Security in cloud computing: Opportunities and challenges
|
|
|
- Audrey Maryann Waters
- 10 years ago
- Views:
Transcription
1 Mazhar Ali, Samee U. Khan, Athanasios V. Vasilakos Security in cloud computing: Opportunities and challenges HanJung Youn Seoultech 2015
2 Table of Contents 1. Introduction 2. Cloud computing architectural framework 3. Cloud security challenges 4. Security solutions in literature 5. Security issues in MCC 6. Discussion and open issues 7. Conclusions 2
3 1. Introduction the cloud computing paradigm has gained the widespread popularity in the industry and academia. Security is one of the biggest obstacles that hamper the widespread adoption of cloud computing 3
4 2. Cloud computing architectural framework NISTs definition of cloud computing is widely accepted. The model comprising with three concepts Essential characteristics Service models Deploying models 4
5 2. Cloud computing architectural framework 5
6 2.1 Essential characteristics On-Demand self-service Customer can manage the services without human interaction. Broad network access Services must be accessible to the customers using the standard mechanisms and protocols: ubiquitous network access. Resource pooling The cloud s resources are shared among multiple customers by pooling in a multi-tenant environment. Rapid elasticity The resources can be rapidly and elastically scaled as per customer s demands. Measured service To optimize service provision, the usage and performance are metered and reported to customer and Cloud Service Provider(CSP). Multi-tenancy Additional feature added by Cloud Security Alliance(CSA) Single resource is shared by multiple customers 6
7 2.2 Service models Cloud service model is referred to as SPI(software, platform, infrastructure). Software as Service(SaaS) it only provides software through internet. Platform as Service(PaaS) It provide framework as IDE, OS, runtime engine for application. Infrastructure as Service(Iaas) It refers to the hardware infrastructure as network, storage, memory, processor. 7
8 2.3 Deployment models Private cloud Only for a single organization. Public cloud Cloud`s infrastructure is owned by CSP and opend to general public and organization. Community cloud It shared by a number of organizations and/or customers forming a community. Hybrid cloud Mix of two or more clouds 8
9 3. Cloud security challenges Cloud models are supposed to use various technologies. This leads various security risk and vulnerabilities. This chapter is about security challenges at abstract level in Communication security Architectural security Contractual and legal aspects 9
10 3.1 Challenges at communication level There are communications between the customers and cloud(external), cloud and infrastructure(internal). In external case is similar as any other communication over the internet. Denial of service, spoofing, eavesdropping Solution is also same SSL, IPSec, IDS, IPS, certificate, encryption 10
11 3.1 Challenges at communication level Internal communication generates cloud specific challenges because of its features and structure. Shared communication infrastructure Virtual network Security misconfiguration 11
12 3.1.1 Shared communication infrastructure Resource pooling not only results sharing of resources, but also allow the sharing of network infrastructure[28]. This provides attacker the window of cross-tenant attack[39]. Usually scanning is not allowed because it is hard to distinguish that attacker access or customer access on components. The user on cloud granted as super-user to manage their VMs. [12,28,39] 12
13 3.1.2 Virtual network Virtual network is a logical network built over a physical network [116]. The software-based components support the networking of VMs over the same host. Security mechanisms on physical network cannot monitor the traffic over virtualized network. Virtual network shared on multiple VMs that cause the possibility of attacks, such as DoS, traffic monitoring, sniffing, spoofing. The data transit of users can suffer from costly breaches. [33,47,116] 13
14 3.1.3 Security misconfigurations A small misconfiguration can break the security of system. Most misconfiguration occur when administrator choose familiar configuration tool with not necessarily covers all the security requirements. When migrating system, or changing traffic pattern or topology, the configuration must be dynamically managed to ensure security. any weakness in session configurations and protocol configurations can be exploited for session hijacking and to gain user sensitive data. [24,26,101] 14
15 3.2 Challenges at architectural level Virtualization issues Data/storage issues Web application and application programming interface (API) security Identity management and access control 15
16 3.2.1Virtualization issues(1/3) Virtualization allows the use of same physical resources by multi users. Several VMs can be mapped to the same physical resources allowing the resource pooling in multi-tenant environment. VM image sharing [39,47] Users can upload and download images from the repository. Malicious user can analysis the code of the image to look for probable attack point. Or they can upload image that contains malware. VM isolation [33,101] Each VMs in same physical hardware need to be isolated from each other. Although logically isolated each other, the access to same physical resources can lead to data breach and cross-vm attacks. 16
17 3.2.1Virtualization issues(2/3) VM escape [47,73,97] It is a situation in which malicious user or VM escapes from the control of VMM or hypervisor. This can provides attacker access to other VMs or let VMM(VM monitor) down, or access on computing, storage hardware. VM migration [20,39,47,128] It is the process of relocating a VM to another physical machine without shutting down. There are many reasons of migration, such as load balancing, fault tolerance, and maintenance. The data and code of VM become vulnerable to attackers during migration. 17
18 3.2.1Virtualization issues(3/3) VM rollback [39, 90, 116] Rollback can revert previous vulnerability, security. Hypervisor issues [102, 106, 128] The VMs management and isolation is the responsibility of the VMM. Compromised VMM can cause huge attack. VM sprawl [80, 97] It is a situation where a number of VMS on the host system is continuously increasing and instantiated VMs are in idle state. This causes the resources of the host machine to be wasted. 18
19 3.2.2 Data/storage issues The cloud computing model does not deliver users with full control over data. Data privacy and integrity [39,47,65,93,99,110] In a shared environment, the security strength of the cloud equals the security strength of its weakest entity. A successful attack on a single entity will result in unauthorized access to the data of all the users. The cryptographic key generation and management for cloud computing paradigm is still not standardized. 19
20 3.2.2 Data/storage issues Data recovery vulnerability [10,17,28] In case of memory and storage resources, a malicious user can employ data recovery techniques to obtain the data of previous users. Improper media sanitization[28,47,107] If the CSP does not sanitize the device properly, the data can be exposed to risks. Data backup [101] A regular backup is needed at the CSP side. Moreover, the backup storage also needs to be protected from attacks. 20
21 3.2.3 Web application and API security Top ten risk in the web applications Injection (SQL, OS, and LDAP) Broken Authentication and Session Management Cross-Site Scripting (XSS) It occurs when an application takes untrusted data and sends it to a web browser without proper validation or escaping. Insecure Direct Object References Security Misconfiguration Sensitive Data Exposure Missing Function Level Access Control 21
22 3.2.3 Web application and API security Cross-Site Request Forgery (CSRF) It forces a logged-on victim`s browser to send a forged HTTP request, including victim`s session cookie and other authentication information to hazard web application with confusing that is legal. Using Known Vulnerable Components Invalidated Redirects and Forwards The traditional security solutions are not suitable for the cloud environment because the risks of web application in cloud is much greater and complex issues. 22
23 3.2.3 Web application and API security The CSP can publish their APIs to market the features of their cloud. At one hand, it helps the users to know the details about components and functions of cloud. On the other hand, the cloud architecture is exposed to the attackers. 23
24 3.2.4 Identity management and access control A cloud needs a dynamic, fine-grained, and strict access control mechanisms to control unauthorized operations within the cloud. Also it needs management system to quickly update access control policies in case of newly joining or leaving. Weak identity management example, denial of service by account lock-out, weak credential reset mechanisms, insufficient authorization checks. 24
25 3.3. Challenges at contractual and legal levels Adopting the cloud computing, results in moving the organizations data and applications to the administrative control of CSP. This brings many issues to the front which are related to the service level agreement (SLA), legalities, and physical locations of the data. 25
26 3.3.1 Service level agreements(sla) The SLA is a document that specifies the terms and conditions between the user and CSP. It indicates minimum performance level that CSP has to provide. counteractive actions. consequences in case of breach of the agreement between user and CSP. There are many issues about conflict between user and CSP, such as monitoring, statistic report. It is kind of technical issues 26
27 3.3.2 Legal issues There are case of local difference of legal issue. Sometime, the data may be present in more than one location having different laws about digital security. Moreover, in case of a dispute the issue of jurisdiction arises as to which laws would be applicable. 27
28 3.3.2 Legal issues The E-discovery refers to an issue when the hardware of the CSP gets seized for investigations related to particular customer according to the laws of geographic location. Such a case, results in risk of privacy breach of other users. 28
29 4. Security solutions This section discusses various approaches proposed in the literature to counter the security issues discussed in Section 3. The counter measures for communication issues and architectural issues which was explained in many paper. Each solutions are compared and analyzed in table form. 29
30 4.1 Counter measures for communication issues In [21], the CSA guidelines recommend the use of a combination of virtual LANs, IDS, IPS, and firewalls to protect the data in transit. In [67],the authors proposed Advanced cloud protection system (ACPS), which aim at providing greater security to the cloud resources. The ACPS is divided into multiple modules located at the host platform. The interceptor module is responsible for detecting any suspicious activities at the host. The detected suspicious activities are recorded by the warning recorder module and are stored in the warning pool.[84] In [59], A security tool for the cloud computing, called CyberGuarder is proposed to provide virtual network security through the deployment of virtual network devices. It implemented isolation by utilizing virtual private network(vpn). CyberGuarder also provide VM security through the integrity verification of applications and by monitoring of system calls invoked by the applications. 30
31 4.1 Counter measures for communication issues In [116],a virtual network model that safeguards the virtual networks against sniffing and spoofing attacks is proposed. In bridge mode the hypervisor attaches the VM directly to the virtual Ethernet bridge. The bridge in turn connects to the physical network. The route mode creates a P2P link between the VM and the VM management domain. This model is divided into three layers: routing, firewall, and shared network layer. In [42], the author presented a cloud network security solution by implementing a novel tree-rule firewall instead of conventional list-rule firewall to increase performance and security. 31
32 4.1 Counter measures for communication issues Authors in [72] presented a technique named DCPortalsNg for isolation of virtual networks for various VMs. It also prevents the cross VM denial of service (DoS). In [120], system called SnortFlow for intrusion prevention within cloud environment is proposed. It utilizes the features of Snort and OpenFlow systems. 32
33 4.1 Counter measures for communication issues 33
34 4.2. Counter measures for architectural issues Measures about virtualization[21] The implementers should secure each virtualized OS in each of the guest VMs. Built in security measures should be adopted for virtualized OS. Third party security technology should be used to cut down dependency on the CSP. The VMs at rest should be encrypted. Security vulnerability assessment tools should cover the virtualized environment. VM images at rest should be patched with the latest fixes as soon as required. Moreover, the protection mechanism should be in place until VMs are patched. Virtualization aware security tools should be implemented and used in the cloud computing environment 34
35 Virtual image security Wie et al. [113] proposed Mirage, an image management system for the cloud environment. It provides a fourfold security to the VM images. In [51], the authors proposed encrypted virtual disk images in cloud (EVDIC) that exploits encryption to secure the VM images on the disk. It uses advanced encryption standard (AES) with a key size of 256 bits. [90] proposed an approach that checks for the outdated software and vulnerabilities in the VM images. Two modules work in the proposed scheme : update checker and Online penetration suite(ops) The ImageElves in [48] targeted at providing updated software installs, and patches for the VMs in the cloud. An Offline Patching Scheme (OPS-offline) is introduced in [27] to identify and rectify images with outdated software and malware vulnerabilities. 35
36 Virtual image security 36
37 VM security during execution(1) In [58],the architecture prohibit memory access from management domain to user domain using foreign mapping. Hypervisor is always monitoring memory access and ensures encryption of information of user domain. 37
38 VM security during execution(2) [129], CloudVisor is a light weight security module, intercept every control transitions between VMM and VMs. It also monitors the address translation to enforce memory isolation. The integrity is ensured by using Merkle tree, MD5 hash and Trusted Platform Module(TPM). [118], HyperCoffer only trusts the processor and consider everything else as the untrusted components. The Address Independent Seed Encryption (AISE) and Merkle tree are used for encryption and integrity checking. Like [129], it monitors the control transition between VMM and VMs. 38
39 VM security during execution(3) [46], CloudSec monitors the VMs physical memory by using VM inspection technique. After VM launching, it identifies the memory layout of the VMs hardware by inspecting the control registers of the VMs CPU. And it requests for Kernel Structure Definition through the hypervisor. It maps the physical memory to the KSD that generates the OS view of the live VM [31], Exterior, dual VM architecture that launches a Secure Virtual Machine (SVM) for executing a guest virtual machine (GVM). The kernel data rootkit attacks and intrusions are detected by introspection of code in the SVM. 39
40 VM security during execution(3) 40
41 VM migration(1) Aslam et al.[9], presented a VM migration technique that allows migration only if the destination platform is secure up to the user defined level. A Trusted Assurance Level is introduced that specifies the trust level of the cloud platform. [109], the author used a Virtual TPM bound with a VM that certifies the integrity of the VM. Property based remote attestation is used to verify the integrity and security conditions of the remote host before migration. Authors in [22] also utilized trusted computing for secure VMvTPM migration. The security for migration is provided by using the key hierarchy of vtpm in [22]. 41
42 VM migration(2) [7], The authors used trusted computing is used for attestation and integrity verification of source and destination platforms. Its framework also used role based access control policies to ensure security against VM hopping and useless migrations. [105], the authors proposed a framework that migrate not only the VM but the security context is also migrated to the destination host. The security context manager module migrates the static security context state, followed by the migration of VM state information by the VM state migrator module. The final phase is the migration of the dynamic security context to the destination host by the security context migrator. 42
43 VM migration(3) 43
44 Secure hypervisor (VMM)(1) Zhang et al,[130] presented HyperCheck to ensure a secure execution of the hypervisor. It is a hardware assisted framework using the CPU system management mode(smm). Registers and network card is utilized to detect and monitor. [115], The authors proposed scheme divides the hypervisor into two major components. The de-privileged DeHype component, that is decoupled from the OS and is executed in the user mode. This separation make hypervisor secure at attacks. [111], HyperLock provides an isolated address space than the host OS and with the limited instruction set. Authors proposed hypervisor shadowing technique to further safeguard the VMs running on the host system. 44
45 Secure hypervisor (VMM)(2) Pan et al.[76] reduce the trusted computing base and restrict the functionality of hypervisor in root mode for securing the hypervisor and running VMs. The authors divide the functionality of hypervisor into sub modules, namely: (a) Guestvisor, non-root mode and (b)splitvisor, which is executes in root mode and is responsible for isolating multiple Guestvisors. [102], NoHype is based on the following key ideas, (a) preallocation of the memory and cores, (b) use of virtualized I/O devices only, (c) system discovery process at the boot time of VM OS, and (d) avoiding indirections. It propose hypervisor elimination 45
46 Secure hypervisor (VMM)(3) 46
47 4.2. Counter measures for architectural issues Data/storage security solution s recommendations [21] The key management should be performed by either the organizations/users themselves or by a trusted cryptographic service from a credible source. The best practices regarding the key management and encryption products from reliable sources should be used. It is recommended to use off-the-shelf-technology where possible. The key scope should be maintained at the individual or group level. The use of standard algorithms is recommended and proprietary encryption algorithms are discouraged. 47
48 Cloud data/storage security(1) [114] SecCloud secures the user data in cloud and computations performed on that. It use bilinear Deffie Hellman for key management. The computational security is ensured about partial computation and use of invalid data. It also using Merkle tree to get more security. [98], The data is encrypted with 128-bit SSL encryption and MAC is appended afterwards. Based on the Sensitivity Rating(SR value), user`s security requirement rating. the data is allotted space in one of the three proposed partitions in the cloud. The proposed partitions are public, private. The data and index are sent to the cloud where they are stored depending on the SR value. 48
49 Cloud data/storage security(2) [110], authors proposed methodology conducting the verification of the cloud data correctness without explicit knowledge of the whole data. The erasure correcting code and homomorphic tokens are used for the aforesaid purpose. Also, the proposed scheme performs error localization by detecting misbehaving server. [103], The File Assured Deletion (FADE) is light weight protocol use both sym-asym encryption. It works with a group of key managers(km) that act as a trusted 3 rd party. The data key is used to encrypt file of client, and another key is used to encrypt data key. it is using Shamirs scheme and RSA to manage key. 49
50 Cloud data/storage security(2) Liu et al, [64] proposed TimePRE, a time based proxy reencryption combined with Attribute Based Encryption (ABE) to support secure data sharing with fine grained access control. Unlike other proxy re-encryption schemes, it does not require the data owner to be online for user revocation and generation of new re-encryption keys. The access control is ensured by use of ABE that identifies user by set of attributes rather than identity. 50
51 Cloud data/storage security 51
52 Security solutions for cloud applications and APIs Cloud applications and APIs recommendations[21] Security and privacy requirements should be defined in accordance to the needs of the cloud development and deployment. The defined requirements should also be in the order based on the impact and possibility. The risks and attack vectors specific to the cloud computing must be explored and assimilated into the security requirements. The risk models and attack models should be continuously built and maintained. The secure software development life cycle and software architecture should be developed and maintained. The re-useable software components that are known to alleviate the known security and breach scenarios should be used. Regular penetration testing for web applications should be carried out. Manual tests must be carried out periodically to ensure secure session management of web applications. 52
53 Security solutions for cloud applications and APIs [91], author proposed the use of Diameter-AAA protocol. It employs network based access control to filter the illegal access request to the cloud applications. [6], authors proposed the use of TPM and ECC to provide a secure platform for application execution in the cloud. [45], authors proposed the provision of Security as a Service (SECaaS) in cloud, provided by different clouds, and in dependent cloud, which works in all levels. [117], proposed an API management platform for the cloud, with Open Authorization which is token based access control mechanism. The consumer calls the API by using the token signed with its private key. The provider sends the token to the API management platform for validation. If valid, the access is granted to the consumer. 53
54 Security solutions for cloud applications and APIs 54
55 4.2. Counter measures for architectural issues Identity management and access control requirement Open standard federations, for example, SAML and OAuth, should be preferred if possible. The source of the attributes should be as close to master source as possible. The attributes should be validated at master source or as close as possible. All characteristics of the entities should have an identified trust level. Bi-directional trust should be ensured for secure relationship and transactions. The services should have import/export function into standards such as XACML and OASIS. 55
56 Identity management and access control [108], authors extended Attribute Set Based Encryption (ASBE) to present Hierarchical ASBE that utilize hierarchical user structure. In HASBE, Root authority is trusted by the domain level, and domain is trusted by subdomain level authorities or users. The access control is also defined as a hierarchical tree structure. [86], author proposed use of ABE and the Attribute Based Signature (ABS) for access control and anonymous authentication. [122], Role Based Multi-tenancy Access Control (RB-MTAC) scheme that combines identity management and role based access control. The scheme requires the users to register with the cloud and obtain unique ID and password. And user is directed to the role assignment module that connects to the DB and assign roles based on information. 56
57 Identity management and access control [19], Simple Privacy-preserving Identity-Management for Cloud Environment (SPICE). It exploits the concept of group signature and randomization for providing the anonymous authentication, delegatable authentication, unlinkability, accountability, and user centric access control. [23], an identity management framework for the cloud networking infrastructure that is centered on User Managed Access (UMA) protocol. The infrastructure in the proposed scheme is seen as the Authorization Manager (AM). The service and users identities are managed by AM. 57
58 Identity management and access control 58
59 Contractual and legal issues [36], SecAgreement that articulates the security parameters and services for provision in the SLA. It extends the template of the wel service agreement to incorporate seciriry constraints and metrics into the terms of SLA. [37], a methd react to the SLA violations or service cancelation to reduce the security risk [79], SPECS, SLA-based approach to security as a service. It divede the SLA life cycle in three stage, (a) negotiation, (b) enforcement, and (c) monitoring. [38], A solution for embedding security controls in cloud SLA, it is concentrating on vocabulary of SLA, with XML schema. The vocabulary allows the organizations to compare different secure services. 59
60 Contractual and legal issues 60
61 5. Security issues in MCC(1/3) Mobile cloud computing inherit security issues that aforementioned. However, MCC has constraint about resources such as low processing power, less storage capacity, limited energy, and capricious internet connectivity. These make interruptions to adapt cloud computing security solution in MCC. 61
62 5. Security issues in MCC(2/3) Mobile application security The traditional security software like antivirus and IDS are not possible to run continuously on the mobile device. The basic concept of offloading computation can also be used to run heavy security programs on mobile. User privacy The mobile device can be the source of user location leakage especially due to location based services The concept of location cloaking can be used to preserve user location privacy by concealing the user exact geographic position 62
63 5. Security issues in MCC(3/3) Authentication Dynamic credential generation can be used for secure authentication. The credential generation can be offloaded to a trusted third party due to low processing power of the mobile device. Data security Computation intensive encryption algorithms with large keys are not feasible to be run at the mobile device. The compute intensive tasks of encryption / decryption can be moved to trusted third party for securing the user data. 63
64 6. Discussion and open issues The cloud not only retains the orthodox security concerns but also entails the novel issues arising due to the use of new technologies and practices. Such as shared pool of resources, multi tenancy, agreement and legal issues. But also integrity, confidentiality, authority, privacy show critical issues. The first and the foremost need is to develop a comprehensive and integrated security solution that includes most of the major security requirements in the cloud environment. there is a need to find security solutions that create a balance between the security requirements and performance to overcome constraints. 64
65 7. Conclusions There was many conventional security issues for, and cloud computing`s own specific issues based on different system. Understanding the security threats and counter measures will help organizations to carry out the cost benefit analysis and will urge them to shift to the cloud. Tabulated analysis will greatly help the readers to compare and analyze the pros and cons of the research endeavors. This survey presented the security issues that arise due to the shared, virtualized, and public nature of the cloud computing paradigm. 65
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
A Survey on Security issues in cloud computing
A Survey on Security issues in cloud computing D. Anil Kumar, Y. Manasa 1 Assistant Professor, Dept of CSE, Qis Institute of Technology, Ongole, 2 Dept of IT, NRI Institute of Technology, Vijayawada. [email protected],
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL Ensuring Compliance for PCI DSS 6.5 and 6.6 CONTENTS 04 04 06 08 11 12 13 Overview Payment Card Industry Data Security Standard PCI Compliance for Web Applications
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6 Ensuring compliance for PCI DSS 6.5 and 6.6 Page 2 Overview Web applications and the elements surrounding them
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Chapter 4 Application, Data and Host Security
Chapter 4 Application, Data and Host Security 4.1 Application Security Chapter 4 Application Security Concepts Concepts include fuzzing, secure coding, cross-site scripting prevention, crosssite request
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
SERENA SOFTWARE Serena Service Manager Security
SERENA SOFTWARE Serena Service Manager Security 2014-09-08 Table of Contents Who Should Read This Paper?... 3 Overview... 3 Security Aspects... 3 Reference... 6 2 Serena Software Operational Security (On-Demand
Security Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
LBSEC. http://www.liveboxcloud.com
2014 LBSEC http://www.liveboxcloud.com LiveBox Srl does not release declarations or guarantee regarding this documentation and its use and declines any expressed or implied commercial or suitability guarantee
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security
SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING
SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING 1. K.SURIYA Assistant professor Department of Computer Applications Dhanalakshmi Srinivasan College of Arts and Science for Womren Perambalur Mail: [email protected]
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
QuickBooks Online: Security & Infrastructure
QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...
Cloud Security Overview
UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Security Overview Murat Kantarcioglu Outline Current cloud security techniques Amazon Web services Microsoft Azure Cloud Security Challengers
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
OWASP AND APPLICATION SECURITY
SECURING THE 3DEXPERIENCE PLATFORM OWASP AND APPLICATION SECURITY Milan Bruchter/Shutterstock.com WHITE PAPER EXECUTIVE SUMMARY As part of Dassault Systèmes efforts to counter threats of hacking, particularly
WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services
WEB SITE SECURITY Jeff Aliber Verizon Digital Media Services 1 SECURITY & THE CLOUD The Cloud (Web) o The Cloud is becoming the de-facto way for enterprises to leverage common infrastructure while innovating
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
Guidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Attack Vector Detail Report Atlassian
Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015 Prepared By Report Description Notes [email protected] The Attack Vector Details report provides details of vulnerability
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
How To Protect Your Cloud Computing Resources From Attack
Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
WEB APPLICATION FIREWALLS: DO WE NEED THEM?
DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer [email protected] www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST
CENTER FOR ADVANCED SECURITY TRAINING 618 Designing and Implementing Cloud Security About EC-Council Center of Advanced Security Training () The rapidly evolving information security landscape now requires
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Nuclear Regulatory Commission Computer Security Office Computer Security Standard
Nuclear Regulatory Commission Computer Security Office Computer Security Standard Office Instruction: Office Instruction Title: CSO-STD-1108 Web Application Standard Revision Number: 1.0 Effective Date:
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
A Review on Cloud Computing Vulnerabilities
A Review on Cloud Computing Vulnerabilities Ms. Sugandha Nandedkar, Ms.Sangeeta Kakarwal Asst.Prof., Department of Computer Science and Engineering, DIEMS /Dr. BAMU, Aurangabad, MH, India. Prof. and HOD,
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Virtualization and Cloud Computing
Virtualization and Cloud Computing Security is a Process, not a Product Guillermo Macias CIP Security Auditor, Sr. Virtualization Purpose of Presentation: To inform entities about the importance of assessing
Cloud Security Framework (CSF): Gap Analysis & Roadmap
Cloud Security Framework (CSF): Gap Analysis & Roadmap Contributors: Suren Karavettil, Bhumip Khasnabish Ning So, Gene Golovinsky, Meng Yu & Wei Yinxing Please send comments & suggestions to Suren Karavettil
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Comprehensive Security for Internet-of-Things Devices With ARM TrustZone
Comprehensive Security for Internet-of-Things Devices With ARM TrustZone Howard Williams mentor.com/embedded Internet-of-Things Trends The world is more connected IoT devices are smarter and more complex
White Paper Secure Reverse Proxy Server and Web Application Firewall
White Paper Secure Reverse Proxy Server and Web Application Firewall 2 Contents 3 3 4 4 8 Losing control Online accessibility means vulnerability Regain control with a central access point Strategic security
Barracuda Web Site Firewall Ensures PCI DSS Compliance
Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive
Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC www.fmsinc.org 1 2015 Financial Managers Society, Inc. Cloud Security Implications
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
SSL BEST PRACTICES OVERVIEW
SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
How To Secure Cloud Computing
Next Generation Cloud Computing Issues and Solutions Jeon SeungHwan 1, Yvette E. Gelogo 1 and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeong-dong, Daeduk-gu, Daejeon,
FACING SECURITY CHALLENGES
24 July 2013 TimeTec Cloud Security FACING SECURITY CHALLENGES HEAD-ON - by Mr. Daryl Choo, Chief Information Officer, FingerTec HQ Cloud usage and trend Cloud Computing is getting more common nowadays
CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India
CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
Public Cloud Security: Surviving in a Hostile Multitenant Environment
Public Cloud Security: Surviving in a Hostile Multitenant Environment SESSION ID: EXP-R01 Mark Russinovich Technical Fellow Windows Azure, Microsoft @markrussinovich The Third Computing Era Security Could
CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:
CompTIA Cloud+ Length: 5 Days Who Should Attend: Project manager, cloud computing services Cloud engineer Manager, data center SAN Business analyst, cloud computing Summary: The CompTIA Cloud+ certification
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems
Eric A. Hibbard, CISSP, CISA Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems
Soteria Health Check A Cyber Security Health Check for SAP systems Soteria Cyber Security are staffed by SAP certified consultants. We are CISSP qualified, and members of the UK Cyber Security Forum. Security
Stephen Coty Director, Threat Research
Emerging threats facing Cloud Computing Stephen Coty Director, Threat Research Cloud Environments 101 Cloud Adoption is Gaining Momentum Cloud market revenue will increase at a 36% annual rate Analyst
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
Hack Proof Your Webapps
Hack Proof Your Webapps About ERM About the speaker Web Application Security Expert Enterprise Risk Management, Inc. Background Web Development and System Administration Florida International University
How to Secure Infrastructure Clouds with Trusted Computing Technologies
How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper Securing Web Applications As hackers moved from attacking the network to attacking the deployed applications, a category
CompTIA Cloud+ 9318; 5 Days, Instructor-led
CompTIA Cloud+ 9318; 5 Days, Instructor-led Course Description The CompTIA Cloud+ certification validates the knowledge and best practices required of IT practitioners working in cloud computing environments,
