Computer Forensics and Incident Response in the Cloud. Stephen Coty AlertLogic, Inc. @Twitter AlertLogic_ACID

Similar documents
Stephen Coty Director, Threat Research

Digital Forensics for IaaS Cloud Computing

How to Grow and Transform your Security Program into the Cloud

NCTA Cloud Architecture

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Auto-Scaling WebApplication. Securityinthe Cloud. Stephen Coty. Chief Security Evangelist

HEY! YOU! GET OFF MY CLOUD! ATTACKS AGAINST CLOUD HONEYPOTS. Martin Lee Neil Rankin

Cloud Courses Description

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Protecting the un-protectable Addressing Virtualisation Security Challenges

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

WhitePaper. Private Cloud Computing Essentials

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken )

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

Cloud computing: benefits, risks and recommendations for information security

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Securing Oracle E-Business Suite in the Cloud

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

External Supplier Control Requirements

Top 10 Cloud Risks That Will Keep You Awake at Night

Westcon Presentation on Security Innovation, Opportunity, and Compromise

Analyzing HTTP/HTTPS Traffic Logs

What Cloud computing means in real life

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

Drawbacks to Traditional Approaches When Securing Cloud Environments

Cloud and Data Center Security

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Agenda , Palo Alto Networks. Confidential and Proprietary.

Protect Yourself in the Cloud Age

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

Protecting Your Organisation from Targeted Cyber Intrusion

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects

Combating a new generation of cybercriminal with in-depth security monitoring

Cloud Courses Description

DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION

Virtualization and Cloud Computing

Windows Server 2003 End of Support. What does it mean? What are my options?

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Storage Cloud Infrastructures

How to Achieve Operational Assurance in Your Private Cloud

Cloud Computing Governance & Security. Security Risks in the Cloud

Caretower s SIEM Managed Security Services

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues

Cloud Security & Standardization. Markku Siltanen Tietoturvakonsultti CISA, CGEIT, CRISC

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

How to Reduce Web Vulnerability Scanning Times

A Decision Maker s Guide to Securing an IT Infrastructure

Locking down a Hitachi ID Suite server

Splunk Company Overview

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

Virtualization Journey Stages

VICNET is G-Cloud7 GOV UK Supplier VISIT DIGITAL MARKET PLACE VICNETCLOUD VICNET CLOUD MIGRATION SERVICES

Analysis of Network Beaconing Activity for Incident Response

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Microsoft Hyper-V Powered by Rackspace & Microsoft Cloud Platform Powered by Rackspace Support Services Terms & Conditions

RSA Security Anatomy of an Attack Lessons learned

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Is Your IT Environment Secure? November 18, Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting

ENISA Cloud Computing Security Strategy

What legal aspects are needed to address specific ICT related issues?

Information Technology Policy

Keyword: Cloud computing, service model, deployment model, network layer security.

Threat Modeling Cloud Applications

THE ROLE OF IDS & ADS IN NETWORK SECURITY

Managed Services OVERVIEW

Akamai Security Products

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

External Supplier Control Requirements

Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

External Penetration Assessment and Database Access Review

ALERT LOGIC FOR HIPAA COMPLIANCE

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Transcription:

Computer Forensics and Incident Response in the Cloud SESSION ID: ANF-T07A Stephen Coty AlertLogic, Inc. @Twitter AlertLogic_ACID

Why forensics in the cloud? Cloud market revenue will increase at a 36% annual rate, PR News Analysts expect AWS revenues to hit $6 billion - $10 billion in 2014 Microsoft Azure to reach $1 billion in annual sales Oracle Cloud bookings increase by 35% in the 3 rd quarter this year VDI (Desktop as a Service) market reached $13.4 billion in 2013 Gartner predicts 60% of banking institutions to migrate to the cloud 2

What Attacks are hitting the Cloud Space 0% 1% Asia Honeypots 4% 6% 4% HTTP MySQL US Honeypots 0% 0% 12% 13% 51% 23% MS-SQL Server MySQL HTTP MS-DS Service RPC FTP 8% 85% 8% Global Honeypots 12% 11% MS-SQL Server MS-DS Service RPC FTP MS-SQL Server MySQL 13% Europe Honeypots 13% MS-DS Service HTTP 35% MySQL 13% 13% 13% MS-SQL Server RPC FTP HTTP 51% 10% MS-DS Service RPC FTP 3

When is digital forensics in the cloud required Investigation into organized cyber crimes Investigation into Acceptable Use Policy violations Data Recovery, Intentional or Accidental 3 rd Party reports of suspicious activity Fraudulent builds for malicious activity Data Breaches WARNING --------------- Adults Only 4

Challenges with Digital Forensics in the Cloud Investigators do not have the physical control of the media nor the network Massive database infrastructure uses customer relationship management systems and social graphs that current forensics cannot address With the nature of cloud computing there are challenges with the chain of custody Who owns the data and what is the expectation of privacy as a customer Oregon State vs Bellar Judge Timothy Sercombe wrote Nor are a person s privacy rights in electronically stored personal information lost because that data is retained in a medium owned by another 5

Why Digital Forensics will not work? Identification of Incident & Evidence Collection Organization for Examination and Analysis Presentation Challenges in Collection Seize servers containing files from many users creates privacy issues with others Trustworthiness of evidence is based on the cloud providers word Investigators are dependent on cloud providers to acquire evidence Technician collecting data may not be qualified for forensic acquisition Unknown location of the physical data can hinder investigations 6

Think Network Forensics, it s the only way Traditional digital forensic data collection is still appropriate for many investigations. There is a growing number of cases, with the adoption of virtual technology and the cloud, where it is not practical or impossible to conduct digital forensics Relies on Limited data to examine Captured Packets Reviewing Log Data Cloned Servers from Server Administrators Looking for key words in parsed data Reviewing any type of IDS or WAF event data 7

Understanding your Service Provider Apps Secure coding and best practices Software and virtual patching Configuration management Access management Application level attack monitoring Hosts Hardened hypervisor System image library Root access for customer Access management Patch management Configuration hardening Security monitoring Log analysis Customer Responsibility Service Provider Responsibility Networks Logical network segmentation Perimeter security services External DDoS, spoofing, and scanning prevented Network threat detection Security monitoring Foundation Services Compute Storage DB Network 8

Shared Customer and Service Provider Responsibility Enabling a logging solution of the virtual server Amazon Cloud has Cloud Trail that logs API calls to your instance Providing an IDS designed for the cloud can provide a level of protection and logging of security related events. Ability to perform deep packet forensics in a virtual environment Researchers have proposed various applications to conduct forensic memory analysis in virtual environments Multi Jurisdiction and multi-tenancy Service Level Agreements (SLA) 9

Forensic Process and tools in the Cloud Have Primary server relocated in the cloud Keep compromised device online while you move the customer to a new instance Have service provider take a Snap Shot of the compromised server Run Forensic Investigation on the compromised device live Tools WireShark Collects Packets Network Miner Collects Data about the Host 10

Credits http://www.securitywizardry.com/index.php/products/forensicsolutions/remote-forensics.html http://www.linkedin.com/pub/andrew-bennett/4/193/203 https://www.asdreports.com/news.asp?pr_id=2116 http://www.dfrws.org/2012/proceedings/dfrws2012-10.pdf https://www.alertlogic.com/resources/cloud-security-report/ Link to Ciphx and other Open Source Tools http://df.shsu.edu/ciphix.html http://www.mcafee.com/us/downloads/free-tools/index.aspx 11

Q&A