to the PDF file
Transcription
to the PDF file
D ATA S H E E T HyTrust CloudControl 4.1 Security breaches are happening with increasing frequency, and savvy attackers are repeatedly targeting administrative credentials to expand their reach and remain undetected. In virtualized environments, administrators typically have very broad privileges with minimal monitoring, and are therefore an ideal target. HyTrust CloudControl™ is a virtual appliance that addresses these critical security and compliance requirements for virtualized infrastructure. The Challenge Virtualization and software-defined networking provide operational and financial benefits by consolidating servers, networking, and storage Fine-Grained Authorization Audit-Quality Logging into a concentrated software layer. It has delivered dramatic increases in capacity utilization, IT administration efficiency, HyTrust CloudControl and agility. However, the administrators of these environments have unprecedented power and span of control: a privileged user with administrative access to the virtual infrastructure — or someone who gains their credentials — can easily exfiltrate sensitive Strong Authentication Infrastructure Integrity data in bulk, as well as disrupt the operations of mission critical applications with a few clicks. Virtualization management tools lack the The Solution authentication, continuous monitoring, auditing, HyTrust CloudControl™ software lets enterprises and accountability for this administrative virtualize even mission critical applications and activity. This lack of visibility and control of deploy multitenant private clouds while reducing virtual infrastructure makes meeting compliance risk of breaches or accidental misconfiguration. mandates such as PCI impossible. More importantly, companies that don’t secure these CloudControl doesn’t require administrators to accounts are vulnerable to the type of data breaches change their workflow or management tools, and theft that can go undetected for months. but simply adds the critical security controls and visibility necessary to achieve security and compliance in virtualized infrastructure and private clouds. Cloud Under Control hytrust.com 650.681.8100 D ATA S H E E T Forensic-Quality Logs How It Works HyTrust CloudControl is deployed as a transparent proxy on the management plane between administrators and vSphere, or KVM hosts. • Compiles complete audit trails required for compliance and fast incident response • Records and alerts on essential audit data including attempted/denied operations, source IP addresses, and details of VM reconfigurations • Provides comprehensive reports and integrates with SIEM solutions including McAfee ePolicy Orchestrator, VMware LogInsight, Symantec Control Compliance Suite, RSA envision, HP ArcSight, and Splunk VMware vSphere Hypervisor Configuration Hardening • Provides templates for and continually monitors hypervisor configuration to ensure compliance with security best practices (VMware hardening guide) and compliance requirements (e.g., Management Clients PCI, HIPAA) HyTrust CloudControl is deployed as a transparent proxy on the management plane between administrators and the ESXi or KVM hosts. Key Capabilities Strong Authentication • Supports two-factor authentication to ensure administrators are who they say they are and prevent identity spoofing • Integrates with Active Directory, RSA SecurID, CA ArcotID, RADIUS, and Smartcards/PKI • Provides root password vaulting to tightly secure ESXi server root access. Policy-Based Authorization • Limits or prevents harm to critical workloads by enforcing enterprise-defined policies • Applies both role-based and asset-based access control rules to achieve separation of duties and resource isolation, with no changes to user workflows • Provides secondary approval workflow to ensure additional control and visibility for sensitive operations • Automates configuration policy definition, enforcement, and remediation •Supports HyTrust Boundary Controls in conjunction with Intel TXT (ensuring hardware-based root of trust) and policy-based controls that prevent workloads from running outside a defined boundary, such as a datacenter or country border The Benefits • Reduce risk of data breach through twofactor authentication, continuous monitoring and policy-based control of privileged administrator accounts • Simplify audits and ensure compliance through configuration hardening and thorough logging and reporting of admin actions or attempted actions • Supports secure multi-tenancy and drives uptime in next-gen datacenters and private clouds • Mitigate risks of extended data center downtime • Contain and prevent damage due to privileged account misuse To learn more about HyTrust, visit hytrust.com/products/why-hytrust. HyTrust, the HyTrust logo, and Virtualization Under Control are trademarks or registered trademarks of HYTRUST, Inc. or its subsidiaries in the United States and other jurisdictions. All other company and productnames mentioned are used only for identification purposes and may be trademarks or registered trademarks of their respective companies. © 2013-2014 HyTrust, Inc. All rights reserved. Part Number: DS-007-001 Cloud Under Control hytrust.com 650.681.8100