
SLIDE 49

My Thesis – Preprocessing .

.

31/45

slide-50
SLIDE 50

Global/Local Equivalences .

Integrity(S, A) (∀ctxx ∈ S)(∀ctxy)(x > y) → (y ∈ S ∪ A) Given S = S1 ∪ S2 Integrity(S, A) ≡ Integrity(S1, A ∪ S2) ∧ Integrity(S2, A ∪ S1)

32/45

slide-51
SLIDE 51

Preprocessing .

. . .

33/45

slide-52
SLIDE 52

Preprocessing .

. . . Tenant Input

1 global implicit property: Isolation

Problem

Public should access Proxy 33/45

slide-53
SLIDE 53

Preprocessing .

. . . Solution

Use graph connectivity

Result

2 Explicit Isolation Properties

33/45

slide-54
SLIDE 54

Preprocessing .

. . . . . Input

1 global explicit property: Isolation

Problem

No solution for Musik_MAD, …, Intranet.

33/45

slide-55
SLIDE 55

Preprocessing .

. . . . . Solution

Use global/local equivalences

Result

4 singleton explicit properties

33/45

slide-56
SLIDE 56

Preprocessing .

. . . . . Input

1 singleton explicit properties

Problem

No isolation mechanism for mixed VM/VNet e.g., Mysql, Intranet

33/45

slide-57
SLIDE 57

Preprocessing .

. . . . Solution

Use typed equivalences

Result

1 Explicit Property = 2 Typed Properties IsolationVM and IsolationVNET

33/45

slide-58
SLIDE 58

Deployment .

Problem How to enforce a typed property ? 2 Solutions

▶ Agent-based enforcement ▶ Placement-based enforcement 34/45

slide-59
SLIDE 59

My Thesis – Agent-based Enforcement .

.

35/45

slide-60
SLIDE 60

My Thesis – Deployment – Agent-based enforcement .

36/45

slide-61
SLIDE 61

My Thesis – Deployment – Agent-based enforcement .

36/45

slide-62
SLIDE 62

My Thesis – Deployment – Agent-based enforcement .

36/45

slide-63
SLIDE 63

My Thesis – Deployment – Agent-based enforcement .

36/45

slide-64
SLIDE 64

My Thesis – Deployment – Agent-based enforcement .

36/45

slide-65
SLIDE 65

My Thesis – Deployment – Placement-based Enforcement .

.

37/45

slide-66
SLIDE 66

Deployment – Placement-based enforcement .

Concerned Properties Properties between VMs (e.g., IsolationVM) Problem: Side/Covert channels Using legal means to exfiltrate information.

▶ AES/RSA key extraction, Activity monitoring , etc. 38/45

slide-67
SLIDE 67

Co-residency: An isolation problem .

In 2009, Ristenpart et al. [ACM CCS] demonstrated on EC2:

▶ 40% success co-residency VM ▶ Cross-VM exploits

Mitigation techniques:

▶ Impractical (High overhead) ▶ Application-specific

Remark: Ultimately, we believe that the best solution is simply to expose the risk and placement decisions directly to users.

39/45

slide-68
SLIDE 68

Placement-based enforcement .

Proposition Use the micro-architecture in the placement decision to enforce VMs isolation. Micro-architecture Hardware components design Issue

▶ Need cross-VM risk metric 40/45

slide-69
SLIDE 69

Exposing the risk: Lack of metrics .

Existing Metrics

▶ Side channel Vulnerability Factor (SVF) ▶ Cache Side channel Vulnerability (CSV)

Limitations

▶ Do not reflect a global risk ▶ Hard to specify in practice

Contribution Risk Metric = Covert channel maximum theoretical bandwidth

41/45

slide-70
SLIDE 70

Risk-based Placement .

Information leakage metric (Memory, Cores) + Latencies + attack protocol → Bandwidth Measurements on Grid’5000: O(Kbps). NP-Hard Problem: First-Fit

42/45

slide-71
SLIDE 71

Conclusion and Perspectives .

slide-72
SLIDE 72

Conclusion – Global Workflow .

44/45

slide-73
SLIDE 73

Perspectives - From Research to Industry .

Qirinus Startup Project

▶ Supported by Inria ▶ Started January 2016

Secured application deployment in Clouds

▶ TOSCA based Models for Automatic Deployment ▶ Global Security (Network, Access Control, etc.) ▶ Compliance to security standards (PCI-DSS, NIST 800.53, ...)

Research Agenda

▶ Support for Elastic Apps ▶ Dynamic security reconfiguration ▶ Dynamic adaptation for incident-response scenarios 45/45

slide-74
SLIDE 74

Grade .

Quality Level Grade Bitrate Low 20 <6 Kpbs Medium 40 <3 Kbps High 60 <1 Kbps Very High 100 <100 bps Isolation({AirportContentManager}, MEDIUM) Isolation({AirportContentManager}, 40)

45/45

slide-75
SLIDE 75

Cache-based Covert Channel – Protocol .

▶ Cached = Small access time = Bit 0 ▶ Flushed = Huge access time = Bit 1

Bandwidth = (latencycached + latencyflushed) 2 × cachesize pagesize

45/45

slide-76
SLIDE 76

Cache-based Covert Channel: Does it work? .

Measurements on L2 cache with distinct cores (Grid’5000): 100 bps

45/45

slide-77
SLIDE 77

NUMA Topology .

Intel Xeon E5420 QC (shared L2) Intel Xeon E5-2630 (shared L3) Hwloc topologies (http://www.open-mpi.org/projects/hwloc/)

45/45

slide-78
SLIDE 78

NUMA Allocation Algorithm .

45/45

slide-79
SLIDE 79

Cache latencies .

Tool: lat_mem_rd (lmbench) NUMA arch latencies L1 (1-32KB): 1.43ns L2 (-256KB): 4.3ns L3 (-15MB): 17.0ns Local NUMA: 108ns Remote NUMA: 184.5ns

45/45

slide-80
SLIDE 80

Bitrates – Results and Workflow .

Bitrates

▶ Local NUMA L3 = 4.167 Kbps ▶ Remote NUMA L3 = 2.585 Kbps ▶ SMP L2 = 9.551 Kbps.

Automatic procedure

45/45