RESOURCE ACCESS CONTROL FOR VIRTUAL MACHINES
To provide enhanced operation of virtualized computing systems, various systems, apparatuses, methods, and software are provided herein. In a first example, a method of operating a computing system to control access to data resources by virtual machines is provided. The method includes receiving an access token and an instantiation command from an end user system. Responsive to the instantiation command, the method includes instantiating a virtual machine identified by the instantiation command using the access token as user data for the virtual machine during instantiation. The method also includes, in the virtual machine, executing a security module responsive to instantiation that transfers the access token for delivery to an authorization system, receiving credentials responsive to the access token, and accessing a data resource using the credentials.
This application is a continuation of, and claims priority to U.S. patent application Ser. No. 14/509,664, titled “RESOURCE ACCESS CONTROL FOR VIRTUAL MACHINES,” filed Oct. 8, 2014, that also claims the benefit of and priority to U.S. Provisional Patent Application 62/003,802, titled “SYSTEMS, METHODS, AND SOFTWARE TO PROVIDE ACCESS CONTROL IN CLOUD COMPUTING ENVIRONMENTS,” filed May 28, 2014, and which is hereby incorporated by reference in its entirety. This application also hereby claims the benefit of and priority to U.S. Provisional Patent Application 62/035,135, titled “RESOURCE ACCESS CONTROL FOR VIRTUAL MACHINES,” filed Aug. 8, 2014, and which is hereby incorporated by reference in its entirety.
TECHNICAL FIELDAspects of the disclosure are related to the field of access control in cloud computing environments, and in particular, providing access control for virtual machines in cloud computing environments.
TECHNICAL BACKGROUNDVirtualized computer systems are becoming increasingly deployed in computing environments. These virtualized computer systems include virtual servers and other virtual machines that host a variety of software applications. Virtual servers can be scaled up or down on-the-fly based on demand, among other factors, to allow for infrastructure flexibility, faster deployment of applications and data, cost control, and adaptability. Cloud computing systems can use these virtualized computer systems to provide flexible computing resources to end users. Cloud computing systems allow for users spread over a variety of geographic locations to access resources of these virtualized computer systems, such as databases, applications, web content, or other digital data, services, or content.
Cloud Service Providers (CSPs) such as Amazon, Google, Rackspace, and OpenStack deploy physical hardware such as servers, network infrastructure, and connectivity for the cloud computing systems to host digital products and services from various remote locations. Cloud service customers can employ the resources provided by the various CSPs without having to purchase and maintain physical equipment.
Access to cloud resources of the various CSPs is managed through permissions. These permissions could include usernames and passwords, as well as other credentialing information. However, in cloud computing environments, access control beyond initial user authorization is limited. The current access control systems lack the ability to manage access to resources accessed by virtual machines.
OVERVIEWTo provide enhanced operation of virtualized computing systems, various systems, apparatuses, methods, and software are provided herein. In one example, a method of operating a computing system to control access to data resources by virtual machines is provided. The method includes receiving an access token and an instantiation command from an end user system. Responsive to the instantiation command, the method includes instantiating a virtual machine identified by the instantiation command using the access token as user data for the virtual machine during instantiation. The method also includes, in the virtual machine, executing a security module responsive to instantiation that transfers the access token for delivery to an authorization system, receiving credentials responsive to the access token, and accessing a data resource using the credentials.
Many aspects of the disclosure can be better understood with reference to the following drawings. The components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Moreover, in the drawings, like reference numerals designate corresponding parts throughout the several views. While several embodiments are described in connection with these drawings, the disclosure is not limited to the embodiments disclosed herein. On the contrary, the intent is to cover all alternatives, modifications, and equivalents.
The various figures and descriptions included herein discuss many examples for enhanced access control for virtual machines in a computing environment. The access control can include restricting access by virtual machines to various data resources, such as databases, other virtual machines, application storage, user data, among other data resources. The access control can allow for individualized authentication or authorization of virtual machines to various data resources, even when the virtual machines are instantiated or replicated from the same virtual images. Although these virtual machines can be hosted in a cloud computing environment, the examples herein are not limited to cloud systems.
As a first example of a computing system,
In operation, end user system 101 can interact with user interface system 110 to establish, instantiate, configure, and alter various virtual machines and associated properties. User interface system 110 can include a front-end interface provided over a web interface and accessed in a browser application on end user system 101. In other examples, an application programming interface (API) system is employed for end user system 101 to interface with user interface system 110 to control the operations of virtual machines.
Storage system 120 includes one or more virtual machine images, such as virtual machine image 121. These virtual machine images include operating systems, user and system applications, various modules, network service applications, among other computing resources that can be instantiated and subsequently operate similar to a physical computing system. When activity of an end user or other management service causes a virtual machine to be active, the virtual machine is instantiated by execution system 130. Any number of virtual machines can be concurrently active in execution system 130, which can include any number of virtual machine handling software elements, such as hypervisors, resource managers, virtual network elements, among other software elements. These various active virtual machines can be instantiated from a shared or same virtual image, with many replicated copies of the same virtual machine image being executed concurrently by execution system 130.
In
Token 160 can comprise a datagram unique to virtual machine 131, such an encrypted code, security key, identifier, identity of end user system 101, or other data, including combinations and variations thereof. In some examples, token 160 comprises pseudo-random data, such as an encrypted key, used to uniquely identify a particular instance of virtual machine image 121. Token 160 can be generated or identified by end user system 101, or can be provided to end user system 101 by authorization system 140. Token 160 can comprise an identity of end user system 101 or a user of end user system 101. The identity can allow for auditing of which users or end user systems desire to access particular resources, such as in healthcare auditing to establish traceability between data access and users. In other examples, token 160 comprises a unique code or encrypted key, and can be used for access control or access restriction to prevent unauthorized users from gaining access to data resources. Other configurations of token 160 are possible, including combinations thereof. Token 160 typically comprises one or more packets which can include network addressing information that identifies virtual machine 131 or security module 132.
Token 160 can be provided to virtual machine 131 during instantiation, such as through user data or user parameters that are provided as an input to virtual machine image 121 during an instantiation process. Security module 132 is configured to receive token 160 responsive to execution of security module 132. For example, security module 132 can comprise a startup script which uses token 160 as input data or user parameters provided during instantiation of virtual machine 131. Security module 132 transfers token 160 for delivery to authorization system 140.
Responsive to receiving token 160, authorization system 140 transfers credentials 161, as shown by operations ‘3’ and ‘4’ in
During execution of virtual machine 131, access to a data resource might be desired. This data resource, such as resource 150, can be external to virtual machine 131 and require credentials in order to access the associated data resources. For example, resource 150 can comprise a database system and virtual machine 131 desires to access data stored or handled by that database system. Any data resource can be employed, such as user applications, databases, digital media content resources, healthcare data, government data, or other data resources, including combinations thereof.
To access resource 150, virtual machine 131 provides credentials 161 to resource 150, as shown by operation ‘5’ in
If credentials 161 are not valid or fail associated verifications, then resource 150 can deny access to virtual machine 131 for further access to resource 150. However, if virtual machine 131 is verified using credentials 161, then further access to resource 150 is provided. Resource 150 and virtual machine 131 can establish a communication session which is authenticated by credentials 161, and virtual machine 131 can continue to have access to resource 150 during the communication session.
As discussed above for
In further examples, when a virtual machine is instantiated from a shared virtual machine image 121, a second virtual machine can be instantiated from shared virtual machine image 121. This second virtual machine can be instantiated responsive to end user commands or end user activity, such as in end user system 101 or a second end user system different than end user system 101. The second end user system can provide a second access token during instantiation of the second virtual machine which can be employed by a security module of the second virtual machine. The second access token is different than first access token 160. Responsive to the second instantiation command, the second virtual machine identified by the second instantiation command uses the second access token as second user data for the second virtual machine during instantiation. In the second virtual machine, a security module is executed responsive to instantiation that transfers the second access token for delivery to authorization system 140. In the second virtual machine, second credentials are received responsive to the second access token, and data resource 150 is accessed using the second credentials. The second credentials are different than first credentials 161. In yet further examples, instead of the second virtual machine being instantiated due to an instantiation command, the first virtual machine 131 might decide to replicate due to loading or other conditions, using the same shared virtual machine image 121. The second access token can be provided by an end user system during replication.
Returning to the elements of
User interface system 110 comprises user interface elements and computing systems configured to provide virtual machine control and interfacing to end users. In some examples, end users are not aware of using virtual machines and user interface system 110 presents user interfaces to end users which employ virtual machines responsive to end user activity. In other examples, user interface system 110 provides administration consoles or management interfaces for end users to control and alter the operations of virtual machines, create and maintain virtual machine images, manage security modules of virtual machine images, among other operations. In yet further examples, user interface system 110 comprises one or more servers for presenting web pages or user applications to end users. Responsive to end user activity, such as web browsing activities or application selections, one or more virtual machines can be instantiated to scale up load handling capabilities of the associated web pages or user applications. User interface system 110 is configured to receive tokens from end users and pass these tokens to virtual machines during instantiation.
User interface system 110 can be provided along with storage system 120 and execution system 130 in a cloud computing environment, such as provided by Cloud Service Providers (CSPs) such as Amazon, Google, Rackspace, and OpenStack, among others. The cloud computing environment can include a distributed computing environment with one or more physical servers distributed over one or more geographic areas. A plurality of virtual machines can be instantiated from a single shared virtual machine image responsive to user demand, load conditions, throughput needs, among other factors. For example, system load or access requests may increase due to end user demand. For instance, virtual machine 131 may be hosting an e-commerce or healthcare web site. At certain times there may be bursts of spikes in end-user requests. For example, in an e-commerce web site, there may be increased activity when a new product is launched or during sales, like Black Friday or Cyber Monday. On a healthcare web site there may be spikes or bursts of end-user activity when there is a deadline to sign up for coverage or new plans are instituted. In order to accommodate the increased number of requests, virtual machine 131 may be programmed to replicate or spawn to increase bandwidth to the application service. In other examples, an administrator or other personnel may send a request to replicate or spawn virtual machine 131. Different tokens can be provide to each instance or replication of a virtual machine to allow that virtual machine to retrieve credentials from authorization system 140.
Cloud computing environments that provide user interface system 110, storage system 120, and execution system 130, are representative of any physical or virtual computing system, device, or collection thereof capable of hosting all or a portion of services provided to end users. Examples of cloud computing environment include, but are not limited to, server computers, web servers, application servers, rack servers, blade servers, virtual machine servers, or tower servers, as well as any other type of computing system, of which computing system 501 illustrated in
Storage system 120 includes one or more non-transitory computer-readable storage media, such as disk drives, disk arrays, solid state storage drives, optical drives, magnetic storage systems, among other storage media. Storage system 120 stores one or more virtual machine images which can be instantiated by execution system 130. Storage system 120 can also store user data, application data, resource data, among other data, including combinations thereof.
Execution system 130 includes one or more processing systems that execute software instructions responsive to user activity and commands issued by user interface system, among other systems. These processing systems can be localized or distributed, and include or more processors, microprocessors, processing circuitry, cloud-based systems, or some other processing devices or software systems, and can be distributed among multiple processing devices. Examples of execution system 130 can also include software such as an operating system, logs, data structures, databases, utilities, drivers, networking software, and other software stored on a non-transitory computer-readable medium. Execution system 130 also includes one or more network interfaces for exchanging network communications over one or more communication links.
Although not shown in
Virtual machine 131, along with any other instantiated or replicated virtual machines, can provide an application service to end users. This application service can be representative of any application, software application, module, component, or collection thereof hosted in computing system 100. Examples of an application service include, but are not limited to, healthcare applications, financial application, banking applications, credit card payment applications, electronic payment applications, email applications, gaming applications, real-time communication applications, blogging and micro-blogging applications, social networking applications, and e-commerce applications, as well as any other type of application. Application services may be locally installed and executed applications, streamed applications, mobile applications, or any combination or variation thereof. In some implementations, the application services may be a browser-based application that executes in the context of a browser application.
Authorization system 140 comprises computer processing systems and equipment. Authorization system 140 can include communication or network interfaces, as well as computer systems, microprocessors, circuitry, cloud-based systems, or some other processing devices or software systems, and can be distributed among multiple processing devices. Examples of authorization system 140 can also include software such as an operating system, logs, databases, utilities, drivers, networking software, and other software stored on a computer-readable medium.
Resource 150 includes computers, physical servers, virtual machines, virtual servers, applications, shared data resources, and shared databases. Resource 150 can be representative of any physical or virtual computing systems, devices, or collections thereof capable of providing digital data resources to a virtual machine.
In operation, one or more virtual machines are executed by an associated execution system. These virtual machines can deploy application servers, databases, media servers, or any other data handling, processing, or distribution system. In some examples, each of execution systems 330 and 340 are provided by different cloud computing platforms, such as different CSPs. For example, virtual machines 331 and 333 are executed on execution system 330, while virtual machines 341 and 343 are executed on execution system 340, although other configurations are possible.
During normal operation of each virtual machine in
In
Responsive to the identity information, authorization system 350 can verify the virtual machine and authorize the virtual machine to receive audit credentials for use in storing audit log information in audit log system 360. These credentials, namely credentials 371, are then transferred for delivery to the virtual machine that requested them, such as virtual machine 331. In some cases, authorization system 350 might deny authorization to a virtual machine for audit credentials, such as due to an invalid identity. Operation ‘2’ in
Once credentials 371 are received by virtual machine 331, these credentials can accompany audit data 380 for logging by audit log system 360. Audit log system 360 can selectively allow or deny storage of audit data based on credentials provided by virtual machines. Instead of a using a shared or the same credentials for all virtual machines instantiated from the same virtual machine image, audit log system 360 uses individualized credentialing for each instance of a virtual machine. For example, virtual machines 331 and 333 can be duplicate virtual machines or instantiated from the same source virtual machine image. However, each virtual machine 331 and 333 requests separate credentials from authorization system 350, and authorization system 350 provides individualized credentials for each virtual machine based in part on the identity provided by the associated virtual machine. Audit data 380 is shown being transferred in operation ‘3’ of
In some examples, the credentials are verified internally to audit log system 360, such as when the credentials are also transferred by authorization system 350 for delivery to audit log system 360 when transferred to the associated virtual machine. In other examples, audit log system 360 generates the credentials and provides the credentials to authorization system 350, and thus the credentials can also be checked or verified locally to audit log system 360. However, as shown in
In another example, as shown in
In further examples, once credentials have been granted for a particular virtual machine, such as for virtual machine 331, these credentials can be revoked at a later time. When audit log system 360 checks or verifies associated credentials with authorization system 350, a previously authorized virtual machine can be denied access. Additionally, authorization system 350 can monitor an activity status of virtual machines. When a particular virtual machine that previously was granted credentials becomes inactive or de-instantiated, then the credentials for that virtual machine can be invalidated by authorization system 350. The invalid status can be proactively reported to audit log system 360 or can be provided responsive to further audit data storage attempts using the credentials. This invalidation of credentials for a particular virtual machine can provide a more secure operating environment since another virtual machine cannot use the credentials of a first virtual machine, such as when a second virtual machine is replicated from the first virtual machine.
Returning to the elements of
Cloud computing environments that provide execution systems 330 and 340 are representative of any physical or virtual computing system, device, or collection thereof capable of hosting all or a portion of services provided to end users. Examples of cloud computing environment include, but are not limited to, server computers, web servers, application servers, rack servers, blade servers, virtual machine servers, or tower servers, as well as any other type of computing system, of which computing system 501 illustrated in
Although not shown in
Virtual machines 331, 333, 341, and 343, along with any other instantiated or replicated virtual machines, can provide an application service to end users. This application service can be representative of any application, software application, module, component, or collection thereof hosted in computing system 300. Examples of an application service include, but are not limited to, healthcare applications, financial application, banking applications, credit card payment applications, electronic payment applications, email applications, gaming applications, real-time communication applications, blogging and micro-blogging applications, social networking applications, and e-commerce applications, as well as any other type of application. Application services may be locally installed and executed applications, streamed applications, mobile applications, or any combination or variation thereof. In some implementations, the application services may be a browser-based application that executes in the context of a browser application.
Authorization system 350 comprises computer processing systems and equipment. Authorization system 350 can include communication or network interfaces, as well as computer systems, microprocessors, circuitry, cloud-based systems, or some other processing devices or software systems, and can be distributed among multiple processing devices. Examples of authorization system 350 can also include software such as an operating system, logs, databases, utilities, drivers, networking software, and other software stored on a computer-readable medium.
Audit log system 360 includes computers, physical servers, virtual machines, virtual servers, applications, shared data resources, and shared databases. Audit log system 360 can be representative of any physical or virtual computing systems, devices, or collections thereof capable of providing digital data resources to a virtual machine.
Audit system 320 comprises computer processing systems and equipment. Audit system 320 can include communication or network interfaces, as well as computer systems, microprocessors, circuitry, cloud-based systems, or some other processing devices or software systems, and can be distributed among multiple processing devices. Examples of audit system 320 can also include software such as an operating system, logs, databases, utilities, drivers, networking software, and other software stored on a computer-readable medium.
Examples of computing system 501 include server computers, rack servers, web servers, cloud computing platforms, and data center equipment, as well as any other type of physical or virtual server machine, and any variation or combination thereof. In some implementations, a collection of multiple computing systems may be employed to implement all or portions of access control service 521, which may be hosted in one or more data centers, virtual data centers, or any other suitable computing facilities.
Computing system 501 may be implemented as a single apparatus, system, or device or may be implemented in a distributed manner as multiple apparatuses, systems, or devices. Computing system 501 includes, but is not limited to, communication interface system 502, processing system 503, and user interface 504. In some examples, user interface 504 may be omitted. Processing system 503 is linked to communication interface system 502 and user interface 504. Processing system 503 includes processing circuitry 511 and storage system 512 that stores software 513.
Processing system 503 loads and executes software 513 from storage system 512. When executed by processing system 503 software 513 directs processing system 503 to operate as described herein for the various access control services discussed in the foregoing implementations. Computing system 501 may optionally include additional devices, features, or functionality not discussed for purposes of brevity.
Referring still to
Storage system 512 may comprise any non-transitory computer readable storage media readable by processing system 503 and capable of storing software 513. Storage system 512 may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules, or other data. Examples of storage media include random access memory, read only memory, magnetic disks, optical disks, flash memory, virtual memory and non-virtual memory, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other suitable storage media.
In addition to computer readable storage media, in some implementations, storage system 512 may also include computer readable communication media over which software 513 may be communicated internally or externally. Storage system 512 may be implemented as a single storage device but may also be implemented across multiple storage devices or sub-systems co-located or distributed relative to each other. Storage system 512 may comprise additional elements, such as a controller, capable of communicating with processing system 503 or possibly other systems.
Software 513 may be implemented in program instructions and among other functions may, when executed by processing system 503, direct processing system 503 to operate as described herein with respect to the various operational scenarios, sequences, and processes. In particular, the program instructions may include various components or modules that cooperate or otherwise interact to carry out the various processes and operational scenarios described herein. The various components or modules may be embodied in compiled or interpreted instructions or in some other variation or combination of instructions. The various components or modules may be executed in a synchronous or asynchronous manner, serially or in parallel, in a single threaded environment or multi-threaded, or in accordance with any other suitable execution paradigm, variation, or combination thereof. Software 513 may include additional processes, programs, or components, such as operating system software or other application software. Software 513 may also comprise firmware or some other form of machine-readable processing instructions executable by processing system 503.
In general, software 513 may, when loaded into processing system 503 and executed, transform a suitable apparatus, system, or device (of which computing system 501 is representative) overall from a general-purpose computing system into a special-purpose computing system customized to facilitate run-time experimentation with user interface configurations as described herein for each implementation. Indeed, encoding software 513 on storage system 512 may transform the physical structure of storage system 512. The specific transformation of the physical structure may depend on various factors in different implementations of this description. Examples of such factors may include, but are not limited to, the technology used to implement the storage media of storage system 512 and whether the computer-storage media are characterized as primary or secondary storage, as well as other factors.
For example, if the computer readable storage media are implemented as semiconductor-based memory, software 513 may transform the physical state of the semiconductor memory when the program instructions are encoded therein, such as by transforming the state of transistors, capacitors, or other discrete circuit elements constituting the semiconductor memory. A similar transformation may occur with respect to magnetic or optical media. Other transformations of physical media are possible without departing from the scope of the present description, with the foregoing examples provided only to facilitate the present discussion.
It should be understood that computing system 501 is generally intended to represent a computing system or systems on which software 513 may be deployed and executed in order to implement access control services in a cloud computing environment. However, computing system 501 may also be suitable as any computing system on which software 513 may be staged and from where software 513 may be distributed, transported, downloaded, or otherwise provided to yet another computing system for deployment and execution, or yet additional distribution.
Communication interface system 502 may include communication connections and devices that allow for communication with other computing systems (not shown) over a communication network or collection of networks (not shown). Examples of connections and devices that together allow for inter-system communication may include network interface cards, antennas, power amplifiers, RF circuitry, transceivers, and other communication circuitry. The connections and devices may communicate over communication media to exchange communications with other computing systems or networks of systems, such as metal, glass, air, or any other suitable communication media. The aforementioned media, connections, and devices are well known and need not be discussed at length here.
Communication between computing system 501 and any other computing system (not shown) may occur over a communication network or networks and in accordance with various communication protocols, combinations of protocols, or variations thereof. Examples of communication networks over which computing system 501 may exchange information with other computing systems include intranets, the Internet, local area networks, wide area networks, wireless networks, wired networks, virtual networks, software defined networks, data center buses, computing backplanes, networks, or any combination or variation thereof. The aforementioned communication networks and protocols are well known and need not be discussed at length here. However, some communication protocols that may be used include, but are not limited to, the Internet protocol (IP, IPv4, IPv6, etc.), the transfer control protocol (TCP), and the user datagram protocol (UDP), as well as any other suitable communication protocol, variation, or combination thereof.
In any of the aforementioned examples in which information is exchanged, the exchange of information may occur in accordance with any of a variety of protocols, including FTP (file transfer protocol), HTTP (hypertext transfer protocol), REST (representational state transfer), WebSocket, DOM (Document Object Model), HTML (hypertext markup language), CSS (cascading style sheets), HTMLS, XML (extensible markup language), JavaScript, JSON (JavaScript Object Notation), and AJAX (Asynchronous JavaScript and XML), as well as any other suitable protocol, variation, or combination thereof. In some implementations, information may be exchanged in accordance with any of a variety of email protocols, including without limitation POP (Post Office Protocol), IMAP (Internet Message Access Protocol), MAPI (Messaging Application Programming Interface), HTTP mail, or any other suitable email protocol.
User interface system 504 may include a keyboard, a mouse, a voice input device, a touch input device for receiving a touch gesture from a user, a motion input device for detecting non-touch gestures and other motions by a user, and other comparable input devices and associated processing elements capable of receiving user input from a user. Output devices such as a display, speakers, haptic devices, and other types of output devices may also be included in user interface system 504. In some cases, the input and output devices may be combined in a single device, such as a display capable of displaying images and receiving touch gestures. The aforementioned user input and output devices are well known in the art and need not be discussed at length here.
User interface system 504 may also include associated user interface software executable by processing system 503 in support of the various user input and output devices discussed above. Separately or in conjunction with each other and other hardware and software elements, the user interface software and user interface devices may support a graphical user interface, a natural user interface, or any other type of user interface. In addition, user input made with respect to the user interfaces can be input via user interface system 504.
The functional block diagrams, operational scenarios and sequences, and flow diagrams provided in the Figures are representative of exemplary systems, environments, and methodologies for performing novel aspects of the disclosure. While, for purposes of simplicity of explanation, methods included herein may be in the form of a functional diagram, operational scenario or sequence, or flow diagram, and may be described as a series of acts. It is to be understood and appreciated that the methods are not limited by the order of acts, as some acts may, in accordance therewith, occur in a different order and/or concurrently with other acts from that shown and described herein. For example, those skilled in the art will understand and appreciate that a method could alternatively be represented as a series of interrelated states or events, such as in a state diagram. Moreover, not all acts illustrated in a methodology may be required for a novel implementation.
The descriptions and figures included herein depict specific implementations to teach those skilled in the art how to make and use the best option. For the purpose of teaching inventive principles, some conventional aspects have been simplified or omitted. Those skilled in the art will appreciate variations from these implementations that fall within the scope of the invention. Those skilled in the art will also appreciate that the features described above can be combined in various ways to form multiple implementations. As a result, the invention is not limited to the specific implementations described above, but only by the claims and their equivalents.
Claims
1-20. (canceled)
21. A computing system in a cloud computing environment for providing individualized secure access to instantiated virtual machines, the system comprising:
- a memory device storing a shared virtual machine image and a set of instructions; and
- a processor configured to execute the set of instructions to: instantiate on demand, based on the shared virtual machine image, a plurality of instances of virtual machines in the cloud computing environment; and execute, from the shared virtual machine image, a security application as a shared executable to execute on an instantiated virtual machine in response to instantiation of the instantiated virtual machine; wherein the security application is configurable, when executing on the instantiated virtual machine, to establish, based on a token sent from an end user system, credentials that are unique to the instantiated virtual machine for allowing the instantiated virtual machine individualized and secure access to an access-controlled resource in the cloud computing environment.
22. The computing system of claim 21, wherein the credentials are established based on a communication with an authorization system in the cloud computing environment and the token.
23. The computing system of claim 21, wherein the token comprises identification information that is unique to the end user system.
24. The computing system of claim 21, wherein the security application is configurable, when executing on the plurality of instances of virtual machines, to establish a plurality of credentials that are unique to each of the plurality of instances of virtual machines for allowing the plurality of instances of virtual machines individualized and secure access to the access-controlled resource in the cloud computing environment.
25. The computing system of claim 21, wherein the security application comprises at least one of a startup script, executable code, and a user application.
26. The computing system of claim 21, wherein the security application is automatically executed upon instantiation of the instantiated virtual machine.
27. The computing system of claim 21, wherein the security application is automatically executed upon detecting that the instantiated virtual machine requested access to the access-controlled resource in the cloud computing environment.
28. The computing system of claim 21, wherein the security application is configured to request audit credentials from an audit system in the cloud computing environment for use by the instantiated virtual machine, the audit credentials being effective for allowing the security application to store audit information associated with the instantiated virtual machine in the audit system.
29. The computing system of claim 28, wherein the audit credentials are unique to the instantiated virtual machine.
30. The computing system of claim 28, wherein the audit credentials are based on the token.
31. A method for providing individualized secure access to instantiated virtual machines in a cloud computing environment, the method comprising:
- accessing a memory device storing a shared virtual machine image;
- instantiating on demand, based on the shared virtual machine image, a plurality of instances of virtual machines in the cloud computing environment; and
- executing, from the shared virtual machine image, a security application as a shared executable to execute on an instantiated virtual machine in response to instantiation of the instantiated virtual machine;
- wherein the security application is configurable, when executing on the instantiated virtual machine, to establish, based on a token sent from an end user system, credentials that are unique to the instantiated virtual machine for allowing the instantiated virtual machine individualized and secure access to an access-controlled resource in the cloud computing environment.
32. The method of claim 31, wherein the security application is configurable, when executing on the plurality of instances of virtual machines, to establish a plurality of credentials that are unique to each of the plurality of instances of virtual machines for allowing the plurality of instances of virtual machines individualized and secure access to the access-controlled resource in the cloud computing environment.
33. The method of claim 31, wherein the security application is automatically executed upon instantiation of the instantiated virtual machine.
34. The method of claim 31, wherein the security application is configured to request audit credentials from an audit system in the cloud computing environment for use by the instantiated virtual machine, the audit credentials being effective for allowing the security application to store audit information associated with the instantiated virtual machine in the audit system.
35. The method of claim 34, wherein the audit credentials are unique to the instantiated virtual machine.
36. The method of claim 34, wherein the audit credentials are based on the token.
37. A computing system for auditing activity of instantiated virtual machines in a cloud computing environment, the system comprising:
- a memory device storing a set of instructions; and
- a processor configured to execute the set of instructions to: receive, from an instantiated virtual machine among a plurality of instantiated virtual machines that have been instantiated from a shared virtual machine image, a prompt for transfer of audit data associated with operation of the instantiated virtual machine, the prompt comprising individualized audit credentials that are unique to the instantiated virtual machine and are based at least in part on a unique identity of the instantiated virtual machine; and responsive to the prompt, selectively authorize storage, in the memory device, of the audit data transferred by the instantiated virtual machine based at least in part on the individualized audit credentials.
38. The computing system of claim 37, wherein the individualized audit credentials are provided by an authorization system in the cloud computing environment.
39. The computing system of claim 37, wherein each of the plurality of instantiated virtual machines has different individualized audit credentials.
40. The computing system of claim 37, wherein the processor is further configured to execute the set of instructions to verify the individualized audit credentials of the instantiated virtual machine.
41. The computing system of claim 37, wherein the processor is further configured to execute the set of instructions to revoke the individualized audit credentials of the instantiated virtual machine.
42. The computing system of claim 41, wherein the processor is further configured to execute the set of instructions to selectively deny storage, in the memory device, of the audit data transferred by the instantiated virtual machine based at least in part on the revoked individualized audit credentials.
43. The computing system of claim 37, wherein the audit data associated with operation of the instantiated virtual machine indicates at least one of user access, a network session, a timestamp of activity, an instantiation time, a load condition, network activity, a processor event, and an operating system event.
Type: Application
Filed: Jun 12, 2017
Publication Date: Nov 9, 2017
Inventors: Kevin Gilpin (Weston, MA), Elizabeth Lawler (Weston, MA)
Application Number: 15/619,955