Top 10 Cloud Risks That Will Keep You Awake at Night



Similar documents
Security Issues in Cloud Computing

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Cloud Computing Governance & Security. Security Risks in the Cloud

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Security & Trust in the Cloud

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Cloud Security Introduction and Overview


Cloud models and compliance requirements which is right for you?

Data Protection: From PKI to Virtualization & Cloud

Security Information & Policies

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

How To Protect Your Cloud Computing Resources From Attack

Managing Cloud Computing Risk

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Cloud Computing. What is Cloud Computing?

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Trust but Verify. Vincent Campitelli. VP IT Risk Management

RMS. Privacy Policy for RMS Hosting Plus and RMS(one) Guiding Principles

Assessing Risks in the Cloud

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

AskAvanade: Answering the Burning Questions around Cloud Computing

Cloud Computing Technology

Network Access Control and Cloud Security

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

Cloud Computing: Risks and Auditing

How To Manage Cloud Data Safely

Information Technology: This Year s Hot Issue - Cloud Computing

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

Cloud Essentials for Architects using OpenStack

Security Issues in Cloud Computing

Cloud-Security: Show-Stopper or Enabling Technology?

Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken )

Cloud Security Who do you trust?

CHAPTER 8 CLOUD COMPUTING

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects

Security & Cloud Services IAN KAYNE

Securing SaaS Applications: A Cloud Security Perspective for Application Providers

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

A Survey on Cloud Security Issues and Techniques

What Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen

8070.S000 Application Security

Security Considerations for Public Mobile Cloud Computing

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Vormetric Data Security Securing and Controlling Data in the Cloud

Digital Forensics. Lab 10: Cloud Computing & the Future of Digital Forensics

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Cloud Courses Description

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Orchestrating the New Paradigm Cloud Assurance

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Data In The Cloud: Who Owns It, and How Do You Get it Back?

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Cloud computing: benefits, risks and recommendations for information security

SECURITY IN SERVICE LEVEL AGREEMENTS FOR CLOUD COMPUTING

Addressing Data Security Challenges in the Cloud

Architectural Implications of Cloud Computing

The Cloud, Virtualization, and Security

Cloud Computing: Compliance and Client Expectations

Addressing Cloud Computing Security Considerations

Cloud Computing Security Issues

FACING SECURITY CHALLENGES

CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD. Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

Cloud Security: The Grand Challenge

Auditing Cloud Computing and Outsourced Operations

IBX Business Network Platform Information Security Controls Document Classification [Public]

Cisco Cloud Assessments. Justin Tang

Welcome & Introductions

SECURE CLOUD COMPUTING

Lecture 02a Cloud Computing I

Healthcare: La sicurezza nel Cloud October 18, IBM Corporation

How to procure a secure cloud service

Bringing Cloud Security Down to Earth. Andreas M Antonopoulos Senior Vice President & Founding Partner

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages

Cloud Security:Threats & Mitgations

Cloud Security Alliance New Zealand Contribution to the Privacy Commissioner. 23 February 2012

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

SELECTING AN ENTERPRISE-READY CLOUD SERVICE

SRG Security Services Technology Report Cloud Computing and Drop Box April 2013

White Paper. Data Security. journeyapps.com

Network Access Control and Cloud Security

Cloud Computing, and REST-based Architectures Reid Holmes

Information Security: Cloud Computing

Cloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com

Key Considerations of Regulatory Compliance in the Public Cloud

Lecture 02b Cloud Computing II

Goals. What is Cloud Computing? 11/11/2010. Understand what cloud computing is and how. Understand the challenges and advantages of cloud computing

Cloud Computing: Legal Risks and Best Practices

Deploying a Geospatial Cloud

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

Transcription:

Top 10 Cloud Risks That Will Keep You Awake at Night Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang Photo Source flickr.com

.. Amazon EC2 (Cloud) to host Eng. Lab testing. We want to use SalesForce.com to host our next Cisco customer application.. Facebook/MySpace to collaborate with company s customer. Cisco Business User.. Google docs to share Cisco documents within team. 400+ ASPs (aka Cloud Providers) in use within Cisco 2

Outline Cloud Industry Adoption Trend Cloud Taxonomy OWASP Cloud Top 10 Cloud Security Risks Risk Mitigations Q & A 4

Cloud Industry Adoption Trend 160 140 120 100 80 60 40 20 0 Global expenditure on Cloud ($ billion) 148.8 58.6 68.3 2009 2010 2014 (Source Gartner) 5

Cloud Taxonomy Service Models Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Deployment Models Public Private Hybrid Community Broad Network Access Rapid Elasticity Measured Service On-Demand Self-Service Resource Pooling (Adapted from CSA Guide, originally from NIST) 6

Cloud Top 10 - Motivation Develop and maintain top 10 risks with cloud Serve as a quick list of top risks with cloud adoption Provide guidelines on mitigating the risks 7

Cloud Top 10 - Approach Easily Executable Most Damaging Incidence Frequency ISC2 CSA Publications NIST Industry Experience News IDC OWASP Cloud Top 10 8

Cloud Top 10 Risks R1: Accountability & Data Risk R2: User Identity Federation R3: Regulatory Compliance R4: Business Continuity & Resiliency R5: User Privacy & Secondary Usage of Data R6: Service & Data Integration R7: Multi-tenancy & Physical Security R8: Incidence Analysis & Forensics R9: Infrastructure Security R10: Non-production Environment Exposure 9

R1: Accountability In traditional data center, the owning organization is accountable for security at all layers Organization fully accountable for security at all layers Application Web/App/DB server Computing Network Storage You can outsource hosted services but you cannot outsource accountability In a cloud, who is accountable for security at these layers? 10

R1: Accountability (cont.) SaaS PaaS Cloud Provider Accountable Application Web/App/DB server Computing Network Storage Application Web/App/DB server Computing Network Storage Cloud Consumer * Accountable IaaS * Few exceptions Application Web/App/DB server Computing Network Storage 11

R1: Data Risk How sensitive is the data? Informal blogs Twitter posts Public news Newsgroup messages Health records Criminal records Credit history Payroll Who owns the data? Data encrypted? Single vs. multiple keys Data stored anywhere!! 12

R1: Accountability & Data Risk Mitigation Logical isolation of the data of multiple consumers Provider fully destroys deleted data Multiple encryption keys 13

R2: Risks: Islands of User Identities Security Risks 1. Managing Identities across multiple providers 2. Less control over user lifecycle (offboarding) 3. User experience Enterprise 14

R2: Mitigation: User Identity Federation SAML Mitigations 1. Federated Identity 2. OAuth for backend integrations 3. Tighter user provisioning controls Identity Federation 15

R3: Regulatory Compliance Data that is perceived to be secure in one country may not be perceived secure in another country/region DC2 Lack of transparency in the underlying implementations makes it difficult for data owners to Key: demonstrate compliance( SOX/HIPAA etc.) DC1 DC3 Lack of consistent standards and requirements for global regulatory compliance data governance can no longer be viewed from a point-to-point data flow perspective but rather a multi-point to multi-point. European Union (EU) has very strict privacy laws and hence data stored in US may not comply with those EU laws (US Patriot Act allows federal agencies limitless powers to access any corporate data etc) 16

R3: Regulatory Compliance Mitigation Strategy Define data protection requirements and SLAs Apply risk management framework, case-by-case basis Provider / Consumer agreement to a pre-defined RACI model 17

R4: Business Continuity & Resiliency Lack of know-how and capabilities needed to ensure continuity & resiliency Cloud provider may be acquired by a consumer s competitor Monetary losses due to an outage 18

R4: Business Continuity & Resiliency Mitigation Contract defines Recovery Time Objectives, and monetary penalty for downtime Cloud provider s Business Continuity program certified to standard such as BS 25999 19

R5: User Privacy & Secondary Usage of Data Users vs. Providers (Priorities) Privacy of my data - Address, Email,.. (Personally Identifiable Information) - Health, personal financial info - Personal Details (email, IMs,.) Keep Revenue Up/ Cost Down Push out the liabilities to user via Privacy and Acceptable Use Policy Build Additional Services on users behavior (targeted advertisements ) e.g. Google Email, banner adv. Do minimal to achieve compliance Keep their social applications more open (increased adoption) End Users Providers 20

R5: Risks: User Privacy & Secondary Usage of Data User personal data mined or used (sold) without consent - Targeted Advertisements, third parties User Privacy data transferred across jurisdictional borders No opt out features for user (user can not delete data) Lack of individual control on ensuring appropriate usage, sharing and protection of their personal information. Law Obligation for providers - Key escrows to law agencies - Subpoena 21

R5: Mitigations: User Privacy & Secondary Usage of Data Policy Enactment -Privacy and Acceptable Usage - Consent (Opt In / Opt Out) - Policy on Secondary Usage De-identification of personal Information Encrypted storage Terms of Service with providers - Responsibility on compliance - Geographical affinity 22

R6: Service & Data Integration Branch Office Private Key: Cloud / Internal Data Center End Users Cloud Broker Cloud Broker Internal Databases Data traverses through the internet between end users and cloud data centers. How secure the integrations are? Public Cloud Cloud Provider 1 Cloud Provider 2 Proxy Cloud Broker Service / App 1 Service / App 2 Service / App 5 Service / App 6 Proxy 23

R6: Service & Data Integration Mitigation Strategy Data in Transit Data at Rest Encryption (keys, protocols etc) 24

R7: Risks: Multi-tenancy and Physical Security Web Tier App/BizTier Database Tier Cloud Consumers (Tenants) Admin Reach back to Enterprise Backups Security Risks 1. Inadequate Logical Separations 2. Co-mingled Tenant Data 3. Malicious or Ignorant Tenants 4. Shared Servicesingle point of failures 5. Uncoordinated Change Controls and Misconfigs 6. Performance Risks 26

R7: Attacks and Incidences MIT demonstrating cross-tenant attacks (Amazon EC2)* - Side channel Attacks - Scanning other tenants - DoS Wordpress Outage June 2010** - 100s of tenants (CNN,..) down in multi-tenant environment. - Uncoordinated Change in database * http://chenxiwang.wordpress.com/2009/11/02/mit s-attack-on-amazon-ec2-an-academic-exercise/ ** http://smoothspan.wordpress.com/2010/06/11/wordpress-and-the-dark-side-of-multitenancy/ 27

R7: Mitigations: Multi-tenancy and Physical Security Architecting for Multi-Tenancy Data Encryption (per tenant key management) Transparency/Auditability of Administrative Access Controlled and coordinated Change Management Virtual Private Cloud (VPC) Regular Third Party Assessments 28

R8: Incidence Analysis & Forensic Support Complex integration and dynamics in cloud computing present significant challenges to timely diagnosis and resolution of incidents such as: Malware detection and Immediate intrusion response to mitigate the impact Branch Office Private Key: Cloud / Internal Data Center End Users Cloud Broker Cloud Broker Internal Databases Implications to Traditional Forensics? (seizing equipment and analysis on media/data recovered) International differences in relevant regulations Public Cloud Cloud Provider 1 Cloud Provider 2 Proxy Cloud Broker Service / App 1 Service / App 2 Service / App 5 Service / App 6 Proxy 29

R8: Incidence Analysis & Forensic Support Mitigation Strategy Dedicated Forensic VM Images Comprehensive logging Without compromising Performance 30

R9: Infrastructure Security Malicious parties are actively scanning the internet for Vulnerable Applications or Services Key: Active Unused Ports Data Default Passwords Default Configurations 31

R9: Infrastructure Security - Mitigations Segregation of duties and role based administrative privs Third party audits and app vulnerability assessments Tiered architecture with appropriate security controls between them Hardening Networks, OS, Apps 32

R10: Non-Production Environment Exposure Non-Production Environments are used for design, development, and test activities internally within an organization Prod Non-Prod Typical non-prod environment use generic authentication credentials Security flaws Data copied to non-prod from its production equivalent Non-Prod High risk of an unauthorized user getting access to the non production environment 33

R10: Non-Production Environment Exposure Mitigation Use multi layers of authentication Prod Non-Prod Non-prod data is not identical to production Don t use cloud for developing a highly sensitive app in the cloud 34

Summary: Peaceful Sleep Photo - http://fineartamerica.com/featured/peaceful-sleep-ron-white.html 35

36

R5: Incidence: User Privacy & Secondary Usage of Data 37