The State of Dynamic Data Center and Cloud Security
The State of Dynamic Data Center and Cloud Security
A SANS Survey
Written by Dave Shackleford
October 2015
Sponsored by
Illumio
of those able to share their breach history have Many of the security concerns that kept enterprises from embracing
44 % experienced a breach resulting in the loss of
sensitive data
earlier cloud computing models still remain, ranging from account
and identity management to application flaws and malware.
are concerned with access management and Application flaws and malware are the biggest threats, with 50%
68% privileged account management vulnerabilities
in their data centers and in the cloud, with 64%
reporting system and data compromises due to application flaws
concerned with application vulnerabilities and 45% attributing compromises to malware. Visibility is a problem
for 44% of respondents, who said their cloud providers don’t allow
have no visibility into East-West traffic
58% in their data center or cloud environments
(or know whether they do)
them to see into those environments well enough to protect users or
data. Public cloud providers also don’t offer insight or access to tried-
and-true security technologies that enterprises have come to rely on,
use network IDS/IPS, malware detection
according to 19% of survey takers.
69 % tools, and access control lists (ACLs) on
intermediate routers and switches to Enterprises seem to be evolving from traditional IT infrastructure
secure their East-West traffic
models to a range of newer, often more complex structures, and
both enterprise security and distributed computing appear to be
35% revealed it takes more than two weeks to
implement security change controls at an evolutionary crossroad. Breach and incident data reported by
IT teams suggest that traditional security strategies and controls
have experienced attacks against workloads struggle to keep up with the risks facing traditional enterprise
37 % in their data center or cloud environments,
and 25% don’t know whether they have
models and are inadequate for the challenges they face in trying to
experienced attacks address dynamic computing environments.
1
h ttps://downloads.cloudsecurityalliance.org/initiatives/surveys/financial-services/Cloud_Adoption_In_The_Financial_
Services_Sector_Survey_March2015_FINAL.pdf
SANS ANALYST PROGRAM
1 The State of Dynamic Data Center and Cloud Security in the Modern Enterprise
Executive Summary (CONTINUED)
The potential risk from cloud services or providers represents just one set of elements in
an increasingly complex picture. The real problem is that security concerns grow along
with increases in complexity. According to this survey and other SANS reports,2 many
organizations are concerned about how to react to increasing pressure to scale their
data center and IT architectures, adapt to new computing models and quickly embrace
complex architectures.
As organizations’ data centers become more dynamic and the need to scale quickly in
complex architectures grows, security will need to adapt accordingly. Based on feedback
from this survey, the following seems clear:
• Most organizations’ computing surfaces are expanding, with the majority reporting
a mix of traditional data center and cloud service infrastructure in place. They use a
broad array of traditional security controls, many of which don’t work well (or at all)
in the cloud. Huge changes are being made to computing infrastructures, which
include the addition of more dynamic data center processes such as DevOps and
expansion into clouds; however, organizations are not adding technologies that
respond to security challenges created by these major shifts in computing.
• The top types of attack vectors concerning most enterprises are access
management flaws, application vulnerabilities, malware, advanced multistage
attacks and poor security habits of employees. In the case of this survey, 44% of
respondents willing to share their breach experiences have faced at least one
breach in which sensitive data was accessed by attackers.
• Among the key security capabilities missing in modern dynamic data centers and
clouds are visibility, rapid attack identification, and fast, accurate and automated
containment. As the data shows, many organizations have experienced attacks
both in the cloud and in their own data centers.
2
“ Conquering Network Security Challenges in Distributed Enterprises,” July 2015,
www.sans.org/reading-room/whitepapers/analyst/conquering-network-security-challenges-distributed-enterprises-36007
“ Enabling Big Data by Removing Security and Compliance Barriers,” September 2014,
www.sans.org/reading-room/whitepapers/analyst/enabling-big-data-removing-security-compliance-barriers-36017
“ Data Center Server Security Survey 2014,” October 2014,
www.sans.org/reading-room/whitepapers/analyst/data-center-server-security-survey-2014-35567
“ The Case for Visibility: SANS 2nd Annual Survey on the State of Endpoint Risk and Security,” March 2015,
www.sans.org/reading-room/whitepapers/analyst/case-visibility-2nd-annual-survey-state-endpoint-risk-security-35927
“ SANS Analytics and Intelligence Survey 2014,” October 2014,
www.sans.org/reading-room/whitepapers/analyst/analytics-intelligence-survey-2014-35507
“ SANS Ninth Log Management Survey Report,” October 2014,
www.sans.org/reading-room/whitepapers/analyst/ninth-log-management-survey-report-35497
SANS ANALYST PROGRAM
2 The State of Dynamic Data Center and Cloud Security in the Modern Enterprise
About the Respondents
Most enterprises rely on a variety of time-tested, best-practice information
security practices and policies to secure their computing environments, according
to respondents to the SANS Dynamic Data Center Survey, completed by 430 IT
professionals working in security-related disciplines. Respondents are less clear about
whether these traditional approaches can work in a much more dynamic computing
environment with a heterogeneous mix of bare metal and virtual servers and data
centers and clouds.
The majority of the respondents (64%) worked in organizations with more than 1,000
workers, and 23% worked in large enterprises of more than 15,000. Another 23% worked
in smaller environments with 100–1,000 staff, and 13% had fewer than 100 employees.
Most respondents (77%) have some presence in the United States, and 58% are
headquartered in the United States. More than a quarter each operate in Europe (29%)
and the Asia-Pacific region (25%). Slightly fewer than 22% have a presence in Canada,
with the remaining regions represented by fewer than 20% of respondents.
Overall, this survey garnered attention from organizations of all sizes, predominately
in the U.S., but with some international representation. The sample represents a broad
spectrum of IT and security professionals in both engineering and management
positions, all of whom are concerned with the security of cloud services and hybrid data
center deployments.
What type of attack vectors are you most concerned about with regard to your
data center or cloud infrastructure?
70%
60%
50%
40%
30%
20%
10%
0%
Access management
vulnerabilities (privilege
account management)
Application vulnerabilities
Malware infections
Insider threat(s)
False alarms
Other
Figure 2. Today’s Top Security Concerns
Figure 2. Today’s Top Security Concerns
Respondents could choose more than one attack vector to be concerned about. Still, it is
surprising to see that the six most often-cited issues were a concern to more than half of
all respondents, highlighting the significant concerns these vectors present to dynamic
data centers.
Even with these defined attack vectors, 37% of respondents indicated they had
experienced a compromise of some sort, an equal percentage said they had not, and
25% weren’t sure. Of those who had experienced attacks, 50% blamed exploits of
application vulnerabilities; 45% blamed malware; 33% fell victim to social engineering
techniques; and 31% said they’d been hit by a distributed denial of service (DDoS)
attack. Figure 3 provides a breakdown of the sources that result in compromise.
50%
TAKEAWAY: 40%
Malware infections
Insider threat(s)
Access management
vulnerabilities (privilege
account management)
False alarms
Other
awareness training. These
security control areas can
help reduce some of the
top avenues of potential
compromise today.
Advanced multistage attacks and insider threats were responsible for compromises
for 24% of respondents. Interestingly, although access and privilege management
issues were the top concern for respondents, they blamed that vector for only 18% of
successful compromise scenarios.
It’s not surprising that many of the root cause scenarios were related to application flaws
or malware of some sort, as these tend to be the most prevalent direct attack models
today. User involvement in attacks is also increasing, usually through social engineering,
so its positioning as the third most common compromise vector is also expected.
In general, how long from the time the attack was detected has it taken you to
contain the attack and fully recover from its effect?
TAKEAWAY:
40%
Take steps to cover the major From 1 to 8 hours
ore than 8 hours but
M
avenues of compromise, 30% within 24 hours
including application ore than a day but less
M
20% than a week
flaws, malware and social ore than a week but less
M
than a month
engineering. Invest in controls 10%
Between 1 to 6 months
that can isolate threats and More than 6 months
0%
contain potential attacks, Containment Recovery Unknown
In both the containment and recovery phases of incident response, a small number of
respondents stated that they didn’t know how long the containment and recovery times
took during these incidents. But most (55%) were dissatisfied with the amount of time
containment and full recovery took.
Just over half of enterprises are able to contain incidents within 24 hours, which leaves
many open to continued damage. More than 9% of respondents took between a week
and a month to contain incidents, and another 5% took between one and six months,
which may demonstrate that traditional security tools are not helping organizations
get a handle on attack scenarios. During attacks, time is of the essence. If enterprises
are alerted to attacks without the ability to contain and respond to them rapidly, the
security program’s overall effectiveness is diminished.
Data Compromise
Simply experiencing an attack or incident doesn’t mean that sensitive data was accessed
or stolen. Unfortunately, of those able to share their breach experiences, 44% reported
having sensitive data accessed by the attackers in at least one attack. Looking at the
entire data set, 20% experienced one or two breaches as a result of the attacks, another
8% reported three to six breaches and less than 1% noted experiencing more than
six breaches. Another 17% didn’t know if they had been breached, and 17% declined
to answer. This may indicate that even more breaches actually occurred and that
respondents chose not to respond. See Figure 5.
How many times, in the past 24 months, have attacks resulted in a breach that
led to theft of your customers’ regulated data or your intellectual property?
TAKEAWAY:
None
Most organizations have
1–2 breaches
experienced at least one
3–4 breaches
breach that led to data theft
5–6 breaches
or exposure. Operate under
the assumption that you will More than 6 breaches
plans and technologies in Organizational size appears to have some effect on how many attacks result in breaches.
place when a breach occurs. Looking at the ratio of breach to attack, organizations of 2,000 or greater experience a
breach 30% of the time or more when they are attacked. For entities with 5,001 to 10,000
employees, that ratio increases to 50%.
Although most organizations are combating sophisticated attacks and data compromise
incidents, the design and function of today’s data centers is changing dramatically. Many
organizations are moving assets to the public cloud, and the nature of security controls
may need to change to accommodate this as well. In fact, some types of security controls
may not even be available in all cloud architecture models.
80%
60%
40%
20%
0%
Traditional data center
(dedicated to your enterprise)
SANS analyzed the number of breaches by the type of data center deployment, and
the results seem to indicate that organizations that experienced up to four breaches
are still seeing more breaches occur in their own data center environments than in
the public cloud. Those who experienced five to six breaches in the past 24 months
saw just as many in the public cloud as in other environments. This result may speak
to the comparative amounts of data housed in the traditional setting as opposed to
the public cloud setting. However, given that the majority of respondents either did
not experience breaches (that they know of ) or chose not to answer, these results are
somewhat inconclusive.
Private data center All hardware, systems and All infrastructure and apps are maintained
building a separate facility. applications by the organization, so all traditional IT and
physical security risks apply.
Co-location facility Most network devices, all Physical security is run by the colo provider,
servers and applications other tenants also host infrastructure and
applications there. The primary risks are
that physical security is breached by other
Co-location Facility tenants or insiders at the colo provider.
A similar facility, but the sites IaaS Private cloud (on-site) Virtualization hypervisors or All virtualization components and systems,
container platforms, virtual apps, and data are maintained by the
are subdivided into multiple machines and applications organization, so all traditional IT and
physical security risks apply. New risks may
tenant areas, usually via arise from the use of new technology, such
as virtual machine escape or role/privilege
provision of separate racks, misuse within virtualization and cloud tools.
IaaS Private cloud (VPC) Virtual machines and The cloud provider maintains all hardware
cages surrounding multiple applications, possibly virtual and physical security, as well as most
appliances and networking networking functions and storage
racks, or even separate rooms infrastructure. Risks from this may include
exposure of sensitive data to the cloud
or access-controlled spaces provider personnel or other tenants. Some
risks may still exist from other tenants, even
within the facility. though VPCs should be isolated, due to
virtualization platform vulnerabilities.
PaaS (public) Application components The cloud provider maintains all hardware
and data and physical security, as well as most
networking functions and storage
infrastructure. In addition, the provider
For more in-depth information usually maintains all control of the OS
configuration within virtual machines.
on risks associated with Risks include insider threats, configuration
errors and risks from other tenants due to
cloud deployments, review virtualization platform vulnerabilities.
the research from the Cloud SaaS (public) Data The cloud provider maintains control of
all components. Only software-based
Security Alliance Top Threats to controls within container or virtual machine
instances are made available to providers.
Cloud Working Group.3 Insider threats, configuration issues and
code flaws are the most prevalent risks in
these environments.
3
h ttps://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
SANS ANALYST PROGRAM
11 The State of Dynamic Data Center and Cloud Security in the Modern Enterprise
Data Center Architecture and Deployment Types (CONTINUED)
In this survey, 93% of respondents indicated they are deploying servers using
virtualization tools and technology, with 68% using traditional (bare metal) server
installations and 23% leveraging container technology.
A variety of different cloud services are in use today. Based on responses, 63% of
enterprises surveyed are currently using SaaS offerings, with over half (51%) using IaaS
for server deployments and one-third (33%) using PaaS. In addition, 39% are using cloud
storage, 15% are implementing cloud-based desktops (DaaS). Two write-in responses
also indicate the use of security-as-a-service (SecaaS), and six use no cloud services at all.
Figure 7 shows the breakdown of different cloud services in use by survey respondents.
Which of the following types of cloud deployments are you currently using?
Select all that apply.
Security-as-a-service 60%
(SecaaS) 50%
Infrastructure-as-a-Service (IaaS)
Cloud-based storage
Platform-as-a-Service (PaaS)
Desktops-as-a-Service (DaaS)
Other
subscription basis
When any of these services are deployed in the public cloud, organizations are putting
their data and systems into environments where they fundamentally cede control of
their infrastructure to cloud service providers (CSPs). To some, this is a reasonable risk to
take, based on the attractive cost savings and business advantages. However, there are
many hurdles to overcome.
What are the applicable regulations or standards with which you must comply?
Select all that apply.
60%
50%
40%
30%
20%
10%
0%
Payment Card Industry (PCI)
Other
EuroSOX
4
ww.nextgov.com/cloud-computing/2014/08/big-win-amazon-first-provider-authorized-handle-sensitive-dod-workloads/92069
w
SANS ANALYST PROGRAM
13 The State of Dynamic Data Center and Cloud Security in the Modern Enterprise
Data Center Architecture and Deployment Types (CONTINUED)
Many of these regulatory and industry compliance requirements include specific security
technologies and governance needs such as change control. In fact, based on experience,
many organizations SANS works with are moving resources to cloud environments in an
attempt to reduce the amount of time it takes to implement changes.
Which of the following security technologies and techniques are you actively
using in your organization’s data center or cloud deployments?
100%
80%
60%
40%
20%
0%
Network firewalls
Network intrusion
detection/prevention
Host-based configuration
and anti-malware tools
Network encryption
Host-based firewalls
Network behavioral
monitoring
Within the data center, the vast majority are employing network firewalls, network IDS
and IPS, and server/application monitoring, selected by 96%, 83% and 77%, respectively.
In addition, 75% use web content filtering, 75% use identity and access management
tools, and 74% use host-based security and anti-malware tools. Roughly two-thirds are
using network encryption (66%) and SIEM (63%).
However, the numbers drop sharply when we examine the tools in use within the cloud.
Just 34% make use of network firewalls, 29% rely on network IDS and IPS, and only 28%
monitor servers and applications. Web content filtering fell off considerably, with only
25% taking this approach. Only 31% use identity and access management tools, while
24% deploy host-based security and anti-malware tools, 28% incorporate network
encryption and 25% use SIEM.
This seeming reduction in use of security tools is a huge issue for many organizations
today, given the fact that many public cloud providers don’t currently offer or support
many security tools considered standard by most security teams. While some cloud
TAKEAWAY: providers do have security offerings available, they fall far short of the security stack
used by most survey respondents.
Work with cloud providers
to enable the security tools, Making changes to security controls requires implementing change controls required
such as network firewalls, by many regulatory groups. And, security changes do take a long time to implement, as
shown in Figure 10.
network intrusion detection
and prevention, and identity From initial change request to final implementation, how long does it take for your
security change controls (firewall rule changes, VLANSs, security zones, etc.) to be
and access management, configured, approved and applied into production within your organization?
but realize they are often
significantly less effective in
securing hybrid and dynamic Less than 2 weeks
While 56% of respondents said they are able to implement changes in less than two
weeks, many are still finding that security changes and updates take much longer,
with 8% taking longer than six weeks to implement security changes. These kinds of
changes are taking a long time with security technologies that are currently running in
our own data centers and co-location facilities. The larger the organization, the longer
it takes to implement changes. And, although the differences in the time to implement
change in traditional and cloud environments in this survey are not significant, it is
worth considering whether that will change as more technologies are migrated to cloud
deployments.
SANS ANALYST PROGRAM
15 The State of Dynamic Data Center and Cloud Security in the Modern Enterprise
The Next Phase of Network and Security Monitoring and Protection
Network security monitoring has proven to be a huge challenge for many organizations
in the data center and in the cloud. As noted previously, fundamental network security
technologies such as firewalls and intrusion detection/prevention platforms have
significantly lower adoption rates in the public cloud. While this may be partially due
to lack of provider support for tried-and-true in-house network security technologies,
security personnel face a number of challenges, one of which may be the lack of security
planning for dynamic and hybrid workloads in private and public cloud environments.
Only 32% of respondents have a formal cloud security strategy in place. Security of
cloud-based data centers cannot be a chance occurrence.
Other
Other challenges include a lack of vendor options for cloud environments and a lack
TAKEAWAY: of virtual appliances that work with chosen cloud service provider hypervisors. SANS
Visibility is a concern in the received a number of responses for the “other” option, including licensing challenges,
cloud and the data center. operations delays, lack of management support, lack of funding, and a knowledge gap
Investigate and implement preventing expansion into new options.
tools and processes that But the challenges are not limited to the cloud. The SANS Data Center Security Survey5
improve visibility in your found visibility a concern in data centers as well. This suggests that tools and processes
that can enhance visibility in cloud and data center environments should be a high
computing environments.
priority for organizations.
5
“ Data Center Security Survey 2014,
www.sans.org/reading-room/whitepapers/analyst/data-center-server-security-survey-2014-35567
SANS ANALYST PROGRAM
17 The State of Dynamic Data Center and Cloud Security in the Modern Enterprise
Hybrid Data Protection Strategies
While much has been said in the past several years about monitoring and protecting
data moving from our data centers to cloud service provider environments, there is
also a need to carefully monitor traffic between systems or virtual machines in both
data center and cloud environments, commonly called East-West traffic. Currently, only
43% of survey respondents are monitoring East-West traffic in their data center and
East-West Traffic
cloud environments, with 36% not monitoring this traffic and 21% unsure whether
The traffic between they are or not.
applications, systems or VMs
The finding that 21% don’t know their monitoring status certainly speaks to
within both data center and confusion about the need to secure East-West traffic. If one in five respondents
cloud environments doesn’t know his/her organization’s own monitoring posture, certainly a problem
exists that must be addressed.
For those that are currently monitoring East-West traffic, 69% use network IDS/IPS
or malware analysis tools to accomplish this. The same percentage of respondents
uses access control lists on routers and switches. Some enterprises are using East-
West internal firewalls (53%), and 18% are using or considering software-defined
networking (SDN) options. Some enterprises did not know how they were monitoring
TAKEAWAY: such traffic or were looking at host-based solutions to monitor activity. Unfortunately,
Begin monitoring East-West these tools are static and unable to keep up with the pace of dynamic data centers. It’s
traffic to enhance your data no surprise 35% of respondents revealed it takes more than two weeks to implement
security. With the advent security change controls. Figure 12 illustrates the strategies respondents are using to
secure East-West traffic.
of dynamic, hybrid data
centers and the increasing What strategies do you use to segment applications and secure
East-West traffic inside your data center?
frequency of intrusions and
data breaches, East-West 60%
monitoring should be done
40%
as close to the workload
as possible, implying that 20%
monitoring on individual
0%
systems and virtual machines
Perimeter appliances (Firewall,
IDS/IPS) or advanced malware
detection tools for security
ACLs on intermediate
routers/switches (with
VLANs, subnets and zones)
Internal (East-West)
firewalls (with VLANs,
subnets and zones)
Considering or have
implemented software-
defined networking (SDN)
Other
In addition to monitoring network traffic between internal environments and the cloud,
as well as East-West traffic, encrypting traffic internally and between on-premises and
cloud environments is key to actually protecting the data in transit. To accomplish this,
66% of respondents’ organizations are currently using SSL technology, and 56% use
IPSec, as shown in Figure 13.
What are you currently using to encrypt network connections between your data center
(on-premises) resources or between your data center and cloud-based assets?
70%
60%
50%
40%
30%
20%
10%
0%
SSL technology based on our premises
Other
Figure 13. Network Encryption Technology in Use
Using on-premises encryption tools makes sense, because many organizations already
have these in place and can continue to use them as they migrate to cloud service
environments. SSL in the cloud provider environment is the third choice, selected by
29%, followed by hybrid SSL and IPSec strategies combining on-premises and cloud
provider technology options, at 27% and 17%, respectively. Only 5% of respondents are
using third-party brokering services.
Sponsor
SANS would like to thank this survey’s sponsor: