Cloud Computing: Finding the Silver Lining



Similar documents
Data Security In The Cloud

Cloud Computing Security Issues And Challenges

Managing Cloud Computing Risk

Cloud Computing; What is it, How long has it been here, and Where is it going?

What Cloud computing means in real life

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Commercial Software Licensing

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

Security Issues in Cloud Computing

On Premise Vs Cloud: Selection Approach & Implementation Strategies

Cloud Enterprise Content Management

Cloud Services Overview

Cloud Computing Security Issues

How To Protect Your Cloud Computing Resources From Attack

Virtualization and Cloud Computing

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

How To Run A Cloud Computer System

Consumption IT. Michael Shepherd Business Development Manager. Cisco Public Sector May 1 st 2014

Cloud Computing. What is Cloud Computing?

Data Centers and Cloud Computing. Data Centers

Cloud Computing Technology

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

About me & Submission details

Validating Cloud. June 2012 Merry Danley

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

White Paper on CLOUD COMPUTING

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

How To Secure Cloud Computing

A Comparative Study of cloud and mcloud Computing

CHAPTER 8 CLOUD COMPUTING

Introduction to Cloud Computing

Cloud Computing and Amazon Web Services

Fundamentals of Cloud Computing

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Cloud Computing for SCADA

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Cloud Computing and Records Management

Lecture 02b Cloud Computing II

What Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen

Why You Should Consider the Cloud

Private vs. Public Cloud Solutions

THOUGHT LEADERSHIP. Journey to Cloud 9. Navigating a path to secure cloud computing. Alastair Broom Solutions Director, Integralis

The Elephant in the Room: What s the Buzz Around Cloud Computing?

Emerging Technology for the Next Decade

Practical Advice for Cloud Data Protection

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Securing Oracle E-Business Suite in the Cloud

Lecture 02a Cloud Computing I

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

NAILING CLOUDSECURITY WITH PRE-CLOUD SECURITY THINKING?

Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Grid-Interop 2012

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Data Centers and Cloud Computing. Data Centers. MGHPCC Data Center. Inside a Data Center

Module 1: Facilitated e-learning

Hosting Services VITA Contract VA AISN (Statewide contract available to any public entity in the Commonwealth)

Cloud Computing and Attacks

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Cloud-Testing vs. Testing a Cloud

How to Turn the Promise of the Cloud into an Operational Reality

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

How Cloud Computing is Changing the Face of IT. Ketul Parekh HCSS

How To Understand Cloud Computing

Cloud Infrastructure as a Service Market Update, United States

Big Data & Its Bigger Possibilities In The Cloud

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

Private Cloud Database Consolidation with Exadata. Nitin Vengurlekar Technical Director/Cloud Evangelist

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit

HARNESSING THE POWER OF THE CLOUD

Selecting the right Cloud. Three steps for determining the most appropriate Cloud strategy

Securing the Physical, Virtual, Cloud Continuum

Data Centers and Cloud Computing

Electronic Records Storage Options and Overview

Federal Aviation Administration. efast. Cloud Computing Services. 25 October Federal Aviation Administration

Leveraging the Cloud. September 22, Digital Government Institute Cloud-Enabled Government Conference Washington, DC

Solutions as a Service N.Konstantinidis Technical Director - MNG

Bringing the Cloud into Focus:

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

security in the cloud White Paper Series

The Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management

Historians and Production Management as Cloud Applications

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

IS PRIVATE CLOUD A UNICORN?

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

It s All About Cloud Key Concepts, Players, Platforms And Technologies

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

Cloud models and compliance requirements which is right for you?

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

Transcription:

Cloud Computing: Finding the Silver Lining Steve Hanna, Juniper Networks Copyright 2009 Juniper Networks, Inc. 1

Agenda What is Cloud Computing? Security Analysis of Cloud Computing Conclusions Copyright 2009 Juniper Networks, Inc. 2

Agenda What is Cloud Computing? Security Analysis of Cloud Computing Conclusions Copyright 2009 Juniper Networks, Inc. 3

Cloud Computing Defined Dynamically scalable shared resources accessed over a network Only pay for what you use Shared internally or with other customers Resources = storage, computing, services, etc. Internal network or Internet Notes Similar to Timesharing Rent IT resources vs. buy New term definition still being developed Copyright 2009 Juniper Networks, Inc. 4

Conventional Data Center Data Applications Data Center Enterprise LAN Office User Internet Remote User Copyright 2009 Juniper Networks, Inc. 5

Cloud Computing Model Enterprise 2 Enterprise 1 Enterprise LAN Cloud Provider Enterprise LAN Data Applications Office User Internet Remote User Copyright 2009 Juniper Networks, Inc. 6

Many Flavors of Cloud Computing SaaS Software as a Service Network-hosted application DaaS Data as a Service Customer queries against provider s database PaaS Platform as a Service Network-hosted software development platform IaaS Infrastructure as a Service Provider hosts customer VMs or provides network storage IPMaaS Identity and Policy Management as a Service Provider manages identity and/or access control policy for customer NaaS Network as a Service Provider offers virtualized networks (e.g. VPNs) Copyright 2009 Juniper Networks, Inc. 7

Cloud Computing Providers IPM Software\ & Data DaaS SaaS PaaS IPMaaS Infrastructure NaaS IaaS (DC/server) Copyright 2009 Juniper Networks, Inc. 8

Cloud Computing Pros and Cons Pros Reduced costs Resource sharing is more efficient Management moves to cloud provider Consumption based cost Faster time to roll out new services Dynamic resource availability for crunch periods Compliance/regulatory laws mandate on-site ownership of data Security and privacy Latency & bandwidth guarantees Absence of robust SLAs Uncertainty around interoperability, portability & lock in Availability & reliability Inhibitors Copyright 2009 Juniper Networks, Inc. 9

Who s using Clouds today? Copyright 2009 Juniper Networks, Inc. 10

Example: Mogulus Mogulus is a live broadcast platform on the internet. (cloud customer) Producers can use the Mogulus browser-based Studio application to create LIVE, scheduled and on-demand internet television to broadcast anywhere on the web through a single player widget. Mogulus is entirely hosted on cloud (cloud provider) On Election night Mogulus ramped to: 87000 videos @500kbps = 43.5 Gbps http://www.mogulus.com Copyright 2009 Juniper Networks, Inc. 11

Example: Animoto Animoto is a video rendering & production house with service available over the Internet (cloud customer) With their patent-pending technology and high-end motion design, each video is a fully customized orchestration of user-selected images and music in several formats, including DVD. Animoto is entirely hosted on cloud (cloud provider) Released Facebook App: users were able to easily render their photos into MTV like videos Ramped from 25,000 users to 250,000 users in three days Signing up 20,000 new users per hour at peak Went from 50 to 3500 servers in 5 days Two weeks later scaled back to 100 servers http://www.animoto.com Copyright 2009 Juniper Networks, Inc. 12

Example: New York Times Timesmachine is a news archive of the NY Times available in pdf over the Internet to newspaper subscribers (cloud customer) Timesmachine is entirely hosted on cloud (cloud provider) Timesmachine needed infrastructure to host several terabits of data Internal IT rejected due to cost Business owners got the data up on cloud for $50 over one weekend http://timesmachine.nytimes.com Copyright 2009 Juniper Networks, Inc. 13

Example: Eli Lilly Eli Lilly is the 10th largest pharmaceutical company in the world (cloud customer) Moved entire R&D environment to cloud (cloud provider) Results: Reduced costs Global access to R&D applications Rapid transition due to VM hosting Time to deliver new services greatly reduced: New server: 7.5 weeks down to 3 minutes New collaboration: 8 weeks down to 5 minutes 64 node linux cluster: 12 weeks down to 5 minutes Copyright 2009 Juniper Networks, Inc. 14

Who s using Clouds today? Startups & Small businesses Can use clouds for everything SaaS, IaaS, collaboration services, online presence Mid-Size Enterprises Can use clouds for many things Compute cycles for R&D projects, online collaboration, partner integration, social networking, new business tools Large Enterprises More likely to have hybrid models where they keep some things in house On premises data for legal and risk management reasons Copyright 2009 Juniper Networks, Inc. 15

Agenda What is Cloud Computing? Security Analysis of Cloud Computing Conclusions Copyright 2009 Juniper Networks, Inc. 16

Information Security Risk Management Process (ISO 27005) Establish Context Risk Assessment Identify Risks Identify Assets Identify Threats Identify Existing Controls Identify Vulnerabilities Identify Consequences Estimate Risks Evaluate Risks Develop Risk Treatment Plan Reduce, Retain, Avoid, or Transfer Risks Risk Acceptance Implement Risk Treatment Plan Monitor and Review Risks Copyright 2009 Juniper Networks, Inc. 17

Streamlined Security Analysis Process Identify Assets Which assets are we trying to protect? What properties of these assets must be maintained? Identify Threats What attacks can be mounted? What other threats are there (natural disasters, etc.)? Identify Countermeasures How can we counter those attacks? Appropriate for Organization-Independent Analysis We have no organizational context or policies Copyright 2009 Juniper Networks, Inc. 18

Identify Assets Copyright 2009 Juniper Networks, Inc. 19

Conventional Data Center Data Applications Data Center Enterprise LAN Office User Internet Remote User Copyright 2009 Juniper Networks, Inc. 20

Cloud Computing Model Enterprise 2 Enterprise 1 Enterprise LAN Cloud Provider Enterprise LAN Data Applications Office User Internet Remote User Copyright 2009 Juniper Networks, Inc. 21

Identify Assets Customer Data Customer Applications Client Computing Devices Copyright 2009 Juniper Networks, Inc. 22

Information Security Principles (Triad) C I A Confidentiality Prevent unauthorized disclosure Integrity Preserve information integrity Availability Ensure information is available when needed Copyright 2009 Juniper Networks, Inc. 23

Identify Assets & Principles Customer Data Confidentiality, integrity, and availability Customer Applications Confidentiality, integrity, and availability Client Computing Devices Confidentiality, integrity, and availability Copyright 2009 Juniper Networks, Inc. 24

Identify Threats Copyright 2009 Juniper Networks, Inc. 25

Cloud Computing Model Enterprise 2 Enterprise 1 Enterprise LAN Cloud Provider Enterprise LAN Data Applications Office User Internet Remote User Copyright 2009 Juniper Networks, Inc. 26

Identify Threats Failures in Provider Security Attacks by Other Customers Availability and Reliability Issues Legal and Regulatory Issues Perimeter Security Model Broken Integrating Provider and Customer Security Systems Copyright 2009 Juniper Networks, Inc. 27

Failures in Provider Security Explanation Provider controls servers, network, etc. Customer must trust provider s security Failures may violate CIA principles Countermeasures Verify and monitor provider s security Notes Outside verification may suffice For SMB, provider security may exceed customer security Copyright 2009 Juniper Networks, Inc. 28

Attacks by Other Customers Threats Provider resources shared with untrusted parties CPU, storage, network Customer data and applications must be separated Failures will violate CIA principles Countermeasures Hypervisors for compute separation MPLS, VPNs, VLANs, firewalls for network separation Cryptography (strong) Application-layer separation (less strong) Copyright 2009 Juniper Networks, Inc. 29

Availability and Reliability Issues Threats Clouds may be less available than in-house IT Complexity increases chance of failure Clouds are prominent attack targets Internet reliability is spotty Shared resources may provide attack vectors BUT cloud providers focus on availability Countermeasures Evaluate provider measures to ensure availability Monitor availability carefully Plan for downtime Use public clouds for less essential applications Copyright 2009 Juniper Networks, Inc. 30

Legal and Regulatory Issues Threats Laws and regulations may prevent cloud computing Requirements to retain control Certification requirements not met by provider Geographical limitations EU Data Privacy New locations may trigger new laws and regulations Countermeasures Evaluate legal issues Require provider compliance with laws and regulations Restrict geography as needed Copyright 2009 Juniper Networks, Inc. 31

Perimeter Security Model Broken Copyright 2009 Juniper Networks, Inc. 32

Perimeter Security Model Safe Zone Data Enterprise LAN Applications Data Center Office User Internet Remote User Copyright 2009 Juniper Networks, Inc. 33

Perimeter Security with Cloud Computing? Enterprise 2 Enterprise 1 Enterprise LAN Cloud Provider Enterprise LAN Data Applications Office User Internet Remote User Copyright 2009 Juniper Networks, Inc. 34

Perimeter Security Model Broken Threats Including the cloud in your perimeter Lets attackers inside the perimeter Prevents mobile users from accessing the cloud directly Not including the cloud in your perimeter Essential services aren t trusted No access controls on cloud Countermeasures Drop the perimeter model! Copyright 2009 Juniper Networks, Inc. 35

Integrating Provider and Customer Security Threat Disconnected provider and customer security systems Fired employee retains access to cloud Misbehavior in cloud not reported to customer Countermeasures At least, integrate identity management Consistent access controls Better, integrate monitoring and notifications Notes Can use SAML, LDAP, RADIUS, XACML, IF-MAP, etc. Copyright 2009 Juniper Networks, Inc. 36

Agenda What is Cloud Computing? Security Analysis of Cloud Computing Conclusions Copyright 2009 Juniper Networks, Inc. 37

Bottom Line on Cloud Computing Security Engage in full risk management process for each case For small and medium organizations Cloud security may be a big improvement! Cost savings may be large (economies of scale) For large organizations Already have large, secure data centers Main sweet spots: Elastic services Internet-facing services Employ countermeasures listed above Copyright 2009 Juniper Networks, Inc. 38

Security Analysis Skills Reviewed Today Information Security Risk Management Process Variations used throughout IT industry ISO 27005, NIST SP 800-30, etc. Requires thorough knowledge of threats and controls Bread and butter of InfoSec Learn it! Time-consuming but not difficult Streamlined Security Analysis Process Many variations RFC 3552, etc. Requires thorough knowledge of threats and controls Useful for organization-independent analysis Practice this on any RFC or other standard Become able to do it in 10 minutes Copyright 2009 Juniper Networks, Inc. 39

Discussion Copyright 2009 Juniper Networks, Inc. 40

Copyright 2009 Juniper Networks, Inc. 41