This document summarizes an Intel briefing on cybersecurity trends, solutions, and opportunities. It discusses how computing trends have expanded the attack surface and opportunities for malware. It then introduces Intel and McAfee's partnership and hardware-enhanced security solutions that work below the operating system level to detect advanced threats. Examples of solutions using hardware acceleration for encryption and virtualization-based security are provided. The briefing argues that hardware-enhanced approaches can improve security by establishing layered defenses and isolating critical functions from malware.
Agenda
• Intel +McAfee: What it means
• Computing trends and security implications
• A new approach to improve cyber-security:
–Hardware-enhanced Security
• Examples of Hardware-assisted Security
• Opportunity for the IT Community to
Change The Game
2
3.
Innovation Opportunities byworking with
Intel and McAfee
• Change the way we all think about security problems and
solutions
• Innovate and Deliver new levels of protection not available with
software-only solutions, employing hardware-enhanced security
• Deliver intelligence-in-depth: Security that is integral to your
hardware, network, systems, applications, and databases—and
works together to protect your business
Key Innovation Areas
Next-Gen Secure Secure Cloud Hardware
Endpoint Mobile Embedded Security Enhanced
Security Devices Devices Platform Security
4.
Computing Trends andSecurity Implications
Escalating
Threat
Complexity Landscape
of the IT
Model
Consumerization
Growth of of IT
Cloud Mobile
Computing Devices
Virtualization
As a consequence: The size of the “Attack Surface”
and the opportunities for Malicious Entry have
expanded.
4
5.
People: The NewNetwork Perimeter
Human Vulnerabilities and Risks
Mobile Phishing
Device Attacks
Loss or and Spear
Theft Phishing
Corporate or Social Networking
Personal Data
Stolen Credentials
Online Collaboration
Tools
Humans make mistakes: Lost Devices, “Found”
USB drives, etc.
5
6.
Traditional IT SecurityStrategy:
Multiple Security Perimeters
Response
Monitoring, intrusion detection,
Capability
proactive and reactive response
File and data encryption, File and Data
enterprise rights management
Secure coding, security Application
specifications
Platform
Antivirus software, patching,
minimum security specifications for
systems
Network
Firewalls, demilitarized zone,
data loss prevention
a.k.a. “Defense in Depth”
6
7.
A closer lookat Hacking:
The Motivations Have Expanded....
SLAMMER ZEUS AURORA STUXNET
Hacking Organized State-Sponsored Physical
for Fun Crime Cyber Espionage Harm
Hacking Software Tools for Sale:
$11B/year industry with 56% CAGR
7
8.
“The Malware Tsunami”
There were more malware attacks in 2010-2011
than in the previous 10 years combined!
?
60,000+ 6,000,000 2,000,000 Stealth
per day per month per month Attacks
new unique new botnet new malicious Non-detectable
malware infections web sites malware and
pieces advanced
persistent threats
9.
Tools of theModern Hacker
Candy Drop:
Placing infected USB drives where humans will take them, and
later plug them into their PC or other network-connected device.
Social Engineering:
Manipulating people to divulge data or “click here”
Advanced Persistent Threat (APT):
A long term, human-directed “campaign” to take control of a
specific system or network – all while remaining undetected.
Kernel-mode Rootkit:
It lives and operates below the operating system, to control the
OS and evade detection by OS-level security measures. Can
cloak other malware, APT’s.
10.
Attacks Are Moving“Down the Stack”, to
Gain Greater Stealth and System Control
Traditional attacks:
Focused primarily on
Attacks disable
the application layer
security
products OS infected with APTs:
Threats are hidden from
security products
Compromise
virtual machine
New stealth attacks:
Ultimate APTs: Embed themselves
Compromise platform below the OS and
and devices below the Virtual Machine, so
OS, using rootkits as they can evade current
cloaks solutions
APT: Advanced Persistent Threat
10
11.
A New ApproachIs Required:
“Hardware-enhanced Security”
• Move critical security processes down into the hardware
– Encryption, Authentication, Manageability, and Platform Cleansing
– Hardware is inherently less vulnerable to modification or corruption
• Establish a security perimeter from the hardware layer up
• Isolate the security services from the host OS (often the target)
• Build in capability to monitor, maintain, repair, and recover
Added Protection against:
• Viruses and worms
• Malware
• Disabled software
• Rootkits
11
12.
Example of Hardware-enhancedSecurity:
The DeepSAFE* Security Platform
DeepSAFE is the first hardware-
assisted security platform from
Intel and McAfee. Platform
capabilities include:
• McAfee Deep Defender* product
• Utilizes the isolation capabilities of Intel
Virtualization Technology
• Works “beyond” the OS, so it can’t be
corrupted by OS or malware
• Detects, blocks, and removes stealthy
advanced persistent threats and
malware
• Foundation for future solutions from
McAfee and Intel
Next-generation “beyond the OS” security
enabled by Intel® processor technology
* Other names and brands may be claimed as the property of others.
13.
Example of Hardware-enhancedSecurity:
The DeepSAFE* Security Platform
DeepSAFE is the first hardware-
assisted security platform from
Intel and McAfee. Platform
capabilities include:
• McAfee Deep Defender* product
• Utilizes the isolation capabilities of Intel
Virtualization Technology
• Works “beyond” the OS, so it can’t be
corrupted by OS or malware
• Detects, blocks, and removes stealthy
advanced persistent threats and
malware
• Foundation for future solutions from
McAfee and Intel
Next-generation “beyond the OS” security
enabled by Intel® processor technology
* Other names and brands may be claimed as the property of others.
14.
Hardware-enhanced Security:
Faster Encryptionon PCs and Servers
“There's a definite benefit to…
Intel® AES-NI instructions… this is huge
for corporate desktops/notebooks.”
—Anandtech1
Intel® Core™ i5, Core™ i7, and Whole-disk Internet File Storage
select Intel® Xeon® processors, with
Intel® Advanced Encryption Standard
Encryption Security Encryption
New Instructions (Intel® AES-NI)
Intel® AES-NI increases encryption operations
up to 4x by using hardware and software together.2
1 The Clarkdale Review: Intel® Core™ i5 processor 661, Core™ i3 processor 540, and Core i3 processor 530, Anand Lal Shimpi, Anandtech, January 2010. http://www.anandtech.com/show/2901/5 .
2 Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI) requires a computer system with an Intel AES-NI enabled processor, as well as non-Intel software to execute the instructions in the
correct sequence.
Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. See full disclaimer at http://www.intel.com/performance
14 * Other names and brands may be claimed as the property of others.
15.
Example of Hardware-enhancedSecurity:
Intel® Identity Protection Technology
Now built into
your PC with Intel® IPT
1 Utilize PCs with
Intel® IPT support
Traditional
hardware
token
2 Choose a security
software vendor1
Used for remote authorized
users (VPN) and/or for the
PC with Intel® IPT public web
embedded tokens
End Users Web Sites Organizations
Add security that is Protect user accounts Secure method for authorized
easy to use and limit losses users to remotely log in
1 Embedded tokens work with all Symantec VIP protected web sites as well as enabled VASCO protected sites.
15
16.
Example of Hardware-enhancedSecurity
for Virtualized Servers and Clouds
Intel® AES-NI Apps1 Apps2
Built-in Encryption Apps2 Intel® TXT
Enables VM
OS1 OS2 OS2 migration based
Intel® VT
VM2 on security policy
Protects VM Isolation VM1 VM2
Intel® TXT Hypervisor Hypervisor
Works with the
VMM to create Server Hardware 1 Server Hardware 2
“trusted” status with Intel® TXT with Intel® TXT
Encrypt Isolate Comply
Intel® AES-NI Intel® VT and Intel® TXT Intel® TXT
delivers built-in encryption protects VM isolation and establishes “trusted” status
acceleration for better data provides a more secure to enable migration based
protection platform on security policy
Establishing the foundation for more secure data centers
Intel® AES-NI – Intel® Advanced Encryption Standard New Instructions; Intel® TXT – Intel® Trusted Execution Technology; Intel® VT – Intel® Virtualization Technology
16
17.
Hardware-enhanced Security:
OtherApplications
Remote Client Management and Remediation, Response
Client Anti-Theft and Recovery
Hardware-accelerated File and Data
Whole-Disk Encryption
Hardware-accelerated Application
Data Encryption
Embedded System, Virtualized Platform
Server, and Cloud Security
Identity Protection and Network
Access Management
Intel and its partners are applying Hardware-enhanced
Security to “harden” each perimeter of defense.
17
18.
Defense-in-Depth enhanced by
Hardware-assistedSecurity
Response
McAfee EEPC File and Data
McAfee EEPC Application
Intel® VT
Platform
Network
Intel and its partners are applying Hardware-enhanced
Security to “harden” each perimeter of defense.
18
19.
Enhancing End toEnd Cloud Security
Build Foundation of Integrity:
From Client to Network to Cloud
Public/Private Clouds
User & Intelligent
(Servers, Network, Storage)
Devices
Private
Cloud Secure the
Connections
Public Apps, data in flight, traffic
Cloud
2
Secure Cloud Datacenters Secure the Devices
Infrastructure & VM integrity,
seamless federation, 3 Identity & access mgmt,
platform integrity, data
audit/compliance, data 1
protection
protection
4
Common Security Standards
20.
Example of HowHardware-enhanced PC
Security can enhance Cloud Security
Private Cloud Public Cloud
Identity Strengthen Protect against Protect against
Federation and Simplify Man in the Zero-Day Attacks
Authentication Middle Attacks
Salesforce.com
Operating System
Google.com
CPU
Authentication Data Protection
Client Devices
20
21.
Enhancing End toEnd Cloud Security
Intel + McAfee: Toward Worry-Free
Cloud Computing
Deliver hardware-enhanced
security to better protect data, users, Cloud Data
Centers
& traffic from client to cloud
Tools to aggregate security information
across clouds to automate & simplify policy
setting & improve audit/compliance reporting
New capabilities to automate client to
cloud security and service levels, such
as identity as a service
Industry collaboration to accelerate
broad adoption of security standards
so IT can easily adopt cloud
21
22.
Summary and Opportunity
Theinfo security challenge is escalating.
Hardware-assisted Security is solving a
variety of problems, many unsolvable by
software-only.
We all have opportunity to Change The Game:
Intel/McAfee + Partners + Customers