Secure Cloud Computing



Similar documents
Cloud Security Prof. Dr. Michael Waidner Fraunhofer SIT CASED. Fraunhofer SIT. Fraunhofer-Gesellschaft 2011

Secure Cloud Computing

Security and Cloud Computing

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Cloud Security: The Grand Challenge

Security and Cloud Computing

Security Issues in Cloud Computing

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Security. DLT Solutions LLC June #DLTCloud

Cloud Security Who do you trust?

Security Officer s Checklist in a Sourcing Deal

How To Protect Your Cloud Computing Resources From Attack

Security & Trust in the Cloud

CLOUD SECURITY: THE GRAND CHALLENGE

A Survey on Cloud Security Issues and Techniques

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

CompTIA Cloud+ 9318; 5 Days, Instructor-led

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

Cloud Security Introduction and Overview

IBM Security in the Cloud

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

FACING SECURITY CHALLENGES

Cloud-Security: Show-Stopper or Enabling Technology?

White Paper How Noah Mobile uses Microsoft Azure Core Services

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Cloud computing White paper November IBM Point of View: Security and Cloud Computing

Cloud Computing: Risks and Auditing

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

THE BLUENOSE SECURITY FRAMEWORK

How To Protect Your Cloud From Attack

Cloud Courses Description

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Securing the Cloud through Comprehensive Identity Management Solution

Top 10 Cloud Risks That Will Keep You Awake at Night

Security and Cloud Computing

CIT 668: System Architecture

IBM EXAM QUESTIONS & ANSWERS

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Addressing Cloud Computing Security Considerations

Cloud Security Who do you trust?

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

Security Overview Enterprise-Class Secure Mobile File Sharing

journey to a hybrid cloud

Security Issues in Cloud Computing

GoodData Corporation Security White Paper

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

HIPAA Compliant Infrastructure Services. Real Security Outcomes. Delivered.

PICO Compliance Audit - A Quick Guide to Virtualization

Virtualization and Cloud Computing

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

Managing Cloud Computing Risk


Data Protection: From PKI to Virtualization & Cloud

Cloud IaaS: Security Considerations

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

Security & Cloud Services IAN KAYNE

Cloud models and compliance requirements which is right for you?

Mitigating Information Security Risks of Virtualization Technologies

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

Secure Cloud Computing

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken )

FormFire Application and IT Security. White Paper

Secure Hosting Solutions For SAGE Energy Management

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Cloud Security:Threats & Mitgations

Cloud Essentials for Architects using OpenStack

Securing the Service Desk in the Cloud

Assessing Risks in the Cloud

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

What Cloud computing means in real life

CloudDesk - Security in the Cloud INFORMATION

Lecture 02b Cloud Computing II

05.0 Application Development

Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

Cloud Security. Securing what you can t touch. Presentation to Malaysia Government Cloud Computing Forum HUAWEI TECHNOLOGIES CO., LTD.

The Production Cloud

Transcription:

Fraunhofer-Gesellschaft 2011 Secure Cloud Computing Prof. Dr. Michael Waidner Center for Advanced Security Research Darmstadt (CASED): TU Darmstadt & Fraunhofer SIT CASED 1 Fraunhofer SIT

Outline 1. Security Considerations 2. Security Challenges Provider Perspective Subscriber Perspective 3. Security as a Service 4. Research Challenges 2

Outline 1. Security Considerations 2. Security Challenges Provider Perspective Subscriber Perspective 3. Security as a Service 4. Research Challenges 3

Consumption and Delivery Model for IT Services Cloud represents the industrialization of delivery for IT supported services Hybrid Clouds Deployment Models On Premise Private Cloud Off Premise Community Cloud Public Cloud 3rd-Party Managed Service Models Business Process as a Service (BPaaS) Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Essential Charateristics On Demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service Service Mgmt Automation Common Charateristics Massive Scale Geographic Distribution Low Cost Software Resilient Computing Resource Virtualization Advanced Security Homogeneity Standardized Workloads Service Orientation Cloud Enables Economies of scale Sourcing Options Flexible payment models Adapted from: [Mell, Grance: The NIST Definition of Cloud Computing; NIST SPUB 800-145] 5

Moving from Private to Public Leads to a Real or Perceived Loss of Control We Have Control It s located at X. We have backups. Our admins control access. Our uptime is sufficient. The auditors are happy. Our security team is engaged. Who Has Control? Where is it located? Who backs it up? Who has access? How resilient is it? How do auditors observe? How does our security team engage? 33% Of respondents are concerned with cloud interfering with their ability to comply with regulations 80% Of enterprises consider security #1 inhibitor to cloud adoptions 48% Of enterprises are concerned about the reliability of clouds Source: Driving Profitable Growth Through Cloud Computing, IBM Study, 2008 (conducted by Oliver Wyman) 6

Workloads may be at Different Levels of Cloud Readiness Ready for Cloud Analytics Information intensive Sensitive Data May not yet be ready for migration... Market bias: Private cloud Public cloud Isolated workloads Highly Customized Not yet virtualized 3 rd party SW Collaborative Care Infrastructure Storage Industry Applications Mature workloads Complex processes & transactions Regulation sensitive Medical Imaging Collaboration Preproduction systems Financial Risk Workplace, Desktop & Devices Batch processing New workloads made possible by clouds... Energy Management Business Processes Disaster Recovery Development & Test Infrastructure Compute IBM, 2010 7

Cloud Service Model Suggests Split of Responsibilities between the Provider of Public Clouds and the Subscribers Who is responsible for security at the level? Datacenter Infrastructure Middleware Application Process Business Process-as-a-Service Provider Subscriber Application-as-a-Service Provider Subscriber Platform-as-a-Service Provider Subscriber Infrastructure-as-a-Service Provider Subscriber IBM, 2010 Provider/Subscriber service agreement determines actual responsibilities. 8

Data are Central to the Analysis of Risks and Threats CSA (2010), ENISA (2009), Gartner (2008), IBM X-Force (2010), Transformation Privacy and Data Compliance Data Recovery Classical IT Security Shared IT 1. Vendor lock-in 2. Data security 3. Data protection, meeting privacy needs and expectations 4. General and industry-specific compliance 5. Uncertainty over data location 6. Inability to respond to law enforcement requests 7. Data recovery, resiliency 8. Account or service hijacking 9. Insecure interfaces and APIs 10. Management (incl. self-service) interface compromise 11. Insecure or incomplete data deletion 12. Process/VM isolation, data segregation, multi-tenancy 13. Malicious insiders (co-tenants, cloud provider) 14. Abuse of cloud services (extrusion) 9

Outline 1. Security Considerations 2. Security Challenges Provider Perspective Subscriber Perspective 3. Security as a Service 4. Research Challenges 10

What is Cloud Security? Confidentiality, integrity, availability of business-critical IT assets Stored or processed on a cloud platform Cloud Computing Software as a Service Utility Computing Grid Computing IBM, 2010 There is nothing new under the sun but there are lots of old things we don't know. Ambrose Bierce, The Devil's Dictionary 11

Very Quick Intro to Information Security 12

Information Security Risk Management Threat (and Attack) Malicious / Accidental Insider / Outsider Vulnerability Risk management Acceptance Avoidance Transfer Mitigation Resources Identities Information Applications IT Infrastructure Physical infrast. Potential insecurity Potential loss for a party Yields risk Objectives Confidentiality Integrity Availability Accountability (Manageability ) Parties Concerned Provider, subscriber, end-user,..., government Risk is estimated based on statistical assumptions, and those are changing over time. Each party needs to manage their risk towards an acceptable level (multi-party security). The residual risk is never zero, there is no absolute security. 13

Security Mechanisms (Controls) Security Policy Enterprise, identity, access, retention, Ideally derived and propagated top down Allow/deny + mandates/ obligations Often composite, mandatory and discr. Abstract, role based, class based Security Development Practices Security testing Eg, OWASP [Allan 10] Prevention (Avoidance, Enforcement) Cryptography Encryption Key management Channel security, VPN Access Control Reference monitor Authorization Data / proc tagging Hypervisor Memory protection Filesystem protection Virtual LAN Identity Authentication Identity Management Detection (Monitoring, Audit) MAC, Hash Digital Signatures Message security Intrusion / Extrusion Prevention Firewall Anti-virus, anti-malware Intrusion prevention Data leak prevention Virtual patching Trusted Computing Enforcement through (mutually) trusted hardware Asset Management Change and Configuration Management Physical and Organizational Security Compensation (Recovery, Fail-over) Redundancy Fault tolerance Backup & recovery Fail-over, graceful degradation Intrusion & Fraud Detection Signature-based Behavior-based Server, network based Logging & Auditing Immutable logs Time stamping 14

Information Security Certification and Audit Trust is good, control is better. Vladimir Ilyich Lenin My job is not security, my job is making sure we pass the audit. Anonymous CISO Internal and external, always organizationally independent Three major frameworks for security audit Payment Card Industry Data Security Standard (PCI DSS) Fairly prescriptive. Meant specifically for protecting card holder data. ISO/IEC 27001 (German BSI-Standard 100) Technology neutral, but ISO 2700x provides strong security context. Statement on Standards for Attestation Engagements (SSAE) No. 16 Successor of SAS 70. Very open, meant for service providers operating transaction systems, and de-facto standard framework for IT outsourcing. Additional requirements (e.g. affirmation of business management) increase quality of audit. Typically significant leeway for auditors Related but not yet relevant for cloud computing outside government context Common Criteria Certification 16

Information Security Process and Management System Information Security Risk Management requires Policy and Process Service Management and IT Governance People and Organization Education and Incentives Measurement and Reporting And Security Technology Our focus: 17

Done, back to cloud... 20

Data are Central to the Analysis of Risks and Threats CSA (2010), ENISA (2009), Gartner (2008), IBM X-Force (2010), Transformation Privacy and Data Compliance Data Recovery Classical IT Security Shared IT 1. Vendor lock-in 2. Data security 3. Data protection, meeting privacy needs and expectations 4. General and industry-specific compliance 5. Uncertainty over data location 6. Inability to respond to law enforcement requests 7. Data recovery, resiliency 8. Account or service hijacking 9. Insecure interfaces and APIs 10. Management (incl. self-service) interface compromise 11. Insecure or incomplete data deletion 12. Process/VM isolation, data segregation, multi-tenancy 13. Malicious insiders (co-tenants, cloud provider) 14. Abuse of cloud services (extrusion) 21

Simplified Model... Multi-tenancy / Virt Cloud Management Cloud Data Center 22

New Threats External Threats Empowered end-users... Multi-tenancy / Virt Cloud Management Cloud Data Center Co-tenants Cloud insiders, privileged users New sources of threats Co-tenants Empowered end-users Cloud insiders (½ new) New technologies Physical-to-virtual: Multi-tenancy, virtualization Cloud mgmt: co-management of security, self-service Web 2.0-ish cross-domain SOA 23

Old Threats External Threats Network vuln's Malware Force majeur Web app vulnerabilities SOA Empowered end-users... Multi-tenancy / Virt Cloud Management Cloud Data Center Co-tenants Cloud insiders, privileged users Network, server, middleware, app vuln's, physical & organizational threats New sources of threats Co-tenants Empowered end-users Cloud insiders (½ new) New technologies Physical-to-virtual: Multi-tenancy, virtualization Cloud mgmt: co-management of security, self-service Web 2.0-ish cross-domain SOA 24

Web app vulnerabilities External Threats Network vuln's Malware Force majeur SOA Empowered end-users... Multi-tenancy / Virt Cloud Management Cloud Data Center Co-tenants Cloud insiders, privileged users Network, server, middleware, app vuln's, physical & organizational threats New sources of threats Co-tenants Empowered end-users Cloud insiders (½ new) New technologies Physical-to-virtual: Multi-tenancy, virtualization Cloud mgmt: co-management of security, self-service Web 2.0-ish cross-domain SOA At the core this is all well known Many system aspects do not change at all But: many new details and constraints 25

Two Parallel Trends: Mobile Access to Cloud-delivered Services Cloud model suggests and supports ubiquitous access via resource constrained and often personally owned devices Mobile access and public cloud both blur the enterprise perimeter New endpoints (e.g., ios, Android) with new security characteristics and challenges, Often used for personal and business purposes Bring your own device : Consumerization of IT often collides with enterprise security principles 26

Cloud computing also provides the opportunity to simplify security controls and defenses Cloud Enabled Control(s) Benefit People and Identity Information and Data Defined set of cloud interfaces Centralized repository of Identity and Access Control policies Computing services running in isolated domains as defined in service catalogs Default encryption of data in motion & at rest Virtualized storage providing better inventory, control, tracking of master data Reduced risk of user access to unrelated resources. Improved accountability, Reduced risk of data leakage / loss Reduced attack surface and threat window Less likelihood that an attack would propagate Process & Application Network Server and Endpoint Physical infrastructure Autonomous security policies and procedures Personnel and tools with specialized knowledge of the cloud ecosystem SLA-backed availability and confidentiality Automated provisioning and reclamation of hardened runtime images Dynamic allocation of pooled resources to missionoriented ensembles Closer coupling of systems to manage physical and logical identity / access. Improved protection of assets and increased accountability of business and IT users Reduced attack surface Improved forensics with ensemble snapshots Improved ability to enforce access policy and manage compliance 27

Two Perspectives... Multi-tenancy / Virt Cloud Management Cloud Data Center Provider perspective: How to provide a secure cloud service? Subscriber perspective: How to select a cloud? Who to use a cloud securely? 28

Outline 1. Security Considerations 2. Security Challenges Provider Perspective Subscriber Perspective 3. Security as a Service 4. Research Challenges 30

Components of a Cloud Security Solution Isolation Identity Compliance 31

Isolation Software, Server, Network Coloring/Labeling Resources, Events, State of the art Service and Application Can be done at all levels of the stack Server Hypervisor: z/vm, LPAR, phype, Xen, VMware ESX,... Network Security Zones, Trusted Virtual Domains VLAN (IEEE 802.1Q) Trusted / Secure Virtual Private Networks (VPN) Encryption of data in transit (SSL/TLS, SSH, IPSec) Key Issues Standardized policies Verification of isolation Application security VM security Network security VN security 32

Security and Cloud Computing Isolation and Integrity Management: Multi-tenancy Users from different trust domains are drawing on a shared pool of resources Network, storage and server virtualization Shared file system, database, middleware, application, desktop, business service,... Stack architectures offer choices for implementing multi-tenancy (lower or higher in the stack) Isolation is the key security requirement Basic mechanism is coloring (aka tagging, labeling) and enforcement of isolation between domains (aka zones) of different colors @ Enforcement through Reference Monitor: provisioning, runtime, de-provisioning / cleanup Cryptography (encryption, key management) 33

Hypervisor-level Security Services Physical What changes in a naïve transition from physical (this picture) to virtual? App 1 App 2 App 3 AV/FW OS HW Security becomes harder: VM sprawl, hypervisor as a new component Services unnecessarily replicated Security becomes easier: move security services out of the OS into the Hypervisor, security system can introspect the virtual hardware Switch / NAC / Firewall / IPS... 35

Hypervisor-level Security Services Virtual A1 A2 AV/FW A3 A1 A2 AV/FW A3 Security VM Policy Hardened OS Security Mgmt OS OS Discovery, license mgmt, update, congestion control + Switch / NAC / FW / IPS Rootkit Detection Hypervisor HW Source: IBM Tivoli Virtual Server Security for VMware 36

Isolation Data, Storage, Backups Coloring/Labeling Resources, Events, State of the art Label-based Access Control (LBAC) Storage zoning (Virtual Storage Area Network, ) Enforcing location (per privacy laws) Cleanup of caches, files, disks, backups, Encryption of data at rest Data deduplication vs. encryption Provider vs. individual keys In-cloud vs. extra-cloud key management Fully homomorphic encryption Key Issues Standardized policies Standardized data portability Meaningful key management Research in advanced crypto 37

Secure Cloud Storage OmniCloud

Analysis of Cloud Storage Services Fraunhofer SIT Technical Report: Borgmann, M., Hahn, T., Herfert, M., Kunz, T., Richter, M., Vowé, S.: On the Security of Cloud Storage Services, to be published in 2011 Analyzed cloud storage providers: CloudMe, CrashPlan, Dropbox, Mozy, TeamDrive, Ubuntu One Result: Providers are security aware However, there are some typical security issues: No data encryption or server side encryption, only No filename obfuscation for public files Registration: weak passwords, no email verification Shared files are indexed by search engines 39

Identity Main types of identities to consider in a cloud Standard identity management + access/usage control Major risk: reinventing the wheel Major challenge: correlation of of identities and security events across multiple layers in the cloud stack Cloud subscriber administrators Initial enrollment and proofing of cloud subscriber Trust depends largely on proofing of identities Valid email address Upfront payment Out-of-band signed service contract Cloud subscriber end user identities Subscriber's employees, customers, Efficient on-boarding / off-boarding Directory synchronization (bad idea) Federated identity (good idea, standard in SOA) Cloud provider administrators Major issue: Control over privileged identities 40

Compliance Meeting Regulatory Requirements Provider auditing Subscriber-level auditing Practically often very hard Privacy Data encryption and suitable key management Enforcing data location Prevent cross-border data flows Cloud Forensics Discover evidence related to a specific cloud subscriber Freezing and surrendering virtual resources Protect confidentiality of third parties resources 41

Outline 1. Security Considerations 2. Security Challenges Provider Perspective Subscriber Perspective 3. Security as a Service 4. Research Challenges 45

Components of a Cloud Security Solution Isolation Identity Compliance Trust in Cloud Provider Secure Usage 46

Trust in Cloud Provider Subscriber perspective Secure Virtualized Runtime is the provider's responsibility No direct control, hence provider must be trustworthy Reputation Stated provider security policies Service-level agreements with regular audits and defined compensations Audits may be general (low-end, standardized) or client-specific (high-end, specialized) Very few technologies enable extension of control into the cloud Cryptography (encryption, integrity checks), to a certain extent TCG-style Trusted Computing (exists but rarely used) Research: homomorphic encryption Best practices, guidance/checklists and audits play major role Cloud Security Alliance [CSA 09] IBM Cloud Security Guidance [Buecker 09] 47

Security and Cloud Computing Fully Homomorphic Encryption Value of data-at-rest encryption in cloud computing Data on disks, data on backups Storage-centric: subscriber can en/decrypt, provider never sees data Does not work if & while cloud provider operates on encrypted data Fully homomorphic encryption (idea: Rivest, Adleman, Dertouzos, 1978) Express an algorithm as a circuit (network): f(x 1, x2, ) = x1+x2*(1-x3) What if we had a public-key encryption function that (roughly) does this: Enc(x 1 )+Enc(x 2 )*(1-Enc(x 3 )) = Enc(x 1+x2*(1-x3) State of the art Efficient solutions for certain related subproblems (homomorphic in one operation, serveraided computations, voting protocols, ) First provably secure fully homomorphic solution: [Gentry 09] Shows what can be done in priniciple Polynomial, but needs substantial work before it can be used in practice Major area of research in cryptography 48

Trust Trusted Cloud Why? Demonstrated Trust in Clouds Success of the cloud model: Perceived benefits dominate stated security and privacy concerns Stated Trust in Clouds: low Private Cloud Public Cloud Cloud users are taking more risk than they feel comfortable with Market very sensitive to real or perceived cloud security incidents What trust is needed? Varies by market segment, workload, type of data Different answers for governments, regulated industries, regular enterprises, private users, etc. Business opportunity Trusted Cloud 49

Cloud Users often do not Understand Cloud Characteristics Fraunhofer SIT Analysis of 1100 Public Amazon Machine Images, Spring 2011 About 1/3 with major vulnerabilities Caches, shadow files, Passwords Public SSH keys Private SSH keys 51

Analysis of VM Images Automated extraction of sensitive information from public AMIs (Amazon Machine Images), available via the Cloud App Store SSL private / public keys SSH private / public keys SVN credentials AWS API keys Unpublished source code Private pictures and documents Reasons why these AMIs contain sensitive information Users forgot private data in their AMIs Users are unaware of the consequences not to remove sensitive data Enables attacks based on those information SSH backdoors allowing remote login SSH host key correlation (multiple instances uses the same SSH host key) Reference: Bugiel, S., Nürnberger, S., Pöppelmann, T., Sadeghi, A., Schneider, T.: AmazonIA: When Elastic Snaps Back, ACM CCS 2011 52

Outline 1. Security Considerations 2. Security Challenges Provider Perspective Subscriber Perspective 3. Security as a Service 4. Research Challenges 54

Security as a Service Security Application as a Service Function Now 2013 2018 Messaging / Email Security 20% 60% 70% Secure Web Gateway 10% 35% 65% Remote Vulnerability Scanning Security Information and Log Management Identity & Access Management 10% 30% 45% 1% 10% 25% 2% 20% 28% Security Intelligence 60% 80% 85% Source: Kelly Kavanagh, Gartner Research Good candidates for security-as-aservice are functions which Can be delivered without on-premises technology Latency-tolerant Require minimal customization Involves one-to-many data management or analysis functions Can be implemented though standard interfaces Unlike managed security services, not labor-intensive 55

In-Security as a Service http://www.itnews.com.au/news/139682,cybercri me-as-a-service-takes-off.aspx http://blogs.technet.com/b/rhalbheer/archive/201 1/01/12/cybercrime-as-a-service-our-future.aspx http://www.securityfocus.com/brief/1046 56

Outline 1. Security Considerations 2. Security Challenges Provider Perspective Subscriber Perspective 3. Security as a Service 4. Research Challenges 57

Areas for Research Not a complete list Definition, Measurement and Assurance VM Security = Platform Security Application Security Provenance, trust management Compliance checking, scanning and patching of dormant images Reconsider proof-carrying code and other mobile agent security constructs Security Through Cloud Computing Security as a service Hypervisor-based security services Security in emerging cloud computing programming models and languages Architectures for trustworthy cloud computing Key management TCG-style trusted computing Fully homomorphic encryption, and other crypto tricks to support privacy Trusted clouds of clouds Trusted data and identity portability 58

Prof. Dr. Michael Waidner michael.waidner@sit.fraunhofer.de Fraunhofer-Institute for Secure Information Technology Rheinstrasse 75 64295 Darmstadt, Germany www.fraunhofer.de www.sit.fraunhofer.de TECHNISCHE UNIVERSITÄT DARMSTADT Technical University of Darmstadt Chair for Security in Information Technology Mornewegstrasse 30 64289 Darmstadt, Germany www.cased.de www.sit.tu-darmstadt.de 59

Security and Privacy»made in Darmstadt«Center for Advanced Security Research Darmstadt 170 employees, 70 full-time researchers, 2 TU professors 10 professors, incl. 6 chairs, with strong security focus 15 professors with more than 100 researchers in CASED 6 professors 60