NAILING CLOUDSECURITY WITH PRE-CLOUD SECURITY THINKING?



Similar documents
Cloud Essentials for Architects using OpenStack

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

VICNET is G-Cloud7 GOV UK Supplier VISIT DIGITAL MARKET PLACE VICNETCLOUD VICNET CLOUD MIGRATION SERVICES

What Cloud computing means in real life

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

Cloud Security Introduction and Overview

APIs The Next Hacker Target Or a Business and Security Opportunity?

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

Emerging Approaches in a Cloud-Connected Enterprise: Containers and Microservices

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Security Issues in Cloud Computing

NCTA Cloud Architecture

How to Grow and Transform your Security Program into the Cloud

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

Cloud Computing: Finding the Silver Lining

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014

Intel IT Cloud 2013 and Beyond. Name Title Month, Day 2013

Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken )

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

THE BLUENOSE SECURITY FRAMEWORK

Cloud Computing Security Issues And Methods to Overcome

Whitepaper. What You Need to Know About Infrastructure as a Service (IaaS) Encryption

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013

Proactively Secure Your Cloud Computing Platform

Security of Cloud Computing

A Survey on Cloud Security Issues and Techniques

Cloud Computing Business, Technology & Security. Subra Kumaraswamy Director, Security Architecture, ebay

Security Issues in Cloud Computing

Hybrid Cloud: Overview of Intercloud Fabric. Sutapa Bansal Sr. Product Manager Cloud and Virtualization Group

SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING

Cloud Computing. Bringing the Cloud into Focus

Security & Cloud Services IAN KAYNE

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Secure Cloud Computing

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

FACING SECURITY CHALLENGES

Cloud-Security: Show-Stopper or Enabling Technology?

Welcome. Panel. Cloud Computing New Challenges in Data Integrity and Security 13 November 2014

CoIP (Cloud over IP): The Future of Hybrid Networking

Threat Modeling Cloud Applications

Cloud Courses Description

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

John Essner, CISO Office of Information Technology State of New Jersey

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

How To Protect Your Cloud Computing Resources From Attack

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

Addressing Security for Hybrid Cloud

Virtualization Impact on Compliance and Audit

The State of Application Delivery in 2015

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects

SECURE CLOUD COMPUTING

Managing Cloud Computing Risk

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

Private vs. Public Cloud Solutions

Computer Science. About PaaS Security. Donghoon Kim Henry E. Schaffer Mladen A. Vouk

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Cloud Services Overview

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

When Security, Privacy and Forensics Meet in the Cloud

Enterprise Architecture Review Checklist

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Meet the Cloud API The New Enterprise Control Point

Building an AWS-Compatible Hybrid Cloud with OpenStack

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

CLOUD COMPUTING. When It's smarter to rent than to buy

Pharma CloudAdoption. and Qualification Trends

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Commercial Software Licensing

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

How To Monitor Hybrid It From A Hybrid Environment

Data Protection: From PKI to Virtualization & Cloud

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Security & Trust in the Cloud

BEST PRACTICES RESEARCH

Distributed Denial of Service (DDoS) attacks. Imminent danger for financial systems. Tata Communications Arbor Networks.

Transcription:

NAILING CLOUDSECURITY WITH PRE-CLOUD SECURITY THINKING? Joerg Fritsch GARTNER Session ID: ARCH-W10 Session Classification: Intermediate

Agenda What is in place: Visions, Models & Commercial Offerings. Security Measures in Computing Clouds: a technology S- Curve. How to get to the sweet spot? Cloudsecurity: DOs and DON Ts Nailing Cloudsecurity with?

What is in place.

Visions Cloud Computing. Utility Computing. Pervasive Computing & the Internet of Things. Frequently dominated by Peer-to-Peer technologies. Mobile Devices. Sensors. BIG Data. Data is the new oil. 3V Data: Volume, Velocity & Variety (Gartner, 2001).

Models & Commercial Offerings (1) Illustration of NIST SP-800-145 Adapted from Craig-Wood 2010

Models & Commercial Offerings (2) IaaS: Virtual Systems. Currently the dominant deployment model. Virtualized copies of their legacy ancestors. All legacy security measures are applicable. But maybe they defy the idea (of cloud computing)? VM centric security measures. PaaS: Application runtime (containers). Under the hood: traditional software stacks maintained by the provider (such as LAMP). App and Data Centric security measures applicable. SaaS: Everything else by definition & scope. Avoid the fragmentation of enterprise services ( one trick solutions )

Models & Commercial Offerings (3) Application Services. Consumed from services / application you run in an IaaS or PaaS cloud. Security frequently depends on API- and SSH Keys. Examples: DBs, Key-Value Stores Message Queues SMTP Storage! Map Reduce and Data Analytics

Security Goals: Parkerian Hexad CIA triad (Owens and Tipton, 1986) not sufficient to cover computing clouds and BIG Data. Parkerian Hexad (Parker, 2002): Confidentiality Availability Integrity Possession Utility Authenticity

Threats: What is new? (1) Misuse or disclosure of API keys. Account and/or Service Hijacking. Eavesdropping, manipulating data, All service security depending on the security of these APIs. No perimeter. Attacker can have guest VMs on the same physical platform. Classic reconnaissance attacks used to map public clouds and achieve co-residence. Covert channels. Lack of entropy. Consequence of multi tenancy. Lack of transparency.

Threats: What is new? (2) (Reputation) Fate sharing. You may not be the source of unacceptable use but suffer from the consequences. Some good news: there is no NoSQL injection.

Threats: What is a déjà vu? (1) Cloud deployments and cloud based services inherit the security issues from the applicable domain. SOA security. Key management. and they also inherit the security measures. For example Web Application Firewalls (WAF). Insider Threats. Applicable to all flavors of outsourcing. (D)DOS Hypervisor exploits.

Threats: What is a déjà vu? (2) Availability. AWS December 24 2012 outage. Developer ran maintenance process against running system. The developer had just returned from a DevOps conference? Windows AZURE leapfrog day bug (Feb 29 2012). Notion to take & compensate loss evolves! Scalability issues. Security measures offered in IaaS clouds (such as Firewalls, iptables, ACLs) do no scale to the same extend as the cloud. Acceleration features for firewall capabilities not present on VMs. In PaaS and SaaS you assume that the underlying software stack will be scalable ( elastic ) as required.

Security Measures in Computing Clouds.

The notion of security in Internet, email, WWW, TCP/IP, C, were all developed without having security in mind. IPsec is clunky, it took 15 years before dtls VPNs became state of the art. Client to site access & tunnels overtaken by port based SSL/TLS WLANs had a built-in security concept (almost) from the beginning. WPAv2 currently prevailing, seamless integration and adoption. Computing Clouds? Started without notion of security. Regrettably.

Cloud SMs on the technology S-Curve Source: Cardiff University, School of Computer Science. VM centric SM Audit trails (guest system) App & Data centric SM Browser Security (H)IPS, Whitelisting VPC-IPsec, dtls, SSH IAM & Federation DLP, DRM, IRM API Security Tokenizer TPM, VMMs (e.g. Terra) & PVI (e.g. TVDc) CS Audit trails Homomorphic Encryption, CryptDB Entropy, Keying Firewalls (N)IPS time development phase growth maturity

Misalignment is hard to manage Source: Cardiff University, School of Computer Science. Navigation aids Steam Turbines Double Skin Water tight Bulkheads Radio Communications time development phase growth maturity

IT Evolution (1)

IT Evolution (2) As you move to PaaS & SaaS, VM centric SMs will become less applicable. Network based security measures are becoming less relevant! Superseded by Identity and Access Management (IAM) and federation.

How to get to the sweet spot?

Standardized Trust: Cloud SLAs Legacy SLAs Meaningful SLAs Specs & performance Fault Management Customer responsibilities Data location & segregation Data recovery Data Destruction at termination of contract Regulatory compliance Privileged user access (this is quite easy)

Change your perception of trust (1) At home: end to end control Geolocation Data Center Hardware Code(integrity) OLA? A little bit down the road: Colocation Geolocation Hardware Code(integrity) SLA In the Cloud Code(integrity) SLA

Change your perception of trust (2) Building blocks that are taken away are: Replaced with new building blocks. Control over the data center is replaced with an SLA. Absorbed by additional security measures in the remaining building blocks. Control over server hardware and software integrity can be replaced by TPM attestation/vmm and PVI. When everything is untrusted. Encryption. Fully Homomorphic Encryption (FHE) CryptDB. However, encryption alone may not even be sufficient.

Let go of the perimeter Implementation of most new security measures may require products & talent that are not offered by your current suppliers. Deperimeterization now a reality. Cloud Computing, Mobile Computing. Levels of trust can vary. Everything untrusted, Semi-trusted Public Cloud, Community Cloud Cloud Washing contributes to inaccurate understanding & bad decision making

Cloudsecurity: DOs and DON Ts

DOs and DON Ts Get the inherited application security measures right. Realize that this is not enough. Don t force fit traditional notions of perimeter security to cloud computing (and mobile computing). Don t leave away new security measures because your current suppliers / supply chain cannot deliver it. Think how to acquire new technology, skills and talent. Don t fall for cloud washing. - Learn from the best in class.

DOs and DON Ts Acquire deep understanding of computing clouds and the safety measures offered by the ecosystem. Don t go for scattergun approaches. Look after your API Keys. Prioritize App and Data centric security measures before VM centric security measures. Acquire a thorough understanding of IAM & federation. This is applicable to all deployment models: IaaS, PaaS and SaaS. Two step authentication does not scale well and has to date only seen little exposure.

NAILING CLOUDSECURITY WITH?

Nailing cloudsecurity with Pre-Cloud security thinking? Partially: yes. Computing clouds are a disruptive innovation. Programming languages and Software Stacks under the hood are not. Many security techniques used for Apps and Data hosted on own premises can be adapted to cloud delivery models. Trust issues must be compensated with new processes & technologies.

Thank you! Joerg Fritsch GARTNER