Crypto Hypervisor High Level Sales Presentation

Report
Crypto Hypervisor:
A Secure Platform for Encryption that Fits the
Cloud Model
Insert Your Name
Insert Your Title
Insert Date
Who We Are
Trusted to protect the world’s most sensitive data for
the world’s most trusted brands.
We protect the most
money that moves in
the world, $1 trillion
daily.
We protect the most digital
identities in the world.
We protect the most
classified information
in the world.
FOUNDED
OWNERSHIP
1983
Private
REVENUE
GLOBAL FOOTPRINT
~330m
+25,000
Customers in
100 countries
EMPLOYEES
ACCREDITED
+1,400
Products certified
to the highest
security standard
In 25 countries
A Hardware Security Module is…
…a dedicated Hardware crypto
processor…
…designed for Hardware protection
of the crypto key lifecycle…
…validated to be secure by third
parties…
…a “Trust Anchor”…
Crypto Hypervisor uses Hardware Security
Modules as the hardware platform
Dynamic Crypto Resource
Crypto Hypervisor
Hardware Security Module
4
Crypto Hypervisor Extends the Capability of HSMs to
Fit the Cloud Model
NIST1 Cloud Definition of
Essential Characteristics
Legacy
HSMs
NIST1 Cloud Definition of
Essential Characteristics
Crypto
Hypervisor
On-Demand Self-Service
No
On-Demand Self-Service
Yes
Rapid Elasticity
No
Rapid Elasticity
Yes
Measured Service
Yes
Broad Network Access
Yes
Resource Pooling
Yes
Multi-Tenancy2
Yes
Measured Service
Broad Network Access
Resource Pooling
Multi-Tenancy2
1.
2.
Some
Yes
Some
No
National Institute of Standards and Technology
Multi-Tenancy is an essential characteristic added by the Cloud Security Alliance
5
Crypto Hypervisor:
Designed for operational cloud model
1
On-demand
crypto delivery
6
Apps can now
migrate to cloud
2
Self-service
portal for users
5
Part of “New
VM Rollout
Process”
3
New crypto services
spin up easily
4
Encryption now a
cloud enabler
6
Three things to know about Crypto Hypervisor
Built for the cloud
• Shared resource pooling, rapid elasticity and multitenancy
• Can reduce capital costs up to 95%
Lower TCO
• Take advantage of virtualization
• Deliver high-assurance cryptographic resources in a
fraction of the time
• 5 minutes, not 5 hours
Centralized control
• Strong auditing capabilities
• Compliance in the Cloud
• Ensure enterprise-wide consistency of crypto policy
7
Use Case: Enterprise
BEFORE:
 Encryption protects many apps
 Islands of encryption
 Problems:
 Costly
 Complex mgmt/admin
 Requires expertise to deploy
crypto
 New encrypted app rollout is
inefficient
DNSSEC
SSL
© SafeNet Confidential and Proprietary
Database
Email
AFTER CHv:
 CHv: platform for all encryption
 Consolidated to CHv-managed virtual
HSMs
 Benefits:
 Cost savings (hardware)
 Simplified mgmt/admin
 Policies enforced consistently
 New encrypted app rollout is fast
(minutes vs. hours)
Code Sign
8
Solution Highlights
 Host Trust Link (HTL) securely binds virtual applications to dynamic crypto
resources
 Prevents Stolen VM from Accessing Critical Assets
 Crypto Command Center



Simplifies HSM management, through Abstraction of HSM Hardware
Publish Catalogs for on-demand service
Separation of roles/responsibilities in multi-tenancies
 Built on proven platform



Availability: Five 9’s uptime, robust high availability
Validated Security: FIPS 140-2 Level 3 and CC EAL 4+
HW Trust: Keys remain in Hardware!
 Who/What/When Auditing and Logging

Configurable based on your Organizational needs
 Control: Unique Roles for Security in Multi-tenant Environments.

System administrators: manages physical devices (appliances, expansion cards,
etc.), and provision access to resource catalogues for users.

Consumer/User: manage crypto applications that consume crypto services. Own their
HSM resource when ‘leased’.
9
What’s in the Crypto Hypervisor
SafeNet Luna SA 5.2
HSM
Crypto Command Center Bundle
Includes:
• Crypto Command Center Software
• SafeNet Luna G5
• Local PED II
• PED II Keys
Crypto Command Center
SafeNet PED II
SafeNet Luna G5
Feature: Crypto Command Center
11
What is Crypto Command Center?


System (SW) to automate the provisioning of HSM resources
Abstracts the management of HSMs from the end user

Administrators
•
•
•
•
•

Consumers/Users
•
•
•
•

Manage the crypto for your company
Manage the physical HSM devices
Determine what crypto services are offered
Create a catalog of services for end users
Manage who has access to those services
Manage crypto applications that consume crypto services
Own their HSM resource when ‘leased’
Request and release use of HSM resources from catalogues
Always in control of their keys!
Implements REST-ful API or GUI (web based) interfaces (Next Release)
12
Why Use Crypto Command Center?

Trust
•

Save Money
•

Remove the Management burden
from your Application owners
Scale
•

Leverage the HSM resources to
their Fullest
Ease of Use
•

Centralize your Organizations
Cryptographic Trust
HSM Infrastructure that Scales as
your demand grows
Enforce policy and Governance
•
Provide Cryptographic Trust
Anchors that enforce centralized
corporate policy and governance
13
Crypto Hypervisor Enables Crypto as a Service
either on Premise or in the Cloud!
Consumer
Crypto Admin
Crypto
Command
Center
SSH
Crypto
Application
+
Luna Client
Luna SA
Device Pool
Feature: Host Trust Links
15
Host Trust Link
 What is it?
• “Host Trust Link”
• Works on Virtual Machines and traditional OS systems
 Why Use it?
• Trust
• Virtual Machines are meant to be portable
• HTL protects against a Stolen VM accessing your HSM
resources
• Ease of Use
• Built into HSM client registration process
16
VM is Stolen…VMs with “HTL” Host Trust Link
•
•
•
•
Prevents theft of an at-rest VM image
Connection to the SA is authorized by a one-time token
Includes a step counter that must sync with the SA
NTLS depends on an active HTL connection
HSM Client VM
NTLS
X
Access Denied
Luna SA
Today:
• Stolen VM will not be granted access to
SA partition
• Stolen image does not have OTT,
required to establish HTL Link
Feature: Secure Audit Logs
18
Why log?
 Want to be able to Audit all HSM operations
• Who/What/When?
• Was the operation a Success or Failure?
 Want to ensure the Origin of the logs
• Messages come from this HSM
 Want to ensure the Integrity of the logs
• No Alterations
• No Deletions
• No Truncation
Meet Audit and Compliance Mandates
© SafeNet Confidential and Proprietary
19
What Gets Logged – Categories
 Critical
• Tamper, HSM init, Audit init, Zeroize
• Always logged
 HSM Management
• change password, create challenge, change policies
 HSM Access
• Login/Logout
 Key Management
• key creation/deletion
 Key Usage
• use of key for crypto ops (‘First Use Only’ flag)
 External
• CA_LogExternal API messages
 Log Management
• Log management related commands (import/export secret, verify)
© SafeNet Confidential and Proprietary
20
Audit Logging
 Time used for log is UTC
 Audit role has ability to sync time (manually) between
the HSM and CLIENT
 Syslog server can be used
• UDP or TCP supported
• Port can be customized
21
Performance Impact
 Logging requires crypto operations
• Logging serializes command execution
• HMAC calculation
 Tradeoff – performance vs. amount logged
 Reduce impact
• Only log necessary data
• “First Use” modifier for key usage logging
© SafeNet Confidential and Proprietary
22
Other Features
23
Common Client
 Common Client For SA/PCI-E/G5
• One install package
• Choose products/features
• Including remote PED and remote Backup
• Choose APIs
• PKCS#11, Java, JCProv, Microsoft CSP,KSP
• Choose Production or Development
• SDK and samples
24
Common Client
 Enhanced OS Support
•
•
•
•
•
Windows 2008R2, 2012
Linux (RedHat 5, 6, SUSE 10, 11, Debian 6)
Solaris 10,11
AIX 6.1, 7.1
HP-UX 11iv3 (11.31)
25
Remote Backup – High Level Architecture
Client Server
Luna
CM
1 SSH
Crypto
App
System Admin
PED
Server
4
2
3
1. SSH/RDP to Client
2. Setup rPED to SA and
Login to Partition
3. Setup rPED to RBS
4. Lunacm>par backup
Remote
Backup
Server
PED
Client
RBS
Backup
HSM
26
Other
 JCProv
• Java-PKCS#11 API
 Upgradable PED
• Any PED with FW 2.4.0-3 can be upgraded
• Need to upgrade for Audit logging
• Can’t change between Local and Remote PED
27

similar documents