Cisco, Intel push 'trusted geolocation in the Cloud'

Idea of growing importance because many countries have laws about how data about their citizens can be moved outside the country

Cisco and Intel say that companies wanting to make use of Infrastructure-as-a-Service (IaaS) clouds should be aware that controls exist for keeping virtual workloads on servers within country borders.

This idea of "trusted geolocation in the Cloud" is of growing importance because many countries have laws about how can data about their citizens can be moved outside the country if at all, and businesses have their own reasons to restrict movement of data to certain places.

Cisco solutions architect, Kenneth Stavinoha, and Intel senior enterprise technologist, Paul Yates, recently spoke on the topic during a panel discussion at the ISC2 Conference in Chicago, along with HyTrust CTO Hemma Prafullchandra. The three advocated one type of geolocation method that can be set up through the Trusted Platform Module (TPM) security chip, which is based on a Trusted Computing Group standard.

"The decision to go to cloud is a risk," said Stavinoha, so there's a need for the enterprise to establish its own security controls. One way to do this is through hardware-based "root of trust" attestation via server-based TPM, he said.

TPM can be used to confirm the location of a host, the integrity of the hypervisor platform, and make sure workloads only get deployed to cloud servers with trusted platforms. Several vendors, including Dell, HP and IBM, have hardware-based TPM enabled today in their products, Prafullchandra pointed out.

[SECURITY:Obama Administration-led data-classification overhaul to bring benefits, costs, disruptions]

Intel's Yates told the security professionals at the ISC2 session that the Intel-based Trusted Execution Technology (TXT) approach related to use of TPM chips can enable "trusted geolocation in the cloud" with the user setting restrictions on where workloads can run based on location.

While this TPM approach to geolocation is still fairly new, the National Institute of Standards and Technology has published a proof-of-concept document about one pilot project of cloud clusters based on use of Dell PowerEdge servers with Intel-based based CPUs, VMware ESXi, Dell PowerVault MD32001 for storage, and assorted Dell and VMware-based management nodes. The NIST publication, open to comments through the end of the year, is described as a template for the general security community to address "selected security challenges involving Infrastructure as a Service (IaaS) cloud computing technologies and geolocation.

"A common desire is to only use cloud servers physically located within the same country as the organization," NIST states in its "Trusted Geolocation in the Cloud: Proof of Concept Implementation (Draft)."

The NIST document says geolocation calls for determining the appropriate physical location of an object, such as a cloud computing server. NIST says while this can be accomplished in "many ways, with varying degrees of accuracy," the "traditional geolocation methods are not secured and they are enforced through management and operational controls that cannot be automated and scaled, and therefore traditional geolocation methods cannot be trusted to meet cloud security needs."

NIST states in its document that the automated hardware-based root-of-trust method for enforcing and monitoring geolocation restrictions for cloud servers is based on the idea that the user organization can set up unique identifier and platform metadata stored in tamperproof hardware as a way of confirming the location of a host.

The NIST document details how to set up the Intel-based TXT hardware components as well as VMware ESX clusters along with the RSA Archer eGRC governance and compliance management console, which presents a dashboard view of "trusted pools" and "untrusted pools."

NIST says, "the ultimate goal is to able to use trusted geolocation for deploying and mitigating cloud workloads between cloud servers within a cloud."

The approach based on hardware-assisted geolocation means, for example, that "you can say the workload is required to remain in the U.S. as long as the environment can enforce those labels," said HyTrust CTO Prafullchandra. She noted it's a way to have platform integrity and workload classification and placement based on data jurisdictions around the world.

Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. Twitter: MessmerE. E-mail: emessmer@nww.com

Join the CSO newsletter!

Error: Please check your email address.

Tags Configuration / maintenanceIBMhardware systemsData Centercloud computingintelinternetHPDellhytrustsecurityCloud

More about CiscoDellHPIBM AustraliaIDGIntelISC2PowerVaultRSATechnologyVMware Australia

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Ellen Messmer

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place