<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Julien Levrard, Author at OVHcloud Blog</title>
	<atom:link href="https://blog.ovhcloud.com/author/julien-levrard/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.ovhcloud.com/author/julien-levrard/</link>
	<description>Innovation for Freedom</description>
	<lastBuildDate>Thu, 08 Jan 2026 14:58:33 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://blog.ovhcloud.com/wp-content/uploads/2019/07/cropped-cropped-nouveau-logo-ovh-rebranding-32x32.gif</url>
	<title>Julien Levrard, Author at OVHcloud Blog</title>
	<link>https://blog.ovhcloud.com/author/julien-levrard/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Agentic AI from a security perspective</title>
		<link>https://blog.ovhcloud.com/agentic-ai-from-a-security-perspective/</link>
		
		<dc:creator><![CDATA[Julien Levrard]]></dc:creator>
		<pubDate>Thu, 08 Jan 2026 14:58:33 +0000</pubDate>
				<category><![CDATA[Deploy & Scale]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://blog.ovhcloud.com/?p=30148</guid>

					<description><![CDATA[Large Language Models (LLMs) and generative AI technologies are everywhere, infiltrating both our personal and professional daily lives. Well-known services are already diverting most internet users away from their old browsing habits, and online information consumption is being profoundly transformed, most likely with no possible return to past behaviours. Issues related to intellectual property laws [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fagentic-ai-from-a-security-perspective%2F&amp;action_name=Agentic%20AI%20from%20a%20security%20perspective&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<p>Large Language Models (LLMs) and generative AI technologies are everywhere, infiltrating both our personal and professional daily lives. Well-known services are already diverting most internet users away from their old browsing habits, and online information consumption is being profoundly transformed, most likely with no possible return to past behaviours.</p>



<p>Issues related to intellectual property laws and the source of data used to train LLMs, which is sometimes confidential or personal, as well as potential biases in the data, intentional or otherwise, are regularly debated in the press and within technology communities. However, the current focus is on the race between LLM providers, who are competing to develop faster, more efficient models, in search of the ‘wow’ factor that will temporarily propel them to the rank of global AI leader.</p>



<p>Meanwhile, organisations are integrating these technologies into their daily activities at their own pace. Implementation is driven both by employees keen to improve their individual productivity, often based on their experience using AI tools in their personal life, and by business leaders and managers, who see an opportunity to optimise efficiency of low-value-added tasks.</p>



<p>At OVHcloud, we have launched an ‘AI Labs’ initiative, which is responsible for centralising projects and experiments using LLM tools. This team now supervises over a hundred projects, and new ones are added every week. The approach aims to catalyse ideas and provide a framework for efficiently implementing effective production tools.</p>



<p>From a data security perspective, the proliferation of experimentation and proof-of-concept (POC) projects creates numerous additional risks that need consideration. Modelling interactions between each component is necessary to understand these risks, as many configurations are possible.</p>



<p>In this article we will take a look at some example use cases, identify the main risks and provide suggestions for how to address them using a risk reduction logic model. We will focus on simple use cases where a user accesses an application for their work. These applications are accessible from their work context, and each have access management mechanisms that verify the user and grant them access to the relevant data and functions associated with their business profile.</p>



<figure class="wp-block-image aligncenter size-medium"><img fetchpriority="high" decoding="async" width="270" height="300" src="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664917-270x300.png" alt="" class="wp-image-30150" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664917-270x300.png 270w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664917-768x854.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664917.png 921w" sizes="(max-width: 270px) 100vw, 270px" /></figure>



<p>The introduction of LLM technologies fits into the usual operating mode of an information system to enrich the user experience and offer additional features. Let’s take a look at the examples.</p>



<h1 class="wp-block-heading">Conversational agents (without third-party integration)</h1>



<p>Most professionals working on a computer regularly use conversational agents to ‘enhance’ their work, often without acknowledging it, for example when writing an email, summarising a document, finding a complex Excel formula, answering a legal or technical question, etc.). As these agents are not connected to the company’s information system,  the risks are limited and depend on the attitude and practices of the user, for example with regards to uploading data, copying and pasting confidential data into the agent, etc.</p>



<p><a id="_msocom_1"></a></p>



<figure class="wp-block-image aligncenter size-full"><img decoding="async" width="1024" height="529" src="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664926.png" alt="" class="wp-image-30151" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664926.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664926-300x155.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664926-768x397.png 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>In this context, the user is the go-between managing the information transfer between the company application and the third-party agent. The agent only has access to information voluntarily sent by the user, typically via the service interface that allows prompts to be entered. These services are rapidly extending their capabilities, allowing file upload, and microphone or camera access, but we remain in a classic responsibility framework in terms of security, with the human in the loop by design.</p>



<h2 class="wp-block-heading" id="examples">Examples</h2>



<ul class="wp-block-list">
<li>Public AI services (Mistral, Openai, Grok, Omissimo, etc.)</li>



<li>AI services contracted by the company from public service publishers or specialised players</li>



<li>Internal chatbot</li>
</ul>



<h2 class="wp-block-heading" id="associated-security-risks">Associated security risks</h2>



<ul class="wp-block-list">
<li>Sending sensitive data (documents, confidential data, personal data, etc.) to the AI service and losing control over this data.</li>



<li>Training models on confidential data sent by users, which can lead to leaking this data to a user who should not have access to it.</li>
</ul>



<h2 class="wp-block-heading" id="possible-security-measures">Measures to implement</h2>



<ul class="wp-block-list">
<li>User awareness</li>



<li>AI charter</li>



<li>Blocking services accessible from the company&#8217;s information system</li>



<li>Contract with suppliers including security and confidentiality clauses for user-transmitted information</li>



<li>Traffic inspection and identification of confidential data using regular expressions</li>



<li>Dedicated instance for the company, fine-tuned or enriched by a RAG with company data (not very sensitive), allowing the LLM to be contextualised to the user’s context.</li>
</ul>



<h1 class="wp-block-heading" id="ia-augmented-application">&#8220;AI Augmented&#8221; Application</h1>



<p>The various editor solutions, in SaaS or deployed internally, are gradually enriched with functions based on LLMs, i.e. an agent on the application side that consumes an LLM with prompts designed by the editor on the data processed by the application. The editor enriches its solution within its own security model. On the user side, there is no change in usage, the application is simply enriched with new functions, for example synthesis, intelligent suggestions, translation, etc.). LLM processing can be done locally or consumed on external services.</p>



<figure class="wp-block-image aligncenter size-full"><img decoding="async" width="1024" height="191" src="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664934.png" alt="" class="wp-image-30152" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664934.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664934-300x56.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664934-768x143.png 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>In this use case, the publisher or application manager is responsible for data security and processing via the LLM; the user has no control and the use of these features is integrated into their usual usage. We remain in a classic security management framework, the application manager (internal or external) is the guarantor of the security of the data they process in the application. The application is enriched with new features and complexity increases, but the security model is preserved.</p>



<h2 class="wp-block-heading" id="examples-2">Examples</h2>



<ul class="wp-block-list">
<li>Messaging and video conferencing service with AI features, for example real-time translation, discussion synthesis, automatic meeting minutes etc.</li>



<li>Any ‘AI wizards’  in SaaS application</li>
</ul>



<h2 class="wp-block-heading" id="associated-risks">Associated security risks</h2>



<ul class="wp-block-list">
<li>Insufficient segmentation of access rights to data in the application, allowing bypassing of usual application access controls. This is the case when the agent has a high-privilege account (to simplify and accelerate the development of features) or when access restriction is not implemented at data level.</li>



<li>Prompt injection into the application</li>



<li>Dependence on an uncontrolled supply chain</li>



<li>Data leakage to a subcontractor</li>
</ul>



<h2 class="wp-block-heading" id="measures-to-be-implemented">Measures to implement</h2>



<ul class="wp-block-list">
<li>Security clauses in contracts</li>



<li>Security insurance plan for application provider</li>



<li>Review of subcontractor dependency chains</li>



<li>Disabling unnecessary AI functions</li>



<li>Deep isolation of sensitive applications</li>
</ul>



<h1 class="wp-block-heading">Agentic IA</h1>



<p>We will now look at actual ‘Agentic AI’. In these cases, the agent is at the centre of the workflow. The agent becomes an orchestrator of resources. It has several roles, in particular:</p>



<ul class="wp-block-list">
<li>Capturing user expectations and triggering the sequence of actions</li>



<li>Retrieving the necessary data to contextualise and process the request</li>



<li>Sending data and instructions to a LLM to find the sequence of actions to be performed</li>



<li>Managing iterations with available services and LLMs to best handle the request</li>



<li>Triggering actions on accessible services</li>



<li>Obtaining (eventually) user validation to validate actions</li>



<li>Providing visibility to the user on actions performed and results obtained</li>
</ul>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="1024" height="632" src="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664941.png" alt="" class="wp-image-30153" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664941.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664941-300x185.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664941-768x474.png 768w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>To properly understand the risks, it is necessary to look at different types of agent implementations.</p>



<h2 class="wp-block-heading">Agents integrated into local applications</h2>



<p>Applications are gradually being enriched with the ability to connect to an LLM service. Generally, this is done via APIs to LLM services or locally on the machine. In this case, the application will integrate an agent and incorporate its use into the usual application experience. The framework is equivalent to that of an enriched SaaS application, but the configuration and calls to the LLM are made from the user’s workstation. The functionality can be native or installed in the form of a plugin.</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="1024" height="436" src="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664949.png" alt="" class="wp-image-30154" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664949.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664949-300x128.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664949-768x327.png 768w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<h3 class="wp-block-heading" id="examples-3">Examples</h3>



<ul class="wp-block-list">
<li>Microsoft Copilot AI agent</li>



<li>AI function in office applications (OnlyOffice, Joplin, email client, etc.)</li>



<li>Apple intelligence</li>
</ul>



<h3 class="wp-block-heading" id="risks">Associated security risks</h3>



<ul class="wp-block-list">
<li>Loss of control over data processed by adding connectivity functions to third-party services (be careful with default tool configurations)</li>



<li>Risks are similar to “cloud” functions in applications, allowing cloud storage or sharing, often configured by default</li>



<li>Leakage of LLM authentication secrets (Bearer Token)</li>
</ul>



<h3 class="wp-block-heading" id="measures-to-implement">Measures to implement</h3>



<ul class="wp-block-list">
<li>User awareness</li>



<li>Application configuration controls</li>



<li>Validation of applications on workstations and smartphones</li>



<li>Monitoring and inspection of network and application flows</li>



<li>Local management of secrets</li>
</ul>



<h2 class="wp-block-heading" id="generalist-or-specialized-local-agents">Generalist or Specialized Local Agents</h2>



<p>Unlike the previous use case where the application is simply enriched with LLM functions, agents are applications whose primary goal is to integrate LLM functions into a workflow. The risk model is similar, but by nature, the functionalities are much richer and focused on optimising the consumption of LLM services. For example:</p>



<ul class="wp-block-list">
<li>Configuration of multiple LLM services in parallel</li>



<li>Personalisation of system and user prompt templates by the user</li>



<li>Integration of local or remote MCP services to enrich the data accessible to the agent</li>



<li>Cost control function</li>



<li>Optimisation of requests and context management</li>
</ul>



<p>These agents can be generalist or specialised. In particular, this type of agent is widely used by developers within their IDE . In this context, security management relies on the user and the local configuration of tools. Capabilities may be extended with marketplace, like plugins to add connectors to external services or capabilities. The complexity of configurations, the lack of proven and hardened standards due to the relative novelty of these tools generates many risks, on an application directly run on user workstation, with all their rights.</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="826" height="1024" src="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664957.png" alt="" class="wp-image-30155" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664957.png 826w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664957-242x300.png 242w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664957-768x952.png 768w" sizes="auto, (max-width: 826px) 100vw, 826px" /></figure>



<h3 class="wp-block-heading" id="examples-4">Examples</h3>



<ul class="wp-block-list">
<li>Generalist agents: Goose</li>



<li>Specialised agents: Claude desktop, Cursor, Shai, Github Copilot, Continue, Kilo Code</li>
</ul>



<h3 class="wp-block-heading" id="risks-2">Associated security risks</h3>



<ul class="wp-block-list">
<li>Connection to third-party services without controls via marketplace (MCP connector for third-party services)</li>



<li>Uncontrolled access to local file system</li>



<li>Sending confidential data to third-party services (business data, secrets, .env file, etc.)</li>



<li>Management of local secrets (Bearer token)</li>



<li>Sharing credentials with third-party services (via OAuth mandate, etc.)</li>
</ul>



<h3 class="wp-block-heading" id="measures-to-be-implemented-2">Measures to implement</h3>



<ul class="wp-block-list">
<li>User awareness</li>



<li>Application configuration controls</li>



<li>Software testing and validation</li>



<li>Sandboxing of agents</li>



<li>Protection of secrets (environment file in development directories)</li>
</ul>



<h2 class="wp-block-heading">Remote Agents</h2>



<p>Remote agents, like local agents, are applications that connect different resources (LLM, RAG, third-party services), packaged within a web application, accessible to the user through their browser. All chatbot services are gradually integrating these capabilities to enrich their service by connecting to third-party services. The operation is similar to local agents, but outside the user’s workstation.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1024" height="756" src="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664972.png" alt="" class="wp-image-30156" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664972.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664972-300x221.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664972-768x567.png 768w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>In this case, the main challenge is managing access to third-party services and the resulting secrets. Since the agent is the focal point of the architecture, entrusting its management to a third party requires granting them access rights to third-party services to capitalise on the agent’s functionality.</p>



<p>In the example above, the user must grant the agent an access mandate to consume the MCPs that allow access to application services. Today, most of these mandates are managed by OAuth2 delegations, with the user authorising the agent to use these technical delegations to access applications.</p>



<h3 class="wp-block-heading">Examples</h3>



<ul class="wp-block-list">
<li>ChatGPT, MistralAI</li>



<li>Agents deployed internally</li>
</ul>



<h3 class="wp-block-heading">Associated security risks</h3>



<ul class="wp-block-list">
<li>Leakage of authentication secrets to sensitive applications of data</li>



<li>Centralisation of secrets to access remote services</li>



<li>Opening of network flows between sensitive applications and agent services</li>
</ul>



<h3 class="wp-block-heading">Measures to implement</h3>



<ul class="wp-block-list">
<li>Architecture to limit network exposure</li>



<li>Network inspection</li>



<li>Application monitoring</li>



<li>Authorisation and access control management</li>



<li>Restriction of access rights to need-to-know for each task</li>
</ul>



<h2 class="wp-block-heading">Workflow agents</h2>



<p>Workflow agent tools are designed to build AI workflows. They may be local or remote. While all wrong behaviours listed above remain possible in this model, the workflow structure  splits the workflow into small manageable parts, allowing:</p>



<ul class="wp-block-list">
<li>Limit of each agent’s access rights to the required sub-set of data for performing its tasks</li>



<li>More deterministic approach for human control over the process</li>



<li>Unitary testing for each parts</li>



<li>Repeatability of the process (workflows are defined ‘as code’)</li>
</ul>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1024" height="368" src="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664986.png" alt="" class="wp-image-30157" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664986.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664986-300x108.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664986-768x276.png 768w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>In this case, the workflow is built and operates as an automation under the control of a project team in charge of aligning the workflow with business processes. The configuration of the workflow management tools is the key to controlling the process. The orchestration platform manages the secrets and flow to resources, so it need to be managed with proper attention as any orchestration platform.</p>



<h3 class="wp-block-heading" id="examples-6">Examples</h3>



<ul class="wp-block-list">
<li>N8N, Langchain, Zapier, Flowise AI</li>
</ul>



<h3 class="wp-block-heading" id="risks-4">Associated security risks</h3>



<ul class="wp-block-list">
<li>Increase in complexity of the workflows and interconnection</li>



<li>Configuration issues</li>



<li>Leak of access token</li>



<li>Exposure of sensitive resources</li>



<li>Shadow orchestration platforms deployed by users</li>



<li>Access to temporary artifacts by platform administrators</li>
</ul>



<h3 class="wp-block-heading" id="measures-to-be-implemented-4">Measures to be implemented</h3>



<ul class="wp-block-list">
<li>Architecture to limit network exposure</li>



<li>Network inspection</li>



<li>Application monitoring</li>



<li>Authorisation and access control management</li>



<li>Secrets management</li>



<li>Restriction of access rights to need-to-know for each task</li>
</ul>



<h1 class="wp-block-heading" id="perspectives-and-problems-to-be-solved">Perspectives and problems to be solved</h1>



<h2 class="wp-block-heading" id="mcp-and-secret-management">MCP and secret management</h2>



<p>Secret management is at the heart of the problem of deploying agent-based AI. Since LLMs are not deterministic, it is necessary to constrain access rights in terms of scope and duration for LLMs, in order to limit their access to only the data and functions required to perform tasks. It is essential to identify the reliable blocks that will act as intermediaries to grant access, particularly for MCP servers. One of the challenges is to rely on existing access rights matrices without re-implementing an additional layer of rights management for MCP servers and agents, but instead implementing mechanisms to limit access dynamically as needed.</p>



<p>Existing or emerging standards (OAuth2, JWT, SAML, SPIFFE/SPIRE, OPA, Cedar, etc.) partially address some of these challenges, but at the cost of high management complexity, without a reference implementation compatible with all current solutions, and in a rapidly evolving market.</p>



<h2 class="wp-block-heading" id="human-in-the-loop">Human in the loop</h2>



<p>Beyond secret management, LLMs are unpredictable because they are non-deterministic. One of the questions to be resolved is how to include humans in the decision-making chain of an agent-based process to ensure that this inherently unpredictable behaviour does not generate risks for organisations. Today, this control, known as ‘human in the loop’, is based on the agent’s internal mechanisms and the limitation of secrets shared with it by the user. Obviously, this mode of operation is not compatible with sensitive processing.</p>



<p>In the future, it will be necessary to build agents that offer a high level of trust, provided by trusted editors or communities, auditable and audited, ideally open-source, to entrust these agents with performing operations on a company’s information system. In parallel, it will be necessary to develop independent agent control mechanisms that ensure sandboxing, filtering, access management, and traceability functions, allowing the responsible user to master their interaction with the information system.</p>



<h2 class="wp-block-heading" id="towards-the-end-of-the-web-browser-as-a-access-vector-to-the-information-system">Towards the end of the web browser as a access vector to the information system</h2>



<p>For about 15 years, the web browser has been the user’s entry point to information systems. While the functional richness of browsers is immense, the attack surface they expose is just as great. Browser security, even if it is perfectible, is one of the pillars of modern security, and browser editors and communities devote a significant part of their development and maintenance efforts to maintaining the level of security and managing threats.</p>



<p>AI agents are changing this access paradigm to the information system by providing users with dynamic and adaptive interfaces, enriched with high-value contextual functions, which is already causing a revolution in usage and the daily lives of users. It is likely that tomorrow’s browser will be an AI agent, and even more likely that current browsers will gradually become AI agents, integrating all identity and authorisation management standards under user control.</p>
<img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fagentic-ai-from-a-security-perspective%2F&amp;action_name=Agentic%20AI%20from%20a%20security%20perspective&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Backdoor in xz/liblzma (CVE-2024-3094)</title>
		<link>https://blog.ovhcloud.com/backdoor-in-xz-liblzma-cve-2024-3094/</link>
		
		<dc:creator><![CDATA[Julien Levrard]]></dc:creator>
		<pubDate>Tue, 02 Apr 2024 12:37:49 +0000</pubDate>
				<category><![CDATA[OVHcloud Engineering]]></category>
		<category><![CDATA[Open Source]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://blog.ovhcloud.com/?p=26523</guid>

					<description><![CDATA[On March 29th, Andres Freund, a Postgres developer, working at Microsoft, identified a response time while authenticating to openSSH on a Debian Sid installation that was about 500 ms longer as usual. He investigated the behaviour and concluded that liblzma, part of the xz library, was compromised by a complex backdoor injected into distribution packages [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fbackdoor-in-xz-liblzma-cve-2024-3094%2F&amp;action_name=Backdoor%20in%20xz%2Fliblzma%20%28CVE-2024-3094%29&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<p>On March 29th, <a href="https://twitter.com/AndresFreundTec" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Andres Freund</a>, a Postgres developer, working at Microsoft, identified a response time while authenticating to openSSH on a Debian Sid installation that was about 500 ms longer as usual. <a href="https://www.openwall.com/lists/oss-security/2024/03/29/4" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">He investigated</a> the behaviour and concluded that liblzma, part of the xz library, was compromised by a complex backdoor injected into distribution packages during build. The versions 5.6.0 and 5.6.1 of the library are impacted. Further investigations led to the discovery of an elaborated supply chain attack scenario. The maintainers team seems to have been infiltrated over a long period of time (several years) by malevolent actors. </p>



<figure class="wp-block-image aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="967" height="1024" src="https://blog.ovhcloud.com/wp-content/uploads/2024/04/cri-967x1024.png" alt="" class="wp-image-26531" style="width:400px" srcset="https://blog.ovhcloud.com/wp-content/uploads/2024/04/cri-967x1024.png 967w, https://blog.ovhcloud.com/wp-content/uploads/2024/04/cri-283x300.png 283w, https://blog.ovhcloud.com/wp-content/uploads/2024/04/cri-768x814.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2024/04/cri.png 1011w" sizes="auto, (max-width: 967px) 100vw, 967px" /></figure>



<p>The story of this backdoor deserves a deep analysis which is out of topic here, but it raises a lot of questions for open-source communities and all the IT sector.</p>



<h2 class="wp-block-heading">What systems are impacted?</h2>



<p>Since the vulnerability has been detected in a relatively short time, no major distribution has already integrated those versions of the XZ library.</p>



<p>Only the distributions with a very fast pace of software integration (Rolling releases, testing, so-called &#8220;unstable&#8221;) had integrated the corrupted version at detection time.</p>



<h2 class="wp-block-heading">As an OVHcloud customers, what are the risks?</h2>



<p>No Linux image provided by OVHcloud to customers for automated installation are impacted. So no customer should be vulnerable to this backdoor using images provided by OVHcloud.</p>



<p>In some corner cases, the backdoor might have been installed on your system:</p>



<ul class="wp-block-list">
<li>If you installed a vulnerable distribution yourself, in the timespan where the compromission was not yet discovered, outside of the OVHcloud automated installation process (for instance, Linux distribution in &#8220;rolling release&#8221; mode)</li>
</ul>



<ul class="wp-block-list">
<li>If you activated edge repositories on your&nbsp;system (for instance, &#8220;experimental&#8221;, &#8220;unstable&#8221; or &#8220;testing&#8221; for Debian, &#8220;edge&#8221; for Alpine, &#8220;update-proposed&#8221; for Ubuntu)</li>
</ul>



<ul class="wp-block-list">
<li>If you installed a software that is&nbsp;&nbsp;packaging the vulnerable version of the library</li>
</ul>



<ul class="wp-block-list">
<li>If you use an alternative package manager&nbsp;(for instance Homebrew)</li>
</ul>



<p>The backdoor is quite complex, so even in such case, you might have deployed the corrupted version of the XZ library, without your system being actually vulnerable. Refer to your distribution/software security advisory page to get more information.</p>



<h2 class="wp-block-heading">How can I check if I use a backdoored version of the library?</h2>



<p>Check your active version of XZ library:</p>



<pre class="wp-block-code"><code class="">debian@lab:~$ strings `which xz` | grep "(XZ Utils)"
xz (XZ Utils) 5.2.5</code></pre>



<p>Note: The command &#8220;xz -V&#8221; would provide a similar output. However, It is not a good practice to execute a binary that might be compromised.</p>



<p>Ensure the active version of XZ library is not part of the known vulnerable ones (5.6.0 and 5.6.1). If you have a compromised version of XZ, follow the security recommendations from your distribution. In some cases, a patch has been released to correct the vulnerability, in other cases, backporting to an older version of the library is recommended.</p>



<h2 class="wp-block-heading">In any case apply the following recommendations:</h2>



<ul class="wp-block-list">
<li>Reduce the exposure of administration&nbsp;interfaces of your server, filter at network level what source IP is allowed to connect to SSH.</li>
</ul>



<ul class="wp-block-list">
<li>Use a bastion to connect to your server&nbsp;for administration (for instance: <a href="https://github.com/ovh/the-bastion" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://github.com/ovh/the-bastion</a>)</li>
</ul>



<ul class="wp-block-list">
<li>Perform regular backup of your data and&nbsp;system configurations, and regularly test your ability to rebuild your service from backups</li>
</ul>



<h2 class="wp-block-heading">External references:</h2>



<p><a href="https://www.openwall.com/lists/oss-security/2024/03/29/4" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.openwall.com/lists/oss-security/2024/03/29/4</a></p>



<p><a href="https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094</a></p>



<p><a href="https://lists.debian.org/debian-security-announce/2024/msg00057.html" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://lists.debian.org/debian-security-announce/2024/msg00057.html</a></p>



<p><a href="https://news.opensuse.org/2024/03/29/xz-backdoor/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://news.opensuse.org/2024/03/29/xz-backdoor/</a></p>



<p><a href="https://access.redhat.com/security/cve/CVE-2024-3094#cve-cvss-v3" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://access.redhat.com/security/cve/CVE-2024-3094#cve-cvss-v3</a></p>



<p><a href="https://archlinux.org/news/the-xz-package-has-been-backdoored/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://archlinux.org/news/the-xz-package-has-been-backdoored/</a></p>



<p><a href="https://boehs.org/node/everything-i-know-about-the-xz-backdoor" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://boehs.org/node/everything-i-know-about-the-xz-backdoor</a></p>



<p><a href="https://gynvael.coldwind.pl/?lang=en&amp;id=782" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://gynvael.coldwind.pl/?lang=en&amp;id=782</a></p>



<p><a href="https://www.wiz.io/blog/cve-2024-3094-critical-rce-vulnerability-found-in-xz-utils" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.wiz.io/blog/cve-2024-3094-critical-rce-vulnerability-found-in-xz-utils</a></p>



<p><a href="https://research.swtch.com/xz-timeline" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://research.swtch.com/xz-timeline</a></p>
<img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fbackdoor-in-xz-liblzma-cve-2024-3094%2F&amp;action_name=Backdoor%20in%20xz%2Fliblzma%20%28CVE-2024-3094%29&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CVE-2023-20593/Zenbleed</title>
		<link>https://blog.ovhcloud.com/cve-2023-20593-zenbleed/</link>
		
		<dc:creator><![CDATA[Julien Levrard]]></dc:creator>
		<pubDate>Thu, 27 Jul 2023 13:52:25 +0000</pubDate>
				<category><![CDATA[OVHcloud Engineering]]></category>
		<category><![CDATA[AMD]]></category>
		<category><![CDATA[OVHcloud]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://blog.ovhcloud.com/?p=25638</guid>

					<description><![CDATA[On July 24th 2023, AMD has issued a security bulletin disclosing a vulnerability in its Zen2 computer processor microarchitecture. Named “Cross-Process Information Leak” by AMD, the vulnerability is also known as &#8220;Zenbleed&#8221;. Labelled CVE-2023-20593 and rated by AMD as Medium, the issue allows an attacker to potentially access sensitive information processed by the CPU in [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fcve-2023-20593-zenbleed%2F&amp;action_name=CVE-2023-20593%2FZenbleed&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<p>On July 24th 2023, AMD has issued a security bulletin disclosing a vulnerability in its Zen2 computer processor microarchitecture. Named “Cross-Process Information Leak” by AMD, the vulnerability is also known as &#8220;Zenbleed&#8221;. Labelled CVE-2023-20593 and rated by AMD as Medium, the issue allows an attacker to potentially access sensitive information processed by the CPU in specific circumstances. The issue affects all software running on the AMD Zen2 based processors, including virtual machines, sandboxes, containers, and processes. Exploitation software is likely available, and we expect that attacks based on this vulnerability will occur soon.</p>



<figure class="wp-block-image aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://blog.ovhcloud.com/wp-content/uploads/2023/07/Zenbleed-1024x538.png" alt="" class="wp-image-25656" width="512" height="269" srcset="https://blog.ovhcloud.com/wp-content/uploads/2023/07/Zenbleed-1024x538.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2023/07/Zenbleed-300x158.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2023/07/Zenbleed-768x404.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2023/07/Zenbleed.png 1199w" sizes="auto, (max-width: 512px) 100vw, 512px" /></figure>



<p>All AMD Zen2 CPUs, including EPYC Rome processors, are vulnerable:</p>



<ul class="wp-block-list">
<li>AMD Ryzen 3000 Series Processors</li>



<li>AMD Ryzen PRO 3000 Series Processors</li>



<li>AMD Ryzen Threadripper 3000 Series Processors</li>



<li>AMD Ryzen 4000 Series Processors with Radeon Graphics</li>



<li>AMD Ryzen PRO 4000 Series Processors</li>



<li>AMD Ryzen 5000 Series Processors with Radeon Graphics</li>



<li>AMD Ryzen 7020 Series Processors with Radeon Graphics</li>



<li>2nd Gen AMD EPYC &#8220;Rome&#8221; Processors</li>
</ul>



<h2 class="wp-block-heading">Impacts on OVHcloud products</h2>



<p>In response to that event, we immediately reviewed the security bulletin and technical information and determined the following potential impact on our products.</p>



<div class="inherit-container-width wp-block-group is-layout-constrained wp-block-group-is-layout-constrained"><div class="wp-block-group__inner-container">
<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:100%">
<figure class="wp-block-table is-style-regular"><table><tbody><tr><td><strong>Public Cloud</strong></td><td>All products</td><td><i class="fas fa-check"></i> Not impacted</td></tr><tr><td><strong>Hosted Private Cloud</strong></td><td>All products</td><td><i class="fas fa-check"></i> Not impacted</td></tr><tr><td><strong>Web Hosting &amp; Domains</strong></td><td>All products</td><td><i class="fas fa-check"></i> Not impacted</td></tr><tr><td><strong>Bare Metal cloud</strong></td><td>ADVANCE-1<br>Advance STOR-1<br>Advance STOR-2<br>Game-1<br>Game-2<br>HGR-SDS-2<br>HGR-HCI-4<br>HGR-HCI-5<br>HGR-HCI-6<br>Infra-2<br>Rise-GAME-1<br>Rise-GAME-2<br>Scale-1<br>Scale-2<br>Scale-3</td><td><i class="fas fa-plus"></i> <mark style="background-color:var(--ast-global-color-0)" class="has-inline-color has-ast-global-color-5-color">Potentially impacted</mark><br>(only AMD Zen2 powered servers)</td></tr><tr><td></td><td>Other commercial ranges of dedicated servers</td><td><i class="fas fa-check"></i> Not impacted</td></tr></tbody></table></figure>
</div>
</div>
</div></div>



<h2 class="wp-block-heading">How to mitigate the vulnerability:</h2>



<h3 class="wp-block-heading">Customer-initiated mitigation</h3>



<h4 class="wp-block-heading">Loading a patched microcode at boot with a firmware package update</h4>



<p>This solution will trigger the update of the processor microcode through an operating system update (the linux-firmware package for instance). You might do it as soon your OS editor or community distribute the updated package. This method is dependent on your distribution or Operating system editor and will only work if the appropriate microcode has been provided by AMD. As of today, only &#8220;Zen2 Rome&#8221; and &#8220;Zen2 Castle Peak&#8221; are covered by this method.</p>



<h4 class="wp-block-heading">Mitigation with an updated Kernel</h4>



<p>When an update of the microcode is not available via a firmware update package, you may update the Kernel with a version that implements a mitigation by configuring a so-called &#8220;chicken bit&#8221; to deactivate the faulty processor feature. It might impact the performance of the system. This solution will be included by OS editors when they backport a new version of the Linux kernel. We recommend our customers to follow this mitigation strategy in priority since it is the most efficient as it doesn&#8217;t depend on whether an updated microcode is provided by the hardware vendor.</p>



<p>As an alternative, you might set the chicken bit manually without relying on the kernel update. However, we do not recommend this solution that may be risky for your system.</p>



<h3 class="wp-block-heading">OVHcloud-initiated mitigation</h3>



<p>OVHcloud teams are working to implement transparent solutions that will ensure the patched microcode is updated in a transparent way for our customers. Those solutions will be deployed progressively on our servers. Two main options are being evaluated.</p>



<h4 class="wp-block-heading">Using OVHcloud iPXE</h4>



<p>The microcode update may be loaded by the bootloader when the standard OVHcloud netboot is used by customers (the most common configuration). Once it is available, rebooting the server through the OVHcloud customer interface will cause it to load the updated microcode before booting to disk, which will mitigate the vulnerability. However, if you&#8217;re booting on disk without using the OVHcloud netboot system, the mitigation will not be applied and you should consider relying on the Operating-System-level mitigation.</p>



<h4 class="wp-block-heading">Using UEFI</h4>



<p>The UEFI firmware update may update the CPU microcode at boot. UEFI firmware updates including the patched microcode will likely be made available by motherboard manufacturers within the next months. Once available, OVHcloud will include this patched microcode on the UEFI for any new delivered server. Customers will then be able to request an UEFI firmware update by contacting the support.</p>



<h2 class="wp-block-heading">As an administrator of a potentially vulnerable server, what should I do?</h2>



<p>The first action is to check if your server is impacted by the vulnerability using the following tool (Linux-only) developed by our team:</p>



<pre class="wp-block-code"><code class=""># wget https://raw.githubusercontent.com/speed47/spectre-meltdown-checker/master/spectre-meltdown-checker.sh
# sh spectre-meltdown-checker.sh --variant zenbleed --explain</code></pre>



<p>If the tool says &#8220;NOT VULNERABLE&#8221;, then you are already safe and no further action is needed.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="828" height="111" src="https://blog.ovhcloud.com/wp-content/uploads/2023/07/image.png" alt="" class="wp-image-25642" srcset="https://blog.ovhcloud.com/wp-content/uploads/2023/07/image.png 828w, https://blog.ovhcloud.com/wp-content/uploads/2023/07/image-300x40.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2023/07/image-768x103.png 768w" sizes="auto, (max-width: 828px) 100vw, 828px" /></figure>



<p>If the tool says &#8220;VULNERABLE&#8221;, you should then evaluate your exposition to the threat. </p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="853" height="207" src="https://blog.ovhcloud.com/wp-content/uploads/2023/07/image-2.png" alt="" class="wp-image-25644" srcset="https://blog.ovhcloud.com/wp-content/uploads/2023/07/image-2.png 853w, https://blog.ovhcloud.com/wp-content/uploads/2023/07/image-2-300x73.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2023/07/image-2-768x186.png 768w" sizes="auto, (max-width: 853px) 100vw, 853px" /></figure>



<p>It is necessary to determine if the server context allows to run code from an untrusted origin. If the server is used to provide services to untrusted end-users that can execute code (VPS, Container, mutualized hosting, etc.), or is used as a desktop in the cloud browsing the Web (hence possibly running 3rd party Javascript payloads), then your server might be at risk. If the server is used only by trusted users and/or does not allow to run untrusted code, the risk of exploitation is probably quite low. Please note however that this vulnerability might allow an attacker to gain extra privilege in a chained attack, it could be used for persistence or lateral movement in a complex kill chain.</p>



<p>Based on this evaluation, you should determine the emergency to trigger a mitigation and choose the most appropriate one.</p>



<h2 class="wp-block-heading">What OVHcloud is working on:</h2>



<p>Our technical and support teams are working to ensure the risk is lowered for every of our customer impacted by the vulnerability. We mostly focus on:</p>



<ul class="wp-block-list">
<li>Informing impacted customers to ensure they take the risk into account in their operations and implement mitigation appropriately</li>



<li>Developing and integrating updates in our automation to cover the risk in a transparent way for our customers.</li>



<li>Security watch of the vulnerability exploitation in the wild to define the appropriate extra mitigations we can implement to protect our customer infrastructures</li>
</ul>



<h2 class="wp-block-heading">External references</h2>



<p><a href="https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html</a></p>



<p><a href="https://lock.cmpxchg8b.com/zenbleed.html" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://lock.cmpxchg8b.com/zenbleed.html</a></p>



<p><a href="https://www.openwall.com/lists/oss-security/2023/07/24/1" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.openwall.com/lists/oss-security/2023/07/24/1</a></p>



<p><a href="https://github.com/torvalds/linux/commit/522b1d69219d8f083173819fde04f994aa051a98" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://github.com/torvalds/linux/commit/522b1d69219d8f083173819fde04f994aa051a98</a></p>



<p><a href="https://github.com/speed47/spectre-meltdown-checker/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://github.com/speed47/spectre-meltdown-checker/</a></p>



<p><a href="https://lists.debian.org/debian-security-announce/2023/msg00151.html" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://lists.debian.org/debian-security-announce/2023/msg00151.html</a></p>



<p><a href="https://packages.debian.org/bullseye/amd64/amd64-microcode" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://packages.debian.org/bullseye/amd64/amd64-microcode</a></p>



<p><a href="https://ubuntu.com/security/CVE-2023-20593" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://ubuntu.com/security/CVE-2023-20593</a></p>



<p><a href="https://almalinux.org/fr/blog/zenbleed-patch-call-for-testing/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://almalinux.org/fr/blog/zenbleed-patch-call-for-testing/</a></p>



<p><a href="https://access.redhat.com/security/cve/cve-2023-20593" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://access.redhat.com/security/cve/cve-2023-20593</a></p>



<p><a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/amd-ucode?id=0bc3126c9cfa0b8c761483215c25382f831a7c6f" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/amd-ucode?id=0bc3126c9cfa0b8c761483215c25382f831a7c6f</a></p>



<p><a href="https://github.com/google/security-research/tree/master/pocs/cpus/zenbleed" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://github.com/google/security-research/tree/master/pocs/cpus/zenbleed</a></p>
<img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fcve-2023-20593-zenbleed%2F&amp;action_name=CVE-2023-20593%2FZenbleed&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ransomware targeting VMware ESXi </title>
		<link>https://blog.ovhcloud.com/ransomware-targeting-vmware-esxi/</link>
		
		<dc:creator><![CDATA[Julien Levrard]]></dc:creator>
		<pubDate>Fri, 03 Feb 2023 16:10:29 +0000</pubDate>
				<category><![CDATA[OVHcloud Engineering]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://blog.ovhcloud.com/?p=24513</guid>

					<description><![CDATA[A wave of attacks is currently targetting ESXi servers. No OVHcloud managed service are impacted by this attack however, since a lot of customers are using this operating system on their own servers, we provide this post as a reference in support to help them in their remediation. These attacks are detected globally. According to [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fransomware-targeting-vmware-esxi%2F&amp;action_name=Ransomware%20targeting%20VMware%20ESXi%C2%A0&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<p>A wave of attacks is currently targetting ESXi servers. No OVHcloud managed service are impacted by this attack however, since a lot of customers are using this operating system on their own servers, we provide this post as a reference in support to help them in their remediation.</p>



<p>These attacks are detected globally. According to experts from the ecosystem as well as authorities, the malware is probably using CVE-2021-21974 as compromission vector. Investigation are still ongoing to confirm those assumptions.</p>



<p>Our technical teams are working to identify the detailed characteristics of the attack all the while coordinating with our peers from other CERTs and security teams.</p>



<figure class="wp-block-image aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://blog.ovhcloud.com/wp-content/uploads/2023/02/IMG_1297-1024x547.jpg" alt="Ransomware targeting VMware ESXi " class="wp-image-24551" width="512" height="274" srcset="https://blog.ovhcloud.com/wp-content/uploads/2023/02/IMG_1297-1024x547.jpg 1024w, https://blog.ovhcloud.com/wp-content/uploads/2023/02/IMG_1297-300x160.jpg 300w, https://blog.ovhcloud.com/wp-content/uploads/2023/02/IMG_1297-768x411.jpg 768w, https://blog.ovhcloud.com/wp-content/uploads/2023/02/IMG_1297.jpg 1186w" sizes="auto, (max-width: 512px) 100vw, 512px" /></figure>



<h3 class="wp-block-heading">Update 07/02/2023</h3>



<p>We continue our investigations and to provide support to our customers.<br>We prioritize our efforts:</p>



<ul class="wp-block-list">
<li>to identify our impacted customers on our networks to provide the most accurate and appropriate information to help them to recover from the attack.</li>



<li>to identify potentially vulnerable customers to ensure they mitigate the risks appropriately as soon as possible in the case of on an other wave of similar attack.</li>
</ul>



<p>Several security researchers may have found a link between the Babuk Ransomware source code leaked in September 2021. The encryption cipher (Sosemanuk) is used in the both cases but the code structure seems to be slightly different.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="769" src="https://blog.ovhcloud.com/wp-content/uploads/2023/02/10_44_34-1024x769.jpg" alt="" class="wp-image-24610" srcset="https://blog.ovhcloud.com/wp-content/uploads/2023/02/10_44_34-1024x769.jpg 1024w, https://blog.ovhcloud.com/wp-content/uploads/2023/02/10_44_34-300x225.jpg 300w, https://blog.ovhcloud.com/wp-content/uploads/2023/02/10_44_34-768x577.jpg 768w, https://blog.ovhcloud.com/wp-content/uploads/2023/02/10_44_34.jpg 1270w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>In addition to the recovery procedure described earlier, we noted that the encryption process is only impacting a small amount of data within the file. Depending of your VM OS and file system type, you might be able to recover data with data revery tools, at least partially. Be carefull, this tools might have irreversible action on the file so, We recommend to copy the VM files on an other location to protect the data before trying any recovery operation.</p>



<p>We are referencing a list of companies that can assist you to recover your data and reconstruct your systems. The list of companies will be available at OVHcloud support.</p>



<p>We also remind to our customers acting as Data Controller that they might have legal requirements to notify autorities in case of security incident. Ensure you declared the incident to the appropriate autorities within the right timeframe.<br>You will find below the Data Protection Autorities procedures for databreach violation for mainly impacted countries and CERT websites as well. Check with your legal department or counsel to ensure you notify the right organisation according to your status.</p>



<p>For PII data controllers:</p>



<ul class="wp-block-list">
<li>France: <a href="https://www.cnil.fr/fr/notifier-une-violation-de-donnees-personnelles" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.cnil.fr/fr/notifier-une-violation-de-donnees-personnelles</a></li>



<li>Italy: <a href="https://servizi.gpdp.it/databreach/s/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://servizi.gpdp.it/databreach/s/</a></li>



<li>Belgium: <a href="https://www.autoriteprotectiondonnees.be/professionnel/actions/fuites-de-donnees-personnelles" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.autoriteprotectiondonnees.be/professionnel/actions/fuites-de-donnees-personnelles</a></li>



<li>Spain: <a href="https://www.aepd.es/es/derechos-y-deberes/cumple-tus-deberes/medidas-de-cumplimiento/brechas-de-datos-personales-notificacion" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.aepd.es/es/derechos-y-deberes/cumple-tus-deberes/medidas-de-cumplimiento/brechas-de-datos-personales-notificacion</a></li>



<li>Poland : <a href="https://uodo.gov.pl/pl/501/2278" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://uodo.gov.pl/pl/501/2278</a></li>



<li>UK: <a href="https://ico.org.uk/for-organisations/report-a-breach/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://ico.org.uk/for-organisations/report-a-breach/</a></li>



<li>Germany: <a href="https://formulare.bfdi.bund.de/lip/form/display.do?%24context=E72B6A6366642AE42118" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://formulare.bfdi.bund.de/lip/form/display.do?%24context=E72B6A6366642AE42118</a></li>



<li>Portugal: <a href="https://www.cnpd.pt/databreach/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.cnpd.pt/databreach/</a></li>



<li>Quebec: <a href="https://www.cai.gouv.qc.ca/incident-de-confidentialite-impliquant-des-renseignements-personnels/aviser-commission-et-personnes/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.cai.gouv.qc.ca/incident-de-confidentialite-impliquant-des-renseignements-personnels/aviser-commission-et-personnes/</a></li>
</ul>



<p>CERT:</p>



<ul class="wp-block-list">
<li>France: <a href="https://www.cert.ssi.gouv.fr/les-bons-reflexes-en-cas-dintrusion-sur-un-systeme-dinformation/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.cert.ssi.gouv.fr/les-bons-reflexes-en-cas-dintrusion-sur-un-systeme-dinformation/</a></li>



<li>Italy: <a href="https://cert-agid.gov.it/contatti/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://cert-agid.gov.it/contatti/</a></li>



<li>Belgium : <a href="https://www.cert.be/fr/signaler-un-incident" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.cert.be/fr/signaler-un-incident</a></li>



<li>Spain: <a href="https://www.ccn-cert.cni.es/gestion-de-incidentes/notificacion-de-incidentes.html" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.ccn-cert.cni.es/gestion-de-incidentes/notificacion-de-incidentes.html</a></li>



<li>Poland: <a href="https://incydent.cert.pl/#!/lang=en" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://incydent.cert.pl/#!/lang=en</a></li>



<li>UK: <a href="https://report.ncsc.gov.uk/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://report.ncsc.gov.uk/</a></li>



<li>Canada: <a href="https://www.cyber.gc.ca/en/incident-management" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.cyber.gc.ca/en/incident-management</a></li>



<li>Germany: <a href="https://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Cyber-Sicherheitslage/Reaktion/CERT-Bund/Kontakt/kontakt_node.html" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Cyber-Sicherheitslage/Reaktion/CERT-Bund/Kontakt/kontakt_node.html</a></li>



<li>Portugal: <a href="https://www.cncs.gov.pt/pt/certpt/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.cncs.gov.pt/pt/certpt/</a></li>
</ul>



<p><strong>Additionnal references:</strong><br><a href="https://www.bleepingcomputer.com/news/security/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.bleepingcomputer.com/news/security/</a><br><a href="https://www.bleepingcomputer.com/forums/t/782193/esxi-ransomware-help-and-support-topic-esxiargs-args-extension/massive-esxiargs-ransomware-attack-targets-vmware-esxi-servers-worldwide/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.bleepingcomputer.com/forums/t/782193/esxi-ransomware-help-and-support-topic-esxiargs-args-extension/massive-esxiargs-ransomware-attack-targets-vmware-esxi-servers-worldwide/</a><br><a href="https://blogs.vmware.com/security/2023/02/83330.html" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://blogs.vmware.com/security/2023/02/83330.html</a><br><a href="https://members.loria.fr/MMinier/static/papers/sosemanuk_08.pdf" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://members.loria.fr/MMinier/static/papers/sosemanuk_08.pdf</a></p>



<h3 class="wp-block-heading"><strong>Update on 05/02/2023</strong></h3>



<p>We continue to work on the technical analysis in coordination with authorities and security community to determine IOCs and understand how the malware is behaving after the initial compromission.</p>



<p>So far we identified the following behavior:</p>



<ul class="wp-block-list">
<li>The compromission vector is confirmed to use a OpenSLP vulnerability that might be CVE-2021-21974 (still to be confirmed). The logs actually show the user <em>dcui</em> as involved in the compromission process.</li>



<li>Encryption is using a public key deployed by the malware in /tmp/public.pem</li>



<li>The encryption process is specifically targeting virtual machines files (&#8220;<em>.vmdk&#8221;, &#8220;</em>.vmx&#8221;, &#8220;<em>.vmxf&#8221;, &#8220;</em>.vmsd&#8221;, &#8220;<em>.vmsn&#8221;, &#8220;</em>.vswp&#8221;, &#8220;<em>.vmss&#8221;, &#8220;</em>.nvram&#8221;,&#8221;*.vmem&#8221;)</li>



<li>The malware tries to shutdown virtual machines by killing the VMX process to unlock the files. This function is not systematically working as expected resulting in files remaining locked.</li>



<li>The malware creates argsfile to store arguments passed to the encrypt binary (number of MB to skip, number of MB in encryption block, file size)</li>



<li>No data exfiltration occurred.</li>
</ul>



<p>In some cases, encryption of files may partially fail, allowing to recover data. Enes Sönmez (<a href="https://twitter.com/enes_dev" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">@enes_dev</a>), a turkish security researcher has documented the procedure for recovery of VMDK files. The procedure is described on his blog (<a href="https://enes.dev/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://enes.dev/</a>). We tested this procedure as well as many security experts with success on several impacted servers. The success rate is about 2/3. Be aware that following this procedure requires strong skills on ESXi environnements. Use it at your own risk and seek the help of experts to assist.</p>



<p>In the previous version of the post, we made the assumption the attack was linked to the Nevada Ransomware which was a mistake. No material can lead us to attribute this attack to any group. Attribution is never easy and we leave security researchers to make their own conclusions.</p>



<p>ESXi OS can only be installed on bare metal servers. We launched several initiatives to identify vulnerable servers, based on our automation logs to detect ESXI installation by our customers.<br>We have limited means of action since we have no logical access to our customer servers. For identified bare metal hosts:</p>



<ul class="wp-block-list">
<li>We sent emails on Friday&#8217;s afternoon to warn customer of the risk and provide them information on to mitigate the risk</li>



<li>We blocked the OpenSLP port (427) between internet and the servers with ESXI installed. Customer can deactivate the filtering rule in their management interface if the use of port 427 is required for whatever reason.</li>
</ul>



<p>We launched scan to identify compromised hosts, by testing the presence of the web page and/or the ssh banner specifying the host has been compromised to notify impacted customers.</p>



<p>Our support team is fully mobilized to help our customers to protect their systems and to help them to recover if they are impacted by the attack.</p>



<p><strong>Additionnal references:</strong><br><a href="https://www.cert.ssi.gouv.fr/alerte/CERTFR-2023-ALE-015/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.cert.ssi.gouv.fr/alerte/CERTFR-2023-ALE-015/</a><br><a href="https://enes.dev/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://enes.dev/</a><br><a href="https://straightblast.medium.com/my-poc-walkthrough-for-cve-2021-21974-a266bcad14b9" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://straightblast.medium.com/my-poc-walkthrough-for-cve-2021-21974-a266bcad14b9</a></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading"><strong>First response action items on</strong> <strong>03/02/2023</strong></h3>



<p>The attack is primarily targetting ESXi servers in version before 7.0 U3i, apparently through the OpenSLP port (427).</p>



<p>To check your version of ESXi, please refer to your server page in your customer interface to identify wich version has been deployed on the server or to the ESXi interface on the system itself.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1024" height="677" src="https://blog.ovhcloud.com/wp-content/uploads/2023/02/Screenshot-2023-02-03-at-15.53.31-1024x677-1.png" alt="Ransomware targeting VMware ESXi " class="wp-image-24554" srcset="https://blog.ovhcloud.com/wp-content/uploads/2023/02/Screenshot-2023-02-03-at-15.53.31-1024x677-1.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2023/02/Screenshot-2023-02-03-at-15.53.31-1024x677-1-300x198.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2023/02/Screenshot-2023-02-03-at-15.53.31-1024x677-1-768x508.png 768w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>So far, we can identify the following recommendations regarding our services:</p>



<p>For Bare Metal customer using ESX-i we strongly recommend in emergency :</p>



<ul class="wp-block-list">
<li>to deactivate the OpenSLP service on the server or to restrict access to only trusted IP addresses (<a href="https://kb.vmware.com/s/article/76372" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://kb.vmware.com/s/article/76372</a>)</li>



<li>to upgrade you ESXi on the latest security patch</li>
</ul>



<p>In a second time, ensure:</p>



<ul class="wp-block-list">
<li>your data are backed up (on immutable storage?)</li>



<li>only necessary services are active and filtered with ACL to only trusted IP adresse</li>



<li>monitor your system for any abnormal behaviour.</li>
</ul>



<p>Our clients using VMware Private Cloud are not impacted. By design, the SSL gateway prevent this typology of attack by blocking the external access to this port (OpenSLP 427).&nbsp;</p>



<p>For our Public Cloud customers, there is no dependency to ESXi so no risk are identified.</p>



<p>No other product among OVHcloud&#8217;s portfolio is threatened by this ransomware campaign.</p>



<p>We will update this blog post with any information that could help to reduce the risk associated with this threat.</p>



<p><strong>Additionnal references:</strong></p>



<ul class="wp-block-list">
<li><a href="https://kb.vmware.com/s/article/76372" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external">https://kb.vmware.com/s/article/76372</a></li>



<li><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21974" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21974</a></li>
</ul>
<img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fransomware-targeting-vmware-esxi%2F&amp;action_name=Ransomware%20targeting%20VMware%20ESXi%C2%A0&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Log4shell, how to protect my cloud workloads</title>
		<link>https://blog.ovhcloud.com/log4shell-how-to-protect-my-cloud-workloads/</link>
		
		<dc:creator><![CDATA[Julien Levrard]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 14:41:27 +0000</pubDate>
				<category><![CDATA[OVHcloud Engineering]]></category>
		<category><![CDATA[Open Source]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://blog.ovhcloud.com/?p=21473</guid>

					<description><![CDATA[Update 22/12: 2 new vulnerabilities have been identify. Those vulnerabilities are also impacting the initial patchs (2.15.0 and 2.16.0): CVE-2021-45105 : Risk of Denial of Service (DOS) CVE-2021-45046 : Risk of information leak and remote code execution in some environments and local code execution in all environments Update 22/12: Updated table assessing the risks at [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Flog4shell-how-to-protect-my-cloud-workloads%2F&amp;action_name=Log4shell%2C%20how%20to%20protect%20my%20cloud%20workloads&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<div class="colored-container">

<p><em>Update 22/12: 2 new vulnerabilities have been identify. Those vulnerabilities are also impacting the initial patchs (2.15.0 and 2.16.0)</em>:</p>



<ul class="wp-block-list"><li><em><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">CVE-2021-45105</a> : Risk of Denial of Service (DOS)</em></li><li><em><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">CVE-2021-45046</a> : Risk of information leak and remote code execution in some environments and local code execution in all environments</em></li></ul>




<p><em>Update 22/12: Updated table assessing the risks at OVHcloud products</em>:</p>

</div>



<p>On December 10th, a group of security researchers published a security notice regarding a vulnerability in <a href="https://logging.apache.org/log4j/2.x/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Log4j</a>, referenced as <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-44228" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">CVE-2021-44228</a>. This vulnerability has been named &#8220;Log4Shell&#8221; since it leverages remote code execution through a log entry on a targeted system which enables the attacker to gain remote access to the system.</p>



<div class="wp-block-image"><figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" src="https://blog.ovhcloud.com/wp-content/uploads/2021/12/Capture-décran-2021-12-14-à-15.36.22-2.png" alt="" class="wp-image-21490" width="421" height="200" srcset="https://blog.ovhcloud.com/wp-content/uploads/2021/12/Capture-décran-2021-12-14-à-15.36.22-2.png 842w, https://blog.ovhcloud.com/wp-content/uploads/2021/12/Capture-décran-2021-12-14-à-15.36.22-2-300x143.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2021/12/Capture-décran-2021-12-14-à-15.36.22-2-768x365.png 768w" sizes="auto, (max-width: 421px) 100vw, 421px" /></figure></div>



<p>Log4j is an open-source project that delivers a library used in Java environments to manage logging activities. Log4j is not the default logging library of Java, but since it provides developers a set of interesting logging features accessible directly in the code, the library is widely used in production systems and embedded in a very large number of off-the-shelve software solutions. Unless you are a Java developer you might never have heard about it but it is safe to bet that we will discover within the next few months that this library is used in a lot of unsuspected places.</p>



<p>The vulnerability is linked to JNDI (Java Naming and Directory Interface). JNDI allows to implement within the logs a variable that can be used to request an external resource, accessible over the network. While it might be convenient for a lot of use cases to enrich logs with external information, this feature also allows to execute code locally with the same rights than the application calling it. The attack protocol widely observed consists in injecting a variable within the logs which includes an URI to a java object served by a LDAP server. If you control the LDAP server, you may execute arbitrary code on the target. Log4j vulnerable versions are 2.0.X to 2.14.x. </p>



<p>As of today, we observed that the vulnerability is used to deploy malware used to mine crypto-currencies. However, since the exploitation is simple, we have all reasons to believe the vulnerability is used to leverage other types of attacks. There are many realistic scenarios you should consider, including ransomware deployment, exfiltration of data or pivot to other systems.</p>



<p><em>Update 22/12: 2 new vulnerabilities have been identify. Those vulnerabilities are also impacting the initial patchs (2.15.0 and 2.16.0)</em>:</p>



<ul class="wp-block-list"><li><em><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">CVE-2021-45105</a> : Risk of Denial of Service (DOS)</em></li><li><em><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">CVE-2021-45046</a> : Risk of information leak and remote code execution in some environments and local code execution in all environments</em></li></ul>



<p><em><strong>The right versions of Log4J to use are 2.17.0 (java 8), 2.12.3 (Java 7) and 2.3.1 (Java 6). Those 3 versions are correcting the 3 vulnerabilities.</strong></em></p>



<h1 class="wp-block-heading" id="Log4jfollowup-Howtoidentifyvulnerablesystems"><strong>How to identify vulnerable systems</strong>?</h1>



<p>Identifying your vulnerable systems will be a complicated task, and you should structure your investigation approach to lower the risks in a prioritized way.</p>



<h2 class="wp-block-heading" id="Log4jfollowup-Publiclyexposedsystemscheck"><strong>Publicly exposed systems check</strong></h2>



<p>You should start immediately to investigate all systems with a public IP address. Any vulnerable systems directly exposed to internet is at high risk. Even if your application is not written in Java, it might use some Java components using Log4j. Consider every behavior that might generate a log entry in your applications. Focus first on everything that is logged pre-authentication, like HTTP requests or login form. When done, dive into the post-authentication behaviors especially on systems where you cannot trust every user.</p>



<h2 class="wp-block-heading" id="Log4jfollowup-In-housedevelopedapplicationscrawling"><strong>In-house developed applications crawling</strong></h2>



<p>When you have access to the source code, look in your code repository to identify precisely where log4j library is included in the code. By doing it you might even identify what types of logs are used and what are the attack entry points. If your organization is managing a very large number of projects in Java, it might be a good idea to look for the string <em>&#8220;</em><em>import org.apache.log4j</em><em>&#8220;</em>&nbsp; in your code repository. You will see very quickly all the applications using the library. It will help you to narrow the search in the emergency phase.</p>



<h2 class="wp-block-heading" id="Log4jfollowup-Operatingsystemslevelcheck"><strong>Operating systems level check</strong></h2>



<p>Having a vulnerable version of log4j installed on your system does not mean your server is vulnerable since it must be used by a legitimate application to trigger the vulnerability. Log4j is included in most Linux distribution package management system, so if your SysAdmins are not following a strict hardening policy and a very strict software control on systems, you might have the package installed. Checking the presence and the version of log4j on all your systems is a reasonable check to do. The library can be installed manually or can be packaged within an application, so check for any jar file including &#8220;log4j&#8221; in the file name on your systems, it may help you to measure how this library is used and identify some systems you need to closely work on.</p>



<h2 class="wp-block-heading" id="Log4jfollowup-Open-Sourceandoff-the-shelvesoftware"><strong>Open-Source and off-the-shelve software</strong></h2>



<p>Checking the security announcement pages of the software editors should be next on your list. Community and security researchers are also publishing web pages to track applications packaging a vulnerable version of Log4j. It&#8217;s neither perfect nor exhaustive but it will help you spot Log4j presence on your systems. As you may expect, the information from editors is not always sufficiently detailed to know exactly if you are at risk, but it will help you to identify some area for further investigations.</p>



<h2 class="wp-block-heading" id="Log4jfollowup-Othersystems"><strong>Other systems</strong></h2>



<p>Finally, for all the other pieces of software or devices with no active community to track the issue, you unfortunately have no easy way to determine if the systems is vulnerable. Any black box system might use a vulnerable version of Log4j without any way for you to find out. This is a scary perspective for a lot of security incidents to come.</p>



<h1 class="wp-block-heading" id="Log4jfollowup-Damagecontrolrecommendations"><strong>Damage control recommendations</strong></h1>



<p>As you may start to understand, Log4shell will be a burden for all IT people in the coming days, months, and years. It&#8217;s quite probable that some security researchers will identify new vulnerabilities of the same kind and new attack protocols soon. So, we recommend working on safety hygiene to lower the risks and you shall consider the following best practices:</p>



<ul class="wp-block-list"><li>Patch, patch, patch and re-check that you patched everything</li><li>Maintain an up-to-date inventory of all software assets</li><li>Implement a security watch to monitor new attack vectors and editor’s announcements</li><li>Segregate your systems to narrow the impacted scope in case of successful attack</li><li>Run your applications under unprivileged user accounts when possible</li><li>Block any egress connection from your servers to external untrusted resources</li><li>Avoid any unnecessary secrets and credentials on production servers</li><li>Block IP and domain names that are known to host payloads for Log4Shell attack</li><li>Implement WAF and filtering to drop all requests including attack pattern (starting with the string &#8220;jndi&#8221; is a good start)</li><li>Monitor the logs of your systems to detect any abnormal behavior and egress connections</li><li>Backup your systems and perform regular recovery tests</li></ul>



<h1 class="wp-block-heading" id="Log4jfollowup-AssessingtherisksatOVHcloud"><strong>Assessing the risks at OVHcloud</strong></h1>



<p>At OVHcloud, as soon as the vulnerability has been published, we started to launch investigations to identify vulnerable systems and started to push patch or mitigation. We have been facing 3 different cases:</p>



<ul class="wp-block-list"><li>The vulnerability is present on our customer systems under their responsibility. We have no means to detect the vulnerability since we do not access our customer systems. We invite our customers to follow the recommendations above as soon as possible.</li><li>The vulnerability is present on a production system used in support for production of the product and service we provide to customers. Those systems are our top priority and we put most of our efforts on those systems.</li><li>The vulnerability is present on internal systems, but not publicly exposed and not directly in support of our services. We prioritize the treatment of those systems taking into account their criticality and information we receive from editors.</li></ul>



<p>We continue to investigate our systems for vulnerable Log4j library. The actual status of our investigations is detailed below and will be updated if necessary.</p>



<figure class="wp-block-table is-style-regular"><table><tbody><tr><td><strong>Product</strong></td><td><strong>Investigation results</strong></td><td><em><strong>Update 22/12</strong><br><strong>CVE-2021-45105<br>CVE-2021-45046</strong></em></td><td><strong>Recommendation</strong></td><td><strong>Status</strong></td></tr><tr><td><strong>Dedicated Servers</strong></td><td>No vulnerable version of Log4j is used in support of these products.</td><td>N/A</td><td>We invite our customers to perform a deep review of their servers configurations following the above guidelines.</td><td><img loading="lazy" decoding="async" width="71" height="71" class="wp-image-21477" style="width: 30px" src="https://blog.ovhcloud.com/wp-content/uploads/2021/12/Check.png" alt=""></td></tr><tr><td><strong>Storage and Backups</strong></td><td>No vulnerable version of Log4j is used in support of these products.</td><td>N/A</td><td>N/A</td><td><img loading="lazy" decoding="async" width="71" height="71" class="wp-image-21477" style="width: 30px" src="https://blog.ovhcloud.com/wp-content/uploads/2021/12/Check.png" alt=""></td></tr><tr><td><strong>Nutanix</strong></td><td>Several Nutanix products are impacted by the vulnerability. Platform delivered by OVHcloud might be vulnerable. OVHcloud has no mean to check the platform since we do not have access to the infrastructure once delivered.<br><br>Mitigation have been implemented in collaboration with customers to restrict exposition at network level.</td><td>N/A</td><td>We recommend to our customers to follow editors recommendations on their Nutanix infrastructure (See link below)<br><br>We invite our customers to perform a deep review of their virtual machines configurations following the above guidelines.<br><br>We also recommend to limit network exposition of vulnerable services.</td><td><img loading="lazy" decoding="async" width="144" height="143" class="wp-image-21476" style="width: 30px" src="https://blog.ovhcloud.com/wp-content/uploads/2021/12/5da376f93c5227cdc85b27.png" alt="" srcset="https://blog.ovhcloud.com/wp-content/uploads/2021/12/5da376f93c5227cdc85b27.png 144w, https://blog.ovhcloud.com/wp-content/uploads/2021/12/5da376f93c5227cdc85b27-70x70.png 70w" sizes="auto, (max-width: 144px) 100vw, 144px" /></td></tr><tr><td><strong>Logs Data Platform</strong></td><td>This platform was using a vulnerable version of Log4j. All vulnerable versions have been patched.</td><td>All customers instances have been patched with 2.17.0 version of Log4J</td><td>N/A</td><td><img loading="lazy" decoding="async" width="71" height="71" class="wp-image-21477" style="width: 30px" src="https://blog.ovhcloud.com/wp-content/uploads/2021/12/Check.png" alt=""></td></tr><tr><td><strong>Hosted Private Cloud powered by VMware</strong></td><td>Several VMware products are impacted by the vulnerability. No patch is available, however VMware published workarounds for each impacted products.<br>We are deploying the workarounds over our infrastructure. Those workarounds might have impact on production systems, so we are deploying them according to our change management process.<br><br>By default, access to administration interfaces is restricted to IP addresses defined by the customer. The exposition of vulnerable systems is consequently very limited. </td><td>Workarounds for the new vulnerabilities are being deployed.</td><td>We invite our customers to perform a deep review of their virtual machines configurations following the above guidelines.<br><br>We recommend to our customers to ensure the Access Control List is limited to trusted IP addresses only.</td><td><img loading="lazy" decoding="async" width="144" height="143" class="wp-image-21476" style="width: 30px" src="https://blog.ovhcloud.com/wp-content/uploads/2021/12/5da376f93c5227cdc85b27.png" alt="" srcset="https://blog.ovhcloud.com/wp-content/uploads/2021/12/5da376f93c5227cdc85b27.png 144w, https://blog.ovhcloud.com/wp-content/uploads/2021/12/5da376f93c5227cdc85b27-70x70.png 70w" sizes="auto, (max-width: 144px) 100vw, 144px" /></td></tr><tr><td><strong>Veeam, Zerto</strong></td><td>No vulnerable version of Log4j is used in support of these products.</td><td>N/A</td><td>N/A</td><td><img loading="lazy" decoding="async" width="71" height="71" class="wp-image-21477" style="width: 30px" src="https://blog.ovhcloud.com/wp-content/uploads/2021/12/Check.png" alt=""></td></tr><tr><td><strong>Hosted Private Cloud powered by Anthos</strong></td><td>No vulnerable version of Log4j is used in support of these products.</td><td>N/A</td><td>N/A</td><td><img loading="lazy" decoding="async" width="71" height="71" class="wp-image-21477" style="width: 30px" src="https://blog.ovhcloud.com/wp-content/uploads/2021/12/Check.png" alt=""></td></tr><tr><td><strong>Public Cloud Instance, Object storage, Block storage, VPS</strong></td><td>No vulnerable version of Log4j is used in support of these products.</td><td>N/A</td><td>We invite our customers to perform a deep review of their instance’s configurations following the above guidelines.</td><td><img loading="lazy" decoding="async" width="71" height="71" class="wp-image-21477" style="width: 30px" src="https://blog.ovhcloud.com/wp-content/uploads/2021/12/Check.png" alt=""></td></tr><tr><td><strong>Containers &amp; Orchestration</strong></td><td>No vulnerable version of Log4j is used in support of these products.</td><td>N/A</td><td>We invite our customers to perform a deep review of their containers configurations following the above guidelines.</td><td><img loading="lazy" decoding="async" width="71" height="71" class="wp-image-21477" style="width: 30px" src="https://blog.ovhcloud.com/wp-content/uploads/2021/12/Check.png" alt=""></td></tr><tr><td><strong>Collaborative solutions (Exchange, Email pro, MXplan, Sharepoint)</strong></td><td>No vulnerable version of Log4j is used in support of these products.</td><td>N/A</td><td>N/A</td><td><img loading="lazy" decoding="async" width="71" height="71" class="wp-image-21477" style="width: 30px" src="https://blog.ovhcloud.com/wp-content/uploads/2021/12/Check.png" alt=""></td></tr><tr><td><strong>Cloud Databases</strong></td><td>No vulnerable version of Log4j is used in support of these products.</td><td>N/A</td><td>N/A</td><td><img loading="lazy" decoding="async" width="71" height="71" class="wp-image-21477" style="width: 30px" src="https://blog.ovhcloud.com/wp-content/uploads/2021/12/Check.png" alt=""></td></tr><tr><td><strong>Web Hosting</strong></td><td>No vulnerable version of Log4j is used in support of these products.</td><td>N/A</td><td>N/A</td><td><img loading="lazy" decoding="async" width="71" height="71" class="wp-image-21477" style="width: 30px" src="https://blog.ovhcloud.com/wp-content/uploads/2021/12/Check.png" alt=""></td></tr><tr><td><strong>Data processing</strong></td><td>This platform was using a vulnerable version of Log4j. All vulnerable versions have been patched.</td><td>All vulnerable versions have been patched with Log4J 2.17.0</td><td>N/A</td><td><img loading="lazy" decoding="async" width="71" height="71" class="wp-image-21477" style="width: 30px" src="https://blog.ovhcloud.com/wp-content/uploads/2021/12/Check.png" alt=""></td></tr><tr><td><strong>AI Training</strong></td><td>No vulnerable version of Log4j is used in support of these products.</td><td>N/A</td><td>N/A</td><td><img loading="lazy" decoding="async" width="71" height="71" class="wp-image-21477" style="width: 30px" src="https://blog.ovhcloud.com/wp-content/uploads/2021/12/Check.png" alt=""></td></tr><tr><td><strong>ML serving</strong></td><td>No vulnerable version of Log4j is used in support of these products.</td><td>N/A</td><td>N/A</td><td><img loading="lazy" decoding="async" width="71" height="71" class="wp-image-21477" style="width: 30px" src="https://blog.ovhcloud.com/wp-content/uploads/2021/12/Check.png" alt=""></td></tr><tr><td><strong>VoIP</strong></td><td>No vulnerable version of Log4j is used in support of these products.</td><td>N/A</td><td>N/A</td><td><img loading="lazy" decoding="async" width="71" height="71" class="wp-image-21477" style="width: 30px" src="https://blog.ovhcloud.com/wp-content/uploads/2021/12/Check.png" alt=""></td></tr><tr><td><strong>www.ovh.com</strong><br><strong>api.ovh.com</strong></td><td>No vulnerable version of Log4j is used in support of these management interfaces.</td><td>N/A</td><td>N/A</td><td><img loading="lazy" decoding="async" width="71" height="71" class="wp-image-21477" style="width: 30px" src="https://blog.ovhcloud.com/wp-content/uploads/2021/12/Check.png" alt=""></td></tr><tr><td><strong>OVHcloud Internal systems</strong></td><td>We continue to investigate to identify any use of the vulnerable Log4j library versions and applicable mitigations. Vulnerable systems identified so far have been patched when the patch is available or mitigation is being deployed. A deep review of all software assets is being performed to ensure the vulnerable library is not embedded in the software solutions we use to operate our information system.</td><td>Action plan includes the new vulnerabilities.<br><br>Mitigation implementation are still being deployed as editors are providing patches.</td><td>N/A</td><td><img loading="lazy" decoding="async" width="144" height="143" class="wp-image-21476" style="width: 30px" src="https://blog.ovhcloud.com/wp-content/uploads/2021/12/5da376f93c5227cdc85b27.png" alt="" srcset="https://blog.ovhcloud.com/wp-content/uploads/2021/12/5da376f93c5227cdc85b27.png 144w, https://blog.ovhcloud.com/wp-content/uploads/2021/12/5da376f93c5227cdc85b27-70x70.png 70w" sizes="auto, (max-width: 144px) 100vw, 144px" /></td></tr></tbody></table></figure>



<h1 class="wp-block-heading">External references</h1>



<ul class="wp-block-list"><li><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-44228" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-44228</a></li></ul>



<ul class="wp-block-list"><li><a href="https://logging.apache.org/log4j/2.x/index.html" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://logging.apache.org/log4j/2.x/index.html</a></li></ul>



<ul class="wp-block-list"><li><a href="https://greenlock.ghost.io/log4j-ou-log4shell-la-javapocalypse-cve-2021-44228" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://greenlock.ghost.io/log4j-ou-log4shell-la-javapocalypse-cve-2021-44228</a></li></ul>



<ul class="wp-block-list"><li><a href="https://www.vmware.com/security/advisories/VMSA-2021-0028.html" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.vmware.com/security/advisories/VMSA-2021-0028.html</a></li></ul>



<ul class="wp-block-list"><li><a href="https://hosted-private-cloud.status-ovhcloud.com/incidents/y6x1h3bls5rb" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://hosted-private-cloud.status-ovhcloud.com/incidents/y6x1h3bls5rb</a></li></ul>



<ul class="wp-block-list"><li><a href="https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592</a></li></ul>



<ul class="wp-block-list"><li><a href="https://download.nutanix.com/alerts/Security_Advisory_0023.pdf" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://download.nutanix.com/alerts/Security_Advisory_0023.pdf</a></li></ul>



<ul class="wp-block-list"><li><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105</a></li></ul>



<ul class="wp-block-list"><li><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046</a></li></ul>



<p></p>
<img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Flog4shell-how-to-protect-my-cloud-workloads%2F&amp;action_name=Log4shell%2C%20how%20to%20protect%20my%20cloud%20workloads&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Log4j vulnerability (CVE-2021-44228)</title>
		<link>https://blog.ovhcloud.com/log4j-vulnerability-cve-2021-44228/</link>
		
		<dc:creator><![CDATA[Julien Levrard]]></dc:creator>
		<pubDate>Mon, 13 Dec 2021 17:14:30 +0000</pubDate>
				<category><![CDATA[Accelerating with OVHcloud]]></category>
		<category><![CDATA[Open Source]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://blog.ovhcloud.com/?p=21452</guid>

					<description><![CDATA[On December 10th, a group of security researchers published a security notice regarding a vulnerability in Log4j. Log4j is a library commonly used in Java environment to manage logging. Log4j versions 2.0 to 2.14.1 are affected by a vulnerability that may lead to remote code execution (RCE). Older versions of Log4j (1.X) might also be [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Flog4j-vulnerability-cve-2021-44228%2F&amp;action_name=Log4j%20vulnerability%20%28CVE-2021-44228%29&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<p>On December 10th, a group of security researchers published a security notice regarding a vulnerability in Log4j. Log4j is a library commonly used in Java environment to manage logging.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://blog.ovhcloud.com/wp-content/uploads/2021/12/IMG_0716-1024x537.jpeg" alt="Log4j Vulnerability" class="wp-image-21468" width="512" height="269" srcset="https://blog.ovhcloud.com/wp-content/uploads/2021/12/IMG_0716-1024x537.jpeg 1024w, https://blog.ovhcloud.com/wp-content/uploads/2021/12/IMG_0716-300x157.jpeg 300w, https://blog.ovhcloud.com/wp-content/uploads/2021/12/IMG_0716-768x403.jpeg 768w, https://blog.ovhcloud.com/wp-content/uploads/2021/12/IMG_0716.jpeg 1200w" sizes="auto, (max-width: 512px) 100vw, 512px" /></figure></div>



<p>Log4j versions 2.0 to 2.14.1 are affected by a vulnerability that may lead to remote code execution (RCE). Older versions of Log4j (1.X) might also be vulnerable if the configuration explicitly loads JDNI components, which is not the standard behavior. Please also note that a lot of softwares available on the market are using Log4j.</p>



<p>This vulnerability is actively exploited. Several softwares to exploit this vulnerability are available publicly and easy to use.</p>



<h3 class="wp-block-heading">How to mitigate</h3>



<ul class="wp-block-list"><li>Patch and deploy Log4j 2.15.0 version as soon as possible when you manage the software stack</li><li>For all applications you use, check editor websites for security announcements and mitigation options</li><li>Restrict software exposure to limit the risk of attack</li><li>Filter egress network flows to limit exploit capability to access other resources</li></ul>



<h3 class="wp-block-heading">References:</h3>



<ul class="wp-block-list"><li>Mitre security announcement: <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228</a></li><li>ANSSI security announcement: <a href="https://www.cert.ssi.gouv.fr/alerte/CERTFR-2021-ALE-022/" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external">https://www.cert.ssi.gouv.fr/alerte/CERTFR-2021-ALE-022/</a></li><li><a href="https://logging.apache.org/log4j/2.x/security.html" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external">https://logging.apache.org/log4j/2.x/security.html</a></li><li><a href="https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external">https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592</a></li></ul>
<img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Flog4j-vulnerability-cve-2021-44228%2F&amp;action_name=Log4j%20vulnerability%20%28CVE-2021-44228%29&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Microsoft Exchange Server Vulnerabilities</title>
		<link>https://blog.ovhcloud.com/microsoft-exchange-server-vulnerabilities/</link>
		
		<dc:creator><![CDATA[Julien Levrard]]></dc:creator>
		<pubDate>Thu, 04 Mar 2021 10:34:35 +0000</pubDate>
				<category><![CDATA[Accelerating with OVHcloud]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.ovh.com/blog/?p=20721</guid>

					<description><![CDATA[On March 2nd, Microsoft published a security patch for 4 vulnerabilities on Microsoft Exchange Server. Security researchers detected that those vulnerabilities are actively exploited for targeted attacks. The vulnerable version are: Microsoft Exchange Server 2010 Microsoft Exchange Server 2013 Microsoft Exchange Server 2016 Microsoft Exchange Server 2019 All OVHcloud Exchange managed services have been patched [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fmicrosoft-exchange-server-vulnerabilities%2F&amp;action_name=Microsoft%20Exchange%20Server%20Vulnerabilities&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.ovh.com/blog/wp-content/uploads/2021/03/IMG_0505-1024x537.png" alt="Microsoft Exchange Server Vulnerabilities" class="wp-image-20733" width="768" height="403" srcset="https://blog.ovhcloud.com/wp-content/uploads/2021/03/IMG_0505-1024x537.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2021/03/IMG_0505-300x157.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2021/03/IMG_0505-768x403.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2021/03/IMG_0505.png 1200w" sizes="auto, (max-width: 768px) 100vw, 768px" /></figure></div>



<p>On March 2<sup>nd</sup>, Microsoft published a security patch for 4 vulnerabilities on Microsoft Exchange Server. Security researchers detected that those vulnerabilities are actively exploited for targeted attacks.</p>



<div class="wp-block-image"><figure class="alignright size-large"><img loading="lazy" decoding="async" width="217" height="212" src="https://www.ovh.com/blog/wp-content/uploads/2021/03/IMG_0506.png" alt="Microsoft Exchange" class="wp-image-20735"/></figure></div>



<p>The vulnerable version are:</p>



<ul class="wp-block-list"><li>Microsoft Exchange Server 2010</li><li>Microsoft Exchange Server 2013</li><li>Microsoft Exchange Server 2016</li><li>Microsoft Exchange Server 2019</li></ul>



<p>All OVHcloud Exchange managed services have been patched in emergency by Wednesday end of day. <em>Exchange Web Service</em> and<em> Exchange Control Panel</em> were temporarily deactivated between the vulnerability disclosure and the end of patching operations, as Veloxcity researchers described in their blog that the RCE was triggered using Exchange Web Service.</p>



<p>OVHcloud recommend to all customers operating Exchange servers on their own to patch those systems urgently.</p>



<p>References:</p>



<ul class="wp-block-list"><li><a href="https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external">https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/</a></li><li><a href="https://www.cert.ssi.gouv.fr/alerte/CERTFR-2021-ALE-004/" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external">https://www.cert.ssi.gouv.fr/alerte/CERTFR-2021-ALE-004/</a></li><li><a href="http://travaux.ovh.net/?do=details&amp;id=49352" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external">http://travaux.ovh.net/?do=details&amp;id=49352</a></li></ul>



<p class="has-text-align-left"></p>
<img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fmicrosoft-exchange-server-vulnerabilities%2F&amp;action_name=Microsoft%20Exchange%20Server%20Vulnerabilities&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Private Cloud en cours de qualification SecNumCloud</title>
		<link>https://blog.ovhcloud.com/private-cloud-en-cours-de-qualification-secnumcloud/</link>
		
		<dc:creator><![CDATA[Julien Levrard]]></dc:creator>
		<pubDate>Fri, 05 Jul 2019 15:01:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Certification]]></category>
		<category><![CDATA[Private Cloud]]></category>
		<guid isPermaLink="false">https://blog.ovhcloud.com/?p=22144</guid>

					<description><![CDATA[OVH est officiellement en cours de qualification pour son offre Private Cloud. Cette première étape formelle dans le projet de qualification est l’occasion de faire un point sur le dispositif mis en place pour aligner son offre avec les exigences élevées du référentiel SecNumCloud dans l’objectif de fournir un cloud de confiance reconnu comme tel [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fprivate-cloud-en-cours-de-qualification-secnumcloud%2F&amp;action_name=Private%20Cloud%20en%20cours%20de%20qualification%20SecNumCloud&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>OVH est officiellement en cours de qualification pour son offre Private Cloud. Cette première étape formelle dans le projet de qualification est l’occasion de faire un point sur le dispositif mis en place pour aligner son offre avec les exigences élevées du référentiel SecNumCloud dans l’objectif de fournir un cloud de confiance reconnu comme tel par l’ANSSI.</p></blockquote>



<p>La confiance de nos clients et des clients de nos clients est au cœur de nos préoccupations. L’expertise technique et le professionnalisme de nos équipes sont la base d’une sécurité pragmatique et efficace. C’est sur celle-ci que nous construisons, chaque jour, la confiance du marché dans nos produits, solutions et services.</p>



<p>Cependant, cette confiance ne suffit pas. Les mesures mises en œuvre doivent être transparentes et produire des résultats mesurables et démontrables. Elles doivent s’adapter à l’évolution des menaces et être comparables entre les fournisseurs. Dans cet objectif, nous avons lancé il y a sept ans des démarches de certification de nos produits et services selon les normes de sécurité les plus exigeantes.<a href="https://www.ovh.com/fr/private-cloud/documentation/certifications.xml" target="_blank" rel="noreferrer noopener" data-wpel-link="exclude">&nbsp;ISO 27001, ISO 27017, ISO 27018, SOC 1, SOC 2, PCI DSS, HDS</a>&nbsp;font désormais partie intégrante des feuilles de route de nos produits cloud et de nos datacenters. Au sein des équipes OVH, plus de 50 personnes sont dédiées à la gouvernance de la sécurité, à la mise en place et au maintien des dispositifs techniques logiques et physiques, à l’amélioration des systèmes et à la veille réglementaire en sécurité.</p>



<p>Aujourd’hui, dans un jeu économique à l’échelle mondiale, la souveraineté numérique est un enjeu politique critique comme le souligne le&nbsp;<a href="https://www.gazette-du-palais.fr/wp-content/uploads/2019/06/Rapport-Gauvain-190626-vdef.pdf" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external">rapport Gauvain</a>&nbsp;remis le 26 juin au Premier Ministre. Les régulateurs et les administrations des différents pays multiplient les dispositifs incitatifs ou contraignants. Ceux-ci visent à conserver une maîtrise sur la protection des données des citoyens et des entreprises, dans leur migration vers les clouds mondiaux.</p>



<p>Dans ce contexte, l’<a href="https://www.ssi.gouv.fr/" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external">ANSSI</a>&nbsp;a publié en 2017&nbsp;<a href="https://www.ssi.gouv.fr/actualite/secnumcloud-la-nouvelle-reference-pour-les-prestataires-dinformatique-en-nuage-de-confiance/" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external">le référentiel SecNumCloud</a>&nbsp;et une procédure de qualification pour les «&nbsp;prestataires de service d’informatique en nuage&nbsp;», sur le modèle de ceux existants pour les prestataires de service de confiance (certification électronique, détection d’incident, horodatage, audit de sécurité, etc.). Son objectif est d’orienter les autorités administratives, les organismes d’importance vitale (OIV) et tous les acteurs économiques français et européens vers des prestataires cloud de confiance.</p>



<p>Le référentiel SecNumCloud, issu du «&nbsp;<a href="https://www.silicon.fr/10-actions-plan-cloud-francais-94830.html/" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external">Plan Cloud</a>&nbsp;», l’un des 34 plans du&nbsp;<a href="https://www.economie.gouv.fr/files/files/PDF/nouvelle-france-industrielle-sept-2014.pdf" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external">programme «&nbsp;Nouvelle France industrielle&nbsp;»</a>&nbsp;de 2014, et d’un dialogue avec les industriels, est aligné sur la norme ISO 27001. Il précise les mesures de sécurité à opérer pour livrer un service cloud hautement sécurisé pour les traitements critiques. Le service&nbsp;<a href="https://www.ovh.com/fr/private-cloud/" target="_blank" rel="noreferrer noopener" data-wpel-link="exclude">Private Cloud</a>&nbsp;d’OVH visant également cet objectif, l’alignement de nos pratiques avec le référentiel a donc été pris en compte dès la parution des premières versions de travail.</p>



<p>Le référentiel d’exigence a été mis à jour en juin 2018. Dans la nouvelle version, les niveaux « Essentiel » et « Avancé » ont été supprimés pour ne laisser qu’un seul niveau de qualification. Par ailleurs, des exigences relatives à la protection de la vie privée ont été ajoutées afin de prendre en compte le Règlement General de Protection des Données (RGPD) applicable depuis le 25 mai 2018.<br>Le référentiel SecNumCloud définit un ensemble complet de pratiques exigeantes visant à assurer un hébergement cloud sécurisé, résilient, protecteur de la confidentialité des données et protégé contre les dispositifs légaux extraterritoriaux pesant sur les services de cloud américains.</p>



<p>La qualification s’impose progressivement sur le marché. A ce jour, seul un fournisseur de solution SaaS a été au bout de la démarche et décroché la qualification. Mais certains décideurs français et européens intègrent déjà le référentiel dans leurs grilles d’évaluation des services externalisés et notamment pour les services d’Infrastructure as a Service. OVH étant officiellement en cours de qualification, il nous semble important d’expliciter les mesures que nous avons mises en place sur notre offre Private Cloud ainsi que celles en cours de mise en place sur la plateforme dédiée SecNumCloud visant à assurer un niveau de sécurité cohérent avec les exigences du référentiel. Cette auto-évaluation issue des démarche de cadrage du projet de qualification n’a pas vocation à se substituer aux conclusions de l’audit de l’organisme d’évaluation ni à l’évaluation de l’ANSSI. Elle vise toutefois à apporter un premier niveau d’assurance et de transparence à destination de nos clients sur l’utilisation de l’offre Private Cloud pour l’hébergement de projets dans un cloud de confiance.</p>



<p>L’évaluation suit le plan du référentiel SecNumCloud disponible sur le site de l’ANSSI&nbsp;:&nbsp;<a href="https://www.ssi.gouv.fr/uploads/2014/12/secnumcloud_referentiel_v3.1_anssi.pdf" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer"></a><a href="https://www.ssi.gouv.fr/uploads/2014/12/secnumcloud_referentiel_v3.1_anssi.pdf" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.ssi.gouv.fr/uploads/2014/12/secnumcloud_referentiel_v3.1_anssi.pdf</a></p>



<h3 class="wp-block-heading" id="politiques-de-securite-de-l-information-et-gestion-du-risque">Politiques de sécurité de l’information et gestion du risque</h3>



<p>OVH dispose depuis 2014 d’une&nbsp;politique de sécurité des systèmes d’information (PSSI), applicable à l’ensemble du groupe. Pour les offres disposant d’un niveau de sécurité renforcé, comme Private Cloud, nous complétons cette politique générale par une politique de sécurité produit. Celle-ci définit les règles et principes de sécurité mis en œuvre pour aligner le niveau de sécurité avec les engagements de sécurité spécifiques à l’offre et aux cas d’usage de nos clients.</p>



<p>Tous les thèmes liés à la sécurité sont précisés dans le contexte du produit. Ce document est la référence pour tous les personnels impliqués dans l’exploitation de l’offre Private Cloud, dans le cadre des opérations quotidiennes et dès qu’une décision pouvant avoir un impact sur la sécurité doit être prise.</p>



<p>Dans cette PSSI, OVH matérialise également son engagement à respecter les réglementations applicables et à déployer une approche par les risques, en s’appuyant sur des méthodologies éprouvées comme ISO 27005 et EBIOS. Le comité des risques est consulté pour tout changement important sur le produit et s’assure de la mise en place des plans d’actions.</p>



<p>La politique de sécurité et les appréciations des risques sont mises à jour régulièrement. Lors de tout changement important dans le cadre de processus formels, le suivi implique des membres de la direction d’OVH.</p>



<h3 class="wp-block-heading" id="organisation-de-la-securite">Organisation de la sécurité</h3>



<p>OVH a nommé un responsable de la sécurité des systèmes d’information (RSSI), garant du respect de la PSSI. Ce rôle global pour le groupe OVH est complété par un responsable dédié à l’offre Private Cloud et des personnels affectés aux processus de gestion de la sécurité (gestion des risques, gestion des mesures de sécurité, gestion des incidents, amélioration continue, etc.). Chaque ensemble de mesures de sécurité est sous la responsabilité d’un référent au sein de l’équipe Private Cloud, en charge de la mise en place des plans d’actions, de la documentation et des indicateurs de suivis. Ces référents assurent la prise en compte des principes de sécurité dans les projets et la gestion des changements, ainsi que dans toutes les activités quotidiennes de production de l’offre Private Cloud.</p>



<p>Au sein du périmètre Private Cloud, nous avons mis en œuvre une politique de séparation des tâches formelles. Elle permet de limiter les risques d’erreur ou de malveillance, en systématisant l’utilisation de&nbsp;<em>workflows</em>&nbsp;avec plusieurs validateurs pour toutes les actions risquées en matière de sécurité.</p>



<p>La sécurité est aussi prise en compte dans la gestion des projets d’évolution de l’offre et de tous les services d’OVH sous-jacents. Une approche par les risques intégrée au processus de gestion des risques du système de management de la sécurité de l’information (SMSI) est mise en place. Toute évolution du service ayant un impact potentiel sur le niveau de sécurité est mise en œuvre en suivant un processus d’information des clients systématique.</p>



<h3 class="wp-block-heading" id="securite-des-ressources-humaines">Sécurité des ressources humaines</h3>



<p>La gestion des équipes est également réalisée en prenant en compte la sécurité de l’offre. Nous mettons en œuvre des processus de sélection poussés et de vérification des antécédents pour les personnels ayant des accès aux systèmes en charge de gérer les infrastructures ou disposant d’accès physiques aux équipements, permettant de limiter les risques de malveillance interne. Les salariés sont sensibilisés et responsabilisés dès l’embauche aux problématiques de sécurité. Une politique de formation et de sensibilisation renforcée pour les personnels en charges de Private Cloud complète ces dispositifs, par des actions de formation et de sensibilisation adaptées aux risques et aux métiers de chaque collaborateur. À titre d’exemple, tous les développeurs sont formés au développement sécurisé.</p>



<p>Les collaborateurs signent une charte de bonnes pratiques adaptée à leur poste et des sanctions formelles sont prévues pour tout manquement aux règles définies.</p>



<h3 class="wp-block-heading" id="gestion-des-actifs">Gestion des actifs</h3>



<p>Nous avons mis en place un inventaire complet de tous les actifs permettant de produire Private Cloud : serveurs, applications, postes de travail, logiciels, équipements réseau, énergie, système de refroidissement, conteneur, espace isolé, personnels, documents. Tout le périmètre est inventorié et géré de manière fine. Des procédures d’entrée et de sortie permettent d’assurer un inventaire exhaustif, condition&nbsp;<em>sine qua non</em>&nbsp;d’une gestion précise de la sécurité. C’est aussi l’assurance que chaque actif est maîtrisé dans l’ensemble de son cycle de vie.</p>



<p>La sensibilité des actifs est définie formellement selon une classification priorisant la protection des données de nos clients.</p>



<h3 class="wp-block-heading" id="controle-d-acces-et-gestion-des-identites">Contrôle d’accès et gestion des identités</h3>



<p>La plupart des accès et interventions sur les systèmes de production sont réalisés par des scripts et des procédures applicatives, déclenchés depuis des applications internes gérant l’authentification ainsi que celle des personnels. Pour l’administration des systèmes de gestion du service ou des plateformes mises à disposition des clients, les accès sont systématiquement réalisés via des bastions gérant l’identification, l’authentification et la traçabilité de toutes les actions. Les bastions sont gérés par une équipe indépendante, afin de garantir la confidentialité et l’intégrité des traces. Les accès aux fonctions sensibles utilisent des authentifications à deux facteurs et ne peuvent être réalisés que depuis des postes de travail dédiés « durcis ».</p>



<p>Des processus formels de création, de modification et de suppression des comptes utilisateur sont mis en place, sur la base d’une base d’authentification centralisée. Les droits d’accès, basés sur la notion de rôles définis sur la base des fonctions des salariés, sont revus régulièrement pour s’assurer de leur adéquation aux besoins fonctionnels et techniques.</p>



<p>Concernant les accès des clients, ils sont gérés par des outils automatisés mis à leur disposition (espace client OVH, api.ovh.com, interface sécurisée). Le client peut activer des fonctions de sécurité complémentaires, comme l’authentification à plusieurs facteurs, des ACL réseau, la validation des actions sensibles par jeton SMS, etc. Il est responsable des droits d’accès attribués à ses utilisateurs, OVH garantissant la fiabilité des processus mis en place pour gérer les droits d’accès techniques des clients aux plateformes.</p>



<p>Si les environnements techniques mis à disposition des clients sont dédiés au niveau matériel (serveurs hôtes et datastores), de nombreuses briques mutualisées sont utilisées pour mettre en œuvre le service. Les robots, les équipements réseau, l’API, les serveurs de stockage des datastores et les serveurs de coordination sont des équipements mutualisés entre plusieurs clients. La segmentation entre les différents clients est gérée par la combinaison de l’utilisation de matériels dédiés et de configuration logique des équipements mutualisés, afin d’assurer l’étanchéité complète des environnements client les uns par rapport aux autres.</p>



<p>Les environnements bureautiques, les environnements techniques d’administration du service et les environnements d’exécution des infrastructures client sont fortement segmentés, physiquement ou logiquement. Les mécanismes de segmentation font l’objet de mesures de contrôle strictes.</p>



<h3 class="wp-block-heading" id="cryptologie-chiffrement">Cryptologie/chiffrement</h3>



<p>Par défaut, le stockage des données est protégé via une segmentation logique entre les clients par des ACL et des droits d’accès sur les systèmes, ainsi que par l’utilisation de médias de stockage dédiés. Le chiffrement du stockage est une fonctionnalité proposée par OVH. Elle permet la mise en place d’un mécanisme de chiffrement/déchiffrement des machines virtuelles au niveau des hyperviseurs, qui assure la protection des données client. L’activation et la configuration de ces mécanismes et la gestion des clés de chiffrement est sous la responsabilité du client mais la configuration des infrastructures pour utiliser ces fonctionnalités est réalisée par OVH.</p>



<p>L’utilisation de protocoles de communication réseau chiffrés (SSH, HTTPS, SFTP, etc.) est systématique au sein des infrastructures. Toute exception à ce principe doit être justifiée par une contrainte technique forte et donner lieu à une analyse de risque formelle, ainsi qu’à la mise en place de mesures de sécurité compensatoires permettant d’assurer un niveau de sécurité équivalent.</p>



<h3 class="wp-block-heading" id="securite-physique-et-environnementale">Sécurité physique et environnementale</h3>



<p>L’accès physique des sites OVH repose sur une sécurité périmétrique restrictive dès l’entrée. Tous les locaux sont classifiés : les zones de circulation privées, les bureaux internes accessibles à tous les employés et visiteurs enregistrés, les bureaux internes confidentiels qui ont une politique d’accès restreinte à certains personnels, les zones d’équipement de datacenters, les zones datacenters confidentielles et les zones datacenters critiques qui hébergent notamment les infrastructures de l’offre Private Cloud.</p>



<p>Les accès à ces zones critiques sont limités à une liste de personnels réduite, avec une traçabilité renforcée et une couverture de vidéosurveillance complète. Ils sont réalisés par des sas unipersonnels, incluant plusieurs contrôles (détecteur de présence, pesée, vidéosurveillance). Un contrôle d’accès à deux facteurs pour les salles d’hébergement critiques est en cours de mise en place pour assurer la conformité au référentiel sur les zones d’hébergement destiné aux environnements SecNumCloud. Ces mécanismes seront étendus progressivement à tous les datacentres OVH.</p>



<p>Des mesures de sécurité sont aussi mises en œuvre afin de contrôler l’accès et éliminer toute menace, comme une politique des droits d’accès physiques, des murs ou dispositifs équivalents entre chaque zone, des caméras situées aux entrées/sorties des installations et dans les salles serveurs, des accès sécurisés contrôlés par badgeuses ou un système de détection de mouvement.</p>



<p>Les entrées/sorties des datacenters sont protégées par des dispositifs anti-effraction. Des mécanismes de détection d’intrusion en dehors des heures de présence du personnel et un gardiennage 24/7/365 sont aussi mis en place sur tous les sites d’hébergement. Les locaux sont surveillés en permanence par un réseau dense de caméras de vidéosurveillance.</p>



<p>Les ouvertures de portes d’entrée et de sortie sont contrôlées et signalées à un centre de surveillance continu.</p>



<p>Des règles spécifiques sont appliquées pour la gestion des accès des tiers.</p>



<p>En matière de gestion des risques naturels et environnementaux, les mesures suivantes sont mises en place :</p>



<ul class="wp-block-list"><li>situation géographique des locaux d’OVH dans des zones non inondables ;</li><li>situation géographique des locaux d’OVH dans des zones sans risques sismiques ;</li><li>alimentation sans interruption ;</li><li>transformateur de secours avec basculement automatique de la charge ;</li><li>basculement automatique sur des groupes électrogènes avec autonomie de 24 heures minimum ;</li><li>batteries permettant de gérer les périodes transitoires ;</li><li>unités HVAC de maintien de la température et du niveau d’humidité ;</li><li>système de détection d’incendie ; des exercices anti-incendie sont réalisés tous les six mois&nbsp;dans les datacenters.</li></ul>



<h3 class="wp-block-heading" id="securite-liee-a-l-exploitation">Sécurité liée à l’exploitation</h3>



<p>L’administration des plateformes Private Cloud est massivement automatisée. Les équipes d’exploitation n’interagissent directement avec les plateformes qu’en cas de gestion d’incident. Certaines procédures impliquent cependant des actions humaines et ne sont pas toujours automatisables. Elles sont formalisées et suivie de manière obligatoire par les personnels concernés.</p>



<p>Un processus de gestion des changements est mis en place. Il s’assure que toute évolution du système est cohérente, fait l’objet d’une analyse de risque et d’impact, est implémentée en respectant des règles prédéfinies et suit le processus de validation avant la mise en production.</p>



<p>Tous les systèmes exposés aux menaces virales sont protégés par des antivirus monitorés par les équipes d’exploitation. Différents types d’antivirus sont utilisés en fonction du rôle de l’équipement. Des dispositifs de contrôles d’intégrité ainsi que des systèmes de détection d’intrusion sont déployés sur les systèmes. Ces derniers sont monitorés en permanence par les équipes d’exploitation.</p>



<p>Tous les systèmes utilisés pour produire le service sont sauvegardés selon un planning adapté (type de sauvegarde et durée de rétention). La sauvegarde des environnements client est, elle, sous la responsabilité du client. OVH propose des solutions optionnelles lui permettant de déployer sa politique de sauvegarde. Le client est cependant libre d’utiliser les outils de sauvegarde de son choix.</p>



<p>Une politique de traçabilité extensive est mise en œuvre. Tous les équipements et systèmes génèrent des traces centralisées et gérées par les équipes d’exploitation. Les logs sont protégés par la mise en place d’une stricte séparation des tâches. Les logs des actions des clients et des interventions des équipes OVH sur leurs systèmes sont mis à la disposition des clients via l’interface d’administration de la plateforme.</p>



<p>La corrélation des événements et la détection des événements sont gérées par les plateformes d’administration développées en interne par OVH.</p>



<p>Un processus de gestion des vulnérabilités formel vise à s’assurer de l’application des correctifs de sécurité pour toutes les vulnérabilités critiques. Un planning d’application des correctifs est géré selon leur importance. En fonction des cas, ils sont appliqués durant des phases de maintenance planifiées ou en urgence pour les failles les plus critiques.</p>



<p>Les administrateurs des équipes d’exploitation utilisent des postes de travail dédiés, distincts des postes de travail bureautique. Ils sont contraints de se connecter à un réseau de gestion sécurisé via une passerelle VPN, permettant ensuite d’accéder aux bastions d’administration intégrant des mécanismes d’authentification à deux facteurs. Ces postes de productions sont durcis et protégés par des mécanismes de sécurité stricts (antivirus, chiffrement, filtrage réseau, etc.) et gérés par une équipe indépendante. Les administrateurs ne disposent pas de droits d’administration sur leurs postes de travail. Tous les flux d’administration sont chiffrés.</p>



<h3 class="wp-block-heading" id="securite-des-communications">Sécurité des communications</h3>



<p>Une cartographie du système d’information de Private Cloud est maintenue. Elle regroupe l’inventaire des actifs, ainsi que des schémas d’architecture fonctionnelle, applicative et réseau de tous les systèmes mis en place.</p>



<p>L’ensemble des flux réseau et des mécanismes de segmentation sont cartographiés et maintenus à jour automatiquement par rapport à l’existant. Toutes les règles d’ouverture de flux réseau sont documentées, justifiées et revues régulièrement.</p>



<p>La segmentation des réseaux est gérée par la combinaison de réseaux dédiés physiques et virtuels. La configuration des équipements chargés d’assurer cette segmentation est revue régulièrement. Le client est responsable de la configuration du réseau de son infrastructure virtuelle et de la connectivité de ses machines virtuelles à Internet, en adressage public ou au sein du vRack (réseau virtuel privé alloué au client). OVH fournit les interfaces d’administration de ces réseaux.</p>



<h3 class="wp-block-heading" id="acquisition-developpement-et-maintenance-des-systemes-d-information">Acquisition, développement et maintenance des systèmes d’information&nbsp;</h3>



<p>Une politique de développement sécurisée est mise en œuvre au sein d’une plateforme de développement maîtrisée. Le cycle de vie des développements intègre la sécurité à toutes les étapes. Des règles d’écriture des codes sources sont définies et des processus de revue, de validation et de mise en production sont appliqués, avec des principes de séparation des tâches forts.</p>



<p>L’utilisation de données de production client est strictement interdite dans les activités de développement et de test. Le déploiement des évolutions logicielles sur les infrastructures de production suit le principe «&nbsp;1-10-100-1 000&nbsp;», permettant d’assurer un déploiement maîtrisé et incluant des procédures de retour arrière à chaque étape.</p>



<p>Les développements de la plateforme sont exclusivement réalisés en interne. OVH ne recourt pas à l’externalisation pour le développement des produits.</p>



<h3 class="wp-block-heading" id="relations-avec-les-tiers">Relations avec les tiers</h3>



<p>OVH recourt à des sociétés tierces pour les activités de gardiennage des datacenters, ainsi que pour la maintenance des équipements assurant les services essentiels en datacenter comme l’électricité et le froid. Les sous-traitants sont soumis aux mêmes règles que les salariés OVH. Elles sont imposées contractuellement à ces sociétés, ainsi qu’à chaque intervenant individuellement. Leur respect est contrôlé de façon opérationnelle et lors d’audits annuels.</p>



<h3 class="wp-block-heading" id="gestion-des-incidents-lies-a-la-securite-de-l-information">Gestion des incidents liés à la sécurité de l’information</h3>



<p>Un processus de détection des incidents de sécurité est mis en place pour s’assurer de la remontée de l’ensemble des événements sur toutes les briques du système. Les personnels sont sensibilisés et formés à la détection des anomalies. Un processus de remontée et de traitement des alertes est également mis en œuvre.</p>



<p>Toute atteinte à la disponibilité du service, à l’intégrité et à la confidentialité des données client ou à la traçabilité des actions sur les systèmes entraîne obligatoirement la création d’un incident de sécurité. La communication des incidents de sécurité dans les meilleurs délais est assurée dans le cadre du processus de gestion des incidents.</p>



<p>Une cellule de crise est mise en place pour les incidents ayant des conséquences importantes en matière de disponibilité ou d’intégrité, ainsi que pour tous ceux affectant la confidentialité des données client.</p>



<p>Le processus de gestion des incidents est formel. Il donne lieu à des plans d’actions de correction des causes racines et alimente le processus de gestion des risques de sécurité.</p>



<h3 class="wp-block-heading" id="continuite-d-activite">Continuité d’activité</h3>



<p>La continuité d’activité des infrastructures est assurée par différents dispositifs garantissant la disponibilité des équipements, des applications et des processus d’exploitation : la continuité du refroidissement, la continuité de l’approvisionnement en électricité et sa redondance, la gestion de la capacité pour les équipements sous la responsabilité d’OVH, le support technique du service réparti sur plusieurs sites géographiques, la redondance des équipements et serveurs utilisés pour l’administration des systèmes et la gestion du service.</p>



<p>En complément, des mécanismes visant à assurer la reprise en cas d’incident sont mis en place : la sauvegarde des configurations des équipements réseau, la sauvegarde des systèmes et des données des serveurs chargés du management du service.</p>



<p>La continuité du système d’information du client s’appuyant sur des ressources OVH est de sa responsabilité et s’appuie sur les mécanismes proposés par OVH dans le cadre du service. Le client doit s’assurer que les dispositifs standards mis en place par OVH, les options souscrites et les dispositifs complémentaires qu’il met en œuvre lui-même permettent d’atteindre les objectifs de continuité de son système d’information.</p>



<p>OVH propose à ses clients de souscrire aux solutions Veeam Backup et Zerto PRA, qui offrent des dispositifs renforcés pour les sauvegardes et la reprise d’activité en cas d’incident.</p>



<h3 class="wp-block-heading" id="conformite">Conformité</h3>



<p>Private Cloud fait l’objet d’un programme d’audit interne et externe à trois ans, visant à couvrir les besoins relatifs aux certifications ISO 27001, ISO 27017, SOC 2 Type II, PCI DSS et certification HDS. Les activités de revues sont les suivantes :</p>



<ul class="wp-block-list"><li>audit interne du SMSI annuel ;</li><li>tests d’intrusions internes et externes annuels et ad hoc ;</li><li>scan de vulnérabilités internes et externes trimestriel ;</li><li>audit de certification et surveillance ISO 27001 et ISO 27017 annuel ;</li><li>audit SOC 1 &amp; 2 type II annuel ;</li><li>audit PCI DSS annuel (PSP Level 1) ;</li><li>audit de certification et surveillance HDS ;</li><li>audit PASSI ;</li><li>Bug Bounty OVH.</li></ul>



<p>Un audit annuel par une société qualifiée PASSI a été ajouté au programme d’audits pour assurer la conformité au référentiel SecNumCloud et assurer une revue en profondeur des configurations, du codes sources et de l’architecture du service dans le cadre de notre audit interne.</p>



<h3 class="wp-block-heading" id="exigences-supplementaires">Exigences supplémentaires</h3>



<p>Une convention de service alignée sur les exigences du référentiel sera proposée à la fourniture du service qualifié, le cas échéant. Elle précisera en particulier le statut qualifié de la prestation et la possibilité pour les clients de mandater un auditeur qualifié PASSI pour auditer le service.</p>



<p>La localisation de l’hébergement des serveurs et des données est choisie par le client à l’initialisation du service. Dans l’optique d’assurer la conformité au référentiel, seules les infrastructures Private Cloud hébergées dans les datacenters OVH localisés dans l’Union européenne seront concernées. Le support technique au client est fourni en langue française ainsi que les interfaces d’administration du service.</p>



<p>OVH assurera un support du service et des astreintes 24 heures/24, 7 jours/7 par des équipes localisées en Union Européenne.</p>



<p>Enfin, OVH s’engage à respecter les plus hauts standards en termes de protection des données à caractère personnel, aussi bien pour les données utilisées par OVH pour la fourniture du service qu’en tant que sous-traitant en accompagnant les clients dans l’utilisation du service pour assurer un niveau de protection des données hébergées aligné avec leur sensibilité.</p>
<img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fprivate-cloud-en-cours-de-qualification-secnumcloud%2F&amp;action_name=Private%20Cloud%20en%20cours%20de%20qualification%20SecNumCloud&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
