Best Practices Secure Cloud Migration WP - 537230 - 617126
Best Practices Secure Cloud Migration WP - 537230 - 617126
com
White Paper
Contents
03 EXECUTIVE SUMMARY
03 INTRODUCTION
03 SECTION 1: DATA PROTECTION USE CASES AND CSA SECURITY GUIDANCE VERSION 4.0
Introduction
Organizations of every size from every vertical – including government agencies from local to federal level – are moving all or part of their
workloads to public cloud services. The revenue growth for the major cloud providers reflects this modern gold rush as we see $15B and $18B
annual revenues for Azure and AWS respectively.
Cloud consumers are largely past the question of whether public cloud services are secure, or if they can reasonably implement governance
and regulatory controls over systems and data they bring into the cloud. Cloud service providers and a handful of their very public customers
have proven that they can. But the question of how to secure systems and data persists. Given the diversity of corporate IT challenges and
variety of application services they support, mapping a security strategy to cloud services is a complex task.
The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to “promote the use of best practices for providing security
assurance within Cloud Computing, and to provide education on the uses of Cloud Computing”. CSA has gathered a diverse group of
globally-distributed business stakeholders with deep expertise in all facets of cloud security, and from this community produced a clear and
actionable set of recommendations. As companies struggle to understand migration and security for cloud, the CSA is the go-to source of
information. Recently the CSA released “Security Guidance for Critical Areas of Focus in Cloud Computing v4.0”, a major enhancement to
the previous edition.
However, the guidance is focused around disciplines like applications, network, legal and identity. The cloud vendors implement security as
silos for individual services (e.g., file, server, database). In contrast, most customers seek cross-discipline strategies to address the use cases
they are most interested in, and prefer a unified model that applies wherever their data may reside. In this paper our goal is to help readers
bridge these gaps, mapping the CSA guidance to buyers’ most important data security challenges, and outline coherent strategies that meet
their objectives.
Thales is well positioned to provide this perspective as we serve thousands of customers around the globe, and our security technologies—
through our partnerships with major cloud vendors—are integrated into or available for those providers. Our products enhance cloud native
capabilities, offering customers a unified security management interface for the cloud challenges they face today, as well as bringing security
capabilities either not available from the cloud vendors or providing multi-cloud solutions that are not typically in the interests of public cloud
provides to offer.
The following are sample use cases and pain points cloud customers most commonly communicate to our systems engineers and professional
services advisors. In each one, we note sections of security guidance that pertain. For each use case potential Thales data protection
solutions are suggested. It is helpful to have open a copy of Security Guidance v4 while you read this paper. You can download at:
cloudsecurityalliance.org/guidance/#_overview.
To understand references to products in this paper, here is an overview of Thales cloud data protection solutions:
Many Thales cloud data protection solutions are components of the Vormetric Data Security Platform. The Vormetric Data
Security Manager, at the core of the platform, provides centralized encryption key and encryption policy management for
these components of the Vormetric Data Security Platform:
° Vormetric Transparent Encryption offers advanced file-and volume-level encryption deployable from on-premises through
hybrid cloud for IaaS. It provides privileged user access controls, container-aware data protection, security intelligence
through data access logging, and Live Data Transformation, which enables use of databases and file systems while they are
undergoing encryption.
° Vormetric Tokenization with Dynamic Data Masking and Vormetric Application Encryption enable data protection higher in
the computer stack, are cloud-friendly and are compatible with cloud database user-defined functions (UDFs).
° The CipherTrust Cloud Key Manager offers centralized, multi-cloud key lifecycle management for IaaS, PaaS and SaaS
providers that support bring your own key (BYOK) capabilities.
While some static masking solutions are non-reversible, if you need to reverse tokens into original data values, you will either need to do so
on-premise or bring your existing tokenization service to the cloud for de-tokenization requests. But any of these three approaches will provide
secure transport and storage of data, and can be used to replicate information to multiple cloud service models.
Vormetric Tokenization or Batch Data Transformation can both mask data prior to migration to the cloud or in the cloud. Further,
dynamic data masking -- that is, masking content dynamically based on user, group, or role, based on, for example Active
Directory or LDAP entries, enables masking or presentation of different data fields, or section of data fields, to different users.
Most Infrastructure as a Service providers now offer—at an added expense for compute nodes—‘Trusted Execution Environments’. Code and
data are passed fully encrypted to these servers, and only decrypted below the hypervisor layer, as it’s loaded into secure hardware, so no
other processes may examine—or alter—the data or code.
Couple trusted execution with the ability to either bring your own encryption, bring your own keys (e.g., BYOK for SaaS, PaaS, IaaS as
described in Domain 11) and key management (e.g., Bring Your Own Encryption for PaaS/IaaS as described in Domain 10 and 11)
software, you have full control over data storage and data in use.
As noted in Security Guidance, either bringing your own encryption or managing your own keys is a solution for the black swan
or subpoena event, with varying effectiveness:
° If you bring your own encryption to the public cloud, then by definition you have 100% control of your encryption keys
° You can bring your own keys to public cloud providers, discussed below. This protects your data from the cloud provider and
subpoena issues to the extent discussed at left
° If you purchase advanced encryption from a Thales Service Provider Partner, their architecture may determine your control of
encryption keys. Vormetric Transparent Encryption enables service providers to devolve key management to each customer
The CipherTrust Cloud Key Manager provides full key lifecycle management for a growing list of IaaS/PaaS and SaaS
providers and solutions. Key sourcing and storage is available in up to a FIPS 140-2 Level 3-certified appliance, or fully in
software with FIPS 140-2 Level 1 certified virtual appliance.
How do I enforce data residency policies, and specifically, comply with GDPR?
Security Guidance
The guidance dedicates a significant portion of Domain 3 (Legal Issues, Contracts and Electronic Discovery) to outline your responsibilities
for EU security concerns in general and GDPR compliance specifically. This will provide a good roadmap of what data you need to account
for and what controls to implement. We recommend that the basic controls you use for any Personally-Identifiable Information (PII)-regulated
data controls are a good place to start with GDPR as the controls and types of data are similar. This is briefly discussed in Domain 11. We also
recommend use of Identity Management, encryption and key management for multiple mechanisms to enforce the Cross-border Data Transfer
Restrictions, so in the event data is moved, it can be rendered inaccessible. You will need to collect both cloud logs for access controls, as well
as the logs from your own applications and services, to fulfill your requirement on Accountability. The guidance has extensive comments on
what logs to collect, and how to create secure logging architectures and monitoring behavior from logs in Domain 7 (infrastructure Security),
Domain 9 (Incident Response), and Domain 10 (Application Security).
Thales solutions including advanced encryption and tokenization enable effective, simple-to-deploy solutions for GDPR
articles 32 and 34 related to:
° Pseudonymisation and encryption of personal data ° The unauthorized access to personal data
° Assessing the effectiveness of your security measures ° Crypto-shredding with key revocation
As mentioned above, Thales encryption and tokenization solutions offer a range of data access logging for integration with
SIEM systems. The logging mechanisms in the Vormetric Data Security Manager, Vormetric Transparent Encryption Agents,
and Tokenization server support monitoring architectures as described in Domains 7, 9 and 10.
As part of any comprehensive logging strategy as suggested by Security Guidance, one benefit of bringing your own
encryption to the cloud with Vormetric Transparent Encryption is its comprehensive data access logging which, combined with
supported SIEM solutions, becomes, effectively, an additional layer of security intelligence.
Similarly, applications utilizing Vormetric Tokenization can themselves log activity, or the Tokenization Server can provide
logging to SYSLOG and whence to SIEM.
Finally, applications written with Vormetric Application Encryption can log their activities to SYSLOG and whence to SIEM.
Container management is typically performed by what are called ‘Orchestration Managers’, the most common of which are Kubernetes and
Swarm; both are non-cloud native and, unfortunately, very insecure by default. Bootstrapping new containers requires issuing credentials and
secrets to access data needed to operate. Image repositories, both from major vendors and cloud native systems, do provide secure image
stores as well as digital signature capabilities to ensure container images have not been tampered with.
Again, unfortunately, the guidance gives you a few road signs directing you to areas that need attention, but lacks tools and specifics
instructions. To close these gaps the guidance recommends leveraging secrets management technologies to issue credentials to containers at
runtime, and transparent disk or file encryption to store sensitive data only accessible by the containers you deem appropriate. The guidance
also recommend leveraging code/container signature systems provided by the container repository, and enforcing that the container
orchestration system can only use approved containers in the registry. And if you specify your own OS to run containers atop, just as Domain
8 advises for virtual servers, you need to spend considerable time making sure the OS is a secure variant configured for container use. Cloud
Identity and Access controls will gate who can access or administer both the containers and the surrounding container infrastructure and
security tools. The cloud vendor will offer logs for access which you can bundle with orchestration logs to examine activity.
Per Security Guidance recommendations, Thales offers unique in-container security for data at rest. Supported container
environments include Docker and Red Hat OpenShift. Vormetric Container Security is an extension to Vormetric Transparent
Encryption that extends the feature set from files and volumes to the interiors of containers. When configuring Vormetric
Transparent encryption, the administrator can apply specific encryption and data access policies on storage objects in each
container.
The benefits of container security in the cloud are the same as for files and volumes: centralized, multi-cloud security with data
access logging, granular controls and both data and container portability across cloud vendors.
As another mechanism to utilize Security Guidance v4.0, here is a checklist of cloud migration risks that are common running themes and apply to
most—if not all—sections.
Vendor lock-in: Lock-in is a reality with cloud services. While PaaS and IaaS vendors offer similar features (e.g., storage, compute, virtual
networking, functions, container support and so on) each native API is proprietary. You can architect applications (e.g., abstraction layers, generic
terraform templates) and leverage 3rd party technologies (e.g., bring your own encryption (BYOE) (and keys), bring your own keys (BYOK) key
management, or Kubernetes container orchestration) for cross-platform services, but a certain amount of lock-in is unavoidable. Thales can help
you manage many of the challenges of vendor lock-in and embrace a cost-effective multi-cloud strategy.
Lift and shift: Cloud vendors encourage you to embrace the cloud, and to make it seem less daunting, claim you need only to “lift and shift”
your existing IT systems to the cloud. The guidance repeats that lift and shift is a bad idea. That’s partially because if your internal security is
bad today, don’t be surprised that it’s still bad when you move it to cloud. But beyond bringing your existing problems with you, this approach
fails to leverage native cloud security, elasticity and resiliency features. Thales, or many of our Cloud Service Providers worldwide, can assist
you in avoiding, or perhaps making the best of, “lift and shift.”
Shared responsibility: This is a key focus of Security Guidance 4.0 as it is important to understand where your security responsibilities begin
(and end), and that you should avoid outsourcing data governance responsibilities or think the provider will do this for you. Carefully review
vendor-published security controls and service level agreements. Depending upon the cloud service, you’re likely to be surprised what vendors
do not provide; for example, some will not share events logs to support Incident Response. Any item not clearly spelled out in documentation
must be remediated through contracts in order to address risks. Anything outside cloud provider stated security coverage is your responsibility.
We find ourselves reminding customers that data security responsibility is in their hands, even with cloud-native encryption, because everything
that occurs in cloud compute instance operating systems, is in their, not the cloud vendors, hands. Paraphrasing an Amazon Web Services
blog: Cloud vendors [Amazon] are [is] responsible for security of the cloud and customers are responsible for security in the cloud. Other
public cloud vendors have similar discussions of shared responsibility.
Multi-account issues: The guidance advises using many different user accounts to support cloud operations, specifically segregation of
accounts for administration, development, quality assurance and IT job functions. Part of this recommendation is because cloud accounts are
free of charge; you pay only for the resources you consume in each account. Another part is because it’s a great way to compartmentalize
users and job functions, making it easier to secure, easier to audit and easier to remediate in the event of an account compromise. But
this creates new problems in sharing of user certificates, identity tokens, encryption keys, and other sensitive information. But you can find
exceptions with third party solutions. For example, if you “Bring Your Own Encryption” with Vormetric Transparent Encryption, you can
centrally manage it across any number of accounts – or even across multiple clouds, with the Vormetric Data Security Manager. Similarly the
CipherTrust Cloud Key Manager from Thales can manage encryption keys for vendor-provided encryption across key vaults, accounts and
even clouds.
Hybrid cloud: The reality is most organizations will run in a hybrid cloud model for some time, with public cloud supplementing on-premises
IT. It’s important to ensure connections to cloud services are secure, and should not form a bridge (i.e: effectively flatten) your network. But the
guidance puts significant focus on meeting compliance and use of customer managed keys as a common root of trust across clouds. And for
many users of the guidance, moving to the cloud does not obviate the need for FIPS 140-2-compliant hardware support for encryption and
key management operations. Many cloud providers now offer some form of access to HSMs in the cloud, allowing you to meet compliance
mandates and bring your own keys to the cloud. And this is an area where Security Guidance fails to recognize, again, Bring Your Own
Encryption, which offers FIPS 140-2 secure key storage combined with advanced encryption, seamlessly from your premises to the cloud.
Data residency: The General Data Protection Regulation (GDPR) from the European Parliament and Council has brought new urgency to
data privacy and a real-world examination of what data residency means and how to meet these requirements. The guidance discusses
data privacy in most sections, and dedicated most of another to GDPR. While data management requirements for GDPR are both complex
and company specific, most existing data protection programs built atop encryption, tokenization and good logging will meet both PII and
data privacy sections of GDPR. Additionally, key management controls can ensure that encryption keys—and by proxy decryption or cyber-
shredding of sensitive customer data—are only available in specific geographic regions to ensure compliance. Thales has been readying
customers for GDPR for several years, and, as discussed above, offer encryption, tokenization and key management solutions that fulfill many
GDPR data residency and privacy mandates.
Key ownership and access: There remain both trust and privacy concerns around key usage in cloud services. Domain 11 of the guidance
focuses on Data Security and Encryption, but does not cover some of the concerns voiced regarding cloud vendors—perhaps compelled
by legal order—accessing customer encryption keys. Major cloud service providers offer key management and elastic HSM support.
Vendors can access keys in the native key management system; they cannot access keys in the HSM. But the difficulty comes from this: All key
operations are performed on derived keys, so even if customer root keys are protected, some of the derived keys may be accessed by the
cloud provider. For customers who feel at risk in this area, they can optionally bring their own encryption, and therefore keys, to the cloud.
Data centric security: Cloud vendors offer security features built into services, and focus on protecting the service, not the data. Data
Centric Security ensures that data is protected regardless of underlying cloud security. In fact no cloud vendors provides tokenization, format
preserving encryption or masking technology. The guidance notes these technologies as both very useful in augmenting cloud security, but
should be foremost considerations when a service cannot meet your security, privacy or regulatory requirements.
For these reasons the new Cloud Security Alliance Security Guidance book, offering a cloud neutral security recommendations, is essential
for customers who are considering, or who have already, moved to public cloud services.
One quick consideration before we dive in: The CSA offers tools beyond Security Guidance such as the Cloud Controls Matrix (CCM) and
Consensus Assessment Initiative Questionnaire (CAIQ), which themselves are essential for creating security and compliance requirements for
cloud deployments. Version 4.0 of the CCM and CAIQ will be released mid-2018, at which time we will provide updated mapping to these
new compliance and security frameworks. As the latest version of Security Guidance is a significant step forward and upon which this paper is
based, we forgo mapping Thales solutions to the CCM and CAIQ until the newest versions of those documents are available.
Thales solutions for Domain 4 Thales solutions offer logging features in support of audits or compliance assurance. The Vormetric Data
Security Manager provides detailed logs. This means all key management functions and administrative actions, commonly central audit
areas of interest, are logged. Customers can configure the DSM to deliver their audit logs to their SIEM, security analytics or general logging
platforms. The previous two logs could be considered “management plane” logs. In addition to those, Vormetric Transparent Encryption can
be instructed to log increasingly detailed data access logs, which are aggregated and de-duplicated by the DSM. These “data plane” logs
detail when users and applications access data, under what policies the requests were handled, and if access requests were permitted or
denied. The logs will even expose when a privileged user submits a command like “switch user” in order to attempt to imitate another user.
Aggregating data plane logs across multiple hosts and correlating in a SIEM can enable very early detection of an infection spreading
horizontally in a cloud.
Thales solutions for Domain 5 There are several technologies that address security and privacy concerns in all phases of the Data Security
Lifecycle, such as data encryption, tokenization and data masking. By obfuscating data and only exposing the original values to fully
authenticated users, these technologies address every phase of the lifecycle by securing data in use, at rest, as it is shared, archived and
destroyed.
The Vormetric Data Security Platform from Thales provides encryption, key management, tokenization and dynamic data masking to tackle all
of these challenges. The platform’s architecture enables customers to implement their own security policies and address Security Guidance
recommendations, for databases, files and big data nodes in private, public, or hybrid cloud environments as well as on-premises.
While data encryption provides solid protection against disclosure of data, regardless of where that data may reside, data encryption keys
remain a challenge for data stored in the cloud. The main risk of utilizing vendor-provided encryption is key management. Bring Your Own
Key (BYOK), supported by the CipherTrust Cloud Key Manager, is a good first step in ensuring security for encrypted data. Bring Your Own
Encryption (BYOE), provided by Vormetric Transparent Encryption and the Vormetric Data Security Manager, provides in-depth controls that
reflect more Security Guidance requirements such as data access controls as defined in Domain 5 functions, actors and controls. Using BYOE,
customers define which user accounts and applications can access data, what particular data they can access, when they can access it, and
in what manner or form. Access rights are enforced for all users, even for those administrators with root-level permissions. And data access
control is performed within the operating system, integrated with AD or LDAP controls. Control in the operating system is critical, in that vendor-
provided encryption occurs below the operating system, presenting clear text to the operating system. Since infections exploit operating
systems and applications, and the shared security model stops below operating systems, it becomes almost imperative to BYOE.
BYOK and BYOE deliver data protection and segregation at multiple levels to safeguard and ensure the confidentiality of your data. By
ensuring the segregation of data, duties, encryption keys, and management of the encryption solution, Thales provides controls that address
data governance and data privacy requirements.
Finally, Thales BYOK and BYOE solutions enable cyber-shredding. Customers can destroy any of their own encryption keys. By doing so, they
effectively remove the ability of anyone to decrypt and access the data associated with those keys. Data that is misplaced or inadvertently
copied remains inaccessible once the encryption keys have been destroyed.
Thales solutions for Domain 8 The Vormetric Container Security extension to Vormetric Transparent Encryption extends encryption, data access
controls and data access logging to Docker and OpenShift containers used in the cloud or on-premises. The Container Security extension helps
address security challenges in two ways:
°° Containers often run with root level systems permissions (For Docker, by default – elsewhere, when specifically enabled), resulting in
administrators having full access to container images and system data. Encryption with data access controls enables privileged users such as
Docker or OpenShift cluster administrators to work as usual, without exposing sensitive information
°° Encryption also aids enforcement of data security policies in dynamic container environments, especially elastic cloud services. Granular
encryption in containers enables users to maximize the benefits of using them in any environment from on-premises to hybrid or public cloud,
without compromising data security
Thales solutions for Domain 10 You can encrypt specific files or database columns in infrastructure- or platform-as-a-service (IaaS or PaaS)
environments with Vormetric Application Encryption deployed on, for example, front-end web servers. Vormetric Application Encryption is
based on the PKCS#11 standard, leveraging the Vormetric Data Security Manager for secure key generation and storage. Another choice
for application-layer security is Vormetric Tokenization with Dynamic Data Masking. Offering data tokenization including format-preserving
encryption (FPE) along with both static and dynamic data masking, tokenization can be requested from nearly anywhere in the IaaS/PaaS stack
using convenient RESTful APIs.
Thales solutions for Domain 11 Data security is where the full portfolio of Thales products come into play.
First, data encryption is at the heart of the Vormetric Data Security Platform. Security Guidance, the Cloud Controls Matrix, and the Consensus
Assessment Initiative Questionnaire all identify data encryption as an ideal security control for data protection primarily because it is a data-centric
control. Data encryption is a persistent control that remains in effect wherever the encrypted data is created, used or stored. Even in the event the
encrypted data is misplaced or unauthorized copies are made, the data remains encrypted and unreadable. Thales offers a range of products
that encrypt data in various places in the stack and in various ways. And it is cost effective and more importantly, multi-cloud friendly, in that key
management for all encryption solutions is centered in the Vormetric Data Security Manager, which can be deployed on-premises or in popular
public cloud environments. Regardless of where the DSM is deployed, if it can reach a server running either Vormetric Transparent Encryption,
Application Encryption, or the Tokenization Service, data access controls and key management are simple and easy.
About Thales
The people you rely on to protect your privacy rely on Thales to protect their data. When it comes to data security, organizations are faced
with an increasing number of decisive moments. Whether the moment is building an encryption strategy, moving to the cloud, or meeting
compliance mandates, you can rely on Thales to secure your digital transformation.
Decisive technology for decisive moments.