• No results found

Accelerate OpenStack* Together. * OpenStack is a registered trademark of the OpenStack Foundation

N/A
N/A
Protected

Academic year: 2021

Share "Accelerate OpenStack* Together. * OpenStack is a registered trademark of the OpenStack Foundation"

Copied!
28
0
0

Loading.... (view fulltext now)

Full text

(1)

Accelerate

OpenStack*

Together

* OpenStack is a registered trademark of the OpenStack Foundation

(2)

Where are your workloads running – Ensuring

Boundary Control in OpenStack Cloud.

Raghu Yeluri

Principal Engineer, Datacenter and Cloud Products Group Intel Corporation

(3)

Contents

• Trust and Boundary Requirements in the Cloud

• Solution: Geo-Tagging and Boundary Control with OpenStack*

• Looking ahead: Additional use-cases/solutions targeted for Kilo+ release

Geo-tagging for storage volumes

Tenant-controlled VM encryption/decryption

• Summary

• Q & A

(4)

Private Cloud DC

Security Challenges in the Cloud

Public Cloud DC

CompanyC Company B

CompanyA Pool n

Pool 1

Visibility

Enhance Audits

Compliance

Control

Company B

(5)

Challenge: Complying with “location-based”

workload security and compliance requirements

Data Privacy & National/Regional Regulations constraint workload movement

Sensitive Data & Applications MUST remain Internal to

Organizations

Very Sensitive Data MUST remain on Specific Data Center Hardware or Security Zones.

Virtualization, Public and Private Cloud Agility adds to the Challenges.

Virtual Servers are files that can be moved or copied and executed anywhere.

Hybrid Clouds blur boundary between what is “internal” and

“external”.

Policy Challenges To add to these challenges….

(6)

Requirement: Ensure that Virtual Workloads are placed, or migrated,

based on location and assurance of hardware platform

Policy Requirements

Run only on Internal Enterprise Network – not in the public cloud

Run in the correct geography or datacenter

Run on hardware in particular Security Zone, or, Assurance Level

Technical Need: How do you provide Trusted Geo-location/Asset-

location in Virtualization and Cloud Environment to meet these Policy

Requirements?

(7)

 Intel TXT provides integrity assurance for x86 server hardware, and the software stack above

Root of Trust is Intel Xeon processors &

motherboard chipsets

Measured Boot + Attestation extends the chain of Trust to OS/VMM.

Chain of Trust: H/W->FW->BIOS->OS/VMM

 Leverages TPM for secure storage and TXT Measured Boot + Attestation for Trusted Geo/Asset-location -

Geo/Asset-tagging

Intel Trusted Execution Technology (TXT)-based H/W Provides a Strong

Foundation for Platform Security & Trusted Geo/Asset-location

TPM Intel®TXT

Hardware Solution

Components Intel®

5500/5520 Chipset

Flash

BIOS

A trusted execution platform for sensitive apps and data

(8)

Geo/Asset-tagging - Enabling Boundary Control

Geo/Asset descriptor (asset-tag) stored in the TPM of the Server.

Used to control placement & migration of workloads

Broad support across bare metal OS and hypervisors (ESX, XenServer, Xen, KVM).

Digital Signature

UUID of Host

Asset Certificate

TPM NVRAM

Index SHA-1

SHA-2

Asset

Certificate Asset

Tag

TAG

NV Index

Index used: index 0x40000010 Size of Index:

TPM 1.2: 20 Bytes;

TPM 2.0 (future): 32 Bytes (for 256) and 64 (for 512) Data Format:

20 Bytes of Binary data ;

Asset Tag used with Geo-Location attributes is a Geo-Tag What is Asset Tag?

(9)

VM Boundary Control With OpenStack

*

- How it works

Nova

Attestation Authority

Glance

TrustedFilter, LocationFilter Request

Location Attestation Challenge

Workload A Workload A Launch Policy

Challenge API Server

Trust Verified.

Geo=France Upload Workload A to Glance with Launch

Policy.

1

2 Launch VM A

3

5 5

6 Attestation

Report

Workload A launched with appropriate policy

4

0 OOB: Provision Geo-Tag on to Server TPMs

(10)

New:

LocationFilter

Guest VMs (workloads)(workloads)Guest VMs End Users

(accessing guest vm)

Attestation Service

Disk Image (for Guest VMs) Tag

Provisioning Service

Horizon (dashboard)

Glance (Image Store

+ Registry) VM Policies

as Image Properties

Geo-tag Selection UI

OS/VMM

TXT+TPM

Geo-Tag extensions in OpenStack

Targeting Kilo release; Downloadable scripts in Q4 for Icehouse & Juno

OpenStack Extensions

Intel/ISV provided components

Blueprints:

https://blueprints.launchpad.net/nova/+

spec/nova-trusted-geo-asset-tag https://blueprints.launchpad.net/horizo

n/+spec/trust-n-geo-display https://wiki.openstack.org/wiki/Trusted-

Location-Control

(11)

Step 1: Defining and Selecting of Geo/Asset Tags

- Tags can be logical or physical geo information, and/or, business functions (Finance, Benefits, Inv Banking, etc) - Uses Tag Mgt APIs.

Tags that will be

Provisioned to a Server.

1 Tag Definition

& Selection 2 Tag Provisioning 3 4

to Servers

VM Policy Creation

Orchestration &

VM Launch 5 Dashboard

Geo-Tagging Flow in OpenStack - 1

(12)

1 Tag Definition

& Selection 2 Tag Provisioning 3 4

to Servers

VM Policy Creation

Orchestration &

VM Launch 5 Dashboard

Step 2: Provision Selected Tag(s) from Step 1, onto the server.

Mt. Wilson Provisioning Tool & Provisioning APIsto Provision TPMs on the hosts.

1. Select the Host to Provision

Geo-Tagging Flow in OpenStack - 2

2. Select the Tags and Provision the Server TPMs

(13)

1 Tag Definition

& Selection 2 Tag Provisioning 3 4

to Servers

VM Policy Creation

Orchestration &

VM Launch 5 Dashboard

Step 3: Create VM Policies.

1) Policies are associated with VM Images as “Properties” in Glance. 2) Horizon Extended to select “Geo-location”

Policies.

Two Policies for this Image 1. Trust 2. Geo-Location

Geo-Tagging Flow in OpenStack - 3

(14)

1 Tag Definition

& Selection 2 Tag Provisioning 3 4

to Servers VM Policy

Creation

Orchestration &

VM Launch 5 Dashboard

Step 4: Determine best Server to meet VM Trust and Geo-Location Policy. Launch VM instance of specific Flavor.

OpenStack Scheduler Extended with Asset/Geo-Tag Filter.

New Filter invokes Mt. Wilson Geo-Tag Attestation APIs to determine best Server to meet VM Polices.

VM Instance created by OpenStack Scheduler by finding the best Server matching the VM Policy to Geo-Tag on the Server

Geo-Tagging Flow in OpenStack - 4

(15)

1 Tag Definition

& Selection 2 Tag Provisioning 3 4

to Servers

VM Policy Creation

Orchestration &

VM Launch 5 Dashboard

Geo-Tagging Flow in OpenStack - 5

(16)

16

Looking Ahead

1. Use-case 1: Extending Geo-Tagging/Location Control for Storage Volumes 2. Use-case 2: Tenant-controlled encryption and decryption, based on

Location and Trust Policies.

(17)

Use-case #1: Extending Geo-Tagging/Location Control for Volumes

Current Implementation: Geo-tagging/location policies defined and enforced at the VM level .

launched

Cloud

Controller Cinder

Trust Verified.

Geo = France

Attestation Authority

Create/attach Storage volumes launched

Trust Verified.

Geo=France

Cloud Controller Attestation

Authority VM2

Scenario 1: Two VMs. VM1 – no attached storage; VM2 – local attached storage;

Scenario 2: Two VMs. VM 1 = No attached Storage;

VM 2 = External/Shared Storage Volume attached to VM2.

VM1 and

VM2 (with local storage) launched.. VM policies

enforced on Storage

VM1 and VM2 launched per

Policy..

VM Policy not enforced on Storage. Location

Policy violation!!!

VM2

(18)

OpenStack Extensions: Location Policy Enforcement on storage volumes

Extend VM Location Policy Control to Cinder volumes

Leverage Intel TXT Measured Boot, Remote Attestation and Geo-Tag Provisioning, for Location Compliance of Cinder Volumes. - Applies to x86-based

External/Shared Storage. Not yet for SAN/NAS storage.

New Location filter in Cinder scheduler – Location Policy Compliance during “Volume Create”

Location Policy compatibility verified during “Volume Attach” – in the ‘Check Attach’ code of Nova API.

VM Location Policy == Volume Location Policy

Exploring ways to enforcing Location Policy for Volume Migration and Backups (for Swift: Storage Policies)

Cinder Client

Cinder API Cinder Volume

driver

Cinder backup Cinder

Scheduler

Storage

(DAS, Scale Out, NAS, SAN) REST

AMQP

AMQP AMQP

AMQP SQL DB

Location Filter

(19)

Creating a new Volume with Geo-tag Policy

1) Policy is selected for Volume creation. You can select up to 5 policies from the Horizon extensions.

2) Create Volume – invokes “CinderLocationFilter”. Verifies Policy against Server (cinder node) Geo-tag.

Volumes with Trust and Geo-Tag

(20)

Attach Volume to a VM instance 1)VM Policy == Volume Policy

2)Attach Volume: Verifies Volume Geo-Tag against the VM Geo-Tag Policy for Compatibility.

(21)

Use-case 2: Tenant-Controlled VM encryption and decryption

based on Location and Trust.

Goals:

VMs and data are encrypted at all times – at-rest, in-transit, and up until execution.

Only allow virtual servers & data to be decrypted on trusted hardware in a particular location

Sensitive virtual server storage volumes are prevented from being decrypted on server not in approved location

Enterprise Private Cloud

Virtual server data only decrypted on approved servers in specified locations

Public Cloud

Demonstration at the Intel booth.

(22)

8

10

9

Tenant Controlled VM Protection in OpenStack - Architecture

KMS [Barbican &

Policy Engine]

Horizon

Gold VM Images

Trust Director

Encrypted VM/Image

PUT-VM Blob

Key Store Symmetric Key

Generation

Launch VM Launch VM

Attestation

Launch VM

GetDecryptionKey (KID, AIK) Attestation

Decrypt &

Launch

Proxy

Blueprint later this year. Targeting ‘L’ release

4

1

3

2

Attestation

Authority Policy

Plugin

7 Glance

Cloud Controller 5

6

Nova compute Cloud Service

Provider Enterprise Data Center

(23)

Summary

 Location-based policies to meet the most stringent security and compliance requirements.

 Tied to Intel TXT and TPM for reliable attestation of platform integrity and location attributes.

 OpenStack Extensions for Geo-Tagging are available for Icehouse & above.

Targeting Kilo release for upstream.

Blueprints: https://blueprints.launchpad.net/nova/+spec/nova-trusted-geo-asset-tag.

 Looking ahead: Boundary Control for Cinder volumes on x86-based Storage.

 Looking ahead: Tenant-controlled VM encryption and decryption-based on Location and Trust; Demonstration at Intel Booth. Targeting ‘L’ release.

(24)

Intel Confidential — Do Not Forward

(25)

Geo-Tagging Provisioning and Management Architecture

Tag Mgmt.

Server TAG API

Tag Provisioning Server Provisioning API

Quot e TAG SEL

ECTIONS

Request Attestation

Coordinates Place names

Asset Tag whitelists, Revoke

Provisioning Agent TXT Node/Host

TPM

MTW Trust Agent Asset-Tag

Invalidation

External Tag Source

ProvisioningAPI

TAG DB whitelists

TAG MGMT TOOL*

Country/State/DB Geo-Location System

TAG PROV TOOL*

Quote Geo-Tag TAG DB

Attestation Authority

Geo Tag Invalidation Plugin*

Monitoring Service [Nagios]

Geo-Tag Invalidation Orchestration,

Policy Tools

Asset-Tag Provisioning &

Management Service

(26)

Trusted Pools - Summary

• Establish and propagate a new security control attribute – “Platform Trust”

- Aggregate Trusted systems and Segregate them from untrusted resources

• Run sensitive workloads only on Trusted Servers (Policy Control)

• Tenant Visibility to remote platform status  “Platform Trust”

• Enable automated monitoring of Trust based policies

• Platform Trust input to audit logs and compliance reporting

Additional Controls: Geotag/Asset-Tags, VM payload en/decryption & Trusted VMs

APP Report

Cloud

Tenant Cloud Provider

Intel® Trusted Execution Technology + Remote Attestation are the basis for achieving Platform Trust

(27)

Virtual Workload and Location Policies

VM with no attached storage

VM using local attached storage

(disks presented from the same physical host the VM runs on)

Host Host Host Remote Host +

Storage

VM running an

application that queries an external source (remote database connection, HTTP, etc)

Host SAN/NFS/NAS/Software Defined Storage

Attached Volumes

1 2 3

4 VM using attached external/shared storage (SAN, vSAN, NFS, Scale Out Storage, DAS.. Etc.

(28)

VM Boundary Control with OpenStack* - Solution Components

TAG

Host UUI

D

Sign.

Asset Certificate

Hash

Store TPM

Asset Tag

VM Geo policy

In Openstack Glance attributes

Openstack NOVA scheduler

Attestatio

Store n

Extract

Verify Trust, Geo

(Filter) Launch VM

on Trusted, Geo- verified server

TXT Server attest

1 2 3

4 5

Enable Provisioning of geo-tags to Hosts Add Asset/Location Filter to FilterScheduler Enhance Attestation Server to attest Geo- Tags

Specify Geo Policies for VMs via Glance Registry Enhance Horizon to show Location/Trust attributes

References

Related documents

The Board of Trustees, by a two-thirds vote of those present at any properly called and constituted Board meeting, may remove, for good cause shown, any Church officer listed

Thus, the following general specification is estimated, where E denotes employment, Y real GDP and w nominal hourly wage rate (weighted average of gross hourly earnings of

that all Traditions should be regarded as fictitious until their authenticity is objectively established. Taking for granted the mechanics of "back projection" of

Thus, rock strengths, as determined by these engineering tests, are not material properties because they depend on the specimen geometry and the loading conditions of the

Building upon these discoveries, the research presented in this thesis aimed to demonstrate a causal role of beta frequency oscillations on unconscious and automatic

Most Grade 10 learners at schools where the study was conducted, own smartphones they use for non-educative purposes in their day-to-day activities that could assist in

If, however, forward prices systematically differ from long-term spot price forecasts (e.g., if there is a cost to hedging, or if the forecasts are out of tune with

EXPERIMENTATION OF NONLINEAR SPACECRAFT ATTITUDE MOTION CONTROL. VIA SUCCESSIVE LINEARIZATION BASED MODEL PREDICTIVE