Module 1 - Week 1 and 2
Module 1 - Week 1 and 2
This Facility stores and manage business-critical data and applications, so Data center security is critical in data center
design.
Network infrastructure. This connects servers (physical and virtualized), data center services, storage, and external
connectivity to end-user locations.
Storage infrastructure. Data is the fuel of the modern data center. Storage systems are used to hold this valuable commodity.
Computing resources. Applications are the engines of a data center. These servers provide the processing, memory, local
storage, and network connectivity that drive applications.
Perimeter Security
Perimeter security : Facility controls :
• The first layer of data center security is to • In case of any breach in the
Facility Controls perimeter monitoring, the
discourage, detect, and delay any
unauthorized entry of personnel at the second layer of defense
Computer Room Controls restricts access. It is an access
perimeter.
• This can be achieved through a high- control system using
resolution video surveillance system, card swipes or biometrics.
motion-activated security lighting, fiber- • High-resolution video
optic cable, etc. surveillance and analytics can
• Video content analytics (VCA) can detect identify the person entering
Cabinet Controls
individuals and objects and check for any and prevent tailgating.
illegal activity. Track movements of • More complex VCA can read
people and avoid false alarms. license plates, conduct facial
recognition, and detect
smoke and fire threats.
Perimeter Security
Tier 1: Basic site infrastructure. A Tier 1 data center offers limited protection against physical events. It has
single-capacity components and a single, nonredundant distribution path.
Tier 1 data center requirements are generally utilized by small businesses and feature:
• 99.671% Uptime
• No redundancy
• 28.8 Hours of downtime per year.
Tier 2: Redundant-capacity component site infrastructure. This data center offers improved protection against
physical events. It has redundant-capacity components and a single, nonredundant distribution path.
• The benefits of a Tier 2 facility include:
• 99.749% Uptime
• Partial redundancy in power and cooling
• Experience 22 hours of downtime per year
CP2422 - James Cook Univeristy Singapore 11
Data Center - Tiers
Tier 3: Concurrently maintainable site infrastructure. This data center protects against virtually all physical
events, providing redundant-capacity components and multiple independent distribution paths. Each
component can be removed or replaced without disrupting services to end users.
Tier 3 data center specifications are utilized by larger businesses and feature:
• 99.982% uptime (Tier 3 uptime)
• No more than 1.6 hours of downtime per year
• N+1* fault tolerant providing at least 72-hour power outage protection
Tier 4: Fault-tolerant site infrastructure. This data center provides the highest levels of fault tolerance and
redundancy. Redundant-capacity components and multiple independent distribution paths enable
concurrent maintainability and one fault anywhere in the installation without causing downtime.
Tier 4 data center certification typically serve enterprise corporations and provide the following:
• 99.995% uptime per year (Tier 4 uptime)
• 2N+1 fully redundant infrastructure (the main difference between tier 3 and tier 4 data centers)
• 96-hour power outage protection
• 26.3 minutes of annual downtime.
Probability to encounter
CP2422 - James Cook Univeristy Singapore 16
Data Center – Security Concerns
Confidentiality:
– Customer's code or data leaking
Integrity:
– Modification of software or data running in data center
– Software or data change in transit (e.g. over network)
Availability:
– Support infrastructure (backup, electricity, etc.)– Customer's access
to their software or data
SOC1 : It is primarily used to validate controls over the completeness and accuracy of monetary transactions and financial statement
reporting. Service organizations specify their own control objectives and control activities. It is intended for CPA's who audit the
firms.
SOC2 : It is designed to certify the security, processing integrity, availability, confidentiality, and/or privacy of hosted systems and the
data they store or process
SOC3 : This report covers the same testing procedures as a SOC 2 report, but it omits the detailed test results and is intended for
general public distribution.
Additionally, each of the SOC reports can be produced as either a Type I (point-in-time) or Type II (period of time) report. Type II reports are more valuable, since they validate the operating effectiveness
of controls throughout the year.
CP2422 - James Cook Univeristy Singapore 21
Data Center - Challenges
Larger data centers can be cheaper to buy and run than smaller ones and this has helped grow the popularity of
CP2422 - James Cook Univeristy Singapore 22
Cloud computing.
Cloud Computing
Cloud computing is a new operational model and set of technologies
for managing shared pools of computing resources.
• “Computing may someday be organized as a public utility” - John McCarthy, MIT Centennial in
1961
• Huge computational and storage capabilities available from utilities
• Metered billing (pay for what you use)
• Simple to use interface to access the capability (e.g., plugging into an outlet)
This domain provides the conceptual framework for the rest of the Cloud Security Alliance’s guidance. It describes and defines
Domain 1 Cloud Computing concept and Architecture cloud computing, sets our baseline terminology, and details the overall logical and architectural frameworks used in the rest of the
document.
Potential legal issues when using cloud computing. Issues touched on in this section include protection requirements for
Domain 3 Legal Issues: Contracts and Electronic Discovery information and computer systems, security breach disclosure laws, regulatory requirements, privacy requirements, international
laws, etc.
Maintaining and proving compliance when using cloud computing. Issues dealing with evaluating how cloud computing affects
Domain 4 Compliance and Audit Management compliance with internal security policies, as well as various compliance requirements (regulatory, legislative, and otherwise) are
discussed here. This domain includes some direction on proving compliance during an audit.
Governing data that is placed in the cloud. Items surrounding the identification and control of data in the cloud, as well as
Domain 5 Information Governance compensating controls that can be used to deal with the loss of physical control when moving data to the cloud, are discussed
here. Other items, such as who is responsible for data confidentiality, integrity, and availability are mentioned.
Different security focuses map to the different logical layers. Application security maps to applistructure, data
security to infostructure, and infrastructure security to infrastructure.
CP2422 - James Cook Univeristy Singapore 31
CSA - Security scope
Customer responsibilities:
Customer data
• Amazon Elastic Compute Cloud (Amazon
EC2) instance operating system :
Applications, IAM • Including patching, maintenance
• Applications
Operating system, network, and firewall • Passwords, role-based access, etc.
configuration • Security group configuration
• OS or host-based firewallsIncluding intrusion detection or
Client-side data
Server- Network prevention systems
encryption
and data
side encryption traffic protection • Network configurations
(file system (encryption, integr
integrity authentic
or data) ity, identity) • Account management
ation
• Login and permission settings for each user
• Network infrastructure
• Intrusion detection
• Virtualization infrastructure
• Instance isolation
services
IaaS
Automated Operations
Virtualized Infrastructure
Enable traceability: Monitor, alert, and audit actions and changes to your environment in
real time. Integrate log and metric collection with systems to automatically investigate and
take action.
Keep people away from data: Use mechanisms and tools to reduce or eliminate the
need for direct access or manual processing of data. This reduces the risk of mishandling
or modification and human error when handling sensitive data.
Prepare for security events: Prepare for an incident by having incident management and
investigation policy and processes that align to your organizational requirements.
Run incident response simulations and use tools with automation to increase your
speed for detection, investigation, and recovery.
Disclosure of security policies, compliance and practices: Cloud providers that host regulated data must meet compliance
requirements such as PCI DSS, Sarbanes-Oxley and HIPAA.
Disclosure when mandated: The cloud service provider should disclose relevant data when disclosure is imperative due to
legal or regulatory needs.
Security architecture: The cloud service provider should disclose security architectural details that either help or hinder
security management as per the enterprise standard. For example, the architecture of virtualization that guarantees isolation
between tenants should be disclosed.
Security Automation: The cloud service provider should support security automation that supports export and import of
security event logs, change management logs, user privileges, firewall policies etc. Provide continuous security monitoring
including support for emerging standards such as Cloud Audit.
key
characteristics Preserve performance
with advanced Encapsulation
Save the entire state
of a virtual machine
resource controls. to files.
Virtualization provides the abstraction needed for resource pools, which are then managed
using orchestration.
Hypervisor
Virtual Interfaces
Customer N
Customer 1
Security Group
Customer 2
Security Group
Customer 3
Security Group …... Security Group
Firewall
Physical Interfaces
This means using patched and up-to-date hypervisors that are properly This may help meet compliance requirements or satisfy security needs in
configured and supported with processes to keep them up to date and special cases where sharing hardware with another tenant is considered a
secure over time. risk.
This ensures that tenants cannot launch machines based on images Monitoring and logging including how to handle system logs from virtual
that they shouldn't have access to, such as those belonging to another machine. This can include the status of a virtual machine, management
tenant, and that a running virtual machine (or other process) is the events, performance, etc.
one the customer expects to be running.
In addition, cloud providers should assure customers that volatile The customer is also responsible for security controls within the virtualized
memory is safe from unapproved monitoring, since important data resource. This includes all the standard security for the workload, be it a
could be exposed if another tenant, a malicious employee, or even an virtual machine, container, or application code.
attacker is able to access running memory. CP2422 - James Cook Univeristy Singapore 60
Network – Security
controls
All clouds utilize some form of virtual
networking to abstract the physical network
and create network resource pool.
There are multiple kinds of virtual networks,
from basic Virtual Local Area Networks
(VLANs) to full Software Defined Networks
(SDN).
Typically, the cloud consumer
provisions desired networking resources from
this pool, which can then be configured within
the limits of the virtualization technique used.
The provider is also responsible for detecting and preventing attacks on Implement default deny with cloud firewalls and always restrict traffic
the underlying physical network and virtualization platform. This includes between workloads in the same virtual subnet using a cloud firewall
perimeter security of the cloud itself. (security group) policy whenever possible.
Instance or Volume storage: This is essentially a virtual hard drive for instances or virtual machines.
Object storage: Object storage manages data as objects, meaning all data types are stored in their native
formats. There is no hierarchy of relations between files with object storage — data objects can be distributed
across several machines. Most access is through APIs, not standard file sharing protocols, although cloud
providers may also offer front-end interfaces to support those protocols.
Database: Cloud platforms and providers may support a variety of different kinds of databases, including from
managed relational and NoSQL database services, to in- memory caching as a service and petabyte-scale data-
warehouse service
Application/platform: Examples of these would be a content delivery network (CDN), files stored in SaaS,
caching etc.,
Assuring the security of the management plane, which in this case are the
orchestrator and the scheduler.
CP2422 - James Cook Univeristy Singapore 67
Converged Infrastructure
Servers
Network switch
Network
and
Storage
Network switch Fiber-channel switch switch
Storage
Role 1
Role 2
Convereged infrastructure that describe software defined datacenters (SDDC) cannot rely on legacy security
methods. The difference in securing traditional multi-dimensional infrastructures versus converged architectures
is that the latter needs a more policy-based approach
CP2422 - James Cook Univeristy Singapore 69
Data center :
• Special requirement for Physical and virtual security measures, Cooling
conditions and Power requirement
• Different Tiers of Data center
takeaways • IaaS , PaaS and SaaS, their security and reference architectures
• Security of the cloud vs security in the cloud
• Virtualization and its security
• Containers and its security
• Converged Infrastructure
• https://www.forcepoint.com/cyber-edu/cia-triad • https://www.docker.com/resources/what-container
• https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf • https://uptimeinstitute.com/resources/research-and-reports
• https://www.itu.int/en/Pages/default.aspx • https://www.vxchnge.com/blog/n1-data-center-infrastructure-redundancy
• http://www.cloudsecurity.org
• https://www.redhat.com/cms/managed-files/iaas_focus-paas-saas-diagram-1200x1046.png
Videos
• https://www.redhat.com/en/topics/containers/whats-a-linux-container
• A visit to the Cloud : https://www.youtube.com/watch?v=94PO2-TL4Vs
• http://www.rationalsurvivability.com
• Security and Risk mgmt. : https://www.youtube.com/watch?v=8g0NrHExD3g
• https://owasp.org/
• Infrastructure security : https://www.youtube.com/watch?v=cLory3qLoY8
• https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf
• Google data center : https://www.youtube.com/watch?v=kd33UVZhnAA
• https://published-prd.lanyonevents.com/published/rsaus19/sessionsFiles/14144/KEY-T07S-A-
Cloud-Security-Architecture-Workshop.pdf • Data center Design : https://www.youtube.com/watch?v=6fxUbUWS1C8
• https://www.infoq.com/articles/cloud-security-architecture-intro/
• https://aws.amazon.com/microservices/
• https://docs.aws.amazon.com/whitepapers/latest/aws-overview-security-
processes/introduction.html