OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect



Similar documents
East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

Security & Trust in the Cloud

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes

IS PRIVATE CLOUD A UNICORN?


Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro

Managing Cloud Computing Risk

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

White Paper on CLOUD COMPUTING

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

OVERVIEW Cloud Deployment Services

Objectives. To understand Cloud Computing Issues. Foundational Elements of Cloud Computing Security & Privacy Cloud Migration Paths Risks in Cloud

Technology & Business Overview of Cloud Computing

The NIST Definition of Cloud Computing (Draft)

Cloud Models and Platforms

Open Source and Cloud. Ramesh Kumar

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

Cloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com

Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate.

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government

Kent State University s Cloud Strategy

Legal Issues in the Cloud: A Case Study. Jason Epstein

Flying into the Cloud: Do You Need a Navigator? Services. Colin R. Chasler Vice President Solutions Architecture Dell Services Federal Government

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit

Cloud Computing. What is Cloud Computing?

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Cloud Services Overview

Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014

A white paper from Fordway on CLOUD COMPUTING. Why private cloud should be your first step on the cloud computing journey - and how to get there

Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB

Cloud Computing Technology

Cloud service model provides levels of abstraction and automation for those tasks

Cloud Security Introduction and Overview

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

How To Protect Your Cloud Computing Resources From Attack

Evolving Technology Issues: Cloud Computing

The NIST Definition of Cloud Computing

Cloud Computing. IST 501 Fall Dongwon Lee, Ph.D.

CHAPTER 8 CLOUD COMPUTING

The Cloud Computing Revolution: Beyond the Hype

SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Security Issues in Cloud Computing

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Cloud Computing Thunder and Lightning on Your Horizon?

6 Cloud computing overview

Business Intelligence (BI) Cloud. Prepared By: Pavan Inabathini

Capability Paper. Today, aerospace and defense (A&D) companies find

Cloud for Credit Unions Leveraging New Solutions to Increase Efficiency & Reduce Costs Presented by: Hugh Smallwood, Chief Technology Officer

Information Security: Cloud Computing

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing for SCADA

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Top 10 Cloud Risks That Will Keep You Awake at Night

journey to a hybrid cloud

CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD. Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service

Cloud Security. DLT Solutions LLC June #DLTCloud

Cloud Computing Submitted By : Fahim Ilyas ( ) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Clinical Trials in the Cloud: A New Paradigm?

Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1

Bringing the Cloud into Focus. A Whitepaper by CMIT Solutions and Cadence Management Advisors

Cloud Computing. Bringing the Cloud into Focus

Architecting the Cloud

Cloud Courses Description

What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era ( ) Workstation Era ( ) Xerox Star 1981!

VMware vcloud Powered Services

Where in the Cloud are You? Session Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle)

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

CLOUD COMPUTING PHYSIOGNOMIES A 1.1 CLOUD COMPUTING BENEFITS

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Information Technology: This Year s Hot Issue - Cloud Computing

Everything You Need To Know About Cloud Computing

AN OVERVIEW ABOUT CLOUD COMPUTING

Transcription:

OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect

Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud Components Cloud Security Advantages Cloud Security Challenges Summary Possible Effects of Cloud Computing

What is Cloud Computing?

Cloud Computing NIST defines cloud computing as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability. It is composed of five essential characteristics, three service models, and four deployment models.

5 Essential Cloud Characteristics On-demand self-service Get computing capabilities as needed automatically Broad network access Services available over the net using desktop, laptop, PDA, and mobile phone Resource pooling Provider resources are pooled to serve multiple clients, using a multi-tenancy model Location independence Rapid elasticity Ability to quickly scale in / out service Measured service Control, optimize services based on metering

3 Cloud Service Models Cloud Software as a Service (SaaS) Use provider s applications over a network Cloud Platform as a Service (PaaS) Deploy customer-created applications to a cloud Cloud Infrastructure as a Service (IaaS) Rent processing, storage, network capacity, and other fundamental computing resources To be considered cloud they must be deployed on top of cloud infrastructure that has the key characteristics

Cloud Software as a Service (SaaS) The capability provided to the consumer is to use the provider s applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email). SaaS is a model of software deployment whereby a provider licenses an application to customers for use as a service on demand. SaaS software vendors (such as SalesForce.com) may host the application on their own web servers or upload the application to the consumer device, disabling it after use or after the on-demand contract expires. Characteristics: Strengths Sometimes free; easy to use; lots of different offerings; easy to access; good consumer adoption; proven business models Weaknesses You can only use the application as far as what it is designed for; no control or knowledge of underlying technology Examples of SaaS

Cloud Platform as a Service (PaaS) PaaS deliver a computing platform and/or solution stack as a service, often consuming cloud infrastructure and sustaining cloud applications. Users gain increased flexibility and control in comparison to SaaS, however this is still somewhat restricted as to what a user can or cannot do. Characteristics: Strengths Great for developers with a particular niche target, Upload a tightly configured applications Simply runs within the platform s framework; More control than SaaS Weaknesses Restricted to the platform s ability only Hard to work outside the box Sometimes dependent on Cloud Infrastructure providers Examples of PaaS

Cloud Infrastructure as a Service (IaaS) IaaS delivers computer infrastructure, typically a platform virtualization environment, as a service. Rather than purchasing servers, software, data center space or network equipment, clients instead buy those resources as a fully outsourced service. This service is what PaaS and SaaS are built on. IaaS providers allow users to create completely virtualized (or hybrid cloud/hardware) IT configurations, giving the user complete control of their environments. Characteristics: Examples of IaaS Strengths Offers full control of a company s infrastructure Not confined to containers or applications or restrictive instances Weaknesses Sometimes comes with a price premium Can be complex to build, manage and maintain (based on provider)

4 Cloud Deployment Models Private cloud The cloud infrastructure is operated solely for an organization. Community cloud The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). Public cloud The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. Hybrid cloud The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds).

Common Cloud Characteristics Cloud computing often leverages: Massive scale Homogeneity Virtualization Resilient computing Low cost software Geographic distribution Service orientation Advanced security technologies

Business Benefits Cost Containment Pay for use, little to no upfront capital expenditure. Immediacy Services are provisioned quickly. Availability Infrastructure has high bandwidth and load balancing capabilities. Scalability Infrastructure capacity allows for traffic spikes and minimizes delays. Efficiency Reallocating some operational activities to the cloud can free up resources to work on innovation. Resiliency Cloud providers have mirrored solutions to minimize downtime in the event of a disaster. This type of resiliency can give businesses the sustainability they need during unanticipated events.

Cloud Computing Security

Security is the Major Issue

Key Security Issues Trust Multi-Tenancy Encryption Compliance

General Security Advantages Shifting public data to a external cloud reduces the exposure of the internal sensitive data. Cloud homogeneity makes security auditing/testing simpler. Clouds enable automated security management. Redundancy / Disaster Recovery.

Cloud Security Advantages Data Fragmentation and Dispersal Simplification of Compliance Analysis Dedicated Security Team Greater Investment in Security Infrastructure Fault Tolerance and Reliability Greater Resiliency Hypervisor Protection Against Network Attacks Possible Reduction of C&A Activities (Access to Pre-Accredited Clouds) Data Held by Unbiased Party (cloud vendor assertion) Low-Cost Disaster Recovery and Data Storage Solutions On-Demand Security Controls Real-Time Detection of System Tampering Rapid Re-Constitution of Services Advanced Honeynet Capabilities

General Security Challenges Trusting vendor s security model Customer inability to respond to audit findings Obtaining support for investigations Indirect administrator accountability Proprietary implementations can t be examined Loss of physical control

Cloud Security Challenges Data dispersal and international privacy laws EU Data Protection Directive and U.S. Safe Harbor program Exposure of data to foreign government and data subpoenas Data retention issues Need for isolation management Multi-tenancy Logging challenges Data ownership issues Quality of service guarantees Dependence on secure hypervisors Attraction to hackers (high value target) Security of virtual OS in the cloud Possibility for massive outages Encryption needs for cloud computing Encrypting access to the cloud resource control interface Encrypting administrative access to OS instances Encrypting access to applications Encrypting application data at rest Public cloud vs. internal cloud security Lack of public SaaS version control

Keep in Mind Issues with moving PII and sensitive data to the cloud Privacy impact assessments Using SLAs to obtain cloud security Suggested requirements for cloud SLAs Issues with cloud forensics Contingency planning and disaster recovery for cloud implementations Handling compliance FISMA HIPAA SOX PCI SAS 70 Audits

Possible Effects of Cloud Computing Small enterprises use public SaaS and public clouds and minimize growth of data centers Large enterprise data centers may evolve to act as private clouds Large enterprises may use hybrid cloud infrastructure software to leverage both internal and public clouds Public clouds may adopt standards in order to run workloads from competing hybrid cloud infrastructures

References NIST on Cloud Computing http://csrc.nist.gov/groups/sns/cloud-computing/ Cloud Security Alliance http://www.cloudsecurityalliance.org/

Thank you for your time! Any questions? Contact brider@securestate.com Q U E S T I O N S A N S W E R S