Titanium Cloud Security Brief

Issue link:

Contents of this Issue


Page 0 of 1

SECURE VIRTUALIZATION PLATFORM FOR CRITICAL INFRASTRUCTURE INTRODUCTION Companies, governments, institutions, and consumers are adopting cloud and cloud-based technologies at an ever- increasing rate, including (per a 2017 study by Schneider Electric 1 ) those leveraging the cloud for security applica- tions. This growing acceptance of the cloud as a reliable, valuable resource has an unfortunate and unintended consequence: The cloud has become a potentially lucrative target for those looking to hack, exfiltrate, or monetize via malware the data within the cloud. True protection from attacks cannot be easily achieved; there are no quick software add-ons, no "all-in-one" security tools to deploy that fit the need. True protection must be comprehensive in approach, designed into the solution from the day the first line of code is authored through to a product's retirement. Protection must include technologies that safeguard against configuration flaws and problematic development practices, and technolo- gies that detect subtle load tampering and prevent the theft of vital secrets. In short, the cloud must be made safe from the moment it boots and begins to provide service, continuing on through daily 24x7 operations. Security is definitely not an afterthought for the award-winning Wind River ® Titanium Cloud ™ virtualization platform. Designed for hosting critical infrastructure applications (e.g., those involved in power generation, oil and gas refiner- ies, chemical factories, and telecommunications systems), Titanium Cloud provides broad and deep protection from today's persistent industry threats and ever-present and evolving active attacks. LIFECYCLE EVENTS As part of a typical software product lifecycle, systems are architected, developed, and then deployed into the field. They power up, boot, and provide service; they are managed and receive updates. During each stage of this product lifecycle at Wind River, actions and specific formal procedures are followed to ensure the security and integrity of the Titanium Cloud family of products and the services they provide to applications. Titanium Cloud Security Lifecycle Events While not an exhaustive list, the following details provide some insight into the practices and technologies employed by Wind River in securing Titanium Cloud. • During the development phase, engineers implementing Titanium Cloud features follow a rigorous develop- ment methodology that includes mandatory code inspections, update traceability, and architectural oversight. • Prior to product release, a third-party security tool is used to actively probe each new Titanium Cloud runtime for vulnerabilities, misconfigurations, and potential attack vectors. Any findings are analyzed and evaluated, with written responses generated and actions taken. • After all known issues have been addressed and the final build created, portions of the Titanium Cloud product load (boot loaders, the OS kernel itself, and supporting kernel modules) are cryptographically signed at Wind River to protect against any form of change or tampering while in transit to a customer site or after delivery. • During the boot process in the field, low level system firmware ensures that crucial portions of the load being executed are bit-for-bit identical to that shipped by Wind River, as validated using cryptographic public key signatures (specifically, following a process known as UEFI Secure Boot and X.509 signatures). A Comprehensive Approach to Security with Titanium Cloud Security Brief AN INTEL COMPANY ™ WHEN IT MATTERS, IT RUNS ON WIND RIVER

Articles in this issue

view archives of Briefs - Titanium Cloud Security Brief