Technische Herausforderungen der Cloud-Forensik



Similar documents
Technical Challenges of Forensic Investigations in Cloud Computing Environments

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

Data Protection: From PKI to Virtualization & Cloud

The Cloud, Virtualization, and Security

Encrypting Business Files in the Cloud

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Cloud Computing An Auditor s Perspective

Cloud Computing Architecture and Forensic Investigation Challenges

Cloud-Security: Show-Stopper or Enabling Technology?

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

D. L. Corbet & Assoc., LLC

CLOUD COMPUTING. When It's smarter to rent than to buy

BMC Control-M for Cloud. BMC Control-M Workload Automation

How To Manage Cloud Data Safely

What Cloud computing means in real life

Don t Forget Your Security Umbrella in the Cloud

Cloud Courses Description

Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

Cloud Computing Security: Public vs. Private Cloud Computing

Quick guide: Using the Cloud to support your business

NCTA Cloud Architecture

Cloud Courses Description

Cloud Security Introduction and Overview

Security Issues in Cloud Computing

ECE6130 Grid and Cloud Computing

Cloud computing: benefits, risks and recommendations for information security

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

When Security, Privacy and Forensics Meet in the Cloud

Digital and Cloud Forensics

Key Considerations of Regulatory Compliance in the Public Cloud

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Why back up the Cloud?

CLOUD COMPUTING READINESS CHECKLIST

How+Cloud+Service+Providers+Can Use+Data+Security+to+Win+Customers!

How To Understand Cloud Computing

Top 10 Cloud Risks That Will Keep You Awake at Night

Governance and Control in the Cloud. Infrastructure as a Service

ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone

Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013

Key Considerations and Major Pitfalls

KEY TERMS FOR SERVICE LEVEL AGREEMENTS TO SUPPORT CLOUD FORENSICS

Cloud Security Overview

Computer Forensics and Incident Response in the Cloud. Stephen Coty AlertLogic, AlertLogic_ACID

Cloud Service Rollout. Chapter 9

Cloud Computing Security Considerations

Cloud Forensic Investigation using Digital Provenance Scheme

Digital Forensics. Lab 10: Cloud Computing & the Future of Digital Forensics

CA API Management SaaS

How to survive in a world of Virtualization and Cloud Computing, where you even can t trust your own environment anymore. Raimund Genes, CTO

Cloud Computing. Security SaaS. ance. Complia. Cloud Storage. Colocs. Docker. European. Scalability IaaS. Bit barns

How to Secure Infrastructure Clouds with Trusted Computing Technologies

Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework

Cloud Computing; What is it, How long has it been here, and Where is it going?

Introduction to Cloud Computing - 02

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Certified Cloud Computing Professional VS-1067

Cloud Essentials for Architects using OpenStack

Deployment Options for Microsoft Hyper-V Server

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

Cloud Computing Training

Brainloop Cloud Security

Protec'ng Data and Privacy in a World of Clouds and Third Par'es Vincent Campitelli

ArcGIS for Server: In the Cloud

AVLOR SERVER CLOUD RECOVERY

ANALYSIS IN CLOUD COMPUTING ENVIRONMENTS

PCI Compliance in a Virtualized World

Cloud Models and Platforms

Cloud Computing Backgrounder

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control

Research on Digital Forensics Based on Private Cloud Computing

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

Kroll Ontrack VMware Forum. Survey and Report

From Zero to Secure in 1 Minute

Cloud Computing Security Master Seminar, Summer 2011

Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation

Introduction to Cloud Computing

Best Practices for Using MySQL in the Cloud

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

Cloud Database Demystified to Deliver SaaS Customer Value

DataCentred Cloud Storage

Cloud Security Michiel Perdeck. Cloud Security. drs. Michiel Perdeck CISSP CISA 14 oktober 2009 Security-Congres 1

PASS4TEST 専 門 IT 認 証 試 験 問 題 集 提 供 者

How To Ensure Correctness Of Data In The Cloud

Cloud Security Prof. Dr. Michael Waidner Fraunhofer SIT CASED. Fraunhofer SIT. Fraunhofer-Gesellschaft 2011

e-discovery Forensics Incident Response

Cloud Computing: Risks and Auditing

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

Computer Science. About PaaS Security. Donghoon Kim Henry E. Schaffer Mladen A. Vouk

Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Grid-Interop 2012

Whitepaper. What You Need to Know About Infrastructure as a Service (IaaS) Encryption

Chapter 1: Introduction

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects

Case Studies: Protecting Sensitive Data in

Cloud Computing. What is Cloud Computing?

Transcription:

Technische Herausforderungen der Cloud-Forensik Dominik Birk Horst Görtz Institute for IT Security Bochum (Germany) Anwendertag IT-Forensik 2011 April 12 th, 2011, Darmstadt

The Speaker Dominik Birk Ph.D. Student at the Horst Görtz Institute for IT Security (HGI) Focus: Cloud Security & Forensics Freelancer in the Field of IT Security Dr. Christoph Wegener, CISA, CISM Horst Görtz Institute for IT Security (HGI) Freelancer (wecon.it-consulting) Member of a-i3, GUUG, ISACA Main interests: Cloud Security, Network Security, Security and Privacy Issues in Social Networks

Cloud Computing Make it Run!

Cloud Computing Make it Secure!

Cloud Computing Make it Secure?

What happens if Security fails?

Do You Know Where Your Data is in the Cloud? Source: http://www.forrester.com/cloudprivacyheatmap

Scuse'me, why should I bother? 2009 2011 2008 2009 2010 2009 2008 2009 2010 - unauthorized access to GoogleDocs - GMail data loss - Gmail Outage - silent data corruption in S3 - S3 outage - compromisation of account information, including payment card data - Microsoft Hotmail downtime - Microsoft Azure outage - unencrypted external storage device - service outage - employee was tricked by Phishing Attack

Amazon Web Services Customer Agreement 7.2. Security. We strive to keep Your Content secure, but cannot guarantee that we will be successful at doing so, given the nature of the Internet. [ ] you acknowledge that you bear sole responsibility for adequate security, protection and backup of Your Content. We strongly encourage you, where available and appropriate, to use encryption technology to protect Your Content from unauthorized access and to routinely archive Your Content. We will have no liability to you for any unauthorized access or use, corruption, deletion, destruction or loss of any of Your Content. http://aws-portal.amazon.com/gp/aws/developer/terms-and-conditions.html

Fault Model Data and information in the cloud can be affected by inconsistencies Maliciously Intended Faults: Internal or external adversaries, economic rivals, former employees, malicious CSP Unintentional Faults: Internal communication errors, human failures,

Tell me, why is the Cloud so dark? Cloud Service Provider (CSP) artificially eclipse the Cloud for several reasons: Competitors could use workload information for improving their own range of services or use it to harm the reputation of the CSP. Adversaries could use technical information about infrastructure and system usage for launching attacks against the provider. Additionally, this "darkness" lies in the current principle of flexibility in the field of Cloud Computing. These circumstances yield one main issue: Is it possible for the customer to perform a traditional digital investigation in case it is needed for one of his virtual instances in the cloud environment of the vendor and if so, where the investigation begins?

SAP Cycle Conventional Digital Forensics "Chain of Custody" is needed The Securing-Analyzing-Presentation (SAP) Cycle Digital Investigations require an appropriate Securing of evidence data. This normally happens with the help of bitwise duplication of the physical volume. During the Analyzing stage, bits and pieces are pulled together for deciphering the story of what happened. In the Presentation phase, all other phases are documented and explained.

Digital Forensics in Real Private Clouds Securing the data: Possible because the Cloud is in your own data center ü Analyzing: Possible because you have trustworthy access-logs, images of VMs, router logs etc ü Problem: Private Clouds do not offer the advantages of real Public Clouds and scale only for huge companies with the help of extraordinary investments Security vs. Business.

Digital Forensics in Real Public Clouds Securing the data: You cannot secure the data in the traditional way because you don't know where exactly it is. O Analyzing: You possibly don't have trustworthy access-logs, images of VMs, router logs etc O Problem: Public Clouds do offer a lot of advantages, however they represent a risk to your sensitive data. The absence of physical access leads to further problems especially in cases of digital investigations.

Forensics in SaaS Eventually high-level logs will provide information Highly depends on what the CSP logs No deeper view into the system and its underlying infrastructure is possible connection through API only No possibility to install any toolkits, analysis tools etc. Source: startswithabang.com "Srsly, You know nothing about your data in SaaS environments"

Potential Solutions? CSP should provide meaningful high-level logs to their customers Evidence data could be offered to the customers through a forensic API: Data Provenance through access, error and event logs Who accessed my email on GMail at what time? Use already established Web Application Forensics Methodologies

Data Provenance for Forensics in SaaS Cloud Environments Data Provenance: known as meta-data that describes the ancestry or history of digital objects. * A time series of logged READ and WRITE access events within a given time-frame can be used to provide data provenance * K. Muniswamy-Reddy and M. Seltzer, Provenance as First Class Cloud Data

Forensics in PaaS You can control your own source! No control over the environment where the application runs Problem: Even if you log syscalls of your application, the underlying runtime environment can modify it. Again, what you get depends strongly on the CSP Source: DPA

Potential Solutions? Customers should never trust the features offered by the CSP Example: Encrypt your data on your own instead of relying on the encryption offered by PaaS CSP Establish application logging on your own Sign and encrypt your log-data on the fly before transferring it to third party servers for analysis

Forensics in IaaS Complete control over the VM but not the host system! It's possible to install suitable tools and configure your system for forensic purposes. What happens if you turn off the VM or cancel the contract? You still don't know the exact location of your data! Interesting: http://blog.cloud404.com/2010/01/22/cloud-investigation-%e2%80%93-part-deux/

Potential Solutions? Prepare your VMs for forensic investigations Make use of the power of snapshots for forensics Current Research: Combine VM-specific guest system logs with evidence data provided through the hypervisor (virtual introspection) only in collaboration with the CSP who controls the hypervisor Interesting: Forensics Examination of Volatile System Data Using Virtual Introspection Brian Hay et al

Summary: Cross-Disciplinary Aspects Lack of Transparency Loss of Evidence Data Compliance Issues Secure Data Deletion SLA Verification Missing Best Practices

Future Problem of Cloud Forensics Without Trust and Control no Digital Investigation is possible CSPs will not make the Cloud transparent Trust and Control need Transparency See: Digital Trust in the Cloud - Liquid Security in Cloudy Places

Conclusion The CSP obtains all the power! If you cannot trust the CSP, leave the Cloud! Methods of digital forensics have to be revised and adapted to the new Cloud Computing environment Will digital images (snapshots) be trusted by courts? CSPs should think about... giving the investigators the option of reconstructing the corresponding environment for recreating scenarios and test hypothesizes. offering customers physical hosts for solely usage.

Thanks for Your Attention! Dominik Birk dominik.birk@rub.de