Cloud Security An Overview OWASP. The OWASP Foundation http://www.owasp.org



Similar documents
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao

Cloud Computing; What is it, How long has it been here, and Where is it going?

On Premise Vs Cloud: Selection Approach & Implementation Strategies

Customer Security Issues in Cloud Computing

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

Cloud Computing in Higher Education: A Guide to Evaluation and Adoption

Securing The Cloud With Confidence. Opinion Piece

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Cloud computing: benefits, risks and recommendations for information security

Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate.

Cloud Services Overview

Private vs. Public Cloud Solutions

Managing Cloud Computing Risk

Bringing the Cloud into Focus. A Whitepaper by CMIT Solutions and Cadence Management Advisors

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

1 The intersection of IAM and the cloud

What Cloud computing means in real life

Deploying Public, Private, and Hybrid Storage Clouds. Marty Stogsdill, Oracle

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit

Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS

CLOUD COMPUTING GUIDELINES FOR LAWYERS

Information Security: Cloud Computing


Cloud Computing. What is Cloud Computing?

Proactively Secure Your Cloud Computing Platform

Key Considerations of Regulatory Compliance in the Public Cloud

How to ensure control and security when moving to SaaS/cloud applications

Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro

Cloud Computing. Chapter 1 Introducing Cloud Computing

Achieve Economic Synergies by Managing Your Human Capital In The Cloud

Program. Maria Fiore Business Development Manager Hartco. Hugo Boutet igovirtual. Introduction to MicroAge. SME and «cloud computing» 2006 MicroAge

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Cloud Computing An Elephant In The Dark

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

2011 Morrison & Foerster LLP All Rights Reserved mofo.com. Risk, Governance and Negotiation in the Cloud: Capture Benefits and Reduce Risks

Risks of Hosting Practice Data on the Cloud Vs. Locally

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013

Cloud Computing Trends, Examples & What s Ahead

Cloud Computing. Chapter 1 Introducing Cloud Computing

What Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen

Deploying a Geospatial Cloud

What Factors Determine Cloud Computing Adoption by Colleges and Universities? Bill Klug Instructor, BCIT

Lecture 02a Cloud Computing I

How to procure a secure cloud service

Hybrid Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Cloud Computing Paradigm Shift. Jan Šedivý

HARNESSING THE POWER OF THE CLOUD

Cloud Computing An Auditor s Perspective

Chapter 1: Introduction

Navigating The World of Cloud Computing

Security & Trust in the Cloud

William Saichek Professor, Computer Science & Information Systems Orange Coast College

Data Privacy and Security for Market Research in the Cloud

Security Considerations for Public Mobile Cloud Computing

Auditing the Cloud Auditors Chief Audit Executives

CHAPTER 8 CLOUD COMPUTING

Building Private & Hybrid Cloud Solutions

OpenStack Benelux. Dan Chester. Seagate Cloud Systems & Solutions

Cloud Computing - Overview of Information Assurance Concerns and Opportunities

Secure Your Cloud and Outsourced Business with Privileged Identity Management

Realizing the Value Proposition of Cloud Computing

Whitepaper. What You Need to Know About Infrastructure as a Service (IaaS) Encryption

CLOUD COMPUTING READINESS CHECKLIST

SCADA Cloud Computing

Cloud Computing Guidelines

SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING

How To Understand Cloud Computing

Storage Clouds. Karthik Ramarao. Director of Strategy and Technology and CTO Asia Pacific, NetApp Board Director SNIA South Asia

Capturing the New Frontier:

Security in the Cloud

Orchestrating the New Paradigm Cloud Assurance

Security management in the internet era

Kent State University s Cloud Strategy

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) Introduction to Cloud Security. Taniya

Cloud 101. Mike Gangl, Caltech/JPL, 2015 California Institute of Technology. Government sponsorship acknowledged

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Compliance and the Cloud: What You Can and What You Can t Outsource

How To Create A Cloud Backup Service

A.Prof. Dr. Markus Hagenbuchner CSCI319 A Brief Introduction to Cloud Computing. CSCI319 Page: 1

Transcription:

Cloud Security An Overview Presented by, Ezhil Arasan Babaraj Ezhilarasan.babaraj@csscorp.com CSS Corp Labs CSS Corp Pvt Ltd. Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the License. The Foundation http://www.owasp.org

Acknowledgement Thanks to Joe St Sauver, Ph.D. Security Programs Manager, Internet2 joe@uoregon.edu or joe@internet2.edu

What is Cloud computing? 3

Cloud Computing Is Many Different Things to Many Different People 4

Some Generally Accepted Characteristics Most people would agree that true cloud computing is zero up front capital costs largely eliminates operational responsibilities (e.g., if a disk fails or a switch loses connectivity, you don t need to fix it) for the most part, cloud computing eliminates knowledge of WHERE one s computational work is being done; your job is being run somewhere out there in the cloud offers substantial elasticity and scalability cloud computing leverages economies of scale 5

Cloud Computing Building Blocks IaaS PaaS SaaS

What's Driving Cloud Computing? Thought leaders Amazon, Google, Microsoft and many The economy Capex Vs Opex The Feds Govt, Enterprise, Innovators (startups) 7

Cloud computing Challenges

Cloud Computing Challenges Source: http://www.csrc.nist.gov/groups/sns/cloud-computing/cloud-computing-v26.ppt 9 at slide 17

"Cyber infrastructure Visualized"

A Cloud, With Lots of "Security" References 11

What is Cloud computing Security?

In Some Ways, "Cloud Computing Security" Is No Different Than "Regular Security" 13

There Are Some Unique Cloud-Related Areas Which We're NOT Going To Worry About Today Contracting for Cloud Services Compliance, Auditing and ediscovery So what are some cloud-related security issues?

The "A" in The Security "C-I-A" Objectives Computer and network security is fundamentally about three goals/objectives Confidentiality (C), Integrity (I), and availability (A) Availability is the Key Issue 15

Bitbucket, DDoS'd Off The Air 16

Maintenance Induced Cascading Failures 17

It's Not Just The Network: Storage Is Key, Too See http://www.engadget.com/2009/10/10/t-mobile-we-probably-lost-all-your-sidekick-data/ However, see also: Microsoft Confirms Data Recovery for Sidekick Users http://www.microsoft.com/presspass/press/2009/oct09/10-15sidekick.mspx 18

And Let's Not Forget About Power Issues 19

Other Security Related Issues Firewalls IDS/IPS Virtualization Security Noisy tenant, Instance Spoofing, Network & I/O Blocking Gaining Access to Local Storage Network Spoofing 20

Issues with the Choice of Cloud Provider Cloud computing is a form of outsourcing, and you need a high level of trust in the entities you'll be partnering with. It may seem daunting at first to realize that your application depends (critically!) on the trustworthiness of your cloud providers, but this is not really anything new -- today, even if you're not using the cloud, you already rely on and trust: -- network service providers, -- hardware vendors, -- software vendors, -- service providers, -- data sources, etc. Your cloud provider will be just one more entity on that list. 21

Issues with Cloud Provider Location Location of the Cloud with respect to storage & computing Due to competition of Cloud Pricing, they always look for low cost data centers Thus, your cloud provider could be working someplace you may never have heard of, such as The Dalles, Oregon, where power is cheap and fiber is plentiful, or just as easily someplace overseas. laws and policies of that jurisdiction. Are you comfortable with that framework? Are you also confident that international connectivity will remain up and uncongested? Can you live with the latencies involved? 22

Other Issues What If your cloud provider has careless or untrustworthy system administrators, the integrity/privacy of your data's at risk willingness to disclose its security practices? Is your Cloud Provider Financially stable? Some security Incident at your corporate. How will you find the root cause? What if your system ends up being the origin of an attack? 23

Mitigating the Risk Involved in Cloud Computing 24

Mitigating Cloud Computing Availability Multi Cloud Strategy Single Cloud Provider with Multiple Region Cloud Hybrid Cloud Strategy Finally be cautious, though, it may simply make financial sense for you to just accept the risk of a rare and brief outage. (Remember, 99.99 availability==> 52+ minutes downtime/yr) 25

Mitigating Data Loss Risks (Data Availability) Off site backup Backup to an another Cloud or Region 26

Understand the Employee Risk How can you tell if your cloud provider has careful and trustworthy employees? Ask them! Do backgrounds get checked before people get hired? Do employees receive extensive in-house training? Do employees hold relevant certifications? Do checklists get used for critical operations? Are system administrator actions tracked and auditable on a post hoc basis if there's an anomalous event? Do administrative privileges get promptly removed when employees leave or change their responsibilities?

Mitigating Transparency related issues Your provider should not treat the security practices as a confidential or business proprietary thing Remember: "Trust, but verify." [A proverb frequently quoted by President Reagan during arms control negotiations] Be like Amazon & Microsoft

Q & A 29

Additional Cloud Computing Security Resources "AWS Security Whitepaper," http://s3.amazonaws.com/ aws_blog/aws_security_whitepaper_2008_09.pdf "Cloud Computing Security: Raining On The Trendy New Parade," BlackHat USA 2009, www.isecpartners.com/files/cloud.blackhat2009-isec.pdf ENISA Cloud Computing Risk Assessment, November 20th, 2009, www.enisa.europa.eu/act/rm/files/deliverables/ cloud-computing-risk-assessment/at_download/fullreport Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26, 10/7/2009, NIST, http://www.csrc.nist.gov/groups/sns/cloud-computing/ cloud-computing-v26.ppt Security Guidance for Critical Areas of Focus in Cloud Computing, V2.1, December 2009, Cloud Security Alliance, http://www.cloudsecurityalliance.org/csaguide.pdf 30