Huawei Cloud Security Solution Design
Huawei Cloud Security Solution Design
Foreword
⚫ This lesson describes how the Huawei Cloud security solution is
designed. You will learn what security services Huawei Cloud
provides and how they work for access layer, service layer, data
layer, access control, and audit security as well as tracking.
2
Objectives
⚫ Upon completion of this course, you will:
Be able to describe Huawei Cloud security services.
Understand the security model of Huawei Cloud.
Understand the functions and application scenarios of each
security cloud service.
3
Contents
1. Huawei Cloud Security Services
2. Security Model
4. Application Security
4
Huawei Cloud Security Services
Internet
Audit and
tracking
Anti-DDoS
Cloud Trace
Service
(CTS)
Advanced Anti-DDoS
(AAD)
Service layer SecMaster
security
...
Web Application
Firewall
Bare Metal Elastic Cloud (WAF)
Host Security Service Server Server
Access control
(HSS) (BMS) (ECS)
security
O&M
Cloud personnel
Bastion Host
(CBH)
Cloud Certificate Data Encryption Database Security Relational Elastic Volume Object Storage Scalable File
Manager Workshop Service Database Service Service Service Service
(CCM) (DEW) (DBSS) (RDS) (EVS) (OBS) (SFS) Identity and Access User
Management
Data layer security (IAM)
5
Contents
1. Huawei Cloud Security Services
2. Security Model
4. Application Security
6
Systematic Security Design
Compliance standards
Network and Access control
application security
7
Huawei Cloud Shared Responsibility Model
⚫ Huawei Cloud and customers share the responsibilities for the cloud environment. Specifically, Huawei Cloud is responsible for
providing secure cloud services, and tenants are responsible for using the cloud services securely.
Data Client-side data encryption & Server-side encryption Network traffic protection
Tenant data
security data integrity authentication (file system/data) (encryption/integrity/identity)
Custom configurations
Tenant IAM
Application Huawei Cloud Tenant
security applications applications
Green: Huawei Cloud responsibilities for security of the cloud Blue: Customer responsibilities for security in the cloud
8
Security Compliance and Certification
9
Contents
1. Huawei Cloud Security Services
2. Security Model
4. Application Security
10
VPC Access Control: Security Group
⚫ A security group is a collection of access control rules for ECSs that have the same security
requirements and are mutually trusted.
⚫ Security groups are stateful.
VPC ⚫ A default security group allows all outgoing data
Default security group
Allow all packets and denies all incoming data packets.
Mutual access outbound traffic.
⚫ Both Allow and Deny rules are supported. A rule
× with a deny action overrides another with an allow
ECS ECS Deny all
ECS action if the two rules have the same priority.
inbound traffic.
⚫ The source of a security group rule can be a single IP
address, an IP address range, or a security group.
11
VPC Access Control: Security Group
Database
⚫ Limit the number of security
Port: 3306, source:
security group application security group group rules.
12
VPC Access Control: Network ACL
⚫ A network ACL is an optional layer of security for your subnets. After you associate one or
more subnets with a network ACL, you can control traffic in and out of the subnets.
13
Differences Between Security Groups and
Network ACLs
Item Security Group Network ACL
14
Common Network Attacks: DDoS
⚫ DoS (Denial of Service) attacks are also called flood attacks. They are intended to exhaust the network or system
resources on the target computer, causing service interruption or suspension. Consequently, legitimate users fail to
access network services. When an attacker controls multiple compromised computers to launch attacks on the
targeted server, this is called Distributed Denial of Service Attack (DDoS).
15
DDoS Protection Suggestions
Huawei Cloud Customers
16
How Does Anti-DDoS Provide Protection?
⚫ Anti-DDoS monitors the service traffic from the Internet to public IP addresses to detect attack traffic in real time. It
scrubs attack traffic based on preset defense policies without interrupting service running.
...
Advantages:
⚫ Real-time monitoring
Internet
Data center ⚫ High-quality bandwidth
Anti-DDoS
Detection ⚫ Comprehensive and accurate IP address
Traffic Detection blacklist library
diversion center
⚫ Per-packet detection and response in seconds
Traffic
Scrubbing
Injection center ⚫ Enabled automatically
Unprotected traffic
⚫ Free of charge
Legitimate traffic
... Abnormal traffic
Detection data
Server Server
17
What Is AAD?
⚫ The Advanced Anti-DDoS (AAD) service uses high-defense IP addresses to proxy services for origin
servers. All public network traffic is diverted to the high-defense IP addresses, and therefore user
services on origin servers are protected against DDoS attacks.
AAD center architecture
ISP ISP
Connect to AAD
VIP 1 AAD center
ISP ISP
②
AAD node AAD node
User Layer-4 Layer-4
scrubbin scrubbin
AADLayer-7
node
g AAD node
Layer-7
g
scrubbin scrubbin
Layer-4gscrubbing Layer-4gscrubbing
① www.xx.com=IP 1 Route traffic to web servers
Layer-7 scrubbing Layer-7 scrubbing
③
www.xx.com=VIP 1 Load
IP address 1 Load
balancing balancing
Load Load
Cloud Cloud
balancing balancing
servers servers
DNS service Protected origin server
18
Anti-DDoS Layers Deploy a typical sandwich-style WAF
structure. Use security
Use the various Huawei Cloud anti- groups to protect
DDoS services. nodes.
Region
VPC
Domain Name
AZ 1
Service
(DNS)
ELB WAF server ELB Web server
Primary
database
19
What Is WAF?
⚫ Web Application Firewall (WAF) examines website service traffic to identify malicious
requests and unknown threats accurately and intelligently. It protects origin servers from
attacks and intrusions and secures mission-critical data, keeping your website stable and
secure.
20
WAF Application Scenarios
22
How WAF and AAD Work Together
⚫ WAF and AAD defend against different types of attacks. AAD mainly defends against DDoS
attacks (such as NTP flood and SYN flood attacks), while WAF mainly defends against web
application attacks (such as SQL injection, cross-site scripting attacks, and web shells).
AAD + WAF build two layers of protection
If you configure AAD and WAF for a website, website traffic goes to AAD
first. AAD scrubs incoming traffic and forwards clean traffic to WAF. WAF
blocks attacks and forwards only the normal traffic to the origin server. In
this way, two layers of protection are implemented for your website.
23
Contents
1. Huawei Cloud Security Services
2. Security Model
4. Application Security
24
What Is HSS?
⚫ Host Security Service (HSS) is designed to protect server workloads in hybrid clouds and
multi-cloud data centers. It integrates server security, container security, and Web Tamper
Protection (WTP) functions.
25
HSS Functions and Features (1)
26
HSS Functions and Features (2)
Dynamic web
5. Detects web page tampering and automatically page
performs remote backup.
27
How HSS Works
Management
console • Console: a visualized management platform, where you
can apply configurations in a centralized manner and
Deliver configurations
Schedule scans view the status and scan results of servers in a region.
• HSS cloud protection center: 1. Uses AI, machine
learning, and in-depth algorithms to analyze security risks
on servers. 2. Integrates multiple antivirus engines to scan
HSS cloud protection center for and remove malicious programs on servers.
Report server • Agent: 1. Scans all servers at 00:00 daily. 2. Monitors
security information
server security. 3. Reports server information (including
28
Contents
1. Huawei Cloud Security Services
2. Security Model
4. Application Security
29
What Is IAM?
⚫ Huawei Cloud Identity and Access Management (IAM) provides permissions management to help you
securely control access to your cloud services and resources.
30
Identity Credentials
⚫ The account name and password cannot be shared within the team. Then how can team members
obtain their own credentials to access resources?
31
Identity Authentication
Password authentication
Key authentication
32
Permissions Management
IAM policy
33
IAM Policy
{
"Version": "1.1",
"Statement": [
{
• IAM permissions are defined "Action": [
"iam:*:get*",
in JSON documents. "iam:*:list*",
• Documents can be "iam:*:check*"
], IAM policy
embedded into policies for "Effect": "Allow"
} ⚫ System-defined policies
repeated use.
] Maintained by Huawei
}
Cloud
34
IAM Permissions Authentication Process
Yes Yes
No No
Access Is there a Is there Final decision:
Filter policy
request Deny? an Allow? Deny
35
IAM Agency
Authorization
Delegating access to other IAM agency
Huawei Cloud accounts
Resource IAM policy ⚫ Agencies do not have static
Other credentials.
accounts
⚫ Agencies inherit permissions
from the attached policies.
Current
⚫ Agencies enable you to
Authorization delegate permissions to:
account
Huawei Cloud services
Delegating access to Other Huawei Cloud
Huawei Cloud services Graph Engine IAM policy accounts
Other cloud
Service (GES) Third-party identity
services
providers
36
Associating an Agency with an ECS
⚫ Scenario: How Do I Enable Python Applications Running on an ECS to Access
Data in OBS?
⚫ Available solutions:
Creating an IAM user and granting OBS access permissions to the user. Store the
AK/SK of the user on the ECS.
Creating an agency and granting OBS access permissions to the agency. Associate the
agency with the ECS. ?
Python
OBS
37
Creating an Agency
Step 1: Grant agency permissions to call Step 2: Associate the agency with an ECS so
APIs to access OBS. that applications on the ECS have
permissions granted to the agency.
38
IAM Agency Scenario
2 4
Belonging to the
IAM group
Role switched Role switched
1
IAM user A-1 IAM user B-1
39
Identity Federation
⚫ IAM supports identity providers (IdPs) that are compatible with Security Assertion Markup
Language 2.0 (SAML 2.0) and OpenID Connect (OIDC). You can use an IdP to enable the
identities in your enterprise system to log in to Huawei Cloud using single sign-on (SSO).
Simplifying account
management
40
Identity Federation Through Agency
OBS
SMN topic
Website server
41
IAM Security Best Practices
⚫ Note: The permissions of the account are not managed by IAM.
Do not use the account for routine tasks.
42
Precautions
⚫ IAM controls the access only to Huawei Cloud services. It does not manage
server logins, database access, or application credentials.
43
Solutions for Secure Server Logins
What Is CBH?
⚫ Cloud Bastion Host (CBH) can monitor the usage of the CBH system, monitor O&M activities
of each managed resource, and identify suspicious O&M actions in real time. This protects
resources and data from being accessed without authorization or damaged by external or
internal users. CBH reports alarms to customers, who can then more easily handle or audit
O&M issues in a timely, centralized manner.
Employees at the headquarters Operation audit
Access control Server
Cloud server
CBH
Third-party O&M personnel
Database
45
CBH Application Scenario 1: Asset Management
⚫ You can manage the admin user and system users created by the admin user, enabling role-based
permissions control.
⚫ You can log in to a CBH system and then manage all assets without additional logins.
46
CBH Application Scenario 2: O&M Audit
⚫ You can monitor O&M behavior in real time to detect violations, send alerts, and block malicious
commands in a timely manner.
⚫ O&M behavior can be monitored, logged, queried, and audited with ease.
47
CBH Application Scenario 3: Security and Compliance
⚫ CBH meets the requirements stated in Cybersecurity Law and DJCP (or MLPS) standard.
⚫ CBH supports mainstream protocol types and audits fine-grained operations.
48
Contents
1. Huawei Cloud Security Services
2. Security Model
4. Application Security
49
Data Encryption Process
Envelope encryption
Data
+ DEK
CMK: A key used to
•
•
There are data encryption keys (DEKs) and
customer master keys (CMKs).
The ciphertext and DEKs are stored together
for easier management.
encrypt the DEK • The impact of losing DEKs is controllable.
Encrypted data
+ Encrypted key
?
How can we store a CMK securely?
50
DEW: Static Data Security
⚫ Key management
CMKs can only be used in Data Encryption
Workshop (DEW), ensuring data security.
DEW
You can generate, encrypt, and decrypt
DEKs.
⚫ Secret management
Dedicated
Cloud Secret Hardware ⚫ Centralized storage of database and server
Management Security Module
Key
Management Service
Key Pair Service
(Dedicated passwords
(CSMS) HSM)
Service (KPS)
(KMS) ⚫ Seamless access with IAM agencies
51
Using KMS to Encrypt and Decrypt a Large Amount of Data
+
Securely store the keys
after encryption.
52
Using CSMS to Build a Keyless Architecture
WAF
HTTPS Mobile
phone
Website
CCM server DNS
Private Certificate Authority (PCA)
Browser
ELB
54
SSL Certificate Types
Security Validation
Certificate Type Application Scenario Supported CA Review Duration
Level Requirement
• DigiCert
The CA verifies the
Domain Testing websites of individuals or • GeoTrust
Minor domain name Several hours
Validated (DV) enterprises • TrustAsia
ownership only.
• vTrus
55
What Is DBSS?
⚫ Database Security Service (DBSS) is an intelligent database security service. Based on the machine
learning and big data analytics technologies, it can audit your databases, detect SQL injection attacks,
and identify high-risk operations.
To use DBSS, you need to install an agent in
the protected database.
Remote log
The DBSS instance and the protected
User Audit log
DBSS
architecture
56
DBSS Functions
57
Contents
1. Huawei Cloud Security Services
2. Security Model
4. Application Security
58
What Is CTS?
⚫ Cloud Trace Service (CTS) records requests and results of operations (API calls) on cloud
service resources for you to query, audit, and backtrack operations.
Perform resource
operations, such as
creating an ECS.
ECS
View
traces. LTS
VPC
Transfer traces.
Report traces.
60
CTS Application Scenarios (2)
61
What Is SecMaster?
⚫ SecMaster is a next-generation cloud native security operations platform that enables integrated and
automatic security operations, including cloud asset, security situation, security information, and
security incident management, security orchestration, and automatic response, making it easier to
identify security risks, and detect and automatically handle incidents when they happen.
62
SecMaster Functions and Advantages (1)
Log collection and asset management: codeless, zero blind Security governance: quick
1 spots, and centralized management 2 security and compliance checks
63
SecMaster Functions and Advantages (2)
Situational awareness: comprehensive Threat operations: Global analysis of
3 situation with one screen 4 threats across the cloud
Based on hundreds of millions of
SecMaster provides a visual, threat intelligence collected by
centralized platform that Huawei Cloud every day, SecMaster
enables you to learn of risks performs correlation analysis to
and incidents on the cloud precisely locate security threats,
in a timely manner. eliminate false alarms, and identify
potential sophisticated threats,
keeping operations secure.
64
SecMaster Functions and Advantages (3)
Security orchestration: automatic handling
5 throughout the process
65
Summary
⚫ Huawei Cloud Security Services
⚫ Security Model
⚫ Functions of Security Cloud Services
⚫ Application Scenarios of Security Cloud Services
66
Quiz
1. (Multiple-choice question) Huawei Cloud provides a wide range of security services, such as
HSS and WAF to help defend against risks and threats on websites, servers, and web
applications. Which of the following are functions of HSS?
A. Asset management
B. Multi-vulnerability detection
C. CC attack protection
67
Acronyms and Abbreviations
⚫ IAM: Identity and Access Management
⚫ DDoS attack: Distributed denial-of-service attack
⚫ DBSS: Database Security Service
⚫ DEW: Data Encryption Workshop
⚫ HSS: Host Security Service
68
Thank You.
Copyright © 2024 Huawei Technologies Co., Ltd. All Rights Reserved.
The information in this document may contain predictive statements including,
without limitation, statements regarding the future financial and operating results,
future product portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially from those
expressed or implied in the predictive statements. Therefore, such information is
provided for reference purpose only and constitutes neither an offer nor an
acceptance. Huawei may change the information at any time without notice.