Information Security With Nutanix PDF
Information Security With Nutanix PDF
Information Security With Nutanix PDF
Copyright
Copyright 2018 Nutanix, Inc.
Nutanix, Inc.
1740 Technology Drive, Suite 150
San Jose, CA 95110
All rights reserved. This product is protected by U.S. and international copyright and intellectual
property laws.
Nutanix is a trademark of Nutanix, Inc. in the United States and/or other jurisdictions. All other
marks and names mentioned herein may be trademarks of their respective companies.
Copyright | 2
Information Security
Contents
1. Executive Summary................................................................................ 4
2. Introduction..............................................................................................5
2.1. Audience........................................................................................................................ 5
2.2. Purpose..........................................................................................................................5
8. Conclusion............................................................................................. 18
Appendix......................................................................................................................... 19
Risk Management Features................................................................................................19
About Nutanix......................................................................................................................20
List of Figures................................................................................................................21
List of Tables................................................................................................................. 22
3
Information Security
1. Executive Summary
Cybersecurity threats grow and change every day, demanding perpetual vigilance and adaptation
to the shifting security landscape. However, upgrading security in a traditional three-tier
architecture is so time consuming and expensive, often involving multiple separate vendors,
that some enterprises put off innovation. In light of competing concerns—the need to reclaim
resources for innovation versus the need to keep costs down—corporate and government
environments demand a simpler approach: one vendor, with a technology platform secured by
design, and automated security compliance and reporting.
Nutanix takes a holistic approach to security, with an inherently secure platform, extensive
automation, and a robust partner ecosystem. The Nutanix security development life cycle
(SecDL) integrates security into every step of product development, rather than applying it as
an afterthought. The SecDL is a foundational part of product design. The pervasive culture
and processes built around security harden the Enterprise Cloud OS and eliminate zero-day
vulnerabilities. For example, research and development teams work together to fully understand
all the code in the product, whether it is produced in-house or inherited from dependencies.
We schedule product updates to handle known common vulnerabilities and exposures (CVEs)
for minor release cycles, and backport all dependencies to their latest release versions in
major release cycles. This approach significantly reduces zero-day risks without slowing down
product evolution. Efficient one-click operations and self-healing security models easily enable
automation to maintain security in an always-on hyperconverged solution. Expanding beyond
the platform into a robust set of security partners, Nutanix delivers validated joint solutions with
security-focused vendors.
Because traditional manual configuration and checks cannot keep up with the ever-growing
list of security requirements, Nutanix conforms to RHEL 7 Security Technical Implementation
Guides (STIGs) that use machine-readable code to automate compliance against rigorous
common standards. Currently, Nutanix tracks over 1,700 security entities across storage and
AHV. With Nutanix security configuration management automation (SCMA), you can quickly and
continually assess and remediate your platform to ensure that it meets or exceeds all regulatory
requirements.
As regulations become more cumbersome and threats continue to proliferate, a fully tested
platform with security at the forefront is the best choice for meeting tomorrow’s challenges today.
The Enterprise Cloud shrinks the compliance auditing window from months to minutes, allowing
you to focus instead on the applications that drive the business.
1. Executive Summary | 4
Information Security
2. Introduction
2.1. Audience
This technical note is intended for security-minded people responsible for architecting, managing,
and supporting infrastructures, especially those who want to address security without adding
more human resources or additional processes to their datacenters.
2.2. Purpose
This document offers an overview of the security development life cycle (SecDL) Nutanix uses to
develop code and describes the extra measures we take to harden our platform. We show how
Nutanix exceeds security regulations and that running our platform streamlines infrastructure
security management.
Version
Published Notes
Number
1.0 November 2015 Original publication.
1.1 February 2016 Minor updates throughout.
1.2 March 2016 Updated Executive Summary.
1.3 June 2017 Updated platform overview.
Updated for AOS 5.5 and software-based data-at-rest
2.0 December 2017
encryption.
Updated for AOS 5.8 software-based data-at-rest encryption
2.1 July 2018
with native key management.
2. Introduction | 5
Information Security
The SecDL is not a bolt-on to an existing software development process. The entire process
incorporates security at every stage of development—from the first day of code inclusion to
deployment. Using agile development methods instead of the classic waterfall methodology
allows developers to iterate quickly and to incorporate security without slowing development.
Prioritizing security means more than writing code that is secure; it occasionally means removing
or replacing problematic code as well. For example, the Nutanix team stopped supporting SSL
(Secure Sockets Layer) protocol in our product in favor of TLS (Transport Layer Security). This
decision has already prevented attacks.
After coding is complete, the QA process includes multiple security scans to reinforce
components and substantially reduce common vulnerabilities. Security researchers and
developers, working in a silo-free environment, recommend changes to the code and to the
process to harden every service at every layer.
During the maintenance portion of the life cycle, the SecDL process greatly simplifies applying
and maintaining required security configuration changes. Customers no longer have to keep
track of security vulnerabilities and interpret them one at a time, determining the correct course
of action in a piecemeal, almost speculative fashion. nSERT analyzes security problems for
you, then publishes recommendations that can be applied through one-click upgrades in the
Prism UI. These security-specific upgrades are automated for speed, reducing human error and
maintaining uptime.
Having security at the forefront for the company—including for developers—empowers Nutanix
to respond to security threats swiftly and allows for easy and rapid product updates, rather than
having to return to the beginning of the development life cycle for each innovation. This process
is drastically different from that of other vendors, who make products and features generally
available, then release updates at six-month intervals. The best part of the Nutanix development
model is that all security updates are tested across the platform, from AOS, Acropolis File
Services (AFS), and the Self-Service Portal (SSP), to disaster recovery and AHV, drastically
reducing operational overhead.
Note: The XCCDF XML format is highly efficient for conversion from a manual
process to machine automation. Designed specifically to meet the SCAP standard,
the XML format is future-proof in that it supports the transition to the DoD Information
Assurance Risk Management Framework (DIARMF) for continuous monitoring.
Any third-party system that understands XCCDF-style formatting can consume the
STIGs.
Previously, it took countless hours to manually check files or find obscure settings. Even worse,
administrators had to track any aspects that couldn’t be automated in static spreadsheets. As a
result of automating these testing tasks, the accreditation process time for the DoD Information
Assurance Certification and Accreditation Process (DIACAP) has been shortened from as long
as a year to less than half an hour. This speed allows you to dynamically check an ever-changing
baseline.
Even with these advantages, simply offering the STIGs is not enough. Given that a system is
only known to be secure at the time of the last verification, you need to consistently examine the
baseline for compliance. To make such consistency easier, Nutanix has implemented security
configuration management automation (SCMA) to check over 800 security entities for both
Nutanix storage and AHV. Nutanix automatically reports log inconsistencies and reverts them to
the baseline.
This embedded SCMA also covers frustrating maintenance scenarios in which you upgrade your
storage or hypervisor software only to find that the new software has overwritten your careful
configuration work, forcing you to go through all the settings again from scratch. Returning to the
baseline manually is slow and error-prone, often causing significant problems, particularly when
dealing with major release upgrades. Companies have had to delay upgrading their systems
to preserve security compliance, even when an upgrade would offer new features required to
support the business. Nutanix SCMA means that businesses don’t have to shoulder the burden
of interoperability testing or go through cumbersome steps to manually inspect and revert the
upgraded system to a known good state.
With SCMA, you can schedule STIGs to run hourly, daily, weekly, or monthly. STIGs have the
lowest system priority within the virtual storage controller, ensuring that security checks do not
interfere with platform performance.
Multiple Nutanix clusters—deployed using the same gold image—inherit the same security
controls, so you only have to set them once, and Prism Central allows you to manage and
monitor them with an embedded self-service functionality. When Nutanix adds new features,
security is not an afterthought, so you’re never left vulnerable. When customers choose AHV,
they can have, out of the box, the most secure platform by default on the market today.
The figure above shows one example out of over 700 possible checks used for the AOS portion
of the RHEL STIG. Vulnerability Discussion addresses the rule and states what the expected
value should be. Check Content contains the machine-readable code used to automate the
check. A rule may have no check content information if the topic is addressed elsewhere; the
vulnerability discussion notes these cases.
Our compliance with RHEL 7 STIGs differs from other vendors’ compliance with other STIGs in
that we write all of the check and fix content (XML tags) as single lines of executable code. Most
manual checks require you to read through guides and interpret how to find and fix the open
vulnerabilities. In contrast, RHEL 7 STIGs remove both the labor and the ambiguity of manual
inspections—anytime you need to check compliance, simply run the STIG reports.
Our in-depth platform knowledge also enables an entirely different level of security. We don’t
expect customers to know more about securing our products than we do ourselves. Ownership
and direction have to come from the vendor to ensure a secure and seamless experience.
Nutanix also provides an easy way to back up your DEKs from Prism. Each storage container
has a DEK, so when a new storage container is created, an alert is generated encouraging
administrators to make a backup. The backup is password protected and should be securely
stored. With the backup in hand, if a catastrophic event happens in your datacenter, you can
replicate the data and reimport the backup keys to get your environment up and running.
Because the oplog and the extent store use different file system layouts and indexing schemes
for data, oplog encryption must be redone when the data reaches the extent store. Nutanix
makes sure that, at any point in time, two blocks of encrypted data in the system don’t share the
same initialization vector (IV). The IV adds more randomization to the encryption process so that
someone monitoring the system can’t detect patterns about the plain text.
8. Conclusion
Security is a preeminent concern at Nutanix, permeating every aspect of our design and creating
efficiencies for your business. The Nutanix SecDL provides defense in depth and a hardened-
by-default posture right out of the box. The RHEL 7 STIG with SCMA offers quick insight on
your environment’s security posture and frees up time by shrinking compliance and regulatory
windows. Automating the ongoing process of hardening and compliance gives customers
the most secure platform right from the start and in the future. Our use of agile development
also means that customers benefit from rapid security enhancements and reduced zero-day
vulnerabilities. Instead of wasting time on issues like interoperability, customers can devote their
resources to providing value to the company. Nutanix achieves always-on security alongside
performance, ease of use, and uninterrupted uptime by addressing it throughout the entire
solution.
8. Conclusion | 18
Information Security
Appendix
Appendix | 19
Information Security
Disk encryption systems can securely erase a drive removed from the Prism UI.
• Key rotation
If the KMS becomes compromised, only the machine encryption key (MEK) needs to be
reencrypted. You don’t need to reencrypt any data, making operations simple and easy.
• Password complexity support
Enables additional rules to meet regulatory requirements.
• Banner support
Adds warnings and custom prompts when logging on to the CVM or Prism to meet federal and
compliance regulations.
About Nutanix
Nutanix makes infrastructure invisible, elevating IT to focus on the applications and services that
power their business. The Nutanix Enterprise Cloud OS leverages web-scale engineering and
consumer-grade design to natively converge compute, virtualization, and storage into a resilient,
software-defined solution with rich machine intelligence. The result is predictable performance,
cloud-like infrastructure consumption, robust security, and seamless application mobility for a
broad range of enterprise applications. Learn more at www.nutanix.com or follow us on Twitter
@nutanix.
Appendix | 20
Information Security
List of Figures
Figure 1: Nutanix Enterprise Cloud................................................................................... 6
21
Information Security
List of Tables
Table 1: Document Version History.................................................................................. 5
22