Cloud Security Overview



Similar documents
Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II

Security Practices, Architecture and Technologies

319 MANAGED HOSTING TECHNICAL DETAILS

KeyLock Solutions Security and Privacy Protection Practices

Cloud S ecurity Security Processes & Practices Jinesh Varia

Virtualization System Security

Level Agreements, and loss of availability due to security breach: Amazon EC2 and S3, Microsoft Windows Azure Compute and Storage.

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Stephen Coty Director, Threat Research

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Passing PCI Compliance How to Address the Application Security Mandates

Cloud Computing Trends

CIT 668: System Architecture

Cloud Computing Governance & Security. Security Risks in the Cloud

PICO Compliance Audit - A Quick Guide to Virtualization

Live Guide System Architecture and Security TECHNICAL ARTICLE

Preparing an RFI for. This RFI has been updated to reflect the new requirements in Version 3.0 of the PCI DSS, which took effect January 2015.

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Security Essentials & Best Practices

Security of Cloud Computing

CSE543 Computer and Network Security Module: Cloud Computing

Amazon Web Services: Overview of Security Processes May 2011

Security in the Sauce Labs Cloud. Practices and protocols used in Sauce s infrastructure and Sauce Connect

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

Security Whitepaper: ivvy Products

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Autodesk PLM 360 Security Whitepaper

Security in the Sauce Labs Cloud

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

Famly ApS: Overview of Security Processes

Security Controls for the Autodesk 360 Managed Services

Best Practices for Security and Compliance with Amazon Web Services. A Trend Micro White Paper I April 2013

Data Protection: From PKI to Virtualization & Cloud

BKDconnect Security Overview

Network Incident Report

Druva Phoenix: Enterprise-Class. Data Security & Privacy in the Cloud

Lecture 02a Cloud Computing I

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

PCI DSS 3.0 Compliance

A Decision Maker s Guide to Securing an IT Infrastructure

Cloud Security Case Study Amazon Web Services. Ugo Piazzalunga Technical Manager, IT Security

Information Security Basic Concepts

FISMA / NIST REVISION 3 COMPLIANCE

Security Virtual Infrastructure - Cloud

CLOUD SERVICES FOR EMS

Module 10 Cloud Security

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

Security + Certification (ITSY 1076) Syllabus

December P Xerox App Studio 3.0 Information Assurance Disclosure

ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire

SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING

Document TMIC-003-PD Version 1.1, 23 August

Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems

Did you know your security solution can help with PCI compliance too?

twilio cloud communications SECURITY ARCHITECTURE

Sitefinity Security and Best Practices

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Cloud-Security: Show-Stopper or Enabling Technology?

White Paper How Noah Mobile uses Microsoft Azure Core Services

Dooblo SurveyToGo: Security Overview

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

Supplier Information Security Addendum for GE Restricted Data

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Whitepaper. What You Need to Know About Infrastructure as a Service (IaaS) Encryption

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Top virtualization security risks and how to prevent them

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

SECURITY in the RACKSPACE CLOUD An overview of our best practices

GoodData Corporation Security White Paper

Keyword: Cloud computing, service model, deployment model, network layer security.

Security Whitepaper. NetTec NSI Philosophy. Best Practices

Lecture 02b Cloud Computing II

Windows Azure Security

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

Can PCI DSS compliance be achieved in a cloud environment?

Every Silver Lining Has a Vault in the Cloud

Deployment of Private, Hybrid & Public Clouds with OpenNebula

Cloud IaaS: Security Considerations

1 Data Center Infrastructure Remote Monitoring

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) Introduction to Cloud Security. Taniya

Building Secure Cloud Applications. On the Microsoft Windows Azure platform

Making Data Security The Foundation Of Your Virtualization Infrastructure

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

How to procure a secure cloud service

Protecting Your Organisation from Targeted Cyber Intrusion

IT Networking and Security

Transcription:

UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Security Overview Murat Kantarcioglu

Outline Current cloud security techniques Amazon Web services Microsoft Azure Cloud Security Challengers

Amazon Security Overview AWS is compliant with various security certifications E.g., FISMA (Federal Information Security Management Act)- Low Level Internal information, communication and employee lifecycle management to increase security

AWS Physical Security Data centers are protected by many security features and safe guards Two factor authentication, security force etc. Fire Detection and suppression Power Climate and Temperature safeguards

AWS Configuration and Continuity Management Changes are reviewed, tested, and approved before rolled out. Different availability zones to separate faults Different regions could be selected for regulatory compliance or increasing reliability. 24x7 incident response team Backups for stored data Physical devices are erased using DoD or NIST media sanitization techniques

AWS Identity and Access Management For each AWS account, you can create multiple users with different credentials For each user, you can give different rights More details on this when we cover Identity management and cloud. Multi-factor authentication based on hardware tokens Key and Certificate Rotation for increased security

AWS Network Security Features Increased reliability against DDOS SSL based access to almost all resources to prevent man in the middle attacks All EC2 instances needs to use their actual IPs and MAC addresses. Packet Sniffing by other tenants are prevented by Hypervisor We will talk about Hypervisor s in detail later. You can create Virtual Private Clouds that are distinct, isolated network within cloud.

EC2 Security Host operating systems are protected Two factor authentication Auditing Guest operating systems must be controlled by users Firewalls

EC2 Firewall

EC2 Firewall Features Firewall is not controlled through Guest operating system X.509 certificates and keys are needed to authenticate with the firewall Guest OS level firewalls could be added for additional security

Hypervisor based Isolation and Security Hypervisors are used to limit access to resources and to maintain isolation between instances Prevents access to raw hard disks

Storage Systems (EBS, S3 etc.) SSL based secure APIs Authentication based on HMAC or public key crypto Security groups Possible Access logging Data can be encrypted by the customer

Microsoft Azure Overview

Azure Structure Each role instance is a new VM VMs run on Microsoft Azure Hypervisor One VM is special Runs hardened root OS Hosts Fabric Agent (FA) FAs manage Guest agents within Guest OSes on customer VMs. FAs manage storage nodes The collection of Hypervisor, VMs, FA and customer VMs comprises compute node.

Microsoft Azure Authentication SMAPI is a REST protocol for web services Runs over SSL using self-signed certificates Certificates and keys store separately by Azure Encrypts the keys and stores some secret location Fabric Controller keeps separate master key and authentication keys to authenticate with hardware devices

Access Control In Azure Storage User can create multiple accounts Each account has a storage key Given a storage key, you can access all the data related to storage key. No fine grained access control! Data can be made publicly readable User can sign query templates using storage account key Container lever access policies are also possible Two keys could be valid at any given time to allow key updates

Azure Isolation Hypervisors used for isolation Isolation of FC are achieved by limiting communication with FA Unidirectional communication to FAs FAs reply requests All incoming messages assume to be untrusted If possible some FCs are put on separate VLANs

Azure Packet Filtering Root OS and Hypervisor filters packets to prevent spoofed and unauthorized traffic. Customer access to VMs is limited E.g., no remote terminal connection Connection between different applications is considered internet connection.

Other Azure Security and Reliability Features Cryptographic tools for data encryption Data deletion for disposed hardware Integrity checks for data Backups to increase availability Monitoring agents gather data from FCs and root OSs to create audit logs Personnel policies, physical security similar to Amazon

Main Cloud Security Problems VM- level attacks Exploit potential vulnerabilities in hypervisor Cloud provider vulnerabilities E.g. cross-site scripting vulnerability in Salesforce.com Phishing Integrating cloud authentication with company authentication mechanisms Availability Single point of Failure Assurance of computational integrity by cloud provider

Issues with moving data to cloud providers Will cloud provider fight against a subpoena? Do you trust Azure logs to show gross negligence on Microsoft part? Contractual obligations? If you can hack one place for espionage Gmail could be a good starting point? Data lock-in

What is new in cloud computing security? Too big to fail? What if Amazon hardware is confiscated? What if Amazon fails? Hiding activity patterns Using cloud for crime? Secure cloud auditing Mutual auditability

Quiz In Microsoft Azure Storage, for a given storage account, how would you enable fine grained access control? Your answer should be less than 30 words.