Cloud Infrastructure Management Interface (CIMI) Model

The Distributed Management Task Force (DMTF) Cloud Infrastructure Management Interface (CIMI) Model and REST Interface over HTTP cloud spec draft is now out for public comment. CIMI was formed from input by more than 20 organizations and will continue to develop based on feedback. Reference implementations should be out soon. Download the draft here.

A whitepaper for background on CIMI use is also available, as is a mapping spec relative to the Common Information Model (CIM).

“Mixed Mode” acceptable in a vSphere Enviroment?

VMware has posted a humorous blog entry on mixed mode security.

It is my opinion that most people are not up to speed on Virtualization Security and Compliance Solutions. If you can prove that the systems in a mixed mode are not communicating, you should be golden. If your QSA does not agree, it might be time to get a new QSA. Jkjkjkjkj, not really but… Click the link below to see what we talked about at VMworld. I was misquoted in this article, Computer World and several others. (I NEVER said QSA’s were ten years behind J ) Seriously, I have some good friends that are QSA’s…

One of the comments in response goes straight to the issue of a QSA’s role.

…let’s clear a few things up. First, QSA’s don’t approve PCI compliance. They assess, make recommendations and document the report on compliance (ROC), but ultimately it is the bank and card brand that will determine if risk is acceptable. Second, there are numerous organizations who have been running mixed mode with PCI and successfully worked with their QSA. Prior to PCI DSS v2.0, that work was all done on a case by case basis and covered under compensating controls. 2.0 tries to put a standard in place for all to follow, but PCI 2.0 Standards do not forbid use of mixed-mode. The virtualization supplement is merely guidance, (not the standard), and the supplement itself even states in 1D: “There is no one-size-fits-all method or solution to configure virtualized environments to meet PCI DSS requirements. Specific controls and procedures will vary for each environment, according to how virtualization is used and implemented.”

The real point is that there are best practices and appropriate technology solutions available that make it absolutely possible to securely use virtualization in a PCI CDE.

I wrote a response to this comment but it hasn’t been approved on the site yet. Here it is for reference:

…I don’t want to speak for all QSAs but since I am one I will speak for myself on my role and the question of mixed mode.

1) Your comment suggests a QSA is *only* a messenger of an entity’s compliance. I understand where you are coming from, because a QSA does not always get the final call, but that does not mean the QSA is just a messenger. It’s like calling a lower court judge just a messenger because a higher court or supreme court can overrule them.

The 2011 July assessor update to QSAs from the Security Standards Council (SSC) makes it clear that a QSA is expected to be making the difficult decisions:

“It should always be remembered that the active QSA has the ultimate responsibility for their client’s assessment and the evidence provided in the Report on Compliance.”

In other words the QSA ultimately is the one to determine with the entity if the risk is acceptable FIRST. Only then does a report get forwarded for review by internal QA, to verify SECOND at the QSA company level that risk is acceptable, before it is forwarded for QA review by the SSC who reviews it. By the time it gets to the SSC and card brands there should be nothing left to decide. That is why as a QSA we regularly have to be re-tested and certified. We have to demonstrate that we can determine if risk is acceptable at the first pass.

This goes beyond PCI SSC. Auditors perform analysis to determine health. The role of an assessor does not emphasize the collect and store/forward phase. That is just the first step. It is like when a doctor collects your records and listens to your answers. They do this to make a determination. If they collect your records only, and do not make an ultimate determination on risk, then they are not a qualified assessor.

2) You mention “solutions available that make it absolutely possible to securely use virtualization”.

That looks like an oxymoron to me. What exactly is “absolutely possible”? Secure use of virtual technology is possible but to protect the cardholder data it takes a lot more than just technology.

One of the flaws I see most often is from managing change. Assessments of mixed mode generally are not about the possibility of virtual environments but rather the reality of how they are managed. From that perspective there is still a lot of opportunity for better technology and practices to develop and address the many risks of mixed mode.

VMworld 2011 LV Feedback: Thank you!

Wow! Thank you all very much for attending my Penetration Testing the Cloud sessions at VMworld 2011 in Las Vegas.

With nearly 500 people in the audience I was very thankful just to have a great turnout, but your feedback is proving to be even better. Last year I was at 4.23 out of 5 and the highest ranked speaker in the cloud track. This year’s tally is now in and my presentation was scored overall at 4.63 (4.72 for effectiveness). And many people came up afterwards to tell me in person it was the best presentation of the entire conference…your positive feedback inspires me to go all out and see how close I can get to the impossible 5.0.

I look forward to seeing you at the next event and please let me know if there is anything missing, or that you would argue with or change.

The presentation is available through the VMworld 2011 website, for registered attendees. Of course you should contact me directly if you have specific questions. I soon will be emailing everyone who gave me a card.

As I mentioned in my presentation the ultimate reward for me is to see a positive and long-term shift in the breach data. We definitely have a lot we can do as civilians to improve security and reduce the frequency and severity of breaches.

  • “Excellent! Similar sessions needed,there’s a lot to cover!”
  • “Need more like this.”
  • “Great material, a lot too look into after session.”
  • “The instructor exceeded my expectations. His knowledge of the subject was deep and his passion for it also showed. Great stuff!”
  • “Excellent material. Speaker researched and developed the information exceptionally well. Extremely well presented.”
  • “This had to be one of the best sessions I have had at VMworld.”
  • “Very useful and applicable to my current situation.”
  • “This guy was an awesome speaker.”
  • “Great speaker – good use of real world examples / humor. Kept crowd engaged”
  • “Great speaker. Good insights. Need more speakers with this kind of technical content.”

Computer Generated Text Woos Venture Money

The NYT has proof that news about the weather and sports needs no human touch, if all the reader wants is a list of facts loosely strung together

The company’s software takes data, like that from sports statistics, company financial reports and housing starts and sales, and turns it into articles. For years, programmers have experimented with software that wrote such articles, typically for sports events, but these efforts had a formulaic, fill-in-the-blank style. They read as if a machine wrote them.

Computers writing prose and poetry and news have been around for as long as the Internet itself. Have you tried the Elizabethan insult generator or the random prose generator?

The important shift in this story is that people who want to make a high return on their investment are getting interested in pushing to make a sizable profit from the automation of language. The issue thus becomes whether pressure to build this new market will bleed straight into phishers and spammers who have already proven they know how to use automation to turn the news into easy money.

The NYT shamefully gives no credit to attackers who have been successfully composing text from automation for years, nor do they mention the risks from blindly accepting computer-generated text as worthy of consumption.

The few sports writers I read have a specific style and sense of humor. I’m not interested in the data on the game, since I could get that anywhere, but rather how they interpret and present the information based on their particular/unique view of the world.

Update: And in the end a computer that has a particular view of the world will still be just a shallow reflection of the person who programmed it. My presentation at BSidesLV 2011 (2011: A Cloud Odyssey) addressed this issue in great depth. I’ve been asked a lot lately to post the slides from that talk so I’ll upload them soon.