01 Huawei Cloud Stack Cloud Security Service Overview
01 Huawei Cloud Stack Cloud Security Service Overview
2 Huawei Confidential
Objectives
Upon completion of this course, you will understand:
Cloud security status
Major cloud security requirements
Understand cloud security solution framework
Cloud security solutions
SECaaS product architecture
Security solution product list
3 Huawei Confidential
Contents
1. Cloud Security Requirement Analysis
4 Huawei Confidential
Cloud Security Challenges (1)
• Cloud computing brings new challenges and changes to security. Conventional security
technologies and experience cannot meet cloud security requirements. Dedicated cloud security
technologies and products are required.
Blurred network
Virtual resources • Cloud resource • Blurred network
borders borders
pooling
• Security threats • Difficult to detect
facing virtual virtual traffic
resources • Traditional security
devices do not
support virtual
networks
5 Huawei Confidential
Cloud Security Challenges (2)
Cloud-Based security Escalated security threats Complex security mgmt
Internet
6 Huawei Confidential
IaaS Security Challenges
Company A ⑤ How can security capabilities be adapted to cloud-based data centers?
Firewall
Security gateway HIDS
Log audit
Anti-DDoS
Company B IPS Data
Traffic audit encryption
Online behavior management IPS
Company C
Others......
①
Hybrid cloud
7 Huawei Confidential
EI Security Challenges
Security risks throughout the data lifecycle ②
Illegal collection Channel attack Data masking risk Lack of audit Lack of audit
Data abuse
Cloud platform Virtualization threat Server threat Network threat Application threat Data threat Management threat
risk
8 Huawei Confidential
Severe Data Security Issues
Data is aggregated on the cloud, and
Cloud platform users pay more attention to data security data leakage and abuse frequently take
place
Companies migrated
⚫ In December 2016, a large number of accounts and
Companies not Better Other
to the cloud migrated to the cloud data of a cloud storage company were leaked.
compliance 1%
Concerns about security and audit Higher user ⚫ In March 2017, 12 GB user information (5 billion
systems security records) on a cloud was leaked.
Lack of cloud migration knowledge
and skills 16% 26% ⚫ In June 2017, information about more than 200
Difficulties in integration with the million voters stored on a cloud was leaked.
existing IT environment ⚫ In March 2018, the data of more than 50 million
Cloud migration cost exceeding the
budget More users was leaked from company XX and was
professional illegally used by an analyst company.
Lack of professional solutions
cloud
Difficulties in cloud service
security
management
personnel
Governments and organizations take
System speed
16% the lead in developing data security
Poor performance laws and regulations.
Government policies Let users
have Chinese mainland:
Other Better disaster maximum
recovery and ⚫ Cybersecurity Law and DJCP Multi-level
control over
Unknown
isolation measures Protection Scheme (MLPS) 2.0 emphasize data
their data
22% 19% protection and set clear requirements on personal
information protection.
⚫ The National Information Security Standardization
Both cloud and non-cloud users are most Data security is of the highest Technical Committee released the Personal
Information Security Specifications.
concerned about cloud security. concern among all security issues.
International:
⚫ The General Data Protection Regulation (GDPR)
issued by the EU is the strictest data protection
law in history.
"Data breach" ranks No. 1 among the top 12 cloud security issues ⚫ So far, nearly 90 countries/regions have enacted
laws on personal information protection, which has
listed by Cloud Security Alliance (CSA) become an international trend.
9 Huawei Confidential
Building Data Security Capabilities
The platform and tenants jointly build multi- Build a data security protection system to
dimensional and in-depth data security capabilities. enhance data security capabilities.
Application
security
Database
security
Privacy
protection
... Full-stack
encryption
Trusted
computing
integrity;
⚫ Access control: data classification and
Encryption fine-grained IAM;
⚫ Masking: dynamic and static;
⚫ Audit: database audit and more
✓ Volume ✓ TP/CM
Data security and enhanced trust are
✓ Cloud HSM ✓ Encryption/ ✓ Data
Masking discovery encryption ✓ TPCM critical for cloud platforms.
✓ KMS ✓ Image encryption
✓ Firewall ✓ Classification ✓ ...
✓ ...
✓ Audit... ✓ DLP... ✓ Transmission • Peer vendors have released data security
encryption...
white papers.
Third-party cooperation Huawei-built • Build a data security maturity model based
on the data lifecycle.
10 Huawei Confidential
Cloud Controls Matrix
• The CSA Cloud Controls Matrix (CCM) is a cybersecurity control framework for cloud computing.
Governance
Governance & Risk Management
Configuration Management
Identity & Access Management Threat & Vulnerability Management
11 Huawei Confidential
Contents
1. Cloud Security Requirement Analysis
12 Huawei Confidential
Huawei Cloud Comprehensive Security System
Network security: 20+ years of security practices
Authoritative Huawei Cloud Security: Leader in IDC MarketScape: China Cloud Service Provider Security
certifications: Capability 2020 Vendor Assessment
Host Security Service (HSS): Leader in IDC MarketScape: China Endpoint Security Detection and
20+ Huawei-developed Response Market 2020 Vendor Assessment
security services Firewall: Challengers Quadrant in Global Network Firewall, Gartner
Sharing Huawei's security Situation Awareness (SA): Leader in China Situational Awareness Solution Market, IDC
capabilities
Compliance & security: a large number of compliance certificates in service regions
Compliance certification: First ISO 27799 certification (healthcare) in the world; the first PCI 3DS certification (finance)
100+ global security & compliance
First in China to obtain the NIST CSF certification (security); first in the world to pass all the
certifications five SOC 2 Type 2 audits; world's first ISO/IEC 27034 and CSA STAR V4 gold certification
Helping 3,000+ customers quickly meet
Security white papers: Participated in the development of multiple industry cloud security standards and
compliance requirements released 30+ security compliance white papers
Hundreds of billions Load security: professional security O&M team with hundreds of engineers
of attacks blocked per year
High platform reliability and availability Security operations: 24/7 security assurance, auto-response to 99% security events
Assurance platform: hundreds of billions of attacks, including tens of thousands of large DDoS attacks are
blocked in a year. Vulnerabilities all over the world can be monitored.
Adhering to data neutrality
Protecting customer data
throughout the lifecycle Data security: visible, controllable, and traceable data
Security R&D: 387 built-in competitive security features, millions of automatic code security reviews and privacy
scans for cloud services per year
One-click encryption: data security of 40+ cloud services assured by encryption
13 Huawei Confidential
Huawei Cloud Stack Shared Security Responsibility Model
Customer
Application
Huawei Cloud Stack O&M platform
EI
Huawei Cloud Stack EI services Customer-built
PaaS
AI services Big data services EI services
Huawei Cloud Stack platform services Customer-built
IaaS
Platform services platform services
EI
PaaS
Infrastructure
IaaS
Blue: Customer responsibility (for security of physical Green: Huawei responsibility (for intrinsic security of Huawei Cloud
Legend infrastructure and cloud service use) Stack and cloud services)
Orange: Customer responsibility (Customers can purchase security O&M services provided by
Huawei Cloud Stack from Huawei to defend against external attacks and meet compliance requirements.)
14 Huawei Confidential
Huawei Cloud Stack Platform Security
Security Solution Capability
15 Huawei Confidential
Huawei Cloud Stack Platform Security
Security Solution Capability
Cloud
platform Security Resilience Reliability Availability Privacy Security Compliance Transparency
trustworthiness
Trustworthy cloud (basic)
17 Huawei Confidential
Huawei Cloud Stack Platform Security
Security Solution Capability
Cloud management
EIP APIG
WAF
DEW CBR CCM Data lake Production database Test database
ROMA API access audit
Device Edge
Device leakage
CBH HSS Office device O&M terminal R&D device IoT Edge IEF Dedicated HSM Database audit
prevention
18 Huawei Confidential
Huawei Cloud Stack Platform Security
Security Solution Capability
Situational awareness
Visible
Large screen ② Operations report
protection
Threat operations
Asset management Risk prevention (threats + intelligence)
Huawei Asset counting Baseline compliance Alerts and incidents reporting Threat detection models
experience
Asset data connections Vulnerability management Attack chain tracing Response playbooks
③
Asset operation connections Protection policies Threat intelligence Threat hunting analysis
Workspaces
Flexible SIEM SOAR
integrations
Data integrations Model building Playbook orchestration Service integrations
④
19 Huawei Confidential
Huawei Cloud Stack Platform Security
Security Solution Capability
Vulnerability
PBH scan Platform
Honeypot
Persistent connection database audit
scenario Encryptor
Independent resource Core switch
deployment
Cloud platform infrastructure security (system hardening, VM isolation, and API security)
20 Huawei Confidential
Production region Remote DR region
Huawei Cloud Stack Platform Security
Security Solution Capability
21 Huawei Confidential
Huawei Cloud Stack Platform Security
Security Solution Capability
Administrator Unified certificate and functions, such as resource isolation, image security,
O&M Operation/run logs
permissions password management and MAC/ARP anti-spoofing.
• The platform provides security capabilities such as
Tenant security
22 Huawei Confidential
Huawei Cloud Stack Security Solution Platform Security Capability
Node
7 App
3
App Guest OS
Image
Security signature Security services
5 Docker Kata
practice guide 1 Image KMS, certificate service, container
Hardening OS
repository Image security, and data encryption
Reference authentication
TPM/TEE
8
and
authorization Container
Node
network firewall
6 Node
Image scan
User
3
Upload Storage
Build
9
Deployment
Authentication 2 Kubernetes
Authentication
Public storage
1 master node Storage
IAM Container
Security Border firewall Network Security container 7
RBAC network firewall
image policy
Escape detection
PSP Basic security
2 policy management isolation Cluster audit
23 Huawei Confidential
Huawei Cloud Stack Security Solution Platform Security Capability
Cloud-edge- Certificate
device Public cloud Hybrid cloud Edge cloud Devices
infrastructure
24 Huawei Confidential
Huawei Cloud Stack Security Solution Platform Security Capability
②
EI platform System Vulnerability Malicious code
Data backup
security hardening management defense
25 Huawei Confidential
Contents
1. Cloud Security Requirement Analysis
26 Huawei Confidential
Full-link Security of Cloud Services Based on Cloud Native Security
Capabilities
R&D and O&M
External user PC Mobile app
Suitable for the cloud native network environment
Huawei Cloud
Traditional security services cannot be deployed in VPCs
Stack security Anti-DDoS NDR EdgeFW/CFW
and require complex configurations. Security services,
such as WAF and CFW, can interconnect with network
Security Web Application Firewall (WAF) services, such as VPC, EIP, and Direct Connect.
management
Elastic IP Elastic Load Cloud Bastion
Address Balance Host (CBH)
SecMaster Suitable for the cloud native computing
(EIP) (ELB)
environment
Vulnerability scan
CFW
Traditional security services are deployed separately
VPC1 VPC2 from other services. HSS can interconnect with
Accounts audit Network
Service Network
ACL
computing services such as ECS, BMS, and CCE to
server ACL Host security
Security Container better protect them.
Security
group Container group security
Cloud backup ECS group
Data
encryption
Cloud Eye Suitable for the cloud native data environment
27 Huawei Confidential
Cloud Firewall 2.0 (Cloud Firewall for HCS, CFWforHCS): All-Scenario
and All-Traffic Protection
Threat and risk detection Business elasticity Difficult to configure
Customer benefits
and use Cloud native
• Zombie, Trojan, and worm
Challenges
28 Huawei Confidential
Host Security Service (HSS): Protecting Cloud Servers Against
Ransomware and Other Viruses
Malicious programs Virus infection Vulnerabilities Website tampering
Malicious program samples captured Servers infected with viruses in China Vulnerabilities recorded by CNVD Tampered websites in China
More than 23.07 million About 4.46 million 13,083 About 34,000
Challenges
Data source: Analysis Report on China's Internet Network Security Monitoring Data in the First Half of 2021 issued by the National Computer
CNVD: China National Vulnerability Database
Network Emergency Response Technical Coordination Center
Agent Agent Agent Web Tamper Protection (WTP): Static + Dynamic WTP
29 Huawei Confidential
Web Application Firewall (WAF): The Optimal Protection for Websites
and Applications
Web security is mandatory for 75% of cyber security attacks are targeted at Are the following security issues
regulatory compliance. web applications. bothering you too?
✓
Challenges
Custom protection
tampering check
Access behavior
security check
Network-layer
Sensitive data
Web page
Web shell upload attacks scanning • WAF mitigates security risks caused by botnets, such as credential
check
rules
Data breaches
Server vulnerability attacks Source code leakage and stuffing attacks, brute-force attacks, data breaches, and bonus
directory leakage
CC attacks
ID card and mobile phone hunting behaviors.
number
Bank account number • WAF identifies all the APIs, scans for vulnerabilities, and reports
alarms when anomalies are discovered.
With patented technologies,
Huawei Cloud WAF can give
best security for websites.
30 Huawei Confidential
Data Security Center (DSC): Cloud Native Data Security Management
Platform
Frequent data Punishment from Difficulties in
Precise identification and
Customer benefits
breaches regulators tracing data leaks
Challenges
31 Huawei Confidential
Data Encryption Workshop (DEW): Guarding Cloud Data Migration with
Cloud-native Encryption Capabilities
Secure and Secure and reliable
Wide controllable
Customer benefits
Dedicated HSM Keys and random
integration Hold Your Own Key numbers are generated
Challenges
Many services
Storage, big data, database, IoT
Computing Storage Database interconnected with
KMS
CSBS
Encryption
Decryption
3000 TPS KMS The API invoking performance of a single
GACS
PostgreSQL
Integration Signature performance per customer is four times that of competitors.
Verification
VBS customer
IMS
MySQL
Key Management Hardware and software
EVS
Service (KMS) HSM cluster Symmetric algorithm: SM1 and SM4;
ECS
OBS DDS
compliant with CSA asymmetric algorithm: SM2
Hash algorithm: SM3
requirements
32 Huawei Confidential
Database Audit Service (DBAS): Cloud-native Database Audit System
Fine-grained Security Multi-dimensional Fine-grained
reports
Core functions
behavior audit alarms analysis
Pain points
Scenario &
Laws and regulations Record and Detect database Behaviors Session behavior report
Risks in cloud databases correlate access risks and report Sessions Risk distribution report
According to the Cybersecurity Law in
China, organizations should adopt technical The audit module of a database behaviors at the alarms based on Statements Compliance report
measures for monitoring and recording affects performance during application and SQL command
network operational statuses and running. Logs will probably be lost database layers. characteristics
cybersecurity incidents, and retain network if the database system is faulty.
and risk levels.
logs for at least six months.
Easy The database audit service is easy to use, and is deployed in out-
deployment of-path mode to avoiding risks caused by O&M misoperations.
User requests + Hacker attacks (injection attacks and unauthorized access)
VPC You can import tens of thousands of data records per second,
Efficient
store mass data, and process hundreds of millions of data
analysis records within seconds.
33 Huawei Confidential
Network Detection Response (NDR)
Scenarios
Internet ① Threat visualization: Visualizes cloud
asset exposure to threats and risks.
5 Attack blocking ② O&M management: Detects abnormal
traffic on the live network to enable the
North-south traffic
1 mirroring O&M team to help the O&M team respond
3
quickly.
Third-party detection
Application protocol
③
Network attack
External connection control: Detects
User behavior
External service A
identification
detection
auditing
and blocks suspicious external
rules
connections, and locates and isolates
ECS ECS compromised hosts.
VPC: external service A ④ Micro-segmentation: Protect north-south
External traffic
services
NDR detection engine Technical advantages
2 (Aurora)
① Heavy traffic: NDR supports visualized
detection and protection of up to 100
4 5 Gbit/s traffic.
②
Internal service B
Multiple scenarios: NDR protects your
network against 26 types of attacks, such
Alarm response
Third-party threat
collaboration
backtracking
as zombies, mining, CC, and brute force
intelligence
ATT&CK
ECS ECS
Audit
API
VPC: internal service B cracking
Internal ③ High reliability: NDR is deployed out-of-
services path in dual-AZ active-active mode, which
has zero impact on your services
④ Strong team: The NDR team is a
Mirrored traffic Blocking traffic Alarms/Logs professional network security team that is
continuously advancing with the
technology development.
34 Huawei Confidential
Anti-DDoS Service: Scrubbing DDoS Traffic and
Ensuring Network Security
Application scenario
36 Huawei Confidential
Cloud Secret Management Service (CSMS): Secret Lifecycle
Management Within the Cloud
Cloud Secret Management Service (CSMS) is a secure, reliable, and easy-to-use secret hosting service. Users or applications can use
CSMS to create, retrieve, update, and delete secrets with ease, making it easier to centrally manage secrets throughout their lifecycle.
Scenarios
Database OS API key
password • Centralized secret management: CSMS can centrally store, retrieve,
password
and use secrets throughout their lifecycles.
• Secure secret retrieval: With CSMS, APIs instead of hard-coded code
are used to retrieve secrets.
Save/Obtain Save/Obtain Save/Obtain
• Protected secret rotation: CSMS enables multi-version secret
management so that applications can call CSMS APIs or SDKs to
securely update secrets.
Secret management • Secret encryption: Secrets are encrypted by KMS before storage.
Encryption keys are generated and secured by Hardware Security
Use a key in KMS to Use a key in KMS to Modules (HSMs) that are authenticated by third-parties.
encrypt data. decrypt data.
• Secret access control: Identity and Access Management (IAM)
ensures only authorized users can retrieve and modify secrets. CTS
KMS monitors access to secrets.
37 Huawei Confidential
Cloud Bastion Host (CBH): Enabling Remote O&M Anytime, Anywhere
Cloud Bastion Host (CBH) helps with fine-grained management of users, User Resource Access Operation
Core functions
resource accounts, and access processes by establishing one-on-one management management control audit
overview
Access control
CBH makes it possible for users to perform O&M
Support for H5
anytime, anywhere, using any devices using
MFA
User Resource O&M using a web
Common user
Server mainstream browsers without installing clients or
account 1 account A browser plug-ins.
Resource
MFA
User account B
System account 2 Authorization Database CBH gives you the ability to use a single point of
administrator Resource entry to manage different application resources,
Permissions account C
MFA Application release such as databases, web applications, and client
User
account 3 extension programs. It also supports OCR-based O&M
Resource
Third-party O&M account D audit, enabling you to convert graphical
Cloud server
personnel operations into text files for audit.
MFA User Resource
account 4 account E
You can set strict access permissions for
Temporary user Operation and audit Network device Abundant resources such as ECSs to ensure that only
permission control authorized users can gain access.
Pre-event planning In-event control Post-event audit
38 Huawei Confidential
Contents
1. Cloud Security Requirement Analysis
39 Huawei Confidential
Huawei Cloud Stack 8.2.1 Professional Security Services
1 Security assistant and assessment 2 Security operations support
DJCP MLPS assistant Solution design Security configuration Security hardening guide Security service deployment
Cryptography test assistant and assessment Asset exposure evaluation Dedicated security detection Security solutions design
Cloud platform cryptography test assistant
Attack path detection Security hardening Drills
Platform password assessment service
Tenant application cryptography test Security risk evaluation Onsite attendance assurance 24/7 attendance monitoring
assistant
Tenant password assessment service
3 Security training and consulting
Cloud computing service security assessment Security training Data security consulting
Cloud computing service security Security & compliance Security regulations
assessment assistant Data classification consulting Data security regulations consulting
training training
WAF HSS Database audit CBH ... Development support for SecMaster
Cloud security software planning, design, and implementation service (software) Cloud security integration service (hardware)
40 Huawei Confidential
Professional Security Service - Security Assurance Service
Help companies and organizations monitor security risks and events, and take effective
measures in a timely manner to continuously reduce security risks.
Security
Security Security service Security Key event Protection DDoS Security
Security warning check and
monitoring deployment hardening guide assurance drills mitigation assessment
hardening
41 Huawei Confidential
Contents
1. Cloud Security Requirement Analysis
42 Huawei Confidential
e-Government Cloud Technical Architecture Case (1)
43 Huawei Confidential
e-Government Cloud Technical Architecture Case (2)
Vulnerability Two-factor
Configuration check Log audit Bastion host
management authentication
Security
policy
deployment
Network Security exchange Firewall Anti-DDoS
Intrusion
VPN Network audit
Antivirus
platform detection gateway
44 Huawei Confidential
Ensuring Tenant Service Data Security from Multiple
Dimensions
VDCs isolate tenant
Access layer VM VM VM VM VM resources.
Https/Http
User SG1 SG2 VPC and SG isolate the
2 service network.
WAF VDC1
vRoute vFW1 VPC1 vFW protects VPC borders.
5
Application layer WTP
Application
4 VDC administrator Security service
DBAS
portfolio
1
abc 1 DBAS
123
3 HSS
3
Resource isolation
Platform layer VM VM VM HSS
System hardening 4 SSA
Storage
layer DR and backup 5 WTP
45 Huawei Confidential
Q&A
1. (True or false) HSS supports virus scanning and killing. ( )
46 Huawei Confidential
Q&A
2. (Single-answer question) Which of the following security areas does SSA
belong to? ( )
A. Application security
B. Data security
C. Host security
D. Security management
E. Cyber security
47 Huawei Confidential
Q&A
3. (Multiple-answer question) Which of the following functions are provided by
HSS of the current version? ( )
A. Antivirus
B. Host firewall
C. Intrusion prevention
D. Baseline inspection
48 Huawei Confidential
Summary
⚫ In this section, we have learned the overall security architecture of Huawei
Cloud Stack cloud security services, functions and application scenarios of
different security services, and use cases of Huawei Cloud Stack.
49 Huawei Confidential
Recommendations
• http://www.ictxuetang.com
• Huawei iLearning
• https://e.huawei.com/en/talent/portal/#/
50 Huawei Confidential
Acronyms and Abbreviations
• Anti-DDoS: Anti-Distributed Denial of Service
• AV: Antivirus
51 Huawei Confidential
Acronyms and Abbreviations
• CCE: Cloud Container Engine
52 Huawei Confidential
Acronyms and Abbreviations
• ELB: Elastic Load Balancer
• k8s: Kubernetes
53 Huawei Confidential
Acronyms and Abbreviations
• OBS: Object Storage Service
54 Huawei Confidential
Acronyms and Abbreviations
• VFW: Virtual Firewall
55 Huawei Confidential
Thank You
www.huawei.com