Security and Cloud Computing
|
|
|
- Meghan Arabella Simon
- 10 years ago
- Views:
Transcription
1 Security and Cloud Computing Michael Waidner TU Darmstadt/FB Informatik, Chair Professor Security in IT Fraunhofer Institute for Secure IT, Director CASED 1 Fraunhofer SIT
2 Objectives of this Lecture Get a feeling for The importance of security for the success of cloud computing The technical challenges The technologies used to address these challenges This lecture Will not make you an an expert in cloud security Does not replace a regular course on Information Security 2
3 <Begin Commercial> We are hiring! Engineers and Researchers BSc/MSc, PhD Students, Post Docs <End Commercial> 3
4 Outline 1. (In)security by example 2. What CIOs think about cloud security 3. Best practices and standards 4. Security technologies 5. Outlook 4
5 What is the state of (in)security, in general? 7
6 Some Security Slang Attacks exploits Privileges of attackers: insider Privileges of others: social engineering, confusing UI s, poor security processes Vulnerable design: wrong idea, architecture or design Vulnerable implementation: right idea, but done wrongly Attacker Intentional Careless user Hacktivist Criminal Spy Nation state Business System IT System Risk Management Accept, Avoid, Transfer or Mitigate Risks Attacks aims at Confidentiality: Stealing data, invading privacy Integrity: Corrupting data & service, stealing resources, illegal service Availability: Destroy system, deny service Accountability: Escape responsibility for actions 8
7 Major Attacks in 2011 Targeted, well orchestrated, economically or politically motivated. Source: IBM X-Force Research and Development, 2012 ( ) 9
8 Example: Targeted Attack on RSA and Defense Sector RSA // Lockheed Martin, Northrop Grumman, L3 Communications (2011) 1: Social engineering & phishing 3: Collecting SecureID secret seed records, downloading them from staging server. RSA issues warning on March 17 March 3: Fake to some RSA employees: [2011 Recruitment plan.xls] with embedded flash zero-day CVE in Adobe Flash Player. Planted Poison Ivy trojan horse. Unusually fast (e.g., attack on Nortel went unnoticed for more then 10 years) 4: Exploiting compromised SecureID to break into the target systems at defense industry. 2: Digital Shoulder Surfing Poison Ivy connects back to control server, giving full control to attacker. Attacker gradually moves towards higher value accounts and data. ( ) ( ) ( ) June 3: Lockheed discloses a blocked attack, which exploited the breach at RSA. RSA announced replacement program for tokens (>40M tokens worldwide, Lockheed > ). August 2011: RSA acknowledge immediate 66M$ for recovery. March 27, 2012: NSA attributes attack to Chinese hackers 10
9 What are actual, known attacks on cloud computing? 11
10 Not Specific for Cloud, but Key Problem: Web-App Security Well-known software problems result in insecure products and services Representative test of web applications (IBM 2012) 86% Security misconfiguration 79% Broken authentication Secure engineering Source: IBM X-Force Research and Development ( ), OWASP Top Ten 2010 ( ) 12
11 Attacks out of the Cloud Attackers use cloud services to perform attacks Attacker as regular cloud user Unclear responsibility of cloud providers Many challenges for forensics / law enforcement Examples Spammer Password cracker Automated fraud Botnet commmand & control ( ) 13
12 Virtual Machine Escape Guest VM takes over hypervisor, gets access to other guests VM VM VM VM Hypervisor Exploits vulnerability in the design or code of the hypervisor for privilege escalation Secure engineering Examples Rafal Wojtczuk, Jan Beulich: Advanced Exploitation of Xen Hypervisor Sysret VM Escape Vulnerability; Sept 4, 2012 (CVE ) ( ) Kostya Kortchinsky: CLOUDBURST A VMware Guest to Host Escape Story; BlackHat USA 2009 ( ) Nelson Elhage: Virtunoid: A KVM Guest Host privilege escalation exploit; Black Hat USA 2011 ( ) 14
13 Incomplete or Insecure Data Deletion Cloud provider does not (securely) delete data before reassigning space, leaking secrets VM VM Time Exploits vulnerability of the cloud management system Secure processes Secure deletion (NIST, BSI) 15
14 Forensics in Cloud Computing Standard approaches to forensics do not work with virtualization VM VM Forensics needs traces (old data, ) Time Explicit subscriber logging and auditing Litigation Hold: Freeze all machines and data! 16
15 Malicious Insider Cloud administrators may have privileged access to customer data VM VM VM VM Hypervisor Exploits basic architecture of current cloud computing offerings. Monitoring and auditing of privileged identities Trusted Computing Cryptography 17
16 Unsafe Virtual Images Image author does not to clean up image before publication, leaking secrets 1/3 of 1100 public Amazon Machine Images with major vulnerabilities Secure engineering for clouds Compliance checking of images Unpublished code, private documents Caches, shadow files Passwords Public / private SSH keys SVN credentials Source: Fraunhofer SIT / S. Bugiel, S. Nürnberger, T. Pöppelmann, A. Sadeghi., T. Schneider : AmazonIA: When Elasticity Snaps Back; ACM CCS, Chicago ( ) 18
17 No Identity Verification in Storage Clouds Cloud provider does not understand risk in usage patterns I am [email protected] Identity verification Federated identity management Share secret with someone pretending to be Bob Receive malware or illegal content under Bob s name Examples of services with this problem (as of end of 2011) Dropbox, SugarSync, CloudMe, HiDrive, wuala Source: Fraunhofer SIT / T. Hahn, T. Kunz, M. Schneider, S. Vowé: Vulnerabilities through Usability Pitfalls in Cloud Services; 2 nd IEEE TSCLOUD, Liverpool ( ) 19
18 Data Duplication for Compressing Data in Storage Clouds Second upload of identical data results in reference to first upload only (1) hash(data) (2) ack(known already) OR (2) ack(new file) (3) data Client-side cross-user deduplication Saves up to 90% cloud storage and bandwidth Introduces vulnerabilities (Better: server-side dedup) 20
19 Example 1: Extend Storage for Free, Share Files Dropbox Client Modified NCrypto (wrapper) 1. Send User Identification, Hash of File 2. File Exists, Linked to User 3. Download File 4. Send File Replacing hashvalue Checks if: User exists File exists with Hash Dropbox Server SHA256 OpenSSL (hash functions) Malicious user can provide hashes for downloading files Source: Martin Mulazzani et. al.: Dark Clouds on the Horizon; USENIX Security ( ) 21
20 Example 2: Guess Confidential Values Theoretical example only! Scenario: Companies bidding for a certain contract Adversary knows structure of contract, just not the price Attack: test all possible prices, dedup will identify the right one Source: Danny Harnik et.al.: Side Channels in Cloud Services, the Case of Deduplication in Cloud Storage; IEEE Security and Privacy Magazine 8/2 (2010). ( ) 22
21 Changing Access Pattern Parallel and Connected Trends: Mobile and Cloud Computing Bring Your Own Device Malware spreads via mobile / cloud into enterprise Data leaks via cloud / mobile Devices and OS s with strong separation between business and personal resources, e.g., Bizztrust by Fraunhofer SIT ( ) 23
22 Recap of Discussed Attacks Four areas of problems in cloud security Isolation / Multi-tenancy Secure Engineering for Cloud Apps Trust in provider Virtual Machine Escape Incomplete or Insecure Data Deletion Attacks based on Client-side Deduplication Unsafe Virtual Images Forensics in Cloud Computing Malicious Insider Trust in subscriber / Identity No Identity Verification in Storage Clouds Changing Access Patterns Attacks out of the Cloud 24
23 Outline 1. (In)security by example 2. What CIOs think about cloud security 3. Best practices and standards 4. Security technologies 5. Outlook 26
24 Where CIOs see the Risks with Public Cloud Computing Security 45% Integration w/ legacy 26% Loss of control over data 26% Availability 25% Performance 24% IT governance 19% Compliance 19% Satisfaction with offerings 12% Return on investment 11% Customization 11% Vendor lock-in Other 6% 11% ( ) 27
25 Who is Considered Responsible for Securing the Public Cloud? Question: How do you Secure Your Cloud Servers Today (in IaaS)? 31.2% 21.3% 19.9% 9.9% 6.4% 6.4% 5.0% Source: CloudPassage Cloud Security Survey, February ( ) 28
26 Who is Really Responsible for Securing the Public Cloud? Split of Responsibilities between Provider and Subscriber Who is responsible for security at the level? Datacenter Infrastructure Middleware Application Process Business Process-as-a-Service Application-as-a-Service Platform-as-a-Service Infrastructure-as-a-Service Provider Provider Provider Provider Subscriber Subscriber Subscriber Subscriber Provider/Subscriber service agreement determines actual responsibilities. 29
27 The Root Cause of Concerns over Cloud Security Real or Perceived Loss of Control when Moving from Private to Public On Premise Private Cloud Off Premise Hybrid Clouds Community Cloud Public Cloud 3rd-Party Managed We Have Control It s located at X. We have backups. Our admins control access. Our uptime is sufficient. The auditors are happy. Our security team is engaged. Who Has Control? Where is it located? Who backs it up? Who has access? How resilient is it? How do auditors observe? How does our security team engage? 30
28 Well Managed Shared Cloud Might be More Secure than Enterprise Managed Private IT Percentage of surveyed cloud customers experiencing security incidents of this type Source: Removing the Cloud of Insecurity; Altertlogic, ( ) 31
29 Well Managed Shared Cloud Might be More Secure than Enterprise Managed Private IT Economy of scale favors security and privacy Dedicated and trained security team Professional service management (patch, change, incident, ) Professional security management, tools, processes, etc. Standardization simplifies security Caveats: Most shared clouds have pre-defined service levels, no negotiated SLAs Physical cloud location may influence regulatory compliance ( discussion about impact of US Patrot Act on European cloud users) 32
30 Outline 1. (In)security by example 2. What CIOs think about cloud security 3. Best practices and standards 4. Security technologies 5. Outlook 34
31 Information Security Process and Management System Security is a dynamic and evolving property. Risks are managed through controls (safeguards), which need to be continuously managed. Initiation of security process Strategy, objectives, compliance Organization, resources, education Creation of security concept Implementation of security concept Maintenance and improvement Scope Documented security policy Threat analysis and risk decisions Safeguards and controls Security Policy Organization of Information security Asset Management Human Resource Security Physical and Environmental Security Communications and Operations Management Access control Information Systems Acquisition Development and Maintenance Information Security Incident Management Business Continuity Management Compliance Reference: BSI Grundschutz ( ), ISO 27002] 35
32 Guidelines, Standards, Requirements Recommendations (from Provider s and/or Subscriber s perspective) Cloud Security Alliance (CSA): Security Guidance v3; 2011 ( ); Cloud Control Matrix (CCM); 2010 ( ); Trusted Cloud Initiative, Ref Architecture; 2011( ) BSI: Security Recommendations for Cloud Computing Providers; 2011 ( ) NIST Special Pub : Guidelines on Security and Privacy in Public Cloud Computing; 2011 ( ) OSA Security Architecture Pattern SP-011: Cloud Computing Pattern; 2010 ( ) Mandatory Framework (for US Federal Government) US General Services Administration: Federal Risk and Authorization Management Program (FedRAMP) ( ) Baselines, e.g., BSI Grundschutz, NIST SP
33 Auditable Framework Auditable Frameworks ISO 2700x Framework 27002: Code of practice for information security management Annex A: Mother of all control matrices In progress 27017: Security in cloud computing In progress 27018: Code of practice for data protection controls for public cloud computing services Statement on Standards for Attestation Engagements (SSAE) No
34 CSA s Basic Cloud Security Reference Model (2011) Source: CSA Security Guidance Version 3, 2011; p20/fig 5 ( )
35 CSA s Trusted Cloud Initiative Reference Architecture Model (2011) Source: ( )
36 CSA s Trusted Cloud Initiative Reference Architecture Model (2011) Source: ( )
37 Anything specific for Cloud Computing? At a high level, everything applies equally well to data centers Isolation / Multi-tenancy Secure Engineering for Cloud Apps Trust in provider Sharing and multi-tenancy across all hw/sw Lack of multi-tenant hw/sw Lack of detailed and verifiable metering and billing + Sharing of security info improves detection, lowers time to respond (aka Big Data for security) Virtualization turns everything into data & software Need for Secure Cloud Engineering + Enables introspection of resources + Simplifies security management (e.g., patch management) Subscribers may distrust providers (resp. cloud admins) Impossibility of individual audits by each subscriber + Privileged user management, Usages control + Trusted Computing and Cryptography can extend trust boundaries Trust in subscriber / Identity Public clouds may have to deal with anonymous subscribers Lack of Trusted Identities + Identity verification as new opportunity for cloud providers Speed: quick on-boarding/offboarding of subcribers identities + Case for Federated Identity (and other SOA constructs) 49
38 Outline 1. (In)security by example 2. What CIOs think about cloud security 3. Best practices and standards 4. Security technologies 5. Outlook 50
39 Virtualization enables introspection of resources 56
40 Hypervisor-level Security Services Physical What changes in a naïve transition from physical (this picture) to virtual? App 1 App 2 App 3 AV/FW OS HW Security becomes harder: VM sprawl, hypervisor as a new component Services unnecessarily replicated Security becomes easier: move security services out of the OS into the Hypervisor, security system can introspect the virtual hardware Switch / NAC / Firewall / IPS... 57
41 Hypervisor-level Security Services Virtual A1 A2 AV/FW A3 A1 A2 AV/FW A3 Security VM Policy Hardened OS Security Mgmt OS OS Discovery, license mgmt, update, congestion control + Switch / NAC / FW / IPS Rootkit Detection Hypervisor HW Reference: IBM Security Virtual Server Protection for Vmware ( ) 58
42 Cryptography extends trust boundaries How to protect data from malicious cloud admins Example 1: Fraunhofer OmniCloud 59
43 OmniCloud: Approach Main objectives Provide secure cloud storage Avoid cloud provider lock-in Easy integration Standard software, no client installation Uses existing communication protocols (e.g., FTP, SCP, WebDAV, Amazon S3,...) Reference: ( ) 60
44 OmniCloud: Security Client-side file encryption Before leaving the company s intranet Key management Separation of keys and encrypted files Keys under exclusive control of the company (Pseudo-) randomly generated keys for each file Modular key generation / key storage approach Filename and folder structure obfuscation Authentication and identity management Various authentication mechanisms Role-based access control Fine grained user permissions 61
45 OmniCloud: API Mapping API mapping Multitude of input and output interfaces Mapping between both High interoperability w.r.t. Supported client software Supported cloud storage providers OC Gateway OC Gateway 62
46 OmniCloud: Features Storage Strategies Specify how data is distributed over storages Consideration of storage specific properties Extensible approach (Inform. Dispersal, Reed Solomon) Data Deduplication Recognition of duplicated files within a service Copied just once to the cloud Reduction of cloud storage costs Mirroring Stripping 63
47 Cryptography extends trust boundaries How to protect data from malicious cloud admins Example 1: Homomorphic Encryption 64
48 General Idea Encryption a la OmniCloud does not work if provider needs to process the encrypted data Fully Homomorphic Encryption (Rivest, Adleman, Dertouzos, 1978, ) Represent algorithm as arithmetic circuit, e.g., f(x1, x2, ) = x1+x2*(1-x3) Homomorphic encryption means: Enc(x1)+Enc(x2)*(1-Enc(x3)) = Enc(x1+x2*(1-x3) Really means: server can compute on the encrypted data First provably secure and polynomial solution (Gentry, 2009, ) Far from being practical 65
49 State of the Art Actually efficient solutions exist for Homomorphic in one operation Somewhat homomorphic (limited depth) E.g., selective document retrieval from encrypted database (Bösch 2012) Secure function evaluation Two parties evaluate function, only one gets result E.g., pattern matching for genetic analysis (Katzenbeisser 2011) 66
50 Outline 1. (In)security by example 2. What CIOs think about cloud security 3. Best practices and standards 4. Security technologies 5. Outlook 72
51 Areas for Research Not a complete list Definition, Measurement and Assurance VM Security = Platform Security Application Security Provenance, trust management Compliance checking, scanning and patching of dormant images Reconsider proof-carrying code and other mobile agent security constructs Security Through Cloud Computing Security as a service Hypervisor-based security services Security in emerging cloud computing programming models and languages Architectures for trustworthy cloud computing Key management TCG-style trusted computing Fully homomorphic encryption, and other crypto tricks to support privacy Trusted clouds of clouds Trusted data and identity portability 73
52 Acknowledgements Support provided by Support provided by 74
53 Prof. Dr. Michael Waidner Fraunhofer-Institute for Secure Information Technology Rheinstrasse Darmstadt, Germany TECHNISCHE UNIVERSITÄT DARMSTADT Technical University of Darmstadt Chair for Security in Information Technology Mornewegstrasse Darmstadt, Germany 75
Cloud Security 2011. Prof. Dr. Michael Waidner Fraunhofer SIT CASED. Fraunhofer SIT. Fraunhofer-Gesellschaft 2011
Fraunhofer-Gesellschaft 2011 Cloud Security 2011 Prof. Dr. Michael Waidner Fraunhofer SIT CASED 1 Fraunhofer SIT Security and Privacy»made in Darmstadt«Center for Advanced Security Research Darmstadt 170
Secure Cloud Computing
Fraunhofer-Gesellschaft 2011 Secure Cloud Computing Prof. Dr. Michael Waidner Center for Advanced Security Research Darmstadt (CASED): TU Darmstadt & Fraunhofer SIT CASED 1 Fraunhofer SIT Outline 1. Security
Secure Cloud Computing
Secure Cloud Computing Prof. Dr. Michael Waidner Technische Universität Darmstadt and Fraunhofer Institute for Secure Information Technology SIT, Darmstadt Darmstadt, 14 March 2015 Agenda Cybersecurity
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
CIT 668: System Architecture
CIT 668: System Architecture Cloud Security Topics 1. The Same Old Security Problems 2. Virtualization Security 3. New Security Issues and Threat Model 4. Data Security 5. Amazon Cloud Security Data Loss
Cloud Security Who do you trust?
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
Cloud Storage Security
Cloud Storage Security Sven Vowé Fraunhofer Institute for Secure Information Technology (SIT) Darmstadt, Germany SIT is a member of CASED (Center for Advanced Security Research Darmstadt) Cloud Storage
Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst
Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment
SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP
SECURITY MODELS FOR CLOUD 2012 Kurtis E. Minder, CISSP INTRODUCTION Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC
RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
How To Protect Your Cloud Computing Resources From Attack
Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview
D. L. Corbet & Assoc., LLC
Demystifying the Cloud OR Cloudy with a Chance of Data D. L. Corbet & Assoc., LLC [email protected] Why 'The Cloud' Common Clouds Considerations and Risk Why 'The Cloud' Distributed Very Large / Very
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
CompTIA Security+ (Exam SY0-410)
CompTIA Security+ (Exam SY0-410) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
Presented by Evan Sylvester, CISSP
Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information
Security & Cloud Services IAN KAYNE
Security & Cloud Services IAN KAYNE CloudComponents CLOUD SERVICES Dynamically scalable infrastructure, services and software based on broad network accessibility NETWORK ACCESS INTERNAL ESTATE CloudComponents
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive
Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise
Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald
Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald About DN-Systems Global Consulting and Technology Services Planning Evaluation Auditing Operates own Security Lab Project Management Integral
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
Security Officer s Checklist in a Sourcing Deal
Security Officer s Checklist in a Sourcing Deal Guide Share Europe Ostend, May 9th 2014 Johan Van Mengsel IBM Distinguished IT Specialist IBM Client Abstract Sourcing deals creates opportunities and challenges.
Public Cloud Security: Surviving in a Hostile Multitenant Environment
Public Cloud Security: Surviving in a Hostile Multitenant Environment SESSION ID: EXP-R01 Mark Russinovich Technical Fellow Windows Azure, Microsoft @markrussinovich The Third Computing Era Security Could
Projectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Cloud Security Who do you trust?
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter
Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Top 10 Cloud Risks That Will Keep You Awake at Night
Top 10 Cloud Risks That Will Keep You Awake at Night Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang Photo Source flickr.com .. Amazon EC2 (Cloud) to host Eng. Lab testing. We want to use SalesForce.com
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC www.fmsinc.org 1 2015 Financial Managers Society, Inc. Cloud Security Implications
White Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected]. Agenda. Security Cases What is Cloud? Road Map Security Concerns
BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected] Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture 2 Data Security and Privacy Principles for IBM SaaS Contents 2 Introduction
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
Mitigating Information Security Risks of Virtualization Technologies
Mitigating Information Security Risks of Virtualization Technologies Toon-Chwee, Wee VMWare (Hong Kong) 2009 VMware Inc. All rights reserved Agenda Virtualization Overview Key Components of Secure Virtualization
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro [email protected] 26.03.2013
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director
Jort Kollerie SonicWALL
Jort Kollerie Cloud 85% of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 68% of spend in private cloud solutions. - Bain and Dell 3 Confidential
International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 11, November 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Cloud Security. DLT Solutions LLC June 2011. #DLTCloud
Cloud Security DLT Solutions LLC June 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) [email protected] www.dlt.com/cloud Your Hosts Van Ristau Chief Technology Officer, DLT Solutions
Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation
Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization
IT Security in Industrie 4.0
IT Security in Industrie 4.0 Prof. Dr. Michael Waidner TU Darmstadt & Fraunhofer Institute for Secure Information Technology? AUTONOMIK Innovation Days Berlin, June 17-18, 2014 1. What is Industrial IT
An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/
An Integrated CyberSecurity Approach for HEP Grids Workshop Report http://hpcrd.lbl.gov/hepcybersecurity/ 1. Introduction The CMS and ATLAS experiments at the Large Hadron Collider (LHC) being built at
Security and Cloud Computing
Security and Cloud Computing Martin Borrett, Lead Security Architect NE Europe, WW Service Management Tiger Team IBM Software Optimising the World s Infrastructure 27th May - London Agenda Brief Introduction
International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January-2014 ISSN 2229-5518 1299
1299 TITLE Virtualization security in Data Centres & cloud Prof Sarita Dhawale. Ashoka Center for Business & Computer Studies,Nashik Head of Department of Computer Science University of Pune, Maharashtra.
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
SANS Security 528 CASP Practice Exam
SANS Security 528 CASP Practice Exam Number: CAS-001 Passing Score: 750 Time Limit: 60 min File Version: 1.1 Join us in Washington DC the week of July 22nd for SEC528: SANS Training Program for the CompTIA
Acano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
Whitepaper. What You Need to Know About Infrastructure as a Service (IaaS) Encryption
Whitepaper What You Need to Know About Infrastructure as a Service (IaaS) Encryption What You Need to Know about IaaS Encryption What You Need to Know About IaaS Encryption Executive Summary In this paper,
Our Key Security Features Are:
September 2014 Version v1.8" Thank you for your interest in PasswordBox. On the following pages, you ll find a technical overview of the comprehensive security measures PasswordBox uses to protect your
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)
Organizational risks 1 Lock-in Risk of not being able to migrate easily from one provider to another 2 Loss of Governance Control and influence on the cloud providers, and conflicts between customer hardening
Security within a development lifecycle. Enhancing product security through development process improvement
Security within a development lifecycle Enhancing product security through development process improvement Who I am Working within a QA environment, with a focus on security for 10 years Primarily web
GoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
Cloud Assurance: Ensuring Security and Compliance for your IT Environment
Cloud Assurance: Ensuring Security and Compliance for your IT Environment A large global enterprise has to deal with all sorts of potential threats: advanced persistent threats (APTs), phishing, malware
How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1
How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1 2 How does IBM deliver cloud security? Contents 2 Introduction 3 Cloud governance 3 Security governance, risk management
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015 1 P a g e ABSTRACT This study examined improving web
THE BLUENOSE SECURITY FRAMEWORK
THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program
Security of Cloud Storage: - Deduplication vs. Privacy
Security of Cloud Storage: - Deduplication vs. Privacy Benny Pinkas - Bar Ilan University Shai Halevi, Danny Harnik, Alexandra Shulman-Peleg - IBM Research Haifa 1 Remote storage and security Easy to encrypt
SECURE CLOUD COMPUTING
Outline SECURE CLOUD COMPUTING Introduction (of many buzz words) References What is Cloud Computing Cloud Computing Infrastructure Security Cloud Storage and Data Security Identity Management in the Cloud
Secure Programming Lecture 12: Web Application Security III
Secure Programming Lecture 12: Web Application Security III David Aspinall 6th March 2014 Outline Overview Recent failures More on authorization Redirects Sensitive data Cross-site Request Forgery (CSRF)
Security & Trust in the Cloud
Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
Cloud Computing Security Issues
Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security, [email protected] Something Old, Something New New: Cloud describes the use of a collection of services, applications,
How to Achieve Operational Assurance in Your Private Cloud
How to Achieve Operational Assurance in Your Private Cloud As enterprises implement private cloud and next-generation data centers to achieve cost efficiencies and support business agility, operational
Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform
Managing Privileged Identities in the Cloud How Privileged Identity Management Evolved to a Service Platform Managing Privileged Identities in the Cloud Contents Overview...3 Management Issues...3 Real-World
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
RSA Security Anatomy of an Attack Lessons learned
RSA Security Anatomy of an Attack Lessons learned Malcolm Dundas Account Executive John Hurley Senior Technology Consultant 1 Agenda Advanced Enterprise/ Threats The RSA Breach A chronology of the attack
Protect Root Abuse privilege on Hypervisor (Cloud Security)
Protect Root Abuse privilege on Hypervisor (Cloud Security) Nantharat Puwarang, CISSP Senior Technical Consultant Protect Software Defined Data Center 1 The Road to Software Defined Data Centers: Virtualization
Assessing Risks in the Cloud
Assessing Risks in the Cloud Jim Reavis Executive Director Cloud Security Alliance Agenda Definitions of Cloud & Cloud Usage Key Cloud Risks About CSA CSA Guidance approach to Addressing Risks Research
Security of Cloud Computing
Security of Cloud Computing Fabrizio Baiardi [email protected] 1 Syllabus Cloud Computing Introduction Definitions Economic Reasons Service Model Deployment Model Supporting Technologies Virtualization
Security Challenges in the Cloud
Security Challenges in the Cloud Claudia Eckert Fraunhofer Research Institution for Applied and Integrated Security (AISEC) Chair for IT Security, TU München 7.2. Darmstadt, Conference of the e-finance
Safeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
