Security and Cloud Computing

Size: px
Start display at page:

Download "Security and Cloud Computing"

Transcription

1 Security and Cloud Computing Michael Waidner TU Darmstadt/FB Informatik, Chair Professor Security in IT Fraunhofer Institute for Secure IT, Director CASED 1 Fraunhofer SIT

2 Objectives of this Lecture Get a feeling for The importance of security for the success of cloud computing The technical challenges The technologies used to address these challenges This lecture Will not make you an an expert in cloud security Does not replace a regular course on Information Security 2

3 <Begin Commercial> We are hiring! Engineers and Researchers BSc/MSc, PhD Students, Post Docs <End Commercial> 3

4 Outline 1. (In)security by example 2. What CIOs think about cloud security 3. Best practices and standards 4. Security technologies 5. Outlook 4

5 What is the state of (in)security, in general? 7

6 Some Security Slang Attacks exploits Privileges of attackers: insider Privileges of others: social engineering, confusing UI s, poor security processes Vulnerable design: wrong idea, architecture or design Vulnerable implementation: right idea, but done wrongly Attacker Intentional Careless user Hacktivist Criminal Spy Nation state Business System IT System Risk Management Accept, Avoid, Transfer or Mitigate Risks Attacks aims at Confidentiality: Stealing data, invading privacy Integrity: Corrupting data & service, stealing resources, illegal service Availability: Destroy system, deny service Accountability: Escape responsibility for actions 8

7 Major Attacks in 2011 Targeted, well orchestrated, economically or politically motivated. Source: IBM X-Force Research and Development, 2012 ( ) 9

8 Example: Targeted Attack on RSA and Defense Sector RSA // Lockheed Martin, Northrop Grumman, L3 Communications (2011) 1: Social engineering & phishing 3: Collecting SecureID secret seed records, downloading them from staging server. RSA issues warning on March 17 March 3: Fake to some RSA employees: [2011 Recruitment plan.xls] with embedded flash zero-day CVE in Adobe Flash Player. Planted Poison Ivy trojan horse. Unusually fast (e.g., attack on Nortel went unnoticed for more then 10 years) 4: Exploiting compromised SecureID to break into the target systems at defense industry. 2: Digital Shoulder Surfing Poison Ivy connects back to control server, giving full control to attacker. Attacker gradually moves towards higher value accounts and data. ( ) ( ) ( ) June 3: Lockheed discloses a blocked attack, which exploited the breach at RSA. RSA announced replacement program for tokens (>40M tokens worldwide, Lockheed > ). August 2011: RSA acknowledge immediate 66M$ for recovery. March 27, 2012: NSA attributes attack to Chinese hackers 10

9 What are actual, known attacks on cloud computing? 11

10 Not Specific for Cloud, but Key Problem: Web-App Security Well-known software problems result in insecure products and services Representative test of web applications (IBM 2012) 86% Security misconfiguration 79% Broken authentication Secure engineering Source: IBM X-Force Research and Development ( ), OWASP Top Ten 2010 ( ) 12

11 Attacks out of the Cloud Attackers use cloud services to perform attacks Attacker as regular cloud user Unclear responsibility of cloud providers Many challenges for forensics / law enforcement Examples Spammer Password cracker Automated fraud Botnet commmand & control ( ) 13

12 Virtual Machine Escape Guest VM takes over hypervisor, gets access to other guests VM VM VM VM Hypervisor Exploits vulnerability in the design or code of the hypervisor for privilege escalation Secure engineering Examples Rafal Wojtczuk, Jan Beulich: Advanced Exploitation of Xen Hypervisor Sysret VM Escape Vulnerability; Sept 4, 2012 (CVE ) ( ) Kostya Kortchinsky: CLOUDBURST A VMware Guest to Host Escape Story; BlackHat USA 2009 ( ) Nelson Elhage: Virtunoid: A KVM Guest Host privilege escalation exploit; Black Hat USA 2011 ( ) 14

13 Incomplete or Insecure Data Deletion Cloud provider does not (securely) delete data before reassigning space, leaking secrets VM VM Time Exploits vulnerability of the cloud management system Secure processes Secure deletion (NIST, BSI) 15

14 Forensics in Cloud Computing Standard approaches to forensics do not work with virtualization VM VM Forensics needs traces (old data, ) Time Explicit subscriber logging and auditing Litigation Hold: Freeze all machines and data! 16

15 Malicious Insider Cloud administrators may have privileged access to customer data VM VM VM VM Hypervisor Exploits basic architecture of current cloud computing offerings. Monitoring and auditing of privileged identities Trusted Computing Cryptography 17

16 Unsafe Virtual Images Image author does not to clean up image before publication, leaking secrets 1/3 of 1100 public Amazon Machine Images with major vulnerabilities Secure engineering for clouds Compliance checking of images Unpublished code, private documents Caches, shadow files Passwords Public / private SSH keys SVN credentials Source: Fraunhofer SIT / S. Bugiel, S. Nürnberger, T. Pöppelmann, A. Sadeghi., T. Schneider : AmazonIA: When Elasticity Snaps Back; ACM CCS, Chicago ( ) 18

17 No Identity Verification in Storage Clouds Cloud provider does not understand risk in usage patterns I am [email protected] Identity verification Federated identity management Share secret with someone pretending to be Bob Receive malware or illegal content under Bob s name Examples of services with this problem (as of end of 2011) Dropbox, SugarSync, CloudMe, HiDrive, wuala Source: Fraunhofer SIT / T. Hahn, T. Kunz, M. Schneider, S. Vowé: Vulnerabilities through Usability Pitfalls in Cloud Services; 2 nd IEEE TSCLOUD, Liverpool ( ) 19

18 Data Duplication for Compressing Data in Storage Clouds Second upload of identical data results in reference to first upload only (1) hash(data) (2) ack(known already) OR (2) ack(new file) (3) data Client-side cross-user deduplication Saves up to 90% cloud storage and bandwidth Introduces vulnerabilities (Better: server-side dedup) 20

19 Example 1: Extend Storage for Free, Share Files Dropbox Client Modified NCrypto (wrapper) 1. Send User Identification, Hash of File 2. File Exists, Linked to User 3. Download File 4. Send File Replacing hashvalue Checks if: User exists File exists with Hash Dropbox Server SHA256 OpenSSL (hash functions) Malicious user can provide hashes for downloading files Source: Martin Mulazzani et. al.: Dark Clouds on the Horizon; USENIX Security ( ) 21

20 Example 2: Guess Confidential Values Theoretical example only! Scenario: Companies bidding for a certain contract Adversary knows structure of contract, just not the price Attack: test all possible prices, dedup will identify the right one Source: Danny Harnik et.al.: Side Channels in Cloud Services, the Case of Deduplication in Cloud Storage; IEEE Security and Privacy Magazine 8/2 (2010). ( ) 22

21 Changing Access Pattern Parallel and Connected Trends: Mobile and Cloud Computing Bring Your Own Device Malware spreads via mobile / cloud into enterprise Data leaks via cloud / mobile Devices and OS s with strong separation between business and personal resources, e.g., Bizztrust by Fraunhofer SIT ( ) 23

22 Recap of Discussed Attacks Four areas of problems in cloud security Isolation / Multi-tenancy Secure Engineering for Cloud Apps Trust in provider Virtual Machine Escape Incomplete or Insecure Data Deletion Attacks based on Client-side Deduplication Unsafe Virtual Images Forensics in Cloud Computing Malicious Insider Trust in subscriber / Identity No Identity Verification in Storage Clouds Changing Access Patterns Attacks out of the Cloud 24

23 Outline 1. (In)security by example 2. What CIOs think about cloud security 3. Best practices and standards 4. Security technologies 5. Outlook 26

24 Where CIOs see the Risks with Public Cloud Computing Security 45% Integration w/ legacy 26% Loss of control over data 26% Availability 25% Performance 24% IT governance 19% Compliance 19% Satisfaction with offerings 12% Return on investment 11% Customization 11% Vendor lock-in Other 6% 11% ( ) 27

25 Who is Considered Responsible for Securing the Public Cloud? Question: How do you Secure Your Cloud Servers Today (in IaaS)? 31.2% 21.3% 19.9% 9.9% 6.4% 6.4% 5.0% Source: CloudPassage Cloud Security Survey, February ( ) 28

26 Who is Really Responsible for Securing the Public Cloud? Split of Responsibilities between Provider and Subscriber Who is responsible for security at the level? Datacenter Infrastructure Middleware Application Process Business Process-as-a-Service Application-as-a-Service Platform-as-a-Service Infrastructure-as-a-Service Provider Provider Provider Provider Subscriber Subscriber Subscriber Subscriber Provider/Subscriber service agreement determines actual responsibilities. 29

27 The Root Cause of Concerns over Cloud Security Real or Perceived Loss of Control when Moving from Private to Public On Premise Private Cloud Off Premise Hybrid Clouds Community Cloud Public Cloud 3rd-Party Managed We Have Control It s located at X. We have backups. Our admins control access. Our uptime is sufficient. The auditors are happy. Our security team is engaged. Who Has Control? Where is it located? Who backs it up? Who has access? How resilient is it? How do auditors observe? How does our security team engage? 30

28 Well Managed Shared Cloud Might be More Secure than Enterprise Managed Private IT Percentage of surveyed cloud customers experiencing security incidents of this type Source: Removing the Cloud of Insecurity; Altertlogic, ( ) 31

29 Well Managed Shared Cloud Might be More Secure than Enterprise Managed Private IT Economy of scale favors security and privacy Dedicated and trained security team Professional service management (patch, change, incident, ) Professional security management, tools, processes, etc. Standardization simplifies security Caveats: Most shared clouds have pre-defined service levels, no negotiated SLAs Physical cloud location may influence regulatory compliance ( discussion about impact of US Patrot Act on European cloud users) 32

30 Outline 1. (In)security by example 2. What CIOs think about cloud security 3. Best practices and standards 4. Security technologies 5. Outlook 34

31 Information Security Process and Management System Security is a dynamic and evolving property. Risks are managed through controls (safeguards), which need to be continuously managed. Initiation of security process Strategy, objectives, compliance Organization, resources, education Creation of security concept Implementation of security concept Maintenance and improvement Scope Documented security policy Threat analysis and risk decisions Safeguards and controls Security Policy Organization of Information security Asset Management Human Resource Security Physical and Environmental Security Communications and Operations Management Access control Information Systems Acquisition Development and Maintenance Information Security Incident Management Business Continuity Management Compliance Reference: BSI Grundschutz ( ), ISO 27002] 35

32 Guidelines, Standards, Requirements Recommendations (from Provider s and/or Subscriber s perspective) Cloud Security Alliance (CSA): Security Guidance v3; 2011 ( ); Cloud Control Matrix (CCM); 2010 ( ); Trusted Cloud Initiative, Ref Architecture; 2011( ) BSI: Security Recommendations for Cloud Computing Providers; 2011 ( ) NIST Special Pub : Guidelines on Security and Privacy in Public Cloud Computing; 2011 ( ) OSA Security Architecture Pattern SP-011: Cloud Computing Pattern; 2010 ( ) Mandatory Framework (for US Federal Government) US General Services Administration: Federal Risk and Authorization Management Program (FedRAMP) ( ) Baselines, e.g., BSI Grundschutz, NIST SP

33 Auditable Framework Auditable Frameworks ISO 2700x Framework 27002: Code of practice for information security management Annex A: Mother of all control matrices In progress 27017: Security in cloud computing In progress 27018: Code of practice for data protection controls for public cloud computing services Statement on Standards for Attestation Engagements (SSAE) No

34 CSA s Basic Cloud Security Reference Model (2011) Source: CSA Security Guidance Version 3, 2011; p20/fig 5 ( )

35 CSA s Trusted Cloud Initiative Reference Architecture Model (2011) Source: ( )

36 CSA s Trusted Cloud Initiative Reference Architecture Model (2011) Source: ( )

37 Anything specific for Cloud Computing? At a high level, everything applies equally well to data centers Isolation / Multi-tenancy Secure Engineering for Cloud Apps Trust in provider Sharing and multi-tenancy across all hw/sw Lack of multi-tenant hw/sw Lack of detailed and verifiable metering and billing + Sharing of security info improves detection, lowers time to respond (aka Big Data for security) Virtualization turns everything into data & software Need for Secure Cloud Engineering + Enables introspection of resources + Simplifies security management (e.g., patch management) Subscribers may distrust providers (resp. cloud admins) Impossibility of individual audits by each subscriber + Privileged user management, Usages control + Trusted Computing and Cryptography can extend trust boundaries Trust in subscriber / Identity Public clouds may have to deal with anonymous subscribers Lack of Trusted Identities + Identity verification as new opportunity for cloud providers Speed: quick on-boarding/offboarding of subcribers identities + Case for Federated Identity (and other SOA constructs) 49

38 Outline 1. (In)security by example 2. What CIOs think about cloud security 3. Best practices and standards 4. Security technologies 5. Outlook 50

39 Virtualization enables introspection of resources 56

40 Hypervisor-level Security Services Physical What changes in a naïve transition from physical (this picture) to virtual? App 1 App 2 App 3 AV/FW OS HW Security becomes harder: VM sprawl, hypervisor as a new component Services unnecessarily replicated Security becomes easier: move security services out of the OS into the Hypervisor, security system can introspect the virtual hardware Switch / NAC / Firewall / IPS... 57

41 Hypervisor-level Security Services Virtual A1 A2 AV/FW A3 A1 A2 AV/FW A3 Security VM Policy Hardened OS Security Mgmt OS OS Discovery, license mgmt, update, congestion control + Switch / NAC / FW / IPS Rootkit Detection Hypervisor HW Reference: IBM Security Virtual Server Protection for Vmware ( ) 58

42 Cryptography extends trust boundaries How to protect data from malicious cloud admins Example 1: Fraunhofer OmniCloud 59

43 OmniCloud: Approach Main objectives Provide secure cloud storage Avoid cloud provider lock-in Easy integration Standard software, no client installation Uses existing communication protocols (e.g., FTP, SCP, WebDAV, Amazon S3,...) Reference: ( ) 60

44 OmniCloud: Security Client-side file encryption Before leaving the company s intranet Key management Separation of keys and encrypted files Keys under exclusive control of the company (Pseudo-) randomly generated keys for each file Modular key generation / key storage approach Filename and folder structure obfuscation Authentication and identity management Various authentication mechanisms Role-based access control Fine grained user permissions 61

45 OmniCloud: API Mapping API mapping Multitude of input and output interfaces Mapping between both High interoperability w.r.t. Supported client software Supported cloud storage providers OC Gateway OC Gateway 62

46 OmniCloud: Features Storage Strategies Specify how data is distributed over storages Consideration of storage specific properties Extensible approach (Inform. Dispersal, Reed Solomon) Data Deduplication Recognition of duplicated files within a service Copied just once to the cloud Reduction of cloud storage costs Mirroring Stripping 63

47 Cryptography extends trust boundaries How to protect data from malicious cloud admins Example 1: Homomorphic Encryption 64

48 General Idea Encryption a la OmniCloud does not work if provider needs to process the encrypted data Fully Homomorphic Encryption (Rivest, Adleman, Dertouzos, 1978, ) Represent algorithm as arithmetic circuit, e.g., f(x1, x2, ) = x1+x2*(1-x3) Homomorphic encryption means: Enc(x1)+Enc(x2)*(1-Enc(x3)) = Enc(x1+x2*(1-x3) Really means: server can compute on the encrypted data First provably secure and polynomial solution (Gentry, 2009, ) Far from being practical 65

49 State of the Art Actually efficient solutions exist for Homomorphic in one operation Somewhat homomorphic (limited depth) E.g., selective document retrieval from encrypted database (Bösch 2012) Secure function evaluation Two parties evaluate function, only one gets result E.g., pattern matching for genetic analysis (Katzenbeisser 2011) 66

50 Outline 1. (In)security by example 2. What CIOs think about cloud security 3. Best practices and standards 4. Security technologies 5. Outlook 72

51 Areas for Research Not a complete list Definition, Measurement and Assurance VM Security = Platform Security Application Security Provenance, trust management Compliance checking, scanning and patching of dormant images Reconsider proof-carrying code and other mobile agent security constructs Security Through Cloud Computing Security as a service Hypervisor-based security services Security in emerging cloud computing programming models and languages Architectures for trustworthy cloud computing Key management TCG-style trusted computing Fully homomorphic encryption, and other crypto tricks to support privacy Trusted clouds of clouds Trusted data and identity portability 73

52 Acknowledgements Support provided by Support provided by 74

53 Prof. Dr. Michael Waidner Fraunhofer-Institute for Secure Information Technology Rheinstrasse Darmstadt, Germany TECHNISCHE UNIVERSITÄT DARMSTADT Technical University of Darmstadt Chair for Security in Information Technology Mornewegstrasse Darmstadt, Germany 75

Cloud Security 2011. Prof. Dr. Michael Waidner Fraunhofer SIT CASED. Fraunhofer SIT. Fraunhofer-Gesellschaft 2011

Cloud Security 2011. Prof. Dr. Michael Waidner Fraunhofer SIT CASED. Fraunhofer SIT. Fraunhofer-Gesellschaft 2011 Fraunhofer-Gesellschaft 2011 Cloud Security 2011 Prof. Dr. Michael Waidner Fraunhofer SIT CASED 1 Fraunhofer SIT Security and Privacy»made in Darmstadt«Center for Advanced Security Research Darmstadt 170

More information

Secure Cloud Computing

Secure Cloud Computing Fraunhofer-Gesellschaft 2011 Secure Cloud Computing Prof. Dr. Michael Waidner Center for Advanced Security Research Darmstadt (CASED): TU Darmstadt & Fraunhofer SIT CASED 1 Fraunhofer SIT Outline 1. Security

More information

Secure Cloud Computing

Secure Cloud Computing Secure Cloud Computing Prof. Dr. Michael Waidner Technische Universität Darmstadt and Fraunhofer Institute for Secure Information Technology SIT, Darmstadt Darmstadt, 14 March 2015 Agenda Cybersecurity

More information

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

CIT 668: System Architecture

CIT 668: System Architecture CIT 668: System Architecture Cloud Security Topics 1. The Same Old Security Problems 2. Virtualization Security 3. New Security Issues and Threat Model 4. Data Security 5. Amazon Cloud Security Data Loss

More information

Cloud Security Who do you trust?

Cloud Security Who do you trust? Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud

More information

Cloud Storage Security

Cloud Storage Security Cloud Storage Security Sven Vowé Fraunhofer Institute for Secure Information Technology (SIT) Darmstadt, Germany SIT is a member of CASED (Center for Advanced Security Research Darmstadt) Cloud Storage

More information

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment

More information

SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP

SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP SECURITY MODELS FOR CLOUD 2012 Kurtis E. Minder, CISSP INTRODUCTION Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson

More information

Cloud-Security: Show-Stopper or Enabling Technology?

Cloud-Security: Show-Stopper or Enabling Technology? Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is

More information

Brainloop Cloud Security

Brainloop Cloud Security Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating

More information

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure

More information

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Computing Governance & Security. Security Risks in the Cloud Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud

More information

How To Protect Your Cloud Computing Resources From Attack

How To Protect Your Cloud Computing Resources From Attack Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview

More information

D. L. Corbet & Assoc., LLC

D. L. Corbet & Assoc., LLC Demystifying the Cloud OR Cloudy with a Chance of Data D. L. Corbet & Assoc., LLC [email protected] Why 'The Cloud' Common Clouds Considerations and Risk Why 'The Cloud' Distributed Very Large / Very

More information

John Essner, CISO Office of Information Technology State of New Jersey

John Essner, CISO Office of Information Technology State of New Jersey John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management

More information

CompTIA Security+ (Exam SY0-410)

CompTIA Security+ (Exam SY0-410) CompTIA Security+ (Exam SY0-410) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

Presented by Evan Sylvester, CISSP

Presented by Evan Sylvester, CISSP Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information

More information

Security & Cloud Services IAN KAYNE

Security & Cloud Services IAN KAYNE Security & Cloud Services IAN KAYNE CloudComponents CLOUD SERVICES Dynamically scalable infrastructure, services and software based on broad network accessibility NETWORK ACCESS INTERNAL ESTATE CloudComponents

More information

Cloud Security Introduction and Overview

Cloud Security Introduction and Overview Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious

More information

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise

More information

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald About DN-Systems Global Consulting and Technology Services Planning Evaluation Auditing Operates own Security Lab Project Management Integral

More information

Data Protection: From PKI to Virtualization & Cloud

Data Protection: From PKI to Virtualization & Cloud Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security

More information

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM STORAGE SECURITY TUTORIAL With a focus on Cloud Storage Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members

More information

Security Officer s Checklist in a Sourcing Deal

Security Officer s Checklist in a Sourcing Deal Security Officer s Checklist in a Sourcing Deal Guide Share Europe Ostend, May 9th 2014 Johan Van Mengsel IBM Distinguished IT Specialist IBM Client Abstract Sourcing deals creates opportunities and challenges.

More information

Public Cloud Security: Surviving in a Hostile Multitenant Environment

Public Cloud Security: Surviving in a Hostile Multitenant Environment Public Cloud Security: Surviving in a Hostile Multitenant Environment SESSION ID: EXP-R01 Mark Russinovich Technical Fellow Windows Azure, Microsoft @markrussinovich The Third Computing Era Security Could

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

Cloud Security Who do you trust?

Cloud Security Who do you trust? Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud

More information

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute

More information

Virtualization System Security

Virtualization System Security Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability

More information

Top 10 Cloud Risks That Will Keep You Awake at Night

Top 10 Cloud Risks That Will Keep You Awake at Night Top 10 Cloud Risks That Will Keep You Awake at Night Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang Photo Source flickr.com .. Amazon EC2 (Cloud) to host Eng. Lab testing. We want to use SalesForce.com

More information

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC www.fmsinc.org 1 2015 Financial Managers Society, Inc. Cloud Security Implications

More information

White Paper How Noah Mobile uses Microsoft Azure Core Services

White Paper How Noah Mobile uses Microsoft Azure Core Services NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah

More information

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected]. Agenda. Security Cases What is Cloud? Road Map Security Concerns

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH VORAPOJ.L@G-ABLE.COM. Agenda. Security Cases What is Cloud? Road Map Security Concerns BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected] Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad

More information

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture 2 Data Security and Privacy Principles for IBM SaaS Contents 2 Introduction

More information

A Survey on Cloud Security Issues and Techniques

A Survey on Cloud Security Issues and Techniques A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]

More information

Cloud security architecture

Cloud security architecture ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide

More information

Mitigating Information Security Risks of Virtualization Technologies

Mitigating Information Security Risks of Virtualization Technologies Mitigating Information Security Risks of Virtualization Technologies Toon-Chwee, Wee VMWare (Hong Kong) 2009 VMware Inc. All rights reserved Agenda Virtualization Overview Key Components of Secure Virtualization

More information

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro [email protected] 26.03.2013

More information

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

The Cloud App Visibility Blindspot

The Cloud App Visibility Blindspot The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before

More information

Passing PCI Compliance How to Address the Application Security Mandates

Passing PCI Compliance How to Address the Application Security Mandates Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These

More information

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director

More information

Jort Kollerie SonicWALL

Jort Kollerie SonicWALL Jort Kollerie Cloud 85% of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 68% of spend in private cloud solutions. - Bain and Dell 3 Confidential

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 11, November 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Cloud Security. DLT Solutions LLC June 2011. #DLTCloud

Cloud Security. DLT Solutions LLC June 2011. #DLTCloud Cloud Security DLT Solutions LLC June 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) [email protected] www.dlt.com/cloud Your Hosts Van Ristau Chief Technology Officer, DLT Solutions

More information

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization

More information

IT Security in Industrie 4.0

IT Security in Industrie 4.0 IT Security in Industrie 4.0 Prof. Dr. Michael Waidner TU Darmstadt & Fraunhofer Institute for Secure Information Technology? AUTONOMIK Innovation Days Berlin, June 17-18, 2014 1. What is Industrial IT

More information

An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/

An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/ An Integrated CyberSecurity Approach for HEP Grids Workshop Report http://hpcrd.lbl.gov/hepcybersecurity/ 1. Introduction The CMS and ATLAS experiments at the Large Hadron Collider (LHC) being built at

More information

Security and Cloud Computing

Security and Cloud Computing Security and Cloud Computing Martin Borrett, Lead Security Architect NE Europe, WW Service Management Tiger Team IBM Software Optimising the World s Infrastructure 27th May - London Agenda Brief Introduction

More information

International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January-2014 ISSN 2229-5518 1299

International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January-2014 ISSN 2229-5518 1299 1299 TITLE Virtualization security in Data Centres & cloud Prof Sarita Dhawale. Ashoka Center for Business & Computer Studies,Nashik Head of Department of Computer Science University of Pune, Maharashtra.

More information

Information Security Basic Concepts

Information Security Basic Concepts Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

SANS Security 528 CASP Practice Exam

SANS Security 528 CASP Practice Exam SANS Security 528 CASP Practice Exam Number: CAS-001 Passing Score: 750 Time Limit: 60 min File Version: 1.1 Join us in Washington DC the week of July 22nd for SEC528: SANS Training Program for the CompTIA

More information

Acano solution. Security Considerations. August 2015 76-1026-01-E

Acano solution. Security Considerations. August 2015 76-1026-01-E Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration

More information

Whitepaper. What You Need to Know About Infrastructure as a Service (IaaS) Encryption

Whitepaper. What You Need to Know About Infrastructure as a Service (IaaS) Encryption Whitepaper What You Need to Know About Infrastructure as a Service (IaaS) Encryption What You Need to Know about IaaS Encryption What You Need to Know About IaaS Encryption Executive Summary In this paper,

More information

Our Key Security Features Are:

Our Key Security Features Are: September 2014 Version v1.8" Thank you for your interest in PasswordBox. On the following pages, you ll find a technical overview of the comprehensive security measures PasswordBox uses to protect your

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.) Organizational risks 1 Lock-in Risk of not being able to migrate easily from one provider to another 2 Loss of Governance Control and influence on the cloud providers, and conflicts between customer hardening

More information

Security within a development lifecycle. Enhancing product security through development process improvement

Security within a development lifecycle. Enhancing product security through development process improvement Security within a development lifecycle Enhancing product security through development process improvement Who I am Working within a QA environment, with a focus on security for 10 years Primarily web

More information

GoodData Corporation Security White Paper

GoodData Corporation Security White Paper GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share

More information

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Cloud Assurance: Ensuring Security and Compliance for your IT Environment Cloud Assurance: Ensuring Security and Compliance for your IT Environment A large global enterprise has to deal with all sorts of potential threats: advanced persistent threats (APTs), phishing, malware

More information

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1 How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1 2 How does IBM deliver cloud security? Contents 2 Introduction 3 Cloud governance 3 Security governance, risk management

More information

Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015

Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015 Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015 1 P a g e ABSTRACT This study examined improving web

More information

THE BLUENOSE SECURITY FRAMEWORK

THE BLUENOSE SECURITY FRAMEWORK THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program

More information

Security of Cloud Storage: - Deduplication vs. Privacy

Security of Cloud Storage: - Deduplication vs. Privacy Security of Cloud Storage: - Deduplication vs. Privacy Benny Pinkas - Bar Ilan University Shai Halevi, Danny Harnik, Alexandra Shulman-Peleg - IBM Research Haifa 1 Remote storage and security Easy to encrypt

More information

SECURE CLOUD COMPUTING

SECURE CLOUD COMPUTING Outline SECURE CLOUD COMPUTING Introduction (of many buzz words) References What is Cloud Computing Cloud Computing Infrastructure Security Cloud Storage and Data Security Identity Management in the Cloud

More information

Secure Programming Lecture 12: Web Application Security III

Secure Programming Lecture 12: Web Application Security III Secure Programming Lecture 12: Web Application Security III David Aspinall 6th March 2014 Outline Overview Recent failures More on authorization Redirects Sensitive data Cross-site Request Forgery (CSRF)

More information

Security & Trust in the Cloud

Security & Trust in the Cloud Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer

More information

Security Management. Keeping the IT Security Administrator Busy

Security Management. Keeping the IT Security Administrator Busy Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching

More information

Cloud Computing Security Issues

Cloud Computing Security Issues Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security, [email protected] Something Old, Something New New: Cloud describes the use of a collection of services, applications,

More information

How to Achieve Operational Assurance in Your Private Cloud

How to Achieve Operational Assurance in Your Private Cloud How to Achieve Operational Assurance in Your Private Cloud As enterprises implement private cloud and next-generation data centers to achieve cost efficiencies and support business agility, operational

More information

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform Managing Privileged Identities in the Cloud How Privileged Identity Management Evolved to a Service Platform Managing Privileged Identities in the Cloud Contents Overview...3 Management Issues...3 Real-World

More information

March 2012 www.tufin.com

March 2012 www.tufin.com SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...

More information

RSA Security Anatomy of an Attack Lessons learned

RSA Security Anatomy of an Attack Lessons learned RSA Security Anatomy of an Attack Lessons learned Malcolm Dundas Account Executive John Hurley Senior Technology Consultant 1 Agenda Advanced Enterprise/ Threats The RSA Breach A chronology of the attack

More information

Protect Root Abuse privilege on Hypervisor (Cloud Security)

Protect Root Abuse privilege on Hypervisor (Cloud Security) Protect Root Abuse privilege on Hypervisor (Cloud Security) Nantharat Puwarang, CISSP Senior Technical Consultant Protect Software Defined Data Center 1 The Road to Software Defined Data Centers: Virtualization

More information

Assessing Risks in the Cloud

Assessing Risks in the Cloud Assessing Risks in the Cloud Jim Reavis Executive Director Cloud Security Alliance Agenda Definitions of Cloud & Cloud Usage Key Cloud Risks About CSA CSA Guidance approach to Addressing Risks Research

More information

Security of Cloud Computing

Security of Cloud Computing Security of Cloud Computing Fabrizio Baiardi [email protected] 1 Syllabus Cloud Computing Introduction Definitions Economic Reasons Service Model Deployment Model Supporting Technologies Virtualization

More information

Security Challenges in the Cloud

Security Challenges in the Cloud Security Challenges in the Cloud Claudia Eckert Fraunhofer Research Institution for Applied and Integrated Security (AISEC) Chair for IT Security, TU München 7.2. Darmstadt, Conference of the e-finance

More information

Safeguarding the cloud with IBM Dynamic Cloud Security

Safeguarding the cloud with IBM Dynamic Cloud Security Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from

More information