set of requirements, when added to the cloud
offerings, enables to use the cloud as if it were
deployed within a local datacenter.
Consider the example in which an enterprise
implements a store front on a public cloud but keeps
the backend database for the store front in their
datacenter. In this simple example, the datacenter
administrator is faced with several security
problems. In the reference architecture these issues
are addressed. The architectural definition of the
solution is to deploy the front-end of the shop on a
public cloud, and the sensitive data as well as the
application financial processing servers on the local
enterprise datacenter. High-availability and transient
(on-demand) scalability requirements define a
minimum of a 3 front-end server cluster, 2
application servers, and 2 replicated database
servers. The maximum allowed provisioned servers
are 15 for the front-end, 5 for application logic, and
during known heavy usage periods (holidays), to add
another single replicated database.
According to this architecture definition, the
Strategic Federated CMDB will contain the planned
structure of 3 front-end servers mounted to be
deployed on Amazon EC2 cloud, 2 application and 2
database servers will be deployed as virtual guests
on a VMWare host within the internal datacenter.
All these images (VMWare guest and server, and
Amazon Image) are configured according to the
Package Description component, after being
designed in the Image Design and Modeling
component.
Since scaling up and down is part of the cloud
promise (dynamic, on demand scaling), we can
define transient conditions of the applications based
on adaptation needs of the solution (number of
concurrent connections, averaged transactions
performance latency, shoppers peaks, etc.). These
are inherently part of the strategy definition,
containing the adaptation configuration parameters,
managed by the Deployment and Change
management tools, rather than CMDB. The
discovery tools that will detect the added servers,
can compare it to the stable minimum strategy and
the approved deviations, and will indicate the
difference as allowed, as long as they are within the
above boundaries. It can even show the differences
on the same view (planned vs. actual).
The security policy rules are:
1. Deployment administration policy:
1.1. The provisioning of this application can
only be conducted by the authorized Image
Provisioning and Deployment Manager
only.
2. Cloud roaming policy:
2.1. The front-end servers cannot be deployed
in Europe due to privacy regulation
limitations.
3. Datacenter co-existence policy:
3.1. The database servers cannot be deployed
on machines that contain the company
employees’ salary database server.
3.2. The application and the database must
reside on separate physical servers,
namely, each component of the solution
must be on another hardware.
4. Sizing and scaling policy:
4.1. The front-end provisioning is bounded
between 3 and 15 servers
4.2. The Application servers provisioning is
bounded between 2 and 5 servers
4.3. The Application servers provisioning is
bounded between 2 and 3 servers
according to dates attached to the policy.
5. Secured communication policy:
5.1.
The application servers can only respond
to incoming requests from the front-end
servers.
The policies are defined and maintained in the
Virtual Host policy (3.1, 3.2, 4.2, 4.3, 5.1), and the
cloud Security Distributed Policy (1.1, 2.1, 4.1)
within the Topology Management component.
Accordingly, the Topology component dispatches
these separate policies to the Security Sentry and
Image Design components.
The Cloud Security Sentry intercepts any
management call to Utility computing that does not
originated from the Image Provisioning and
Deployment component.
The Managed Services component contains
accordingly specific application security
provisioning policy (1.1, 4.1) that enables the
provisioning and un-provisioning of images on the
public cloud, governed by the Security Sentry. Thus,
change function calls will be activated only if they
are within the policy boundary. The exact amount of
provisioned machines is maintained in the Topology
MDR, which receives the correct status of the
system from the federated reconciled CMDB.
The Image Provisioning and Deployment
component manages the internal datacenter as well,
where each of the deployed servers has an
enforcement access control agent installed. This
agent receives the co-existence (3.1, 3.2), sizing
(4.2, 4.3) and communication (5.1) policy, bundled
with other access control policies, hardening the
operating systems (out of scope for this paper).
PROTECTING THE PHYSICAL BOUNDARIES OF VIRTUAL MACHINES IN CLOUD COMPUTING
669