CIT 668: System Architecture

Similar documents
AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II

Cloud Security Overview

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Virtualization System Security

Making Data Security The Foundation Of Your Virtualization Infrastructure

Are Cache Attacks on Public Clouds Practical?

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Stephen Coty Director, Threat Research

Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

SECURE CLOUD COMPUTING

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

Security Solution Architecture for VDI

KeyLock Solutions Security and Privacy Protection Practices

Welcome. Panel. Cloud Computing New Challenges in Data Integrity and Security 13 November 2014

Analyzing HTTP/HTTPS Traffic Logs

Data Protection: From PKI to Virtualization & Cloud

Sophistication of attacks will keep improving, especially APT and zero-day exploits

John Essner, CISO Office of Information Technology State of New Jersey

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

White Paper How Noah Mobile uses Microsoft Azure Core Services

Virtualization Impact on Compliance and Audit

Virtualization and Cloud Computing

How To Protect Your Cloud Computing Resources From Attack

Secure Hosting Solutions For SAGE Energy Management

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Mitigating Information Security Risks of Virtualization Technologies

Whitepaper. What You Need to Know About Infrastructure as a Service (IaaS) Encryption

Not for distribution or reproduction.

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

A Survey on Virtual Machine Security

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Cloud and Data Center Security

Before we can talk about virtualization security, we need to delineate the differences between the

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

PCI DSS 3.0 Compliance

2) Xen Hypervisor 3) UEC

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Compromise-as-a-Service

Cloud Security Case Study Amazon Web Services. Ugo Piazzalunga Technical Manager, IT Security

MSSTAN 1504: Supplier Security Requirements and Expectations (SSRE) Web Applications For Externally Facing (Public) Data

HIPAA Privacy & Security White Paper

Cloud S ecurity Security Processes & Practices Jinesh Varia

Certified Secure Computer User

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE

Information Security Services

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Storm Clouds Rising: Security Challenges for IaaS Cloud Computing

BYOD: End-to-End Security

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

VMware vcloud Air Security TECHNICAL WHITE PAPER

How To Protect Your Data From Being Stolen

Learn the Essentials of Virtualization Security

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

BMC s Security Strategy for ITSM in the SaaS Environment

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE

The Education Fellowship Finance Centralisation IT Security Strategy

Learn the essentials of virtualization security

Big Data, Big Risk, Big Rewards. Hussein Syed

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Bellevue University Cybersecurity Programs & Courses

PICO Compliance Audit - A Quick Guide to Virtualization

With Eversync s cloud data tiering, the customer can tier data protection as follows:

Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

Maximizing Configuration Management IT Security Benefits with Puppet

Cloud computing: benefits, risks and recommendations for information security

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

Trend Micro Sicherheit in den Tiefen des Hypervisors. Richard Javet und Gabriel Kälin Trend Micro (Schweiz)

twilio cloud communications SECURITY ARCHITECTURE

Preparing an RFI for. This RFI has been updated to reflect the new requirements in Version 3.0 of the PCI DSS, which took effect January 2015.

Building Energy Security Framework

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January-2014 ISSN

CONTENTS. PCI DSS Compliance Guide

Securing the Cloud Infrastructure

Cloud Computing Governance & Security. Security Risks in the Cloud

SecureAge SecureDs Data Breach Prevention Solution

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise

Securing the Physical, Virtual, Cloud Continuum

FMCS SECURE HOSTING GUIDE

Virtual Switching Without a Hypervisor for a More Secure Cloud

Transcription:

CIT 668: System Architecture Cloud Security Topics 1. The Same Old Security Problems 2. Virtualization Security 3. New Security Issues and Threat Model 4. Data Security 5. Amazon Cloud Security Data Loss Downtimes Phishing Password Cracking Botnets and Other Malware Same Old Security Issues 1

Data Loss "Regrettably, based on Microsoft/Danger's latest recovery assessment of their systems, we must now inform you that personal information stored on your device such as contacts, calendar entries, to-do lists or photos that is no longer on your Sidekick almost certainly has been lost as a result of a server failure at Microsoft/Danger." Downtimes Phishing hey! check out this funny blog about you... 2

Password Cracking Botnets and Malware Features Isolation Snapshots Issues State Restore Complexity Scaling Transience Data Lifetime Virtualization Security 3

Virtualization Security Features: Isolation Using a VM for each application provides isolation More than running 2 apps on same server. Less than running on 2 physical servers Virtualization Security Features: Snapshot VMs can record state. In event of security incident, revert VM back to an uncompromised state. Must be sure to patch VM to avoid recurrence of compromise. State Restore VMs can be restored to an infected or vulnerable state using snapshots. Patching becomes undone. Worms persist at low level forever due to reappearance of infected and vulnerable VMs. 4

Complexity Hypervisor may be simple or not, but It is often another layer on top of host OS, adding complexity and vulnerabilities. Hypervisor Security Vulnerability consequences Guest code execution with privilege VM Escape (Host code execution) Vendor CVEs KVM 32 QEMU 23 VirtualBox 9 VMware 126 Xen 86 Xen CVE-2008-1943 VBox CVE-2010-3583 Inter-VM Attacks Attack via shared clipboard http://www.securiteam.com/securitynews/5gp021fkko.html Use shared folder to alter other VM s disk image CVE-2007-1744 5

Scaling Growth in physical machines limited by budget and setup time. Adding a VM is easy as copying a file, leading to explosive growth in VMs. Rapid scaling can exceed capacity of organization s security systems. Transience Users often have specialized VMs. Testing Different app versions Demos Sandbox that are not always up, preventing network from converging to a known state. Infected machines appear, attack, then disappear from the network before can be detected. Vulnerable systems likewise appear too briefly to be detected and patched. Data Lifetime Although data was correctly sanitized from VM disk and/or memory, snapshots can retain multiple copies of both VM memory and disk data. 6

Accountability No Security Perimeter Larger Attack Surface New Side Channels Lack of Auditability Regulatory Compliance Data Security New Security Issues Accountability No Security Perimeter Little control over physical or network location of cloud instance VMs Network access must be controlled on a host by host basis. 7

Larger Attack Surface Cloud Provider Your Network New Side Channels You don t know whose VMs are sharing the physical machine with you. Attackers can place their VMs on your machine. See Hey, You, Get Off of My Cloud paper for how. Shared physical resources include CPU data cache: Bernstein 2005 CPU branch prediction: Onur Aciiçmez 2007 CPU instruction cache: Onur Aciiçmez 2007 In single OS environment, people can extract cryptographic keys with these attacks. Lack of Auditability Only cloud provider has access to full network traffic, hypervisor logs, physical machine data. Need mutual auditability Ability of cloud provider to audit potentially malicious or infected client VMs. Ability of cloud customer to audit cloud provider environment. 8

Regulatory Compliance Certifications Data in Transit Data at Rest Data in Processing Data Remanence Homomorphic Encryption Data Security 9

Data Security Confidentiality Symmetric Encryption Homomorphic Encryption SSL Integrity MAC Homomorphic Encryption SSL Redundancy Redundancy Redundancy Availability Storage Processing Transmission Plus data remanence. Public Key Cryptography Homomorphic Public-key Encryption Public-key Crypto with additional procedure: Eval c* Eval pk (P, c 1,,c n ) Encryption of output value m*=p(m 1,,m n ) Encryption of inputs m 1,,m n to P P a Boolean circuit with ADD, MULT mod 2 Homomorphic encryption slides borrowed from people.csail.mit.edu/shaih/pubs/ihe-s-and-p-day.ppt 10

An Analogy: Alice s Jewelry Store Alice s workers need to assemble raw materials into jewelry But Alice is worried about theft How can the workers process the raw materials without having access to them? An Analogy: Alice s Jewelry Store Alice puts materials in locked glove box For which only she has the key Workers assemble jewelry in the box Alice unlocks box to get results Amazon Cloud Security 11

EC2 Security Group Configuration AWS Firewall is below Xen Hypervisor Security Groups vs. Local Firewall To configure security groups, you need AWS X.509 certificate and key Attacker has to hack AWS infrastructure to modify To configure local firewall, need Root access on EC2 instance. Attacker has to hack EC2 instance to modify. Use both for defense in depth What if you misconfigure one layer? What if one layer is hacked? 12

Virtual Private Cloud (VPC) AWS Security Bulletins Certifications and Accreditations PCI DSS Level 1 Payment Card Industry Data Security Standard Certifies use of credit cards in EC2 cloud. ISO 27001 Certifies infrastructure, data centers, and services Certifies information security practices SAS 70 Type II Audit every 6 months according to standards below HIPAA Allows compliant healthcare applications to be built. 13

AWS Audit Requirements AWS Audit Requirements Key Points Cloud is susceptible to same threats as non-cloud VMs provide isolation and net attack vectors Attacks from other VMs on same host Attacks on hypervisor Side channels allow other VMs to obtain data VM snapshots can remove malware or add it Transient VMs may not be updated Snapshots can revert to vulnerable or infected states Data must be secure in storage, transit, and processing Symmetric encryption (AES) encrypts data in storage SSL / TLS encrypts data in transit Homomorphic encryption allows data to be encrypted even while being processed. 14

References 1. Amazon, Amazon Web Services: Overview of Security Processes, http://aws.amazon.com/security, 2010. 2. Yanpei Chen, Vern Paxson and Randy H. Katz, What s New About Cloud Computing Security? Technical Report No. UCB/EECS-2010-5, http://www.eecs.berkeley.edu/pubs/techrpts/2010/eecs-2010-5.html, Jan. 20, 2010. 3. Tal Garfinkel and Mendel Rosenblum. When virtual is harder than real: security challenges in virtual machine based computing environments. In Proceedings of the 10th conference on Hot Topics in Operating Systems - Volume 10 (HOTOS'05), Vol. 10. USENIX Association. 4. Craig Gentry. Computing arbitrary functions of encrypted data. In Commun. ACM 53, 3 (March 2010), 97-105. DOI=10.1145/1666420.1666444 5. Doug Hyde. A Survey on the Security of Virtual Machines. http://www1.cse.wustl.edu/~jain/cse571-09/ftp/vmsec/index.html, 2007. 6. Tim Mather, Subra Kumaraswamy, and Shahed Latif, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, O Reilly Media, 2009. 7. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Compute Clouds. In S. Jha and A. Keromytis, eds., Proceedings of CCS 2009, pages 199 212. ACM Press, Nov. 2009. 8. NIST, DRAFT Guidelines on Security and Privacy in Public Cloud Computing, http://csrc.nist.gov/publications/drafts/800-144/draft-sp-800-144_cloud-computing.pdf, January 28, 2011. 15