Akamai Information Security Management System Overview: Securing The Cloud
Akamai Information Security Management System Overview: Securing The Cloud
PREFACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
EXECUTIVE SUMMARY. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Users Internal/External. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
ORGANIZATION. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Privacy Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Physical Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Access Control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Network Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
VULNERABILITY MANAGEMENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
PERSONNEL. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
SECURITY INITIATIVES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
ISO 17799/27000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Security Reviews. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
SUMMARY. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Akamai Information Security Management System Overview 1
Preface
Akamai cannot guarantee that the policies and procedures describe in the document
will not change in the future, and this document is not intended to bind Akamai to
any particular course of product marketing or development.
Executive Summary
Akamai is committed to sharing its Information Security Management System (ISMS)
in order to help its customers successfully and securely integrate their web environments
with Akamai’s service. This paper describes what Akamai does to prevent malicious or
unauthorized use of the Akamai EdgePlatform. This protection is comprised of a formal
vulnerability management framework, security management processes, and clear organi-
zational roles and responsibilities. The basis of the approach is to satisfy control objectives
consistent with ISO 27002 and generally accepted standards of information security,
as applicable to the Akamai environment.
Akamai’s Information Security Management System addresses each of the three basic
security dimensions (Integrity, Confidentiality, and Availability), to allow information
to be shared appropriately in an efficient and effective manner by the design and
implementation of management, operational and technical security controls.
Strong security begins with comprehensive security practices and requires continuous
attention and improvement to ensure a consistent, repeatable, secure environment.
Security forms the foundation for every aspect of Akamai’s business, from system
design and security policy to operations management; not only for network security
within the Akamai corporate network, but also to better secure the Internet and each
customer’s web presence.
Akamai welcomes inquiries and feedback about its security practices. Please contact
a member of the Akamai sales team, who will forward the request to the appropriate
security team members for a prompt response.
Akamai Information Security Management System Overview 2
Akamai Network Overview This data is merged with the latency and packet loss information
collected real-time from large samplings of nodes on our network.
Akamai operates the EdgePlatform, a global network of Other data collected includes geographic location of IP addresses,
tens of thousands of servers in nearly a thousand networks latencies from numerous points on the Internet, DNS information,
in scores of countries. Akamai builds, operates, updates, health of key transit regions of the Internet, and observed routing
manages and maintains the software operating on this decisions. The information is collected in a distributed manner
platform and employs sophisticated network monitoring and distributed algorithms determine an optimal “map” of
technologies to track, analyze and report on current/ end-user IP addresses to Akamai servers.
real-time system-wide conditions and trends, including
security events. Functioning of the System and the
Information Flow
The overall security of Akamai’s network relies on several
It is important to note that Akamai personnel do not require
factors, which work together to provide a secure solution
access to our customer’s internal systems. Akamai EdgePlatform
with defense in depth. These components include physical
servers operate as surrogate web servers pulling content from
security, host and software security, network and compo-
the origin site using standard protocols such as HTTP and HTTPS
nent design, and 24x7 monitoring and response.
and do not have any access to the back-end systems of the
customer’s hosted facility. The EdgePlatform will simply handle
Mapping the Internet the end-user’s access to the customer’s Internet web site and
Akamai has devised a number of proprietary algorithms will make the same end-user request to the web servers (or
to leverage its distributed architecture. Akamai’s network the origin servers) within the customer’s hosted facility for the
is designed to operate automatically, in real-time, in the purpose of retrieving or refreshing content.
most effective and efficient manner possible. Topological
measurements are continuously performed. BGP feeds
from hundreds of networks are combined with real-time
trace-routes and other measurements to determine the
overall connectivity of the Internet.
End Users
GET GET
Internet
200 Ok 200 Ok
Customer Fire Akamai Edge
Origin Wall Servers
3.3.Content
Contentis
delivered
is delivered
from Edge
from Edge
End Users
Users Internal/External
“External users” refers to members of the public with access to the Internet who
are requesting the customer’s web site content. Data provided would be information
managed and published by the customer through its hosted facility. External users do
not require authentication outside of services available within HTTP to access the web
site content. Processing provided on the EdgePlatform system is web server functionality,
specifically responding to requests for content within the protocols supported on the
EdgePlatform. These are standard functions in delivering web site content and appli-
cations over the Internet.
“Internal users” for the EdgePlatform system are authorized Akamai personnel monitoring
and maintaining the EdgePlatform system in general and any authorized customer person-
nel. Akamai personnel do not exercise administrative access to a customer’s web content,
except as any other external user. Authorized Akamai personnel will have operational
control over the EdgePlatform system, ensuring that its distributed network of servers
is functioning properly. Authorized customer personnel have access to the reporting tools
and customer support tools via the Akamai customer portal. Reporting tools provide data
about the customer web site traffic at an aggregate level.
Akamai’s DNS infrastructure uses the end result of each map-making cycle to determine
optimal mapping for end-users. Akamai’s network intelligence system uses a set of top-
level DNS name servers, authoritative for a variety of domains, and uses technology
similar to Enhanced DNS.
Organization
Akamai launched commercial service in April 1999 and security has been extremely
important from the beginning. The Akamai Information Security Program is structured
in accordance with ISO 17799 and ISO 27001 international standards for information
security. Akamai has engaged outside audit teams to conduct assessments of Akamai’s
security program against these standards.
Accordingly, Akamai continually strives to improve upon its security practices. Included
in Akamai’s ongoing security efforts are regular internal reviews and risk assessments
for corporate, information, and network security. As Akamai continues to roll out new
services on its network, security plays a fundamental role in product design and review
for every new feature. In addition to performing frequent internal security reviews,
Akamai’s security professionals meet regularly with a cross-functional executive team
to review corporate and network security issues.
Akamai Information Security Management System Overview 4
Akamai has a dedicated Information Security Group. the Payment Card Industry Data Security Standard, such as video
The Senior Director of Information Security is responsible cameras, fire suppression and guards. For more information about
for security of the system and the company. The Director Secure Content Delivery contact your Akamai sales representative.
reports to the Senior Vice President of Networks and
Operations, provides a security status report to the CEO Host System Security
regularly, and works with management across the com-
pany to prioritize and schedule security efforts. All Akamai servers are designed to function as a bastion host,
obviating the need for enclaving the systems behind a separate
Akamai performs both qualitative and quantitative risk firewall. The systems are hardened to withstand various types
assessments of the service network infrastructure on an of attack, including various denial-of-service attacks and other
on-going basis. Risk assessments consider the value of the known vulnerabilities.
assets being protected, the exposure presented to those
assets by vulnerabilities, and the likelihood of exploitation Akamai deploys security-hardened servers and adheres to the
by various threats. principles of minimum access and least privilege. Akamai disables
all non-essential IP services on deployed servers to limit opportuni-
Akamai has a formal incident response process that includes ties for unauthorized network access. Remote administrative
root cause analysis of the incident. See the section Incident access is only available via cryptographically secure connections
Response & Management for more information. and all electronic access to Akamai servers is logged. To further
limit access, read-only views and limited diagnostic tools are
Privacy Policy provided to Akamai personnel performing system diagnostics
and analysis, eliminating the need for administrative access
Akamai does not collect or aggregate personally identifiable to accomplish these functions. Network Operations enforces
information about its customers’ users. The Akamai privacy Akamai’s access control policies and security key management.
policy is available on the Company’s web site.
Access Control
http://www.akamai.com/html/policies/privacy_principles.html
Akamai’s EdgePlatform servers do not have individual user
accounts, and user-level applications (e.g., web browsers) are
EdgePlatform Security removed from the system, eliminating the most common virus
infection vectors. The systems are hardened by closing all un-
The overall security of Akamai’s network relies on several needed ports and by removing extraneous software packages
factors, which are designed to work together to provide and network services.
a comprehensive secure solution with defense in depth.
These components include physical security, host system Administrative logins are restricted to trained and authorized
security, access control, network design, software reliability Akamai employees. The Network Operations Group maintains
and integrity, and 24x7 monitoring and response. and enforces Akamai’s access control policies and key manage-
ment. Read-only views are provided to a limited number of
Physical Security authorized personnel performing system diagnostics and analysis.
Akamai’s EdgePlatform servers are deployed in facilities
worldwide, many of which provide state-of-the-art access Each authorized Akamai user has a set of unique public-key
control. Akamai requires its providers to enforce verification pairs for authentication purposes, and access occurs via an SSH
of Akamai service requests; providers may not attempt to proxy enforcing a role-based access control model. These key
gain any sort of access to Akamai systems without written pairs are rotated frequently, and Akamai’s Network Operations
instructions from Akamai. Failed systems are returned directly and Information Security teams routinely review access privileges.
to Akamai-contracted facilities that follow strict handling
procedures to repair and return them to service. Although Software changes are executed via automated processes, obviating
Akamai stipulates the above requirements for facility providers, the need for most human intervention. Akamai’s deployed network
it is important to note that Akamai is not dependent on their functions in an autonomous mode without users logging into the
compliance to protect its network. The network is designed servers to conduct routine system administration.
such that physical compromise of Akamai machines can have
only a limited impact on the system as a whole and critical Network Design
systems are placed in more secure and trusted locations.
Akamai’s unique distributed intelligent network is designed
to eliminate single points of failure. Its self-correcting properties
Secure Content Delivery Network servers are deployed in allow it to address machine, data center, and network problems
professional and secure collocation facilities. These facilities and route around any outages or areas of inefficiency for optimal
incorporate physical requirements designed to comply with reliability of content and application delivery. Akamai has servers
Akamai Information Security Management System Overview 5
in almost every major network in the US and around the world. This, along with
dynamic routing technology, enables Akamai to continue operating in the presence
of almost any network outage.
These changes are installed in a staged fashion to ensure minimal impact to Akamai
services. Software is installed over secure connections with safeguards to check that
components are of the correct revision and have not been modified in transit. In the
unlikely case that problems are discovered during the roll-out, Akamai’s fault-tolerant
mapping system will direct users away from the affected machines as the problems
are addressed.
Akamai’s advanced software management system provides tight control over the
soft-ware and configuration on all machines. Any deviations from the specified
configuration are corrected, resulting in a highly consistent state across the network.
Akamai also tightly controls all software on the servers. No CGI scripts or customer
created executables are run on Akamai servers—with the notable exception of our
EdgeComputing service that uses a specially designed “sandbox” environment. For
more information about EdgeComputing contact your Akamai sales representative.
Akamai does not have a standard SLA for security incidents The structure and operation of the Akamai EdgePlatform are
due to the incidents’ varied nature. As noted above, Akamai inherently designed to minimize the possibility that a disruption
provides timely response via customer portal notifications, could have any network-wide effect. The built-in self-correcting
email or other communications with appropriate levels of properties allow it to be uniquely able to deal with machine,
information based upon the specific incident and its custo- data center, and network problems; routing around any outages
mer impact. for optimal reliability of content delivery. This also means that
it is easier to contain potential damage caused by a disruption
Akamai utilizes a variety of host-based audit controls to that affects even a significant number of servers or data centers.
provide intrusion detection. Every Akamai server monitors Entire data centers can be withdrawn from service, with minimal
a large collection of events including usage, performance impact, as Akamai’s dynamic mapping algorithms will direct users
and abnormal behavior. These events are reported through to new data centers within minutes. These fault-tolerant features
a distributed database system into Akamai’s monitoring automatically activate when machines or data centers fail for any
system that provides alerting intelligence to the Network reason, allowing Akamai to continue serving content reliably. Net-
Operations Command Center (NOCC). NOCC staff are work-related disaster recovery plans and procedures are constantly
trained and on call to provide incident management in reviewed to ensure the integrity, stability, and fault-tolerance of
accordance with Akamai’s incident response procedures. the system.
Akamai Information Security Management System Overview 7
Secondary operations sites are located in San Mateo, California, and Reston, Virginia,
providing redundant capability for ongoing operations in the event of a metro disaster
in either or both of our primary locations.
Security Initiatives
For businesses where a web presence plays an integral part in success, delivering content
over the Internet means balancing the reward of easy, universal access to content against
the difficulty of protecting the integrity of those accessible systems. Akamai’s commitment
to best-in-class security policies and practices is designed to minimize the risk to our
customers—allowing each to take advantage of the optimal wide-reaching delivery
mechanism for its content while retaining the protection and control they demand.
ISO 17799/27000
Akamai undergoes an annual readiness assessment to determine compliance with the
ISO 17799 standard “Information technology – Security techniques – Code of practice
for information security management.” ISO 17799:2005 measures 11 control categories:
• Security Policy
• Asset Management
• Access Control
• Compliance
Akamai Information Security Management System Overview 8
Summary
Akamai’s Information Security Management System (ISMS) is designed
to ensure that Akamai’s EdgePlatform provides the most secure way to
increase performance and reliability across the Internet.
Akamai welcomes inquiries and feedback about its security practices. Please
contact a member of the Akamai sales team, who will forward the request
to the appropriate security team members for a prompt response.
1 November 2009 - This document is intended to provide certain background information on Akamai as of the above date. This information is subject to change from time to time
as Akamai’s business and systems change, and thus should not serve as a representation or warranty.
www.akamai.com