Cloud Physical Virtual VM Servers

From Physical Servers to Hyper-Convergence – A Greater Need for Encryption

In the past I have tried to make the case for encrypting physical servers on premise.   The argument for not needing to encrypt them is usually that these servers run for weeks, months or even years without being brought down, and that they are physically protected within a well-fortified data center.  The protection that FDE (Full Drive Encryption) brings only really applies to data at rest and it seldom is at rest on these servers.   I would counter that all drives eventually leave the data center for repair or disposal and having them encrypted protects you from having your old drives with your customer data on them show up on eBay.  An encrypted drive can be quickly and easily crypto-erased if it is still operational, and if not, the data is still not accessible without the encryption key.

Today with virtualization and especially with hyperconvergence infrastructure (HCI) the attack surface has greatly expanded and therefore the need for FDE has greatly increased. But before I make my case, here is some background on HCI:

A hyper-converged system is a pre-configured virtualized server platform that combines compute, storage, networking, and management software in a single appliance.  Hyper-convergence enables customers to simply and rapidly deploy mixed-workload and virtual desktop integrated infrastructure solutions across local or remote locations. i.e. it is a mini Cloud in a box that can be connected to other HCI boxes.

HCI boxes are still physical things kept on premise, and the argument above for protecting them with FDE still applies. However, the argument for not encrypting them doesn’t.   HCI workloads run in Virtual Machines (VM) on top of the hypervisor, not directly on the physical hardware.  It is the VM and its data that needs protecting.   In today’s fast moving environment the VMs come up and go down much more often than physical machines.  In some cases VMs come and go several times a day.   When an admin takes a snapshot of running machine or turns it off, the VM is at rest and a VM at rest is just a big file.   It can be copied onto a USB memory stick or over the network.  In fact one of the advantages of HCI is that workloads (or VMs) can be moved around easily from HCI node (box) to HCI node. Looking forward, HCI vendors are working with the public cloud providers, such as Google, to move workloads seamlessly back and forth between on premise and the public cloud.  So unlike physical servers VMs can move around a lot and often are in a data at rest state.    This is the perfect application of FDE, but not at the physical (hardware) level.  If we encrypt only at the physical level, the only protection we get is for the disposal or loss of the physical drive.  However, the VM, is easy to move around, and is still in plain text if copied even when using physical level FDE.  The answer then is to encrypt the VM itself, preferably with in-guest encryption that is independent of the hypervisor with the key under the control of the enterprise.  This way even if the VM is moved to another HCI box – perhaps in another country or even into a public cloud –  the customer keeps control of the data, because it can decide to provide the key or not to decrypt and unlock the VM.

Advantages of VM encryption for HCI include:

  • Scalability: VM-level Encryption is highly scalable. It is protection that actually resides with your data and scales with each new VM brought up.
  • Security: Physical level Encryption protects against lost or stolen physical drives.   VM-level Encryption protects against lost or stolen physical drives, unauthorized data movement, access, replication, etc.
  • Continuity: With physical level Encryption, workloads are decrypted (unprotected) in-transit – no continuity in security model. VM-level Encryption protects workloads continuously, persistently as they move, clone, snapshot across your infrastructure
  • Portability: Physical level Encryption is reliant on exactly that, your hardware – but what about hybrid IT and workloads in-transit.   VM-level Encryption eliminates lock-in to hardware, hypervisors or cloud providers – it’s completely portable protection
  • Flexibility: VM-level encryption allows you to encrypt sensitive workloads and run them securely alongside your non-sensitive workloads. Different keys and policies can apply to different VMs
  • Governance: VM-level Encryption enables boot-based policies so you can control, who can access your data, where your data resides and how it is protected
  • Termination: VM-level Encryption allows you to securely terminate individual workloads as you’re finished with them – it’s simple

To summarize, in the old world some can rationalize not encrypting their physical servers, because there are compensating physical controls such as locked doors and sturdy walls.   In today’s world with HCI and virtualization, workloads are virtual, dynamic, mobile, scalable and vulnerable.   The solution is to protect them with in-guest encryption with keys under the control of the VM owner.

Read our press release on our recent collaboration with Scale Computing

2017 International Cryptographic Module Conference and FDE cPPs

From May 17th to 19th, I had the pleasure of attending the Fifth International Cryptographic Module Conference (ICMC 2017) with my colleague, Alexander Mazuruc.   Alex usually attends this conference which focuses on cryptographic modules  and FIPS 140 type issues,  but this year there were 8 tracks on related subjects such as Quantum-safe crypto (yes, that is a thing), and Common Criteria.  The conference had about 35 different sponsors including the Trusted Commuting Group.  Overall I found the conference very informative and a good place to network in the community.

SEDs, Sleep and Hibernation

I have written about the security implications of using sleep with encrypted drives in the past  and have offered both short term and longer term solutions that would allow users to use sleep under some conditions and not risk (too much) a data breach.   Today I am writing to offer another, common sense, alternative: Just don’t use sleep because you don’t really need it.

Full Disk Encryption, UEFI, Secure Boot and Device Guard

It has been a while since I have written about UEFI, Secure Boot and their impact on Full Disk Encryption (FDE) pre-boot authentication (PBA) so it’s time for an update on what is new in this area, but first here is a recap because this is a bit of an arcane technical subject. UEFI stands for “Unified Extensible Firmware Interface”. The UEFI specification defines a standard model for the interface between personal-computer operating systems and platform firmware.   It provides a standard environment for booting an operating system and running pre-boot applications such as the PBA for FDE.   It replaces the traditional legacy BIOS interface that was used with Windows 7 and older systems.   Now that Windows 10 is being widely adopted I expect to see UEFI used on almost all new machines.

RSA Security Conference 2017 and the Cloud

Last week, I once again had the pleasure and privilege of attending the RSA Conference in San Francisco. I heard estimates of a record breaking 40,000 attendees. It didn’t seem much busier than previous years but as another participant pointed out to me, that might be because it was better organized, with pre-registration for the sessions, this year. This year I focused my sessions on the Cloud.

Opal, Opalite & Pyrite Self-Encrypting Drives (SED) Specifications Simplified

This year (2015) the Trusted Computing Group (TCG) Storage Work Group (SWG) published two new specifications derived from the Opal SED specification called Opalite and Pyrite. You may already be familiar with the benefits of using an Opal SED vs software encryption in your laptops and desktops, but are puzzled as to why there are 2 new standards. Perhaps you even wonder if they would be a better fit for your needs than Opal.

PCI DSS 3.0 and Encryption

Version 3.0 of PCI DSS (Payment Card Industry Data Security Standard) was released in November 2013 and now that version 2.0 became inactive at the end of last year all organizations should have made the transition to version 3.0.

NVMe and Self-Encrypting Drives – The Perfect Match

NVMe technology had a big presence at the Intel Developer Forum (IDF), held in San Francisco of September this year. There were products and demonstrations from about a dozen leading vendors including Intel and Micron. I also attended quite a few sessions, but the one on NVMe was the only one that was overflowing with people.