Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive



Similar documents
Where every interaction matters.

PCI DSS and the A10 Solution

Public Cloud Security: Surviving in a Hostile Multitenant Environment

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Cloud Security:Threats & Mitgations

PCI DSS and the A10 Solution

T2 IaaSand PCI Compliance. Robert Zigweid, IOActive

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

GoodData Corporation Security White Paper

SERENA SOFTWARE Serena Service Manager Security

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

05.0 Application Development

APIs The Next Hacker Target Or a Business and Security Opportunity?

PCI Compliance Updates

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Keyword: Cloud computing, service model, deployment model, network layer security.

Introduction to the EIS Guide

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

D. L. Corbet & Assoc., LLC

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

OWASP AND APPLICATION SECURITY

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

Cloud Computing Security Considerations

Cloud Security. Let s Open the Box. Abu Shohel Ahmed ahmed.shohel@ericsson.com NomadicLab, Ericsson Research

Evaluating IaaS security risks

Google Identity Services for work

managing SSO with shared credentials

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Effective End-to-End Cloud Security

Security Issues in Cloud Computing

A Survey on Cloud Security Issues and Techniques

Whitepaper. What You Need to Know About Infrastructure as a Service (IaaS) Encryption

Chapter 10. Cloud Security Mechanisms

Data Protection: From PKI to Virtualization & Cloud

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

Passing PCI Compliance How to Address the Application Security Mandates

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

The Hillstone and Trend Micro Joint Solution

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Web Engineering Web Application Security Issues

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

Virtualization Impact on Compliance and Audit

Magento Security and Vulnerabilities. Roman Stepanov

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

IBX Business Network Platform Information Security Controls Document Classification [Public]

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

PCI DSS 3.0 Compliance

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Achta's IBAN Validation API Service Overview (achta.com)

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Cyber Essentials Questionnaire

FACING SECURITY CHALLENGES

DiamondStream Data Security Policy Summary

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Cloud Computing: Risks and Auditing

How to Grow and Transform your Security Program into the Cloud

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

What is Web Security? Motivation

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Cloud-Security: Show-Stopper or Enabling Technology?

PCI Compliance for Cloud Applications

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Introduction to Information Security

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

Cloud Security Best Practices

Xerox Mobile Print Cloud

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

Intro to Firewalls. Summary

Overview of the Penetration Test Implementation and Service. Peter Kanters

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Securing Corporate on Personal Mobile Devices

External Supplier Control Requirements

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

Lecture 02b Cloud Computing II

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

How To Secure Your Data Center From Hackers

Security Management. Keeping the IT Security Administrator Busy

Introduction to the Mobile Access Gateway

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Transcription:

Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1

Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise Conclusions and Questions 2

INTRODUCTION

SAML-Enable Everything as a Service FLEXIBILE AUTHENTICATION METHODS MANAGED APP INTEGRATIONS Service Providers (SPs) Individuals Sign In Username Password HOSTED/CLOUD SERVICE Cloud Service Providers (CSPs) Third Party Cloud Apps Third Party Identity Sources Enterprise VPC Third Party On-Premises Apps Social ID / OpenID LDAP Organization Management User Management Authentication Authorization 1 st Party Cloud Services First Party Apps Third Party Identity Stores Enterprise Identity Providers How can security weigh-in with real risks?

Cloud Security Wisdom This wisdom is captured best here:

Cloud Security Wisdom What Is It?

Modeling Risks Programmatically Microsoft SDL Process Training Requirements Design Implementation Verification Release Response Developing Threat Models Structured approach Repeatable way to identify attack surfaces (i.e. risk) Develop mitigations and acceptance criteria Can be applied to anything even Cloud environments

Threat Modeling Cloud Environments Threat analysis guidance provided in this domain good thinking, now let s talk about how to create threat models

THREAT MODEL PRIMER

Why Threat Model? Threat modeling is not just for code Anything can be Threat Modeled Output will drive risk analysis and business decisions Implementing in the Cloud is still code Deploying and managing servers is all software It has driven the rise of Dev-Ops personnel 10

When to Threat Model Not a one time event Adding or removing assets/components It is never too late! What you need to know before you start What are you building? What needs to be protected? You can be too early, especially on new projects 11

Threat Modeling Tools The tool used is less important than the data recorded Using a tool already? Keep doing so! Whiteboards are a favorite Do not forget longer term retention Data Flow Diagrams 12

Assessment and Identifying Threats Identify Data Assets Determine Each Assets Relative Value Identify Actors and Data Asset Visibility Internal Personnel CSP Personnel Government? 13

Assessment and Identifying Threats Data Flow Diagram Identify Points of Trust Boundaries Points at which control changes Identify Points of Vulnerability Know Where Your Data Is To the best of your visibility 14

ASSESSING THREATS

CSP Responsibilities IaaS Hardware Layer Network Layer (IDS, DDoS, Guest Instances) Instance Access Control Rules 16

CSP Responsibilities PaaS Hardware Layer Operating System Layer Network Layer May not be inherited from IaaS Access Control Rules 17

CSP Responsibilities SaaS All asset integrity and visibility is dependent upon the CSP regardless of service 18

Data Visibility CSP Threats IaaS Government requests May be able to be mitigated Network Traffic Shaping and Manipulation Hypervisor Trust 19

CSP Threats PaaS IaaS threats included Like a Managed Service Provider Shared Root/Admin Less control over data Depends on nature of PaaS Data Storage vs. Application Hosting Depends on how the data is used 20

CSP Threats SaaS IaaS and PaaS threats included No guaranteed control over data CSP must be completely trusted 21

MITIGATING THREATS

Mitigating CSP Threats IaaS Data Storage Storage location Encryption and key management control Avoid using ephemeral disks Authentication and Authorization Use your own system whenever possible 23

Mitigating CSP Threats IaaS Data transit Encryption with your own certificates if possible Pass through load balancers instead of terminating connections there Includes administration Network segmentation and firewalls, if available 24

Mitigating CSP Threats PaaS Monitor all access, regardless of who It might not be a critical event but then again, it might Use encrypted transit with your certificates/keys Be careful where you store the private keys Encrypt before storing Log where possible 25

Mitigating CSP Threats SaaS There is no control Deleted vs. non-visible Legal might help 26

The Fun Part: Multiple Services Most Cloud implementations use multiple services Data Flow Diagrams show their worth It is necessary to break the components down Take each service on its own merit They might not be from the same CSP Could be a good thing 27

SAMPLE THREAT MODEL EXERCISE

Exercise: CSP Service Definition ACME Cloud Data Storage 1. Web UI supplied to customers to manage users and access 2. RESTful API service to post and retrieve data in custom XML protocol 3. Underlying data storage architecture undisclosed to customers

Exercise: Data Flow Diagram CSP Employees CSP Customers Storage API Service IAM Service Firewall CSP Admins

Exercise: Identifying Assets Asset Classification User ID User Name User Account # User CC # Account Rep ID Company Public Company Confidential Company Public Secret Confidential Company Confidential

Exercise: Identifying Actors Actors Classification Anonymous Account Rep Account Manager Account Administrator CSP Personnel CSP Customers Anyone not authenticated Authenticated account representative Account representative managers Controls account rep & managers access CSP employees and administrators Other customers using similar interfaces

Exercise: Identifying Threats Threat Potential Actors Data accessed or modified without authorization Account credentials exposed or modified Anonymous, CSP employees, CSP administrators, other CSP customers, other account representatives All potential users not credential owner Service not available All users Operating System Access Anonymous, CSP administrators

Exercise: Identifying the Attack Surface Threat Attack Surface Data accessed or modified without authorization Account credentials exposed or modified Service not available Web Application/Service Flaw (XSS, CSRF, SQLi), Malware on System, Hypervisor Compromised, Command Injection Web Application/Service Flaw (SQLi), Malware on System, Hypervisor Compromised, Command Injection Required Systems offline, Firewall/Router misconfiguration, DDOS, IPS, WAF Operating System access Malicious CSP Admin, Hypervisor Compromised, Web Application Flaw (Command Injection, SQLi)

Exercise: Mitigate or Accept Threat Potential Mitigation Data accessed or modified without authorization Encrypt data at rest Improve access groups Find new CSP Accept threat Account credentials exposed or modified Enforce use of HTTPS Contract CSP to improve service Find new CSP Enforce use of IAM layer or service provider

Exercise: Mitigate or Accept Threat Potential Mitigation Service is not available Onsite backup Caching Separate DR compute region Multiple AZs or CSPs Operating System access Patching Consistent Access Control Enforcement Change CSPs Operating System Hardening

CONCLUSIONS AND QUESTIONS

Conclusions Risk vs. Reward Identify risk to minimize it Increase reward leverage CSPs that work Cloud Projects will involve discrete backend services Lots of API interaction at SaaS, PaaS, and IaaS levels Focus on permissions, authentication, and authorizations Leverage legal contracts and compliance assurances 38

Questions 39

Thank You! Robert M. Zigweid rzigweid@ioactive.com 40