• No results found

Rackspace Private Cloud Security

N/A
N/A
Protected

Academic year: 2021

Share "Rackspace Private Cloud Security"

Copied!
12
0
0

Loading.... (view fulltext now)

Full text

(1)

Rackspace

®

Private

Cloud Security

Written by: Joe Burke

(2)

Table of Contents

1. Introduction

2

2. Rackspace Private Cloud Security

3

Configuration Options

3. Operational Security

5

4. Physical Security

7

5. Network Security

9

(3)

1: Introduction

Security is a very complex topic for every organization. Challenges can include legisla-tive requirements and internal procedures spanning across both the physical, logical, and virtual layers. Although the uniqueness of customer needs can be endless, Rack-space Private Cloud is designed with the flexibility to meet these needs.

The key to having a well-secured environment is not just identifying the risks, but ensuring the appropriate controls are in place and that they are being actively moni-tored. While Rackspace Private Cloud provides the flexibility, Fanatical Support® brings best-practices and experience in managing the infrastructure to help achieve customer’s control objectives.

This document will provide an introductory understanding of:

1. Security configuration options available within Rackspace Private Cloud 2. Security of customer’s Rackspace Private Cloud if hosted at Rackspace

3. Security of customer’s Rackspace Private Cloud if hosted within a customer’s data center

4. Security and Fanatical Support service

• For a Rackspace Private Cloud hosted at Rackspace

• For a Rackspace Private Cloud hosted with a customer’s data center ASSumPtIONS

Users reading this should have a basic understanding of the following concepts; if not, some reference links are provided:

• Familiarity with the components of Rackspace Private Cloud and Rackspace Public Cloud

• Security Industry standards and regulations including: ISO 27001, SSAE16,

FISmA, HIPAA

Difference between Software-, Platform-, and Infrastructure-as-a-service

Please note that Rackspace provides various levels and types of Rackspace Private Cloud Support Services, not all information in this whitepaper will apply to all such services. For more detail about which Rackspace Private Cloud services can meet your needs, please contact a sales associate.

(4)

2: Rackspace Private Cloud Security

Configuration Options

OpenStack® offers a variety of options on how to secure a cloud. AutHENtICAtION/IDENtIty mANAgEmENt

Within the Rackspace Private Cloud, identities can be authenticated using either internal or external authentication protocols like: LDAP and Active Directory. This allows enterprises to reuse their existing infrastructure.

AutHORIzAtION/ROlE mANAgEmENt

Rackspace Private Cloud provides preconfigured roles and role assignment. Roles provide fine-grained authorization over specific actions and are assigned to identified users. Customers can define custom roles to meet specific compliance or operational needs, e.g. segregation of duties. These are defined within each of the cloud components. For example, a ‘Cloud Operator’ role might be configured to:

• Add a new nova compute guest VM • Add additional storage to a zone

• View an availability zone but not create one HOSt OPERAtINg SyStEmS

Rackspace Private Cloud recommends hardening the host Operating Systems. Many current Private Cloud customers currently do this and the Rackspace Private Cloud team will collaborate with customers to recommend a strategy based upon current corporate standards.

guESt/Vm OPERAtINg SyStEmS

The OpenStack Image service, Glance, as implemented in the Rackspace Private Cloud, can be integrated into an enterprise’s existing change management and image release process. This allows the use of an organizations existing, hardened images. Please consult with the Rackspace Private Cloud team for a list of the latest supported base Operating Systems.

(5)

multI-tENANCy

A core element of OpenStack is its support for multi-tenancy. Rackspace Private Cloud leverages this by initially installing a configuration that ensures isolation between tenants. Tenant isolation can be used to prevent unrestricted communication between business units or application domains. This best practice safeguards against cross-VLAN communication by restricting ingress traffic based on destination port and source IPs. If desired, configurations are also possible that could allow inter-VLAN communication. Rackspace Private Cloud architects will work with customers to understand their needs and recommend an appropriate solution.

Similarly, this practice also extends down into the storage platform by leveraging the OpenStack Identity security service.

COmmuNICAtION

Rackspace Private Cloud recommends separating management and internal service traffic onto separate networks. Internally, OpenStack internal communications are performed as RESTful API calls that can be secured via SSL/TLS certifications. Looking forward, OpenStack’s security groups are actively advancing Firewall-as-a-Service and other OpenStack networking features enabling multiple levels of software defined network isolation.

Fanatical Support FOR PRIVAtE ClOuD

Fanatical Support for Private Cloud starts with a team that has expert knowledge in OpenStack, applies that knowledge to a customer’s specific platform needs, imple-ments the cloud while complying with a customer’s compliance standards, and continues with a support team monitoring the health of the environment.

(6)

3: Operational Security

Rackspace Hosting policies and procedures set a high standard that each employee, consultant, and third-party service provider is required to follow. These corporate stan-dards cover key functions like:

• password-based access • password expiration

• automatic workstation locking

• documented change management and escalation procedures • onboarding training

• VPN-base access

• access that are monitored and independently audited

Rackspace maintains documented operational procedures for both infrastructure opera-tions and customer-facing support funcopera-tions. Newly provisioned infrastructure under-goes appropriate testing procedures to limit exposure to any hardware failure. Docu-mented procedures and configuration version controls provide protection from errors during configuration. Changes to an existing infrastructure are controlled by a technical change management policy, which enforces best practice change management controls including impact/risk assessment, customer sign off, and back-out planning.

Rackspace participates in and maintains the following audit reports, certifications, and documentation:

• SSAE 16 / ISAE 3402 (formerly SAS70 Type II) Audit Reports • Safe Harbor Self-Certification

• ISO 27001 Certification(s)

• PCI Attestation of Compliance & PCI DSS Validated Service Provider • CDSA Certification

• SOC2 Data Centers in Security & Availability Report • SOC3 Data Centers in Security & Availability Report

Whether the cloud is hosted in a Rackspace data center or in a customer’s data center, the support team will adhere to both Rackspace corporate as well as the customer’s policies and procedures. The Rackspace team will work with customers to determine the appropriate level of access and proper delineation of responsibilities to support the Private Cloud including identifying any logistical steps needed.

(7)

Below is an example of key functions and responsibilities based upon where the Rackspace Private Cloud (RPC) is deployed

Responsibility Hosted @ Rackspace Hosted @ Customer DC

Hardware & Data Center Rackspace Customer

Networking Rackspace Customer

RPC Host OS Rackspace Either

Backup (Host OS) Rackspace Either RPC Components Rackspace Rackspace

Patching RPC Rackspace Either

Monitoring RPC Either Either

RPC Upgrades Rackspace Either

Cloud Capacity Planning Rackspace Either Guest OS Imaging

Creation and Patching Customer Customer Instance Deployment Customer Customer Application Management Customer Customer

Should a Private Cloud be deployed at a customer’s data center and supported by Rackspace, the Rackspace support team is willing to work with customers to under-stand their specific security under-standards and derive a solution that meets or exceeds those standards.

DAtA SECuRIty/BACkuP

Rackspace Private Cloud allows third-party encryption tools to be used throughout the infrastructure, including SSL/TLS certifications and file/database encryption, giving customers flexibility to reuse their current encryption tools. While no solution is prescribed, Rackspace Implementation teams will work with customers to provide guidance on how to integrate these.

Rackspace Private Cloud is integrated with Rackspace Managed Backup service, giving customers the ability to securely back up Host Machine information.

Operationally, the Rackspace Private Cloud support team can actively monitor the cloud environment and proactively reach out to customers when actions are required. Rackspace recommends and most customers prefer to provide an approval prior to any

(8)

4: Physical Security

For Private Clouds hosted in a Rackspace data center, physical security concerns are addressed across the data center and network.

DAtA CENtER

Rackspace Private Cloud is available in Rackspace data centers globally. Rackspace data centers’ physical security capabilities include:

• Two-factor authentication required to access all data center facilities.

• Electromechanical locks controlled by biometric authentication (hand geometry or fingerprint scanner) and key-card/badge.

• Access to secure sub-areas allocation on a role-specific basis

• Authorized Rackspace personnel’s access to the facilities is reviewed on a monthly basis by management

• Termination and role-change control procedures are in place so that any physical or logical access rights are removed in a timely manner when access is no longer necessary or appropriate

• Closed circuit video surveillance is installed at all entrance points on the interior and exterior of the buildings that house data centers. Cameras are monitored 24x7x365 by on-site security personnel and support data retention for 90 days. • Sensitive equipment such as information processing facilities, including customer

servers, is housed in secure sub-areas within each data center’s secure perimeter and is subject to additional controls

• Centralized Security Management Systems are deployed at all data centers to control the Electronic Access Control Systems and closed circuit television networks.

Rackspace data centers are operational 24x7x365 and are manned around-the-clock by a security team and engineering/operations personnel. Appropriate additional perimeter defense measures, such as walls, fencing, gates and anti-vehicle controls are in place at Rackspace data centers. The delivery and loading bays at all Rackspace data centers are separate areas secured by defined procedures and security controls.

(9)

Unauthorized visitors are not permitted access to the data centers. Authorized data center visitors are required to abide by the following rules:

• Authorized approvers must specifically grant visitor access to the data centers at least 24 hours before the scheduled visit

• Visitors must have a valid reasons for entering the data center

• Visitors must sign the visitor’s log, present a valid photo ID, and specify the reason for visiting and a Rackspace point of contact

• Visitor badges differ in appearance from Rackspace employee badges and do not provide any control over doors, locks, etc.

• All visitor access is logged. This policy applies equally to Rackspace employees not assigned to the data center.

• Visitors, including Rackspace customers, are strictly forbidden from accessing the data halls themselves and other secure sub areas.

• Visitors must be escorted at all times while at any Rackspace facility.

• Data center management performs a monthly audit of security and visitor access logs

(10)

5: Network Security

Whether deployed at Rackspace or within a customer’s data center, network security is as equally important as physical security and encryption. OpenStack Neutron Network component is a software defined network that provides enhanced flexibility on how to manage your virtual network. Security over these networks can be applied in a variety of ways. Rackspace Private Cloud architects and support team members will work with customers to help identify and develop an appropriate solution to meet their current and future needs.

NEtwORk SECuRIty wItHIN A RACkSPACE DAtA CENtER

All Rackspace network infrastructure devices are located in a physically secure data center with controlled access. All visitors or authorized contractors are logged and escorted. Local console access to network devices is restricted to authorized individuals and requires access to the physical location as well as the correct username and password for console login. While Rackspace utilizes a wireless infrastructure for corporate connectivity, wireless access points are not permitted in the data halls where the cloud infrastructure resides, and regular scans are performed to identify and neutralize rogue access points.

Administrative access to the networking devices underlying the cloud infrastructure is controlled via industry standard practices (TACACS+) and is subject to appropriate logging and monitoring, records of which are retained for one year. Logical access to cloud infrastructure network devices is only provided to those Rackspace employees with a business requirement for such access, and is subject to permissions change control including independent managerial authorization and timely revocation of access rights. SSL is used to encrypt administrative sessions.

Implementing new cloud environments is performed according to standardized procedures in order to minimize the risk of accidental insecure network provisioning. Rackspace maintains strict policies on the use of network services. The network services underlying our cloud infrastructure are subject to DDoS/DoS mitigation and network policy enforcement controls, ensuring the best possible quality of connection to the customer’s cloud environment and maximizing the stability of the environment. These include anti-spoofing controls and IP prefix-lists, as well as Unicast Reverse Path Forwarding (URPF) protocols in place at edge routers in data centers hosting cloud environments.

(11)

6: Recommended Customer Controls

When hosted at Rackspace, the infrastructure controls are designed to protect cloud resources from attack within the environment, appropriately control and provide assurance over Rackspace access to customer cloud resources. The customer should seek to protect their cloud resources and hosted data with measures overlaying Rackspace infrastructure controls as appropriate to their data’s sensitivity and criticality as informed by a formal risk assessment.

Customers are the primary owner of their data and maintain sole visibility over its specific security requirements. Accordingly, customers are responsible for classifying their data and applying appropriate risk mitigation controls. Customer’s sensitive data should be encrypted for storage in order to preserve confidentiality. Rackspace recom-mends that data being transmitted to and from the cloud should be subject to encryp-tion appropriate to its requirements, for example the use of TLS or a secure VPN. Rackspace Private Cloud customers can interact with the environment at an administra-tive level via API. Authentication is required in order to use them. Customer applications that interface with APIs should undergo adequate security testing and maintain best practice application security controls including communication with our SSL protected API endpoints via HTTPS. Customers should consider tightly restricting access to API keys and account credentials to those employees with a legitimate business require-ment, as well as segregating duties to maintain accountability.

As primary system administrator of the cloud resources, the customer is responsible for managing user accounts creation, provisioning and destruction, password policies, server level account authentication mechanisms, etc. Rackspace recommends that customers integrate their Private Cloud with their organizational single-sign on (SSO) domain if available in order to simplify this task.

(12)

About Rackspace

Rackspace® Hosting (NYSE: RAX) is the open cloud company, delivering open technologies and powering hundreds

of thousands of customers worldwide. Rackspace provides its renowned Fanatical Support® across a broad portfolio

of IT products, including Public Cloud, Private Cloud, Hybrid Hosting and Dedicated Hosting. The company offers choice, flexibility and freedom from vendor lock in.

glOBAl OFFICES

Headquarters Rackspace, Inc.

5000 Walzem Road | City of Windcrest, San Antonio, Texas 78218 | 1-800-961-2888 | Intl: +1 210 312 4700 www.rackspace.com

uk Office

Rackspace Ltd. 5 Millington Road Hyde Park Hayes Middlesex, UB3 4AZ Phone: 0800-988-0100 Intl: +44 (0)20 8734 2600 www.rackspace.co.uk Benelux Office Rackspace Benelux B.V. Teleportboulevard 110 1043 EJ Amsterdam Phone: 00800 8899 00 33 Intl: +31 (0)20 753 32 01 www.rackspace.nl

Hong kong Office

9/F, Cambridge House, Taikoo Place 979 King’s Road,

Quarry Bay, Hong Kong Sales: +852 3752 6465 Support +852 3752 6464 www.rackspace.com.hk

Australia Office

Level 4, 210 George Street, Sydney, NSW 2000 Phone: 1-800-722577 www.rackspace.com.au

© 2013 Rackspace US, Inc. All rights reserved.

This whitepaper is for informational purposes only and is provided “AS IS.” This information is intended as a guide and not as a step-by-step process, and does not represent an assessment of any specific compliance with laws or regulations or constitute advice. We strongly recommend that you engage additional expertise in order to further evaluate applicable requirements for your specific environment.

RACKSPACE MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, AS TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS DOCUMENT AND RESERVES THE RIGHT TO MAKE CHANGES TO SPECIFICATIONS AND PRODUCT/SERVICES DESCRIPTION AT ANY TIME WITHOUT NOTICE. RACKSPACE RESERVES THE RIGHT TO DISCONTINUE OR MAKE CHANGES TO ITS SERVICES OFFERINGS AT ANY TIME WITHOUT NOTICE. USERS MUST TAKE FULL RESPONSIBILITY FOR APPLICATION OF ANY SERVICES AND/ OR PROCESSES MENTIONED HEREIN. EXCEPT AS SET FORTH IN RACKSPACE GENERAL TERMS AND CONDITIONS, CLOUD TERMS OF SERVICE AND/OR OTHER AGREEMENT YOU SIGN WITH RACKSPACE, RACKSPACE ASSUMES NO LIABILITY WHATSOEVER, AND DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO ITS SERVICES INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT.

ALTHOUGH PART OF THE WHITEPAPER EXPLAINS HOW RACKSPACE SERVICES MAY WORK WITH THIRD PARTY PRODUCTS, THE INFORMATION CONTAINED IN THE WHITEPAPER IS NOT DESIGNED TO WORK WITH ALL SCENARIOS. ANY USE OR CHANGES TO THIRD PARTY PRODUCTS AND/OR CONFIGURATIONS SHOULD BE MADE AT THE DISCRETION OF YOUR ADMINISTRATORS AND SUBJECT TO THE APPLICABLE TERMS AND CONDITIONS OF SUCH THIRD PARTY. RACKSPACE DOES NOT PROVIDE TECHNICAL SUPPORT FOR THIRD PARTY PRODUCTS, OTHER THAN SPECIFIED IN YOUR HOSTING SERVICES OR OTHER AGREEMENT YOU HAVE WITH RACKSPACE AND RACKSPACE ACCEPTS NO RESPONSIBILITY FOR THIRD-PARTY PRODUCTS.

Except as expressly provided in any written license agreement from Rackspace, the furnishing of this document does not give you any license to patents, trademarks, copyrights, or other intellectual property.

References

Related documents

HRSA also supports the Integration of Oral Health and Primary Care Practice initiative and pilot project by providing technical assistance and support to community health centers

What are the perceptions, experiences and understandings of dyslexia amongst mentors, nurse tutors and preceptors who support and guide dyslexic nursing

Hands with an ss consultancy consumer complaints and insurance companies offer those who are no longer available placement consultancy for candidates in your complaint to

Keywords: Smart building, Indoor environment, Building automation system, User building interaction, User Interface, Voice user interface, Ama- zon Alexa, Amazon Web

P&G Professional has a range of high quality antibacterial cleaning solutions to help operators keep up with disinfection standards in bedrooms, kitchens, bathrooms and

For the Oslo protocol we do not observe an increase in mother patenting in signatory countries, but the number of designated family patents in signatory countries as well as

This thesis is about using exact optimization algorithms to solve the routing problem known as the Mixed Capacitated General Routing Problem (MCGRP) that is a generalization of

When this question was asked last year, we reported that for the first time we observed an increase in the investment made in staff training, and the link between skilled labour