29
Secure Hybrid Cloud on Z Dave Hay [email protected] IBM Cloud Hyper Protect Services 6 November 2019 Session PH

Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

Secure Hybrid Cloud on ZDave [email protected] Cloud Hyper Protect Services

6 November 2019

Session PH

Page 2: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

Agenda

• The Challenge

• Hyper Protect – Base Technology

• Hyper Protect Services Overview

• Hyper Protect in a Private Cloud

Page 3: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

IBM Cloud Hyper Protect Services | © 2019 IBM Corporation

trusttransitive verb\ ˈtrəst \1a: to rely on the truthfulness or accuracy ofb: to place confidence inc: to hope or expect confidently soon2a: to commit or place in one's care or keepingb: to permit to stay or go or to do something without fear or misgiving

https://www.merriam-webster.com/dictionary/trust

In whom or what do you trust?What is most important to you?

Page 4: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

Your EnterpriseThird Party

Mr. Malicious

IBM Cloud SRE

Application AdminGovernment Agent

Network Admin

Application User

Database Admin

Developer

Hardware Vendor Software Vendor Storage Admin

IBM Cloud Hyper Protect Services | © 2019 IBM Corporation

Page 5: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

IBM Cloud Hyper Protect Services | © 2019 IBM Corporation

Your EnterpriseThird Party

Mr. Malicious

IBM Cloud SRE

Application AdminGovernment Agent

Network Admin

Application User

Database Admin

Developer

Hardware Vendor Software Vendor Storage Admin

Page 6: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

6

73%… of organizations allow the root user account to be used to perform activities, which goes against security best practices. --RedLock, 2018

83%of vulnerable hosts in the cloud are receiving suspicious traffic.

58%… of Healthcare PHI Data Breaches Caused by Insiders

Verizon found that healthcare PHI data breaches are most likely due to insider threats, with healthcare the only industry where internal actors are the greatest threat.

16%… of organizations have user accounts that have potentially been compromised, the report stated.

8%of organizations have been impacted by cryptocurrency mining

https://www.techrepublic.com/article/tesla-public-cloud-environment-hacked-attackers-accessed-non-public-company-data/https://healthitsecurity.com/news/58-of-healthcare-phi-data-breaches-caused-by-insiders

Page 7: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

Secure Service Containers

EAL5+

PR/SM

SSC LPAR SSC LPAR

Secure Service Container

Container 1

VM

Container 2

Isol

atio

n

VM

• No system admin access• Data at rest, transport protection• Once the appliance image is built,

OS access (ssh) is not possible• Memory access disabled• Encrypted disk• Debug data (dumps) encrypted• Signed Docker images• Secure boot

Page 8: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

https://www.threatstack.com/blog/73-of-companies-have-critical-aws-security-misconfigurations

Inside datacenter physical attack Remote attack (shell access) Privilege escalation

IBM Cloud Hyper Protect services are based on LinuxONE secure enclave technology.

• Firmware sets no memory (dump) access

• Encryption keys stored in only public cloud FIPS 140-2 level 4 compliant HSM.

73% of AWS users analyzed leave SSH wide open to the internet, allowing potential compromise. Console access is also common.

Secure enclave technology has:

• No SSH, console or shell access, of any kind to the host layer.

Kubernetes workers and containers on shared hosts allow potential exploits, B2B or, when wholly-owned by one org, dept. to dept.

IBM Cloud Hyper Protect:

• Uses runq, not runc, to isolate each worker in an SSC secure enclave

• SSC LPARs have EAL5+ isolation.

Page 9: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

9

IBM Cloud Hyper Protect ServicesIndustry-leading security for Cloud data, digital assets and workloads

Hyper Protect Crypto Services

Keep your own keys for cloud data encryption protected by a dedicated cloud HSM*

* Industry’s only FIPS 140-2 level 4 certified HSM

Hyper Protect DBaaS

Complete data confidentiality for your sensitive data

(PostgreSQL, MongoDB EE)

IBM Cloud Hyper Protect Virtual Servers

Instantiate Linux VMs with own public ssh key to maintain exclusive access to code and data

(Ubuntu)

IBM Hyper Protect Virtual Servers

Build and instantiate your own Linux VM based applications with integrity and established provenance on your own LinuxONE

(Ubuntu)

GA BetaGA

Built On LinuxONE secure enclaves

Tech Preview

Page 10: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

10

Dallas MZR

Frankfurt MZR

Sydney MZRIBM Hyper Protect Regions 2019https://www.ibm.com/cloud/hyper-protect-services

IBM Hyper Protect Regions: 1H2019

Page 11: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

• IBM Hyper Protect Crypto Services

• Dedicated key management and cloud HSM service

• Keep your own keys for cloud data encryp3on in a dedicated cloud HSM

Ø IBM Cloud admins do not ever have access to customer keys

Ø Key Lifecycle Management and support for Keep Your Own Key (KYOK) for cloud data encryption, with keys protected by customer controlled, dedicated cloud HSMs

Ø Integrates using Key Protect APIs to secure IBM Cloud data and storage services

Ø Provides industry's first and only FIPS 140-2 Level 4 certified HSMs in the public cloud market today

Ø First cloud provider to provide dedicated (cloud) CLI for HSM Key Ceremony, supporting multiple personnel with crypto key responsibilities

Ø Supports industry standards – PKCS #11

• Customer Benefits:

Ø Full control of the entire key hierarchy including the HSM Master Key

Ø Industry-leading security for Cloud data and digital assets

Ø Reduced data compromise risk due to in-built protection against privileged access threats

Ø Regulatory compliance through data encryption and controls on privileged access

BYOK: Bring Your Own KeyKYOK: Keep Your Own KeyHSM: Hardware Security ModulePKCS: Public Key Cryptography Standards

Page 12: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

• IBM Hyper Protect DBaaS

• Provision and manage highly secure, high volume databases*

for your sensitive data• * PostgreSQL and MongoDB EE

Ø IBM cloud admins cannot ever access customer dataØ Industry-leading data confidentiality through built-in

workload isolation, restricted administrator access, tamper protection against internal threats

Ø High availability and reliability for mission critical applications

Ø Supports industry compliance and certifications - GDPR *

Ø Provides standard APIs to provision, manage, maintain and monitor multiple database types

Ø Integrates with IBM Cloud services for access management, logging and monitoring

• Customer Benefits:

Ø Data owner maintains complete control over data

Ø Application developers can easily provision secure data stores for sensitive data without specialized skills

Page 13: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

• IBM Cloud Hyper Protect Virtual Servers - Beta

• Instantiate Linux VMs with own public SSH key to maintain exclusive access to code and data

• Ubuntu based VM

Ø IBM Cloud admins cannot ever access customer VMs

ØSelect and deploy a dedicated Linux VM in a Secure Service Container

ØSecure customized data and code vaults that can only be accessed via APIs

ØAccess to all software available in Docker hub for S390X, and run it as a dedicated VM

Øhttps://www.ibm.com/cloud/blog/announcements/announcing-ibm-cloud-hyper-protect-virtual-servers-beta

• Customer Benefits:

Ø An easy-to-use UI to spin up new virtual server instances and to maintain and monitor the instances

Ø No changes to application code

Ø Support for industry certifications and client regulatory compliance activities

Page 14: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

IBM Hyper Protect Virtual Servers – Tech Preview

Page 15: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

Before we begin … Docker ™From VMs ….

To containers …

Virtual appliance plaPorm

Based upon hypervisor

Hardware abstracQon

VM includes full OS

Windows on macOS, Linux on Windows, macOS on macOS

Images start big

Images grow like Topsy

Share host OS kernel

Process isolaQon

Each container is its own process

Typically Unix-based

Images typically much smaller than VMs

Vastly enables app portability

Linux on Linux, Linux on macOS

Windows ( on Windows ) containers now available

Docker Docs - Get Started, Part 1: Orientation and setup

Page 16: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

ApplicaQon Secrets

Virtualisation

As-Is: Run a Virtual Server as a Container

Build/TestCode

App

Deploy

Data

Infrastructure Manager (Manage VirtualisaQon and Data Storage)

Application Manager

ApplicaQon Builder

Application Developer

Package

App

Registry

App

Store

Server

Server

App

Server

Secrets

xApp

Server

Secrets

StaQc Code Scanning

Image Vulnerability Scanning

Page 17: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

Image Vulnerability Scanning

StaQc Code Scanning

ApplicaQon Secrets

Virtualisation

As-Is: Run a Virtual Server as a Container

Build/TestCode

App

Deploy

Data

Infrastructure Manager (Manage VirtualisaQon and Data Storage)

Application Manager

ApplicaQon Developer

Package

App

Registry

App

Store

Server

Server

App

Server

Secrets

App

Server

SecretsApplicaQon Builder

Direct Memory access?

Data access?Where did this come

from?

Need to see all secrets?

Is this code safe?

Did they build what they were supposed to?

Page 18: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

ApplicaQon Developer• Role: Develops the applicaQon source code and tests it out• Key Threat: Could deliberately or accidently introduce vulnerabiliQes into the source

ApplicaQon Builder• Role: Builds the applicaQon source wriaen by the applicaQon developer, probably using a CICD

pipeline.• Key Threat: Could build alternaQve source code to what they are supposed to, introducing

vulnerabiliQesApplicaQon Manager

• Role: A trusted role that deploys applicaQons into the producQon environment• Key Threat: Deployments require vendor and user secrets to access images and data, with

those secrets they are in a posiQon to misuse them.Infrastructure Manager

• Role: A trusted role that manages the infrastructure that the client’s applicaQon runs on• Key Threat: Could misuse infrastructure access to gain access to secrets and data

IBM Hyper Protect Virtual Servers - Personas

Page 19: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

Public and Private Cloud Services

HosQng Appliance

Infrastructure Manager (Manage Servers and Data Storage)

REST

Application Secrets

Use Case: Restrict infrastructure manager’s access to application data

Build/TestCode

App

Deploy

LocalData

ApplicaQon Manager

Application Builder

Application Developer

Package

App

Registry

App

Store

Server

Server

App

Server

Secrets

App

Server

Secrets LocalData

Remote Data/

Service

Keys used to encrypt and decrypt local data

StaQc Code Scanning

Image Vulnerability Scanning

Page 20: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

Public and Private Cloud Services

HosQng Appliance

Use Case: Restrict Application Manager’s access to builder/vendor secrets

Build/TestCode

AppLocalData

Infrastructure Manager (Manage Servers and Data Storage)

Application Builder

ApplicaQon Developer

Package

App

Registry

App

Store

Server

Server

App

Server

Secrets

App

Server

Secrets

REST

LocalData

Remote Data/

Service

Registration File signing public key

HosQng Appliance RegistraQon File Public KeyHosting Appliance Registration File Private Key

+ User’sApplication

Secrets

Deploy

ApplicaCon Builder

Registration FIle

Builder ApplicaQon

Secrets

Image location

ApplicaCon Manager

Sign and EncryptRegistration File signing private key

StaQc Code Scanning

Image Vulnerability Scanning

Page 21: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

Public and Private Cloud Services

+ User’sApplicaQon

Secrets

Hosting Appliance

Use Case: Ensure Integrity of Images

Build/Test

Code

LocalData

Infrastructure Manager (Manage Servers and Data Storage)

Application Developer

Registry

Store

App

Server

Secrets

App

Server

Secrets

REST

LocalData

Remote Data/

Service

Code Repository

App

Server

RegistraQon FIle

Builder Application

SecretsDeploy

Application Builder

Image locaQon Application

Manager

Sign and EncryptDCT public key

Secure Build

Application Builder

App

Server

REST

DCT private key

Static Code Scanning

Image Vulnerability Scanning

Page 22: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

Public and Private Cloud Services

+ User’sApplication

Secrets

HosQng Appliance

Use Case: Determine the provenance of Images

Build/Test

Code

Secure Build

LocalData

Infrastructure Manager (Manage Servers and Data Storage)

Registry

App

Store

Server

App

Server

Secrets

App

Server

Secrets

REST

LocalData

Remote Data/

Service

REST

Code Repository

App

Server

Deploy

Registration FIle

Builder ApplicaQon

Secrets

Image location

Application Builder

ApplicaCon Developer

Manifest

Code

Image locaQon

Audit Image Approval to use

Application Manager

Manifest signing public key

Manifest signing private key

StaQc Code Scanning

Image Vulnerability Scanning

Page 23: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

Key SummaryKey Usage Actors with access Where key is located

Generic keys Represent keys that are used to access locally stored data encrypted at rest

None Application runtime infrastructure

Hosting Appliance Registration File Public Key

Encrypting JSON format registration files All In IBM HPVS CLI tool

Hosting Appliance Registration File Private Key

Decrypting JSON format registration files None Internally within the Hosting Appliance

Registration File signing public key Validation of updates to a JSON format registration file by the Hosting Appliance

Application Builder JSON format registration file

Registration File signing private key

Signing a JSON format registration file before encryption

Application Builder at a minimum

Location managed by application builder or application builder’s org

Manifest signing public key Validating the signature of a build manifest file Application Builder In the secure build and where needed to validate manifest signature

Manifest signing private key Signing a build manifest file None Internally

Docker Content Trust (DCT) public key

Validating image integrity Anyone with access to the Docker notary

Secure build and Docker notary

DCT private key Signing an image None Secure build only

Page 24: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

24

Tech Preview - Support to build your own image

ØWhich Docker FROM?Ø Choose from 2 images based upon the IBM Cloud Hyper Protect Virtual Servers

image1. With SSH access2. With NO SSH access

ØThe supplied images use quotagroups within the SSC for dataØCLIØ Build image using a secure buildØ Create registration file to describe the application imageØ Deploy your virtual server image(s)Ø Managing your virtual servers

Page 25: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

The CLI tool runs here• securebuild create• securebuild update• securebuild log• regfile create• repository create• hpvs startetc.For the record, the CLI tool is also a Docker container J

Developer builds a Dockerfilein a GitHub repository

SBS clones and builds from GitHub repository

SBS tags, signs and pushes image to Docker Hub repository CLI directs

SSC to pull and run trusted image from Docker Hub

SBS optionally pushes Docker manifest to Cloud Object Store

AB

C

D

E

From GitHub to Docker Hub

https://github.com/logos

https://www.docker.com/company/newsroom/media-resources

Page 26: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

26

IBM Cloud Hyper Protect ServicesIndustry-leading security for Cloud data, digital assets and workloads

Hyper Protect Crypto Services

Keep your own keys for cloud data encryption protected by a dedicated cloud HSM*

* Industry’s only FIPS 140-2 level 4 certified HSM

Hyper Protect DBaaS

Complete data confidentiality for your sensitive data

(PostgreSQL, MongoDB EE)

IBM Cloud Hyper Protect Virtual Servers

Instantiate Linux VMs with own public ssh key to maintain exclusive access to code and data

(Ubuntu)

IBM Hyper Protect Virtual Servers

Build and instantiate your own Linux VM based applications with integrity and established provenance on your own LinuxONE

(Ubuntu)

GA BetaGA

Built On LinuxONE secure enclaves

Tech Preview

Page 27: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

Any Questions?

Page 28: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

And finally …..

https://www.meetup.com/MainframerZ-London/

Page 29: Secure Hybrid Cloud on Z - conferences.gse.org.uk · Before we begin … Docker ™ From VMs …. To containers … Virtual appliance plaPorm Based upon hypervisor Hardware abstracQon

Please submit your session feedback!

• Do it online at http://conferences.gse.org.uk/2019/feedback/PH• This session is PH