Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)



Similar documents
Security Issues in Cloud Computing

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Cloud Computing Governance & Security. Security Risks in the Cloud

How To Protect Your Cloud Computing Resources From Attack

Lecture 02b Cloud Computing II

A Survey on Cloud Security Issues and Techniques

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

SERENA SOFTWARE Serena Service Manager Security

Keyword: Cloud computing, service model, deployment model, network layer security.

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Is it Time to Trust the Cloud? Unpacking the Notorious Nine

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

Cloud Security Introduction and Overview

Security Model for VM in Cloud

Cloud-Security: Show-Stopper or Enabling Technology?

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

Cloud Security. Securing what you can t touch. Presentation to Malaysia Government Cloud Computing Forum HUAWEI TECHNOLOGIES CO., LTD.

Introduction to Cyber Security / Information Security

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

Security Issues In Cloud Computing And Their Solutions

Cloud Courses Description

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Cloud Security. DLT Solutions LLC June #DLTCloud

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

FACING SECURITY CHALLENGES

Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems

D. L. Corbet & Assoc., LLC

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Public Cloud Security: Surviving in a Hostile Multitenant Environment

STeP-IN SUMMIT June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)

Security & Cloud Services IAN KAYNE

Cloud Security:Threats & Mitgations

Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

Cloud Security Overview

Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014

Passing PCI Compliance How to Address the Application Security Mandates

Security Virtual Infrastructure - Cloud

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Cloud Security Framework (CSF): Gap Analysis & Roadmap

Cloud Security. Let s Open the Box. Abu Shohel Ahmed ahmed.shohel@ericsson.com NomadicLab, Ericsson Research

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Where every interaction matters.

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Analysis of Cloud Computing Vulnerabilities

Cloud Security Framework (CSF): Gap Analysis & Roadmap

John Essner, CISO Office of Information Technology State of New Jersey

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

Cloud Infrastructure Security

College Training Program

Cloud Computing for SCADA

Cloud computing: benefits, risks and recommendations for information security

Auditing Cloud Computing. A Security and Privacy Guide. Wiley Corporate F&A

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

What Cloud computing means in real life

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing

Planning the Migration of Enterprise Applications to the Cloud

Intel IT Cloud 2013 and Beyond. Name Title Month, Day 2013

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 1, Jan-Feb 2015

External Supplier Control Requirements

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Virtualization and Cloud Computing

Lecture 10 Cloud Security. modified from slides of Lawrie Brown, Ragib Hasan, YounSun Cho, Anya Kim

Top 10 Cloud Risks That Will Keep You Awake at Night

Security of Cloud Computing

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

Cloud Security and Managing Use Risks

locuz.com Professional Services Security Audit Services

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

How to Secure Infrastructure Clouds with Trusted Computing Technologies

Cloud Security & Standardization. Markku Siltanen Tietoturvakonsultti CISA, CGEIT, CRISC

Cloud Courses Description

Network Virtualization Solutions - A Practical Solution

Cloud computing - Architecting in the cloud

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Network Access Control and Cloud Security

Data Protection: From PKI to Virtualization & Cloud

Moderator: Panelists: Panel #2 Big Data: Application Security and Privacy. Keith Swenson, VP of Research and Development, Fujitsu America, Inc.

Security Issues in Cloud Computing

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka.

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Transcription:

Security Management of Cloud-Native Applications Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) 1

Outline Context State-of-the-Art Design Patterns Threats to cloud systems Security Mechanisms Contribution Evaluation Preliminary Results Conclusion and Future Work 2

Context Cloud Computing: A model for enabling ubiquitous, convenient, ondemand network access to shared pool of configurable computing resources that can be rapidly provisionedand released with minimal management effort or service provider interaction. [NIST2011] Cloud-Native Application: Computer software that natively utilizes services and infrastructure provided by cloud service providers. 3

Context Overall Cloud Computing Concerns Network Availability: Cloud must be available whenever you need it. Disaster Recovery & Business Continuity: Services should continue even if cloud provider s production environment is subject to disaster. Security Concerns Data Isolation: Tenant s confidential data may be comingled with data belonging to others. Security Incidents: Tenants need to be informed of security incidents. Also, tenants may require provider support for audits. Virtualization based Risks: Heavy use of virtualization introduce new risks such as attacks among VMs on same physical server. Data Security: Storing unencrypted data on the cloud can be risky. 4

State of the Art Cloud-Native Applications Properties of Cloud-Native Application: Distribution Elasticity Isolated State Design Patterns Elasticity Manager Loose Coupling Stateless Components Automated Management Loose coupling Resiliency Stateful Components Message Mover Resiliency 5

State of the Art Threats to cloud systems Classification of Threats Based on attack surfaces [Gruschka, Jensen2010] Based on layers [C. Modi et al.2012] Attack Surfaces User to Service/ Service to User (Buffer-overflow/ SSL certificate spoofing) Service to Cloud/ Cloud to Service (Resource Exhaustion Attacks / Rootkits) User to Cloud/ Cloud to User (Attacks on cloud management interfaces / Attacks originating at cloud) Based on Layers Data Storage Level (Co-mingling, weak encryption) Network Level (DDOS, IP Spoofing) Virtualization level (Hypervisor Compromise e.g. blue pill) Application Level (SQL injection, XSS) 6

State of the Art Threats to cloud systems Top threats as identified by Cloud Security Alliance [CSA2010] Abuse and Nefarious Use of Cloud Computing (DDOS) Insecure Application Programming Interfaces (Reusable tokens) Malicious Insiders Shared Technology Vulnerabilities (Hypervisor compromise) Data Loss/Leakage (Weak authentication, authorization, audit controls) Account/ Service/ Traffic Hijacking (Phishing, Exploiting vulnerabilities) Unknown Risk Profile (No transparency in internal security procedures, patching, auditing & logging) 7

State of the Art Security Mechanisms Implementing security controls in layered fashion Honeypots: Create a false non-production system to entice the attacker. Once attacked, distract the attacker and report the incidence Sandboxing: Add a layer between code and OS. E.g.: Hypervisor Isolation: Use encryption for VM network traffic to provide logical isolation Isolation using subnets Auditing & Monitoring Use of Configuration management database (CMDB) Use of Attack signatures to match events of interest Provide feedback loop to the system operating the cloud infrastructure More sophisticated detection possible using situational awareness 8

Limitations of Security Mechanisms Traditional security techniques being applied in cloud infrastructure. The techniques not specific to cloud-native applications. Security in cloud-native applications is complex as it s a conjunction of many other services provided by IaaS, PaaS, SaaS. 9

Contribution Goal Build a solution that is capable to address specific security requirements of cloud-native applications Develop a security approach for cloud-native application Security Approach for Cloud-Native Applications Cloud-native application modeling Detection Mechanism Prototyping & Evaluation 10

Contribution Modeling the Cloud-Native application Each software component performs a particular class of tasks (e.g. {Presentation, Authentication, DataAccess}). Each component may be dependent on other software components. Each component is elastically scalable Each component may contain multiple instances of same software module Each instance is represented by a node Each component performs only one class of tasks Set S= set of nodes (represents instances of software modules) Set C= set of class of tasks (can be mapped to functional clusters) Function Role: S C associate nodes with functional clusters Each cluster may be dependent on other clusters Communication among clusters can be represented byη C x C 11

Contribution Abstract Model Nodes S= {N 1, N 2,. N 14 } Clusters C= {Presentation, Bl 1,Bl 2,Bl 3,Bl 4, KeyValue, RelationalDB} Dependencies η= {e 1,e 2,, e 9 } Cloud Application App= <C,η> where η C x C 12

Contribution Communication Among Nodes Abstract model does not specify communication among specific instances. Only one edge per request between one cluster to another. Elastic load balancer decides the instance to which the request should be forwarded within a cluster. We mimic this behavior using notion of probable edgesout of which only one edge (selected non-deterministically) is realized. Probable edges Realized edge 13

Contribution Modeling the Computation Set of requests R= {r 1,r 2,, r n } Each request r i R can be seen as interaction among a set of nodes S = {N i } S Each interacting node shall belong to a different cluster N i S, Role(N i )is distinct Each request processing can be represented as a graph G i = <S, η > where η S x S (realized edges) 14

Contribution Detection Mechanisms We want to analyze the behavior of cloud-native applications. To detect potential attacks by analyzing abnormal behavior. We use a detection approach based on k-means clustering to detect malicious activities. 15

Contribution Some Possible Symptoms Request path not complete Request trace did not reach one of the nodes in a set of termination nodes. Possible Reasons: Low level exploits such as EIP overwrite, crashes due to stack overflow. Deviation from dependency path Each cluster may be dependent on other clusters. Abnormal behavior in case the request path violates the dependency path. Possible Reasons: Vulnerabilities in APIs. Biasness Some nodes may be biased towards a particular dependent cluster. Possible Reasons: Misuse of a particular feature in the application. 16

Evaluation Built a simulator to represent the behavior of cloud-native applications and potential attacks. Using k-means clustering algorithm to detect potential attacks. 17

Evaluation Preliminary Results Receiver operating characteristic (ROC) curve generated using sensitivity and specificity calculations. Allows to evaluate the performance of the detection The current performance is good but we have modeled very simple attacks 1.2 1 0.8 TRUE POSITIVE RATE 0.6 0.4 ROC Curve 0.2 0 FALSE POSITIVE RATE 18

Conclusions & Future Work Proposed Security Approach for Cloud-Native Applications Cloud-native application modeling Detection Mechanism Prototyping & Evaluation Future work Modeling more complex attacks. Extracting traces from openstack infrastructure. 19

Questions? 20