Cloud Security Framework (CSF): Gap Analysis & Roadmap



Similar documents
Cloud Security Framework (CSF): Gap Analysis & Roadmap

Virtual Desktop Infrastructure (VDI)

How To Write A Cloud Security Framework

Cloud Security:Threats & Mitgations

Where every interaction matters.

Adobe Systems Incorporated

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Magento Security and Vulnerabilities. Roman Stepanov

Hack Proof Your Webapps

Sitefinity Security and Best Practices

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Web application security

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

SERENA SOFTWARE Serena Service Manager Security

Security Issues in Cloud Computing

05.0 Application Development

Web Application Penetration Testing

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

Addressing Cyber Security in Oracle Utilities Applications

OWASP Top Ten Tools and Tactics

(WAPT) Web Application Penetration Testing

Passing PCI Compliance How to Address the Application Security Mandates

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

Using Free Tools To Test Web Application Security

Penta Security 3rd Generation Web Application Firewall No Signature Required.

What is Web Security? Motivation

Attack Vector Detail Report Atlassian

ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus

SQuAD: Application Security Testing

The Top Web Application Attacks: Are you vulnerable?

Lecture 11 Web Application Security (part 1)

SOLUTIONS. Secure Infrastructure as a Service for Production Workloads

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Cloud Security and Managing Use Risks

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Last update: February 23, 2004

Web Application Security Assessment and Vulnerability Mitigation Tests

What Cloud computing means in real life

Integrating Security Testing into Quality Control

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

Securing SaaS Applications: A Cloud Security Perspective for Application Providers

Enterprise Application Security Workshop Series

Web Application Vulnerability Testing with Nessus

Web Application Report

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

OWASP TOP 10 ILIA

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Cloud Computing Security Issues

CompTIA Security+ (Exam SY0-410)

CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities

Nuclear Regulatory Commission Computer Security Office Computer Security Standard

How to complete the Secure Internet Site Declaration (SISD) form

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Criteria for web application security check. Version

Web Application Security

How To Protect Your Cloud Computing Resources From Attack

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Certified Secure Web Application Security Test Checklist

Cloud Security Introduction and Overview

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Security Controls What Works. Southside Virginia Community College: Security Awareness

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Top Ten Web Application Vulnerabilities in J2EE. Vincent Partington and Eelco Klaver Xebia

Secure development and the SDLC. Presented By Jerry

Cloud Security. Securing what you can t touch. Presentation to Malaysia Government Cloud Computing Forum HUAWEI TECHNOLOGIES CO., LTD.

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

Network Test Labs (NTL) Software Testing Services for igaming

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Essential IT Security Testing

Columbia University Web Security Standards and Practices. Objective and Scope

Overview of the Penetration Test Implementation and Service. Peter Kanters

Cloud Security. DLT Solutions LLC June #DLTCloud

OWASP AND APPLICATION SECURITY

REDCap Technical Overview

Web Application Security

Requirement Priority Name Requirement Text Response Comment

MANAGED SECURITY TESTING

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Check list for web developers

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

From the Bottom to the Top: The Evolution of Application Monitoring

Security Whitepaper: ivvy Products

Hardening Moodle. Concept and Realization of a Security Component in Moodle. a project by

Transcription:

Cloud Security Framework (CSF): Gap Analysis & Roadmap Contributors: Suren Karavettil, Bhumip Khasnabish Ning So, Gene Golovinsky, Meng Yu & Wei Yinxing Please send comments & suggestions to Suren Karavettil (surenck@gmail.com) April 15 th, 2011 1

IETF IPR and Copyright Statements This document (future Internet-Draft) is being prepared for IETF in full conformance with the provisions of BCP 78and BCP 79 Copyright Notice Copyright (c) 2010 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78and the IETF Trust's Legal Provisions Relating to IETF Documents in effect on the date of publication of this document (http://trustee.ietf.org/license-info) 2

List of Acronyms IETF Internet Engineering Task Force CSF - Cloud Security Framework GRC Governance, Risk & Compliance CSA Cloud Security Alliance SDO Standards Development Organizations OWASP Open Web Application Security Project XSS Cross-Site Scripting CSRF Cross-Site Request Forgery PCI -Payment Card Industry DSS - Data Security Standards SOX Sarbanes Oxley 3

Outline Purpose Background on Cloud from Cloud Security Alliance Essential Characteristics of Cloud Cloud model to security control & compliance model Cloud Service security risks consumer vs provider Top Security Risks Reasons for Standardizations in Cloud Gap Analysis & Roadmap CSP Services Requirements Categories Typical Web Application Architecture & Content Types General Application Security Requirements Security Attributes & Methods Functional Apps & Systems Core Services Requirements Administration & Management Requirements Non Functional Apps & Systems Security, Business Continuity, etc Governance, Risk & Compliance Requirements Facilities Management Services Requirements Gap Analysis - Cloud Protocol Framework Other Standards Development Organizations (SDO) Roadmap Next steps 4

Purpose The purpose of the Cloud Security Framework: Gap Analysis & Roadmap is to come up with requirements for: Protocol & Profiles Interfaces API s That helps develop & provide secure applications for users and reduce human interventions in provisioning & management of resources for these cloud applications & services. 5

Essential Characteristics of Cloud On-demand self-service Broad network access Resource pooling using Multi-Tenant model Rapid elasticity Measured service Courtesy of Cloud Security Alliance (CSA) Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 6

Cloud Model to Security Control & Compliance Model Diagram is courtesy of Cloud Security Alliance (CSA) Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 7

Cloud Services Security Risks Consumer vs Provider Portion of diagram is courtesy of Cloud Security Alliance (CSA) Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 OSI Layers + Addons 8

Top Security Risks Top Threats to Cloud Computing, version 1.0 identified by CSA are: Abuse and Nefarious Use of Cloud Computing Insecure Application Programming Interfaces Malicious Insiders Shared Technology Vulnerabilities Data Loss/Leakage Account, Service & Traffic Hijacking Unknown Risk Profile The OWASP Top 10 Web Application Security Risks for 2010 are: Injection Cross-Site Scripting (XSS) Broken Authentication and Session Management Insecure Direct Object References Cross-Site Request Forgery (CSRF) Security Mis-configuration Insecure Cryptographic Storage Failure to Restrict URL Access Insufficient Transport Layer Protection Un-validated Redirects and Forwards 9

Reasons for Standardizations in Ease of Integration Portability Transparency Inter-operability Reuse Security Others? Cloud Security 10

Gap Analysis & Roadmap Governance, Risk & Compliance (GRC) General Application Services Functional Apps Core Services Functional Admin & Management Services Non- Functional Virtualized & Hardware Systems Resources Facilities Management Non-Functional Network Resources 11

CSP Services Requirements Categories General Applications Security Functional - Apps & Systems Core Services API Administration & Management API (incl. Non Functional for systems) Resources Allocation, Locking, Control & Management Non Functional Apps & Systems Security anti-virus, LDAP Business Continuity & Disaster Recovery Planning Governance, Risk & Compliance (GRC) Governance, Risk Assessment & Mitigation, Compliance Facilities Management Services Personnel, premises monitoring, etc 12

Typical Internet Application Architecture Application Security Client Attributes Network Security Network Attributes Video Data Voice VLAN Systems Security Host Attributes Data Security Information (Data) Attributes Physical Security Facility (Physical) Attributes 13

Cloud Content Data Types Live Web Application Form Data (Structured text/html) Image Voice Video Attachments (unstructured/mime data types) Unstructured data Archive Structured Data (Database, etc) Files Data DOC, PDF, Excel, etc Image - JPEG, GIF, PNG, etc Voice archive MP-3, etc Video Archive MPEG-4, MPEG-2, MJPEG, AVCHD, etc Unstructured data Note: Assuming data security as part of application security for this discussion purposes 14

General Application Security Requirements Authentication, Authorization & Auditing (AAA) Runtime user authentication & session management Authorized access to data and resources Track access and usage of services, data and other resources (auditing & logging) Secure token identifiers for applications, instances of systems (servers), device types (clients), request/response (pages), etc Data Validation Sanitized data (user or systems) input into applications (from Browsers, CLI, Web Services, etc to avoid injection into OS, SQL, LDAP, etc). Validated and appropriately escaped data output to the clients (browser, CLI, etc) Checking length of data to avoid overflows. Securing the persistent data/ information Data Security Appropriate encryption of data. Data confidentiality Multi-tenant isolation through proper configuration of virtualization & other mechanisms? 15

Client Attributes General Application Security Attributes & Methods Host Attributes Data Attributes Additional Attributes Facility Attributes URL Protocol attributes referrer, etc Encrypted or Not Secure Channel Personnel Access Control Session Id Hostname (virtual or hard) & port Location DMZ or Core Data center Servers RFIDs Page Id Context root Sanitized or Not Bandwidth Available Data center room cameras User Identity Application Context Connection Type Client Type Id Resource Id Route Cookie Enabled Session Context PKI Certificates HttpOnly, Secure Flag Page Context LDAP, RADIUS, Kerberos Query parameters ConsumerId & Location Id Method Id Cluster,Load Balanced, Failover & DR Provider Id & Resource Location Id Server Configurations (Timeouts) Identity Management I/OData Validation Safe Coding Practices SafeInstall & Config Practices Facility Management Multi-factor, Single-Sign on Federation, Authentication Input Sanitizationfor SQL, LDAP, Header Injection Encoding, Logging, etc LDAP/AD config for multitenancy Time of Day rules Authorization Encoding of output of javascript or HTML data Database configurationfor multi-tenancy Access Controls Auditing Input LengthCheck to avoid overflows VLAN for multi-tenancy Note: Do not assume all cloud resources are virtualized to support multi-tenancy 16

Functional Apps & Systems Core Services Requirements Identity & Access Management (IAM) Virtual Desktop Infrastructure (VDI) Video Streaming Directory Services (DS) Database Management Systems (DBMS) Logging 17

Functional Apps & Systems - Admin & Management Requirements Systems Resource Allocation Services System, Storage (private/public, or varying provider), etc for multi tenancy Systems Resource Mobility Resources Allocation Services Availability, etc Systems Resource Configuration Services Security Single Sign On, Multi-Factor Authentication, Access Control, Encryption Named Services Systems Management Services Asset tracking, Status & Statistics of various Services Systems Interoperability 18

Non-Functional Apps & Systems Systems Security Anti-virus LDAP Requirements Kerberos/RADIUS Systems Failover & Performance Services With different physical infrastructure providers Load Balancing, Backup & Recovery, Business Continuity 19

Governance, Risk & Compliance (GRC) Requirements Payment Card Industry (PCI) Data Security Standards (DSS) PCI DSS Health Insurance Portability & Accountability Act (HIPAA) Sarbanes Oxley Act (SOX) Personal Identification Information (PII) -Massachusetts Regulation 201 CMR 17.00 SAS 70 Auditing Standards NERC CIP Standards Gramm Leach Bliley Act (GLBA) for Financial Services GRC applies to CSP and their clients 20

Facilities Management Services Requirements Resources Tracking (assets scan) Manage personnel access to assets/resources by business hours, location, etc. Track assets/resources. 21

Gap Analysis Cloud Protocol Framework Few factors influencing the Cloud Protocol Framework: On-demand self service Client Type (PC, TV, Smartphone, Auto) User & Session (identity) Data Type (video, voice, image, data [e.g. HTTP POST]) Channel (bandwidth, availability, mobility, security) Host/Service (resource virtualization, availability, location) 22

Other Standards Development Organizations (SDO) Cloud Security Alliance (CSA) VMWare s DMTF vcloud API & Open Virtualization Format (OVF) TM Forum s Cloud Program Open Cloud Computing Interface Working Group Amazon EC2 API Sun s Open Cloud API Rackspace API GoGrid API 23

Roadmap Next Steps Thoughts & Ideas for next steps 24