Effectively and Securely Using The Cloud Computing Paradigm
Effectively and Securely Using The Cloud Computing Paradigm
Effectively and Securely Using The Cloud Computing Paradigm
Agenda
Part 1: Effective and Secure Use
Understanding Cloud Computing Cloud Computing Security Secure Cloud Migration Paths Cloud Publications Cloud Computing and Standards
10
To be considered cloud they must be deployed on top of cloud infrastructure that has the key characteristics
11
12
Community cloud
shared infrastructure for specific community
Public cloud
Sold to the public, mega-scale infrastructure
Hybrid cloud
composition of two or more clouds
13
Community Cloud
Platform as a Service (PaaS) On Demand Self-Service
Public Cloud
Infrastructure as a Service (IaaS)
Essential Characteristics
Rapid Elasticity Measured Service Resilient Computing Geographic Distribution Service Orientation Advanced Security
15
Common Characteristics
16
17
Clouds are massively complex systems can be reduced to simple primitives that are replicated thousands of times and common functional units Cloud security is a tractable problem
There are both advantages and challenges
Former Intel CEO, Andy Grove: only the paranoid survive
18
20
Provisioning Service
Advantages
Rapid reconstitution of services Enables availability
Provision in multiple data centers / multiple instances
Challenges
Impact of compromising the provisioning service
22
Challenges
Isolation management / data multi-tenancy Storage controller
Single point of failure / compromise?
Challenges
Application multi-tenancy Reliance on hypervisors Process isolation / Application sandboxes
24
Challenges
Additional risk when integrated with customer applications Needs certification and accreditation as a separate application Code updates
25
Challenges
Virtual zoning with application mobility
26
EU Data Protection Directive and U.S. Safe Harbor program Exposure of data to foreign government and data subpoenas Data retention issues
Need for isolation management Multi-tenancy Logging challenges Data ownership issues Quality of service guarantees
29
Public cloud vs internal cloud security Lack of public SaaS version control
30
Additional Issues
Issues with moving PII and sensitive data to the cloud
Privacy impact assessments Suggested requirements for cloud SLAs Issues with cloud forensics
Using SLAs to obtain cloud security Contingency planning and disaster recovery for cloud implementations Handling compliance
FISMA HIPAA SOX PCI SAS 70 Audits
31
32
Cloud security issues may drive and define how we adopt and deploy cloud computing solutions
33
Organizations have more control over the security architecture of private clouds followed by community and then public
This doesnt say anything about actual security
Higher sensitivity data is likely to be processed on clouds where organizations have control over the security model
35
Putting it Together
Most clouds will require very strong security controls All models of cloud may be used for differing tradeoffs between threat exposure and efficiency There is no one cloud. There are many models and architectures. How does one choose?
36
39
40
Core features
43
Proposed Result
Cloud customers knowingly choose the correct mix for their organization of
standard portable features proprietary advanced capabilities
44
45
The virtual machine is the best focal point for fungibility Security and data privacy concerns are the two critical barriers to adopting cloud computing
46
51
53
54
Everything we think of as a computer today is really just a device that connects to the big computer that we are all collectively building
56
57
60
Virtualization Grid technology Service Oriented Architectures Distributed Computing Broadband Networks Browser as a platform Free and Open Source Software
Autonomic Systems Web 2.0 Web application frameworks Service Level Agreements
61
Web 2.0
Is not a standard but an evolution in using the WWW Dont fight the Internet CEO Google, Eric Schmidt Web 2.0 is the trend of using the full potential of the web
Viewing the Internet as a computing platform Running interactive applications through a web browser Leveraging interconnectivity and mobility of devices The long tail (profits in selling specialized small market goods) Enhanced effectiveness with greater human participation
Tim O'Reilly: Web 2.0 is the business revolution in the computer industry caused by the move to the Internet as a platform, and an attempt to understand the rules for success on that new platform. 62
Eric Knorr with Computerworld says that [there is an] increasing desperation on the part of IT to minimize application deployment and maintenance hassles
63
Multi-tenancy
One application instance may be serving hundreds of companies Opposite of multi-instance where each customer is provisioned their own server running one instance
Utility Computing
Computing may someday be organized as a public utility - John McCarthy, MIT Centennial in 1961 Huge computational and storage capabilities available from utilities Metered billing (pay for what you use) Simple to use interface to access the capability (e.g., plugging into an outlet)
66
68
Grid Computing
Distributed parallel processing across a network Key concept: the ability to negotiate resourcesharing arrangements Characteristics of grid computing
Coordinates independent resources Uses open standards and interfaces Quality of service Allows for heterogeneity of computers Distribution across large geographical boundaries Loose coupling of computers
69
Platform Virtualization
[Cloud computing] relies on separating your applications from the underlying infrastructure Steve Herrod, CTO at VMware Host operating system provides an abstraction layer for running virtual guest OSs Key is the hypervisor or virtual machine monitor
Enables guest OSs to run in isolation of other OSs Run multiple types of OSs
Increases utilization of physical servers Enables portability of virtual servers between physical servers Increases security of physical host server
70
Web Services
Web Services
Self-describing and stateless modules that perform discrete units of work and are available over the network Web service providers offer APIs that enable developers to exploit functionality over the Internet, rather than delivering full-blown applications. - Infoworld Standards based interfaces (WS-I Basic Profile)
e.g., SOAP, WSDL, WS-Security Enabling state: WS-Transaction, Choreography
Many loosely coupled interacting modules form a single logical system (e.g., legos)
71
71
Use of web services to compose complex, customizable, distributed applications Encapsulate legacy applications Organize stovepiped applications into collective integrated services Interoperability and extensibility
72
73
75
Green technologies can reduce energy costs by 50% IT produces 2% of global carbon dioxide emissions
77
Cloud Economics
Estimates vary widely on possible cost savings If you move your data centre to a cloud provider, it will cost a tenth of the cost. Brian Gammage, Gartner Fellow Use of cloud applications can reduce costs from 50% to 90% - CTO of Washington D.C. IT resource subscription pilot saw 28% cost savings Alchemy Plus cloud (backing from Microsoft) Preferred Hotel
Traditional: $210k server refresh and $10k/month Cloud: $10k implementation and $16k/month
78
Cloud Economics
George Reese, founder Valtira and enStratus
Using cloud infrastructures saves 18% to 29% before considering that you no longer need to buy for peak capacity
79
80
Vivek Kundra, CTO for the District (now OMB e-gov administrator) Migrating 38,000 employees to Google Apps Replace office software
Gmail Google Docs (word processing and spreadsheets) Google video for business Google sites (intranet sites and wikis)
It's a fundamental change to the way our government operates by moving to the cloud. Rather than owning the infrastructure, we can save millions., Mr. Kundra 500,000+ organizations use Google Apps GE moved 400,000 desktops from Microsoft Office to Google Apps and then migrated them to Zoho for privacy concerns 81
VMWare VCloud
Federate resources between internal IT and external clouds
82
vCloud Initiative
Goal:
Federate resources between internal IT and external clouds Application portability Elasticity and scalability, disaster recovery, service level management
83
n
LB
m
Worker Role
Web Role
Case Study: Facebooks Use of Open Source and Commodity Hardware (8/08)
Jonathan Heiliger, Facebook's vice president of technical operations 80 million users + 250,000 new users per day 50,000 transactions per second, 10,000+ servers Built on open source software
Web and App tier: Apache, PHP, AJAX Middleware tier: Memcached (Open source caching) Data tier: MySQL (Open source DB)
Thousands of DB instances store data in distributed fashion (avoids collisions of many users accessing the same DB) We don't need fancy graphics chips and PCI cards," he said. We need one USB port and optimized power and airflow. Give me one CPU, a little memory and one power supply. If it fails, I don't care. We are solving the redundancy problem in software.
86
87
New Features
Availability zones
Place applications in multiple locations for failovers
Elastic IP addresses
Static IP addresses that can be dynamically remapped to point to different instances (not a DNS change)
88
Amazon Cloud Users: New York Times and Nasdaq (4/08) Both companies used Amazons cloud offering
Didnt coordinate with Amazon, used a credit card! Used EC2 and S3 to convert 15 million scanned news articles to PDF (4TB data) Took 100 Linux computers 24 hours (would have taken months on NYT computers It was cheap experimentation, and the learning curve isn't steep. Derrick Gottfrid, Nasdaq
Nasdaq
Uses S3 to deliver historic stock and fund information Millions of files showing price changes of entities over 10 minute segments The expenses of keeping all that data online [in Nasdaq servers] was too high. Claude Courbois, Nasdaq VP Created lightweight Adobe AIR application to let users view data
89
Questions?
Peter Mell NIST, Information Technology Laboratory Computer Security Division Tim Grance NIST, Information Technology Laboratory Computer Security Division
Contact information is available from: http://www.nist.gov/public_affairs/contact.htm
92