Trusted Geolocation in the Cloud: Proof of Concept Implementation
Total Page:16
File Type:pdf, Size:1020Kb
NISTIR 7904 Trusted Geolocation in the Cloud: Proof of Concept Implementation Michael Bartock Murugiah Souppaya Raghuram Yeluri Uttam Shetty James Greene Steve Orrin Hemma Prafullchandra John McLeese Jason Mills Daniel Carayiannis Tarik Williams Karen Scarfone This publication is available free of charge from: http://dx.doi.org/10.6028/NIST.IR.7904 NISTIR 7904 Trusted Geolocation in the Cloud: Proof of Concept Implementation Michael Bartock Hemma Prafullchandra Murugiah Souppaya John McLeese Computer Security Division Jason Mills Information Technology Laboratory HyTrust Mountain View, California Raghuram Yeluri Uttam Shetty Daniel Carayiannis James Greene Tarik Williams Steve Orrin RSA, The Security Division of EMC Intel Corporation Bedford, Massachusetts Santa Clara, California Karen Scarfone Scarfone Cybersecurity Clifton, Virginia This publication is available free of charge from: http://dx.doi.org/10.6028/NIST.IR.7904 December 2015 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Willie May, Under Secretary of Commerce for Standards and Technology and Director National Institute of Standards and Technology Internal Report 7904 59 pages (December 2015) This publication is available free of charge from: http://dx.doi.org/10.6028/NIST.IR.7904 Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may be used by Federal agencies even before the completion of such companion publications. Thus, until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, Federal agencies may wish to closely follow the development of these new publications by NIST. Organizations are encouraged to review all draft publications during public comment periods and provide feedback to NIST. Many NIST cybersecurity publications, other than the ones noted above, are available at http://csrc.nist.gov/publications. Comments on this publication may be submitted to: National Institute of Standards and Technology Attn: Computer Security Division, Information Technology Laboratory 100 Bureau Drive (Mail Stop 8930) Gaithersburg, MD 20899-8930 NISTIR 7904 TRUSTED GEOLOCATION IN THE CLOUD: PROOF OF CONCEPT IMPLEMENTATION Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology. ITL’s responsibilities include the development of management, administrative, technical, and physical standards and guidelines for the cost-effective security and privacy of other than national security-related information in Federal information systems. Abstract This publication explains selected security challenges involving Infrastructure as a Service (IaaS) cloud computing technologies and geolocation. It then describes a proof of concept implementation that was designed to address those challenges. The publication provides sufficient details about the proof of concept implementation so that organizations can reproduce it if desired. The publication is intended to be a blueprint or template that can be used by the general security community to validate and implement the described proof of concept implementation. Keywords cloud computing; geolocation; Infrastructure as a Service (IaaS); roots of trust; virtualization ii NISTIR 7904 TRUSTED GEOLOCATION IN THE CLOUD: PROOF OF CONCEPT IMPLEMENTATION Acknowledgments The authors wish to thank their colleagues who reviewed drafts of this document and contributed to its technical content, in particular Kevin Fiftal from Intel Corporation. Audience This document has been created for security researchers, cloud computing practitioners, system integrators, and other parties interested in techniques for solving the security problem in question: improving the security of virtualized infrastructure cloud computing technologies by enforcing geolocation restrictions. Trademark Information All registered trademarks or trademarks belong to their respective organizations. iii NISTIR 7904 TRUSTED GEOLOCATION IN THE CLOUD: PROOF OF CONCEPT IMPLEMENTATION Table of Contents 1 Introduction ......................................................................................................................... 1 1.1 Purpose and Scope .................................................................................................... 1 1.2 Document Structure .................................................................................................... 1 2 Usage Scenario ................................................................................................................... 2 2.1 Problem to Address .................................................................................................... 2 2.2 Requirements .............................................................................................................. 2 2.2.1 Stage 0: Platform Attestation and Safer Hypervisor Launch ........................................ 3 2.2.2 Stage 1: Trust-Based Homogeneous Secure Migration ............................................... 4 2.2.3 Stage 2: Trust-Based and Geolocation-Based Homogeneous Secure Migration ........ 5 3 Usage Scenario Instantiation Example: Stage 0 .............................................................. 7 3.1 Solution Overview ....................................................................................................... 7 3.2 Solution Architecture ................................................................................................... 8 4 Usage Scenario Instantiation Example: Stage 1 ............................................................ 10 4.1 Solution Overview ..................................................................................................... 10 4.2 Solution Architecture ................................................................................................. 11 5 Usage Scenario Instantiation Example: Stage 2 ............................................................ 12 5.1 Solution Overview ..................................................................................................... 12 5.2 Solution Architecture ................................................................................................. 13 List of Appendices Appendix A— Hardware Architecture and Prerequisites ...................................................... 14 A.1 High-Level Implementation Architecture ................................................................... 14 A.2 Intel Trusted Execution Technology (Intel TXT) & Trusted Platform Module (TPM) . 15 A.3 Attestation ................................................................................................................. 17 Appendix B— Platform Implementation: HyTrust ................................................................. 20 B.1 Solution Architecture ................................................................................................. 20 B.2 Hardware Description ............................................................................................... 20 B.3 BIOS Changes .......................................................................................................... 21 B.4 HyTrust CloudControl Installation and Configuration with VMware Components ..... 21 B.5 Trust Authority Installation and Configuration ........................................................... 23 B.5.1 TXT/TPM Pre-Flight Checklist .................................................................................... 23 B.5.2 Configure TAS on HTCC ............................................................................................ 24 B.5.3 Configure GKH on HTCC ........................................................................................... 24 B.6 Trust Authority Registration ...................................................................................... 24 B.6.1 Configure PolicyTags on HTCC ................................................................................. 24 B.6.2 Install/Configure PXE Server ...................................................................................... 25 Appendix C— Platform Implementation: OpenStack ............................................................ 30 C.1 Solution Architecture ................................................................................................. 31 C.2 Hardware Description ............................................................................................... 32 C.3 BIOS Changes .......................................................................................................... 33 iv NISTIR 7904