Security Challenges in the Cloud



Similar documents
Endpoint protection for physical and virtual desktops

Security Solution Architecture for VDI

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud-Security: Show-Stopper or Enabling Technology?

Endpoint protection for physical and virtual desktops

APIs The Next Hacker Target Or a Business and Security Opportunity?

Secure Your Mobile Device Access with Cisco BYOD Solutions

APPLIED AND INTEGRATED SECURITY

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

Cloud Essentials for Architects using OpenStack

Cloud Computing Security Considerations

Chapter 4 Application, Data and Host Security

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

Addressing Cloud Computing Security Considerations

overview Enterprise Security Solutions

overview Enterprise Security Solutions

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices

Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools

Security Issues in Cloud Computing

How to Secure Infrastructure Clouds with Trusted Computing Technologies

A Survey on Cloud Security Issues and Techniques

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage

Systems Manager Cloud Based Mobile Device Management

BYOD: End-to-End Security

IBM United States Software Announcement , dated February 3, 2015

World-class security solutions for your business. Business Products. C a t a l o g u e

How To Protect Your Mobile Devices From Security Threats

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation

Securing Enterprise Mobility for Greater Competitive Advantage

Mobile Device Security Is there an app for that?

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

FileCloud Security FAQ

ONE Cloud Services Secure Cloud Applications for E-Health

Data Protection: From PKI to Virtualization & Cloud

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

Flexible Identity Federation

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

Five Fundamentals for Modern Data Center Availability

Internet threats: steps to security for your small business

Cloud security architecture

owncloud Architecture Overview

Security Overview Enterprise-Class Secure Mobile File Sharing

ForeScout MDM Enterprise

The ForeScout Difference

Feature List for Kaspersky Security for Mobile

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

Chapter 19 Cloud Computing for Multimedia Services

Protect Yourself in the Cloud Age

BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.

Assessment & Monitoring

ESET Security Solutions for Your Business

Google Identity Services for work

The Essential Security Checklist. for Enterprise Endpoint Backup

Security Considerations for Public Mobile Cloud Computing

White Paper How Noah Mobile uses Microsoft Azure Core Services

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

Secure Cloud-Ready Data Centers Juniper Networks

Cloud Security. DLT Solutions LLC June #DLTCloud

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

State of South Carolina Policy Guidance and Training

SERENA SOFTWARE Serena Service Manager Security

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Information Security It s Everyone s Responsibility

Alliance Key Manager Solution Brief

Secure your Privacy. jrsys, Inc. All rights reserved.

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

COLLEAGUES. CLIENTS. CONNECTED. CLOUD.

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

Virtual Switching Without a Hypervisor for a More Secure Cloud

Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches

WWRF Cloud Implications to Security, Privacy, and Trust

2013 USER GROUP CONFERENCE

2012 NCSA / Symantec. National Small Business Study

Securing Office 365 with MobileIron

Backup with synchronization/ replication

OVERVIEW. Enterprise Security Solutions

Transcription:

Security Challenges in the Cloud Claudia Eckert Fraunhofer Research Institution for Applied and Integrated Security (AISEC) Chair for IT Security, TU München 7.2. Darmstadt, Conference of the e-finance Lab C. Eckert, AISEC

Outline 1. Cloud Security Issues 2. Cloud Security Solutions Mitigate Risks & Take Opportunities 3. Take Home Message

Outline 1. Cloud Security Issues 2. Cloud Security Solutions Mitigate Risks & Take Opportunities 3. Take Home Message

1 Cloud Security Issues Well-known Hot Topics: CSA 2010, ENISA 2009, IBM X-Force 2010, CSOs Loss of Control, Compliance & Data Leakages Where is my data? Who accesses my data? Strong isolation for multiple tenants? How is data backup handled? Required: Security monitoring of applications

1. Cloud Security Issues Well-known Hot Topics (cont.) Bring your Own Device: Smart Phones etc. Insecure personal devices: Patch-level? Anti-virus checks? Theft protection? Backup of sensitive data on device Access to Cloud-data via stolen, misused mobile devices Required: Security health checks for mobiles

1. Cloud Security Issues Well-known Hot Topics (cont.) Identity & Access Management Federated Clouds: Single-Sign-in? SAML and RBAC supported? Strong Authentication, e.g. npa? Trustworthiness of used Clouds? Certification? Trust-Labels? Required: Security assessments for platforms

1. Cloud Security Issues Security Challenge in the Cloud Challenge: Turn fear and doubt into trust and added-value! Turn Cloud Computing into a Security Enhancing Technology! Provide Security Monitoring Tools to enhance trust in Cloud platforms. Provide Cloud-based Security as a Service Solutions to support mobile cloud access. Provide usable, secure Cloud Services to enhance security in daily business scenarios

Outline 1. Cloud Security Issues 2. Cloud Security Solutions Lots of Paper Work, Guidelines already available: Cloud Security Alliance, NIST, BSI, ENISA, etc. Security technologies are evolving Mitigate Risks: Cloud Monitoring Take Opportunities: Security aas

2. Cloud Security Solutions Mitigate Risks: AISEC Cloud Leitstand Leitstand: Security Monitoring Framework Aim: Empower users/providers to control & manage clouds Enforcement of policies e.g. access control, authorization Monitoring of platform metrics: e.g. time-to-patch, network traffic, Dashboard displays role-specific information Plug in existing monitoring tools: e.g. Zabbix, Ganglia, RSA Archer Prototype: commercial (e.g. Vblock) & open source (e.g. OpenNebula)

2. Cloud Security Solutions Mitigate Risks: AISEC Cloud Leitstand Data on different layers SOAP calls Method calls In Java-VM System calls in guest OS/Hypervisor Dashboard Role-specific views Services to analyze incidents Backend Integration of monitoring tools

2. Cloud Security Solutions Mitigate Risks: Sealed Cloud Sealed Cloud: Provider-secure Cloud, BMWi funded project Aim: leverage the Trust Level of Cloud Infrastructure provider Integrate data protection mechanismes to provide a secure and technically verifiable infrastructure Integrating Hardware Security Modules & end-to-end encryption Integrating attestation techniques & software integrity monitoring Providing strong Authentication: Gateway for Identity tokens (npa, OpenID ), SAML, ecard-server-interface Data cleanup services, diskless systems

2. Cloud Security Solutions Mitigate Risks: Sealed Cloud

2. Cloud Security Solutions Take Opportunities: Security as a Service Problem: Bring your own (insecure!) device Solution: Cloud-based Security aas Anti-virus scanning OS integrity checks Malicious App Prevention Secure Storage Wiping and versioning

2. Cloud Security Solutions Take Opportunities: Security as a Service Services: Analyze replicated Smartphone Image Aim: synchronize in near real-time, save battery consumption, CPU, network bandwidth etc. Security Services Set-up Amazon Web Services on Linux OS Run Emulation of a Smartphone in VM Adapted Emulator to dump Smartphone Images Security as a Services: AVG anti-virus : takes 7 sec in Cloud versus 50 sec on device Use Private Cloud to enforce Security Policies on mobile Phones

2. Cloud Security Solutions Take Opportunities: Tap n Drop Problem: Ad-hoc sharing of documents during e.g. meetings: secure, comfortable, synchronized, Possible Solutions: Pass around an USB stick Are you sure there is no virus on it? Send an encrypted email to everybody Is everybody using S/MIME? Or PGP? Use an online storage like DropBox Everybody needs an account Everybody needs to trust the storage provider

2. Cloud Security Solutions Take Opportunities: Tap n Drop Tap n Drop: Secure ad-hoc sharing of files using CC NFC enabled smartphone or laptop: just touch tag Ad hoc creation of a Cloud storage On-the-fly generation & distribution of encryption keys Instant access to shared online folder It s secure and it s easy: Client-site encryption, no trusted backend No-click-interaction: Just touch the tag No set up or configuration required

Outline 1. Cloud Security Issues 2. Cloud Security Solutions Mitigating Risks & Take Opportunities 3. Take Home Message

3. Take Home Message Challenge: Turn fear and doubt into trust and added value! Turn Cloud Computing into a Security EnhancingTechnology! Enhance trust in cloud offerings by providing means to control what is going on (Lenin: Vertraue, aber prüfe nach) e.g. Cloud Leitstand (Monitoring Framework) Enhance Security by offering Security as a Service using cloud technology e.g. Tap n Drop, BringYourOwnDevice

Thank you for your Attention Claudia Eckert Fraunhofer AISEC (Applied & Integrated Security) TU München, Chair for IT Security E-Mail: Internet: claudia.eckert@aisec.fraunhofer.de http://www.aisec.fraunhofer.de Visit us: e.g. CeBIT Hannover Cloud Security Lab @AISEC in Munich