1
SEED4C SEED4C
RESSI 2015, RESSI 2015, May 19 May 19th
th 2015
2015
SEED4C SEED4C th 2015 RESSI 2015, RESSI 2015, May 19 May 19 th - - PowerPoint PPT Presentation
SEED4C SEED4C th 2015 RESSI 2015, RESSI 2015, May 19 May 19 th 2015 1 Alcatel-Lucent France Gemalto INSA CVL Inria/ENS Lyon Wallix Cygate Mikkelin Puhelin Oy Finland Nokia Solutions & Networks Oy, Finceptum Oy VTT VTT SEED4C:
1
RESSI 2015, RESSI 2015, May 19 May 19th
th 2015
2015
Alcatel-Lucent Gemalto INSA CVL Inria/ENS Lyon Wallix Cygate Mikkelin Puhelin Oy Nokia Solutions & Networks Oy, Finceptum Oy VTT France Finland
2
VTT Innovalia Association Nextel Software Quality Systems (SQS) Fundación Vicomtech IKUSI BISCAYTIK SOLACIA SEED4C: Security Embedded Element and Data Privacy for Cloud Spain Korea
time-bound project)
SEED4C General Presentation
Context
3
SLA
Legal / regulation policies Applications Data Policy
Traditional Enterprise IT
(on-premise based)
Cloud-based Enterprise IT
(incl. Private & Public cloud)
time-bound project)
SEED4C General Presentation
Context
Cloud SLA
Data storage
Data processing (in Virtual Machines)
Network configuration
4
SLA
Legal / regulation policies Applications Data Policy
Traditional Enterprise IT
(on-premise based)
Cloud-based Enterprise IT
(incl. Private & Public cloud)
How to enforce these SLA security policies? How to monitor/certify the enforcement of these policies?
From an isolated security to a coordinated security
5
Isolated Security Coordinated Security
NoSEE SEE SEE SEE
SEED4C General Presentation SEED4C process
Policy Modeling SEED4C User Policy Assurance NoSEE
6
App & Policy Deployment Policy Monitoring SEE–based Policy Enforcement SEE
SEED4C General Presentation
Various types of use-cases at different cloud levels (IaaS, PaaS, SaaS)
NSS Security Operations Center Use Case Environment Authenticaton DomainAirport system mgt e-Gov services
EU Other SEE SE E SEE SEECloud-based Collaboration Services 7
MSC A U C H L R V L R EIR SMSC SMSC2 VLR2 W eb Server Application/ Processing Server Database Servers User Authentication Server Ba nk Do ma in Possible location of SE or SEEe-Banking Telco services in the cloud Security monitoring PaaS environment IAM authentication and auditing IaaS level security Admin access mgt vHSM + key ceremony
SEE–based Policy Enforcement
Sam4C Modeling Tool
Virtualized Application Security
App & Policy Deployment Policy Assurance Policy Monitoring SEE–based Policy Enforcement P<olicy Modeling
8
Example of properties: Integrity, Confidentiality, Isolation, etc.
External client Network Application group Service
Virtualized Application
SEE–based Policy Enforcement App & Policy Deployment Policy Assurance Policy Monitoring SEE–based Policy Enforcement P<olicy Modeling
9
Virtual machine Security domain Data
Screenshot of Airport Management Application (called “Musik”) in Sam4C Modeling Tool
Integrity, Confidentiality, Isolation properties Authentication property
Application Security
SEE–based Policy Enforcement App & Policy Deployment Policy Assurance Policy Monitoring SEE–based Policy Enforcement P<olicy Modeling
10
Network property
Screenshot of Airport Management Application (called “Musik”) in Sam4C Modeling Tool
Resources Mapping
SEE–based Policy Enforcement App & Policy Deployment Policy Assurance Policy Monitoring SEE–based Policy Enforcement P<olicy Modeling
11
Screenshot of Airport Management Application (called “Musik”) in Sam4C Modeling Tool
SEE–based Policy Enforcement Policy Assurance Policy Monitoring SEE–based Policy Enforcement P<olicy Modeling
Resources contraints
Placement with Constraints
App & Policy Deployment
12
Sam4C Deployment Tool
Resources contraints CPU, RAM, Disk, Location. Security contraints Integrity Isolation etc.
Placement-based security
Idea: Do not share physical machines with unwanted neighborhood. Properties: Isolation, Integrity, Confidentiality between VMs. Innovation: Core, Cache, RAM granularity.
SEE–based Policy Enforcement Policy Assurance Policy Monitoring SEE–based Policy Enforcement P<olicy Modeling App & Policy Deployment
13
Security properties matching
Idea: A VM / PM provides security capabilities via a SEE. Properties: All (except properties between VMs). Innovation: Independent from security mechanism implementation.
P<olicy Modeling App & Policy Deployment Policy Assurance Policy Monitoring SEE–based Policy Enforcement
iptables
SE
SEE
Security Policy Enforcement SEE: Secure Element Extended
SEE–based Policy Enforcement
14
14 Policy Enforcement Engine iptables SELinux Data Protection Module SSH Tunneling PAM Oscap Secure Element
SECURITY PLUGINS MANAGER
Assurance Module
SEE
Sam4C Interface
SE
Tenant 1 security domain
P<olicy Modeling App & Policy Deployment Policy Assurance Policy Monitoring SEE–based Policy Enforcement SEE–based Policy Enforcement
15
Tenant 1 security domain Data
Functions
Tenant 2 security domain Data
Functions
Shared security domain Data
SE= SmartCard, MicroSD, etc.
Security Policy Assurance
P<olicy Modeling App & Policy Deployment Policy Assurance Policy Monitoring SEE–based Policy Enforcement Policy Assurance Policy Monitoring
16
16
17
⇒ ⇒ ⇒ ⇒ ⇒ ⇒ ⇒ ⇒ http:// http://www.celticplus-seed4c.org/
18