High Assurance Platform (HAP) High Assurance Challenges. Rob Dobry Trusted Computing NSA Commercial Solutions Center 04 & 05 August 2009

Similar documents
Streamlining User, Data and Network Defense in a Multi-Level Environment Steve Stratton Sr. Director Product Management

XD Framework (XDF) Overview. For More Information Contact BlueSpace at Tel: (512) Web:

Introduction of the Identity Assurance Framework. Defining the framework and its goals

Intel s s Security Vision for Xen

Securing your Virtualized Datacenter. Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008

Presentation Title 11/13/2013

Target Baseline -- Consolidated Enterprise IT Baseline --

Security Models for Cloud

End User Device Strategy: Interoperability Standards

2013 Cisco and/or its affiliates. All rights reserved. 1

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

Identity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition

Security and Performance Benefits of Virtualization

The Road to a Secure, Compliant Cloud

SafeNet HSM solutions for secure virtual amd physical environments. Marko Bobinac SafeNet PreSales Engineer

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control

Cross Domain Capabilities

DoD Mobility Mobility Product Security Certification Processes

Virtualization (II) SPD Course 17/03/2010 Massimo Coppola

DELIVERING TRUSTED CLOUDS How Intel and Red Hat integrated solutions for secure cloud computing

Agile Coalition Environment (ACE) Freedom within a Framework. Michele McGuire Space & Naval Warfare Systems Command Office of Chief Engineer (056)

Homeland Security Information Sharing Architecture

VMware Overview VMware Infrastructure 3: Install and Configure Rev C Copyright 2007 VMware, Inc. All rights reserved.

Deployment Patterns using Docker and Chef

AB Drives. T4 - Process Control: Virtualization for Manufacturing. Insert Photo Here Anthony Baker. PlantPAx Characterization & Lab Manager

Chapter 5 C. Virtual machines

Symantec Reference Architecture for Business Critical Virtualization

A Cost Effective High Assurance Layered Solution for MLS Test Training and LVC

COTS, Subversions, and the Foreign Supply Chain issues for DoD Systems. Dr. Ben A. Calloni, P.E. Lockheed Martin Fellow, Software Security

Secure Sharing of an ICT Infrastructure Through Vinci

STREAMLINING THE DELIVERY, PROTECTION AND MANAGEMENT OF VIRTUAL DESKTOPS. VMware Workstation and Fusion. A White Paper for IT Professionals

Xen Project Status Ian Pratt 12/3/07 1

Intel, OpenStack, & Trust in the Open Cloud. Intel Introduction

Virtual Machine Security

Table of Contents 1.1. Introduction. Overview of vsphere Integrated Containers 1.2

Multi-Domain exchange (MDeX) System

Introduction to Virtualization

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Securing Content in the Department of Defense s Global Information Grid

Multiple Independent Layers of Security (MILS) Network Subsystem Protection Profile (MNSPP) An Approach to High Assurance Networking Rationale

Sentinet for BizTalk Server SENTINET

Enterprise Online Help for GCCS-J and JC2CUI: An example of Enterprise Software Engineering. 2 April Ross Adjei Mike Nguyen

WHITE PAPER DECEMBER VMWARE vsphere VIRTUAL MACHINE ENCRYPTION. Virtual Machine Encryption Management

Cisco ISE Features. Cisco Identity Services Engine Administrator Guide, Release 1.4 1

Citrix XenDesktop 2.0. Michael Schmidt Country Manager Switzerland Citrix Systems International GmbH

Network+ Guide to Networks 6 th Edition

TERRA. Boneh. A virtual machine-based platform for trusted computing. Presented by: David Rager November 10, 2004

The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems

Configuring RADIUS Clients

Security for the Xen Hypervisor Status Quo & Perspective 2006

VxRack FLEX Technical Deep Dive: Building Hyper-converged Solutions at Rackscale. Kiewiet Kritzinger DELL EMC CPSD Snr varchitect

Hypervisor Security First Published On: Last Updated On:

Managed Security Service National Security Information (MSS-NSI)

Enterprise & Cloud Security

Building Hybrid Clouds

Distributed Systems COMP 212. Lecture 18 Othon Michail

VMware vsphere 4.0 The best platform for building cloud infrastructures

Cloud Builders. Billy Cox. Director Cloud Strategy Software and Services Group

CSP 2017 Network Virtualisation and Security Scott McKinnon

BUILDING the VIRtUAL enterprise

Smarter Business Agility with WebSphere DataPower Appliances Introduction

A QUICK INTRODUCTION TO THE NFV SEC WG. Igor Faynberg, Cable Labs Chairman ETSI NFV SEC WG

Xen Project Overview and Update. Ian Pratt, Chairman of Xen.org, and Chief Scientist, Citrix Systems Inc.

Assuring Identity. The Identity Assurance Framework CTST Conference, New Orleans, May-09

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

Realize the True Potential of Server Virtualization with Oracle VM. Rossella Bellini Principal Sales Consultant HW Business Uniti

About the XenClient Enterprise Solution

BLOCKCHAIN FOR CYBERSECURITY MICRO-SEGMENTED NETWORK ACCESS CONTROL

Xen Community Update. Ian Pratt, Citrix Systems and Chairman of Xen.org

Hypervisors at Hyperscale

System Threat Analysis Case Study for Software Based Communications

Practical Guide to Platform as a Service.

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open

CSE543 - Computer and Network Security Module: Virtualization

Data Center 3.0: Transforming the Data Center via the Network

NCES Program Overview. Rita Espiritu NCES Program Manager

A Comparison Study of Intel SGX and AMD Memory Encryption Technology

Table of Contents 1.1. Overview. Containers, Docker, Registries vsphere Integrated Containers Engine

OS = Windows 2012 Name = Hyp1 IP = VM = Domain: Contoso.com IP = os = windows2012

Tailoring TrustZone as SMM Equivalent

2018 Cisco and/or its affiliates. All rights reserved.

SailPoint IdentityIQ 6.4

Using Virtualization in Manufacturing Industries to Improve the Utilization and Availability of Resources and Applications

How Parallels RAS Enhances Microsoft RDS. White Paper Parallels Remote Application Server

THE OPEN DATA CENTER FABRIC FOR THE CLOUD

Merging Enterprise Applications with Docker* Container Technology

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices

Chapter 3 Virtualization Model for Cloud Computing Environment

DevOps Anti-Patterns. Have the Ops team deal with it. Time to fire the Ops team! Let s hire a DevOps unit! COPYRIGHT 2019 MANICODE SECURITY

WHY COMPOSABLE INFRASTRUCTURE INSTEAD OF HYPERCONVERGENCE

Test & Evaluation of the NR-KPP


Cloud Managed Services for Government (CMSG) A secure strategy for the Department of Defense at an IBM-operated, Level 5, DoD Facility

Mapping of FedRAMP Tailored LI SaaS Baseline to ISO Security Controls

FPKIPA CPWG Antecedent, In-Person Task Group

Directions in Data Centre Virtualization and Management

FLUID COMPUTING. ARC FORUM, India Ricky Watts Director of Industrial Solutions, Wind River IN A SOFTWARE-DEFINED WORLD

Policy Based Security

EXAM Pro: Windows Server 2008 R2, Virtualization Administrator. Buy Full Product.

Lecture 3 MOBILE PLATFORM SECURITY

Transcription:

High Assurance Platform (HAP) High Assurance Challenges Rob Dobry Trusted Computing NSA Commercial Solutions Center 04 & 05 August 2009

What is HAP? HAP is being developed to provide users with two primary capabilities: 1. Provide secure access to multiple domains or networks from a single workstation 2. Allow secure data movement between domains 2

Program Goals Deliver a computing platform architecture and roadmap leading to U TS on the same platform Allow secure data movement between domains Deliver certified and accredited reference implementations that can be built, modified, and commercialized by industry Run legacy applications and systems Be enclave agile / remotely reconfigurable Support common peripherals Incrementally deliver near-term, meaningful capabilities Leverage COTS HW & SW to the maximum extent possible Develop government components only when absolutely necessary to achieve very specific results 3

Fusion of Commercial Relevant Technologies and High Assurance The fusion of commercial initiatives plus trusted software create a High Assurance Platform (HAP) A HAP can support both trusted separation of domains and multi-level Cross-Domain UNCLASSIFIED // FOR OFFICIAL USE ONLY 4

What Have We Delivered? Release 1 Capabilities Single Level Separation Measured Launch/Platform Attestation/Passive NAC Certification & Accreditation Status: SABI: ST&E completed TSABI: Completed waiting for the ATO from ODNI HAP R1 Workstation commercially available through Dell NOW 5

What Are We Building? Release 2 Capabilities Single Level Separation between TS/S or S/U Runtime Measurements/Restrictive NAC/vTPM Will run on same hardware baseline as Release 1 Include laptop and tactical server instantiation 6

Where we are headed (R3 Capabilities) Separation Sharing Security Manageability 7

Separation 2-Domain Separation Unclassified thru Top Secret Device Driver Isolation Hardware enforced Direct Device Assignment Assign specific ports/devices to specific computing environments 8

Sharing Single sign-on Multi-factor Authentication / Multi-level token Authenticate across security domains Cross domain sharing Cross domain discovery Cross domain collaboration Create Communities of Interest (COI) Trusted service interface Other computing environments leverage HAP security properties General user access User at lowest security level can use platform (PL5) 9

Security Mutual Attestation Machine / Machine Machine / Network enterprise Phased integrity measurements Freshness of measurements Integrity based policy enforcement Evaluate measurements Data at rest protection Zeroization Trusted path / Trusted display Protect data paths / displays Network event analysis 10

Manageability Single wire Remote administration Just enough Operating System (JeOS) Interoperability On demand secure launch Non-secure to secure and back Form factor Desktop Laptop Server Embedded 11

Areas of Challenge: Release 3 Bare Metal Hypervisor Tailored for enterprise server/client Virtualization Decomposition of Host OS into a virtual trusted platform Server-side sharing for low-to-high movement of data Server-side sharing for high-to-low movement of data Secure Virtual Appliance for Single NIC Attestation Measurement of mobile VMs Measurement of hypervisor and virtual trusted platform Integration of measurements across domains Late launch just-in time client Administration I&A Audit Large scale VM configuration management Automated provisioning for VM-based COI Coordinated provisioning between client and server for COI Single sign on Integrated audit of virtual trusted platform and guest VMs Access Control Type enforcing hypervisor 12

More information Further questions contact: Rob Dobry (410)854-4179 rwdobry@missi.ncsc.mil Neil Kittleson (410) 854-4174 ndkittl@nsa.gov 13

Capability Roadmap UNCLASSIFIED // FOR OFFICIAL USE ONLY 14