Bài giảng An toàn thông tin cho môi trường ảo hoá và điện toán đám mây

An toàn thông tin cho môi trường o  
hoá và đin toán đám mây  
Khoi Ngo • Country Sales Manager  
Trend Micro Vietnam  
Copyright 2011 Trend Micro Inc.  
1
Classification 4/6/2011  
Ni dung  
Quan đim mi vAn toàn thông tin vi đin  
toán đám mây: ngăn chn him hotrước khi  
ti được máy tính vi thông tin nhn dng cp  
nht từ đám mây.  
1
2
3
An toàn thông tin vi môi trường o hoá: nhng  
vn đề tim n và gii pháp.  
Chn gii pháp an toàn thông tin cho các hệ  
thng o hoá để gim chi phí qun lý và tăng hệ  
số đầu tư (ROI).  
Copyright 2011 Trend Micro Inc.  
2
Classification 4/6/2011  
Ngày nay, hu hết him hoạ đến tInternet  
Top threat infection vectors  
(how threats arrive on PCs)  
1. Visits to malicious websites  
( 42% )  
92%  
2. Downloaded by other malware  
( 34% )  
3. Email attachments & links  
( 9% )  
TARGET  
4. Transfers from removable disks  
viruses  
( 8% )  
5. Other (mostly via Internet)  
( 7% )  
worms  
spyware  
8%  
source: Trend Micro  
botnets  
REMOVABLE MEDIA  
INTERNET  
Copyright 2011 Trend Micro Inc.  
3
độc, virus, malware, spyware…  
TrendLab 2010: 3 biến  
thmi/1.5 giây…  
malware mi mi ngày…  
Copyright 2011 Trend Micro Inc.  
Malware chiếm 90% các  
độc ghi nhn được  
2009 Verizon Security Report  
The Smart Protection Network  
Web  
Reputation  
File  
Reputation  
Email  
Reputation  
Endpoint  
Datacenter  
Messaging  
Web  
Threat Correlation,  
Feedback Loops,  
Analysis  
Data  
Trend Micro Enterprise Security  
SPAM  
Corporate  
Employee  
Data & Systems  
Devices  
FILES  
WEBSITES  
EMAIL  
THREAT  
S
THREAT  
S
THREAT  
S
LINKS &  
ATTACHMENTS  
Bo vkhách hàng tt hơn!  
Trend Micro: Mã độc bnhn dng ngăn chn trước khi đến được máy tính ca bn  
Quan đim cũ: cho mã độc thâm nhp và quét chúng vi pattern file  
Email Reputation  
Web Reputation  
WRS prevents  
ERS blocks  
access to  
malicious  
spammed  
emails  
URLs  
IP  
URL  
File Reputation  
FRS detects  
and prevents  
download of  
malicious  
binary files  
Files  
Trend Micro Enterprise Security  
Web Security  
Web Gateway Security  
Website Security  
Endpoint Security  
PC, Laptop, Mobile Device Security  
Extensive Platform/OS Support  
Unified Security & Systems Mgt  
Messaging Security  
Email Gateway Security  
Mail & Collaboration  
Server Security  
Data Center Security  
Business Server Security  
Protection, Integrity, Compliance  
Physical/Virtual/Cloud Computing  
Solutions & Services  
Regulatory Compliance  
Threat Management Services  
Premium Support Service & more  
Data Protection  
Data Loss Prevention  
Email & Endpoint Encryption  
Central Management  
Centralized Security Mgt  
Unified Security & Systems Mgt  
Copyright 2011 Trend Micro Inc.  
Thi gian đưa ra bn vá cho mã đc mi  
Titanium is faster than any of its competitors at providing  
protection against newly identified web threats.  
#1  
Time to Protect  
Average time after first exposure for security vendor to  
provide protection against a new threat  
source: NSS Labs Report, “Endpoint Protection Products Test Report for Socially Engineered Malware”, September 2010  
Malware bphát hin và ngăn chn trưc khi phát tác  
Titanium is the best at catching web threats before  
they execute on a user’s computer  
#1  
error bars are 95% confidence interval for number of malware tested  
Malware Caught before Execution  
# malware tested = 1122  
%of malware attacks blocked before being executed on the endpoint  
source: NSS Labs Report, “Endpoint Protection Products Test Report for Socially Engineered Malware”, September 2010  
Ni dung  
Quan đim mi vAn toàn thông tin vi đin toán  
đám mây: ngăn chn him hotrước khi ti được  
máy tính vi thông tin nhn dng cp nht từ đám  
mây.  
1
2
3
An toàn thông tin vi môi trường o hoá:  
nhng vn đề tim n và gii pháp.  
Chn gii pháp an toàn thông tin cho các hệ  
thng o hoá để gim chi phí qun lý và tăng hệ  
số đầu tư (ROI).  
Copyright 2011 Trend Micro Inc.  
12  
Classification 4/6/2011  
Nhng giai đon ca ltrình o hoá  
Stage 1  
Stage 2  
Stage 3  
IT Production  
Business Production  
IaaS  
85%  
Servers  
70%  
30%  
Desktops  
15%  
Copyright 2011 Trend Micro Inc.  
4/6/2011  
13  
Nhng thách thc van toàn thông tin trên ltrình o hoá  
VMware and Trend Micro help customers address these issues, and accelerate the journey  
IT Production  
Business Production  
ITaaS  
12  
Data destruction  
Multi-tenancy  
11  
10  
Diminished perimeter  
9
Data access & governance  
Data confidentiality & integrity  
Compliance / Lack of audit trail  
Complexity of Management  
8
7
6
5
Resource contention  
Mixed trust level VMs  
Instant-on gaps  
4
3
Inter-VM visibility & attacks  
2
1
Host controls under-deployed  
08-31  
Security Challenges Defined  
(Explains the security and compliance challenges previously outlined)  
Compliance/Lack of audit trail  
Host-based controls under-deployed  
File Integrity Monitoring, host IDS/IPS and anti-  
malware are often under-deployed, because of cost,  
complexity or performance.  
1
7
Higher levels of consolidation put greater stress on the  
ability to ensure compliance, particularly amongst  
mission critical / Tier 1 applications. As well,  
virtualization makes it more difficult to maintain audit  
trails, and understand what, or by whom, changes were  
Inter-VM visibility & attacks  
Traditional network security devices cannot detect  
or contain malicious inter-VM traffic.  
2
3
made.  
Data confidentiality & integrity  
8
Unencrypted information in cloud environments is  
subjected to various risks including theft,  
unauthorized exposure and malicious manipulation  
Instant-on gaps  
It’s all but impossible to consistently provision  
security to “instant-on” VMs, and keep it up-to-date.  
Dormant VMs can eventually deviate so far from the  
baseline that merely powering them on introduces a  
massive security hole.  
Data access & governance  
9
RESTful-authentication* in the cloud can be  
susceptible to brute force and hijacking, attacks  
allowing unauthorized data access. Breakdown in  
the separation of duties might allow unauthorized  
vendor access to data. (* REpresentational State  
Mixed trust level VMs  
4
5
6
Workloads of different trust levels are likely being  
consolidated onto a single physical server without  
sufficient separation..  
Transfer)  
Diminished perimeter  
1
0
Security mechanisms are under the cloud service  
provider’s control and perimeter security  
mechanisms are significantly diminished.  
Resource contention  
Resource-intensive operations (AV storms &  
pattern-file updates) can quickly result in an extreme  
load on the system.  
Multi-tenancy  
1
1
In cloud environments, your VMs exist with other  
unfamiliar, potentially hostile VMs with unknown  
security.  
Complexity of Management  
Virtualization has led to the proliferation of more  
virtual machines (VM sprawl) than their physical  
predecessors, leading to increased complexity in  
provisioning security agents to each VM, and  
constantly reconfiguring, patch and rolling out  
patterns to each VM.  
Data destruction  
1
2
Some cloud providers do not overwrite storage  
before recycling it to another tenant; in some cases  
where the storage is overwritten, data may be  
vulnerable after a system crash or unexpected  
termination.  
Copyright 2011 Trend Micro Inc.  
15  
4/6/2011  
Securing Servers the Traditional Way  
AV  
AV  
AV  
Ap  
Ap  
Ap  
p
p
p
OS  
OS  
OS  
Network  
IDS / IPS  
ESX Server  
Anti-virus: Local, agent-based protection in the VM  
IDS / IPS : Network-based device or software solution  
Copyright 2011 Trend Micro Inc.  
Tn công gia các VM cùng server vt lý  
Inter-VM attacks  
1
Copyright 2011 Trend Micro Inc.  
17  
Classification 4/6/2011  
Lhng an ninh ca các VM activate/inactivate/  
dormant/newly added…  
Instant-on gaps  
2
Reactivated with  
out-of-date security  
New VMs  
Active  
9 9 8 8 8 8  
Copyright 2011 Trend Micro Inc.  
Chênh lch vmc độ bo mt và qun lý gia  
các VM cùng server vt lý  
Mixed trust level VMs  
3
ERP  
Email  
Web  
Test  
CRM  
Copyright 2011 Trend Micro Inc.  
19  
Classification 4/6/2011  
Quá nhiu chun bo mt cn tuân thủ  
Compliance  
4
?
Audit Trail !  
?
?
?
Copyright 2011 Trend Micro Inc.  
20  
Classification 4/6/2011  
Tiêu thụ đáng kngun lc ca server  
Resource contention  
5
9:00am Scan  
Typical AV  
Console  
Copyright 2011 Trend Micro Inc.  
21  
Classification 4/6/2011  
Ri ro van ninh thuc vkhách hàng sdng  
dch vca “đám mây”  
Data confidentiality and integrity  
6
The cloud user is  
responsible for security,  
and needs to plan  
accordingly.  
end Micro Inc.  
22  
Tải về để xem bản đầy đủ
pdf 40 trang baolam 10/05/2022 6180
Bạn đang xem 20 trang mẫu của tài liệu "Bài giảng An toàn thông tin cho môi trường ảo hoá và điện toán đám mây", để tải tài liệu gốc về máy hãy click vào nút Download ở trên

File đính kèm:

  • pdfbai_giang_an_toan_thong_tin_cho_moi_truong_ao_hoa_va_dien_to.pdf