Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS



Similar documents
Cloud Computing; What is it, How long has it been here, and Where is it going?

Lecture 02a Cloud Computing I

Managing Cloud Computing Risk

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Security & Cloud Services IAN KAYNE

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

Network Infrastructure Under Siege

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao

Private Cloud Database Consolidation with Exadata. Nitin Vengurlekar Technical Director/Cloud Evangelist

SECURE CLOUD COMPUTING

Security Issues in Cloud Computing

EXIN Cloud Computing Foundation

Cloud Courses Description

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

What Cloud computing means in real life

The Elephant in the Room: What s the Buzz Around Cloud Computing?

Cloud-Security: Show-Stopper or Enabling Technology?

Security Virtual Infrastructure - Cloud

<Insert Picture Here> Cloud Archive Trends and Challenges PASIG Winter 2012

A Survey on Cloud Security Issues and Techniques

Architectural Implications of Cloud Computing

Cloud Computing. What is Cloud Computing?

Definitions. Hardware Full virtualization Para virtualization Hosted hypervisor Type I hypervisor. Native (bare metal) hypervisor Type II hypervisor

Cloud Models and Platforms

Cloud Security Overview

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Virtualization Impact on Compliance and Audit

Cloud models and compliance requirements which is right for you?

IBM EXAM QUESTIONS & ANSWERS

Cloud Courses Description

How to procure a secure cloud service

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Cloud Computing Architecture: A Survey

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Oracle Applications and Cloud Computing - Future Direction

Computer Science. About PaaS Security. Donghoon Kim Henry E. Schaffer Mladen A. Vouk

Security Landscape of Cloud Computing

The Private Cloud Your Controlled Access Infrastructure

Security Considerations for Public Mobile Cloud Computing

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

A Gentle Introduction to Cloud Computing

Introduction to Cloud Computing

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc.

Virtualization and Cloud Computing

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com

How To Protect Your Cloud Computing Resources From Attack

Electronic Records Storage Options and Overview

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Is it Time to Trust the Cloud? Unpacking the Notorious Nine

Cloud Security Who do you trust?

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

Trust but Verify. Vincent Campitelli. VP IT Risk Management

Cloud Infrastructure Pattern

How Data-Centric Protection Increases Security in Cloud Computing and Virtualization

Keyword: Cloud computing, service model, deployment model, network layer security.

PCI DSS and the A10 Solution

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

PCI DSS and the A10 Solution

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

- DLP Des nuages. à la terre ferme

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India

WOLKEN KOSTEN GELD GUSTAVO ALONSO SYSTEMS GROUP ETH ZURICH

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Introduction to Engineering Using Robotics Experiments Lecture 18 Cloud Computing

D. L. Corbet & Assoc., LLC

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Lecture 02b Cloud Computing II

Data In The Cloud: Who Owns It, and How Do You Get it Back?

Virtualization and Cloud Computing

Virtualization Technologies in SCADA/EMS/DMS/OMS. Vendor perspective Norman Sabelli Ventyx, an ABB company

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Welcome. Panel. Cloud Computing New Challenges in Data Integrity and Security 13 November 2014

CLOUD COMPUTING OVERVIEW

Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014

The Analysis of Cloud Computing Major Security Concerns & Their Solutions

Deploying a Geospatial Cloud

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

Security & Trust in the Cloud

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

Transcription:

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget

Disclaimer Standard Disclaimer - This talk represents the opinions and research of the presenter only and not those of her employer. This talk is NOT a CERT sanctioned talk. 2

Is Your Data In The Cloud @ Risk? Introduction Credentials etc. Acknowledgement 3

Agenda Defining the Cloud - General Overview - Specific Areas Security Implications - IaaS - PaaS - SaaS Data Loss Prevention (DLP) What You Can Do Conclusion & Wrap-up 4

Defining The Cloud What is the Cloud? - Difficult to define, no agreement on definition. - One definition The provision of dynamically scalable and often virtualized resources as a service over the Internet on a utility basis. Users need not have knowledge of, expertise in, or control over the technology infrastructure in the cloud that supports them. - NIST 800-145 also attempted to define the cloud. 5

Defining The Cloud NIST Standard 800-145 defines 3 Cloud Service Areas. - Infrastructure as a Service (IaaS) - Platform as a Service (PaaS) - Software as a Service (SaaS) 6

Defining The Cloud According to Mather, Kumaraswamy and Latif, common characteristics of Cloud Computing include: - Shared resources - Massive scalability - Elasticity - Pay as you go - Self-provisioning of resources 7

Defining The Cloud Not a model, a combination of models. A type of abstraction. Another step (not sure if forward) in the technology arena. - Mainframe -> PCs -> client server -> Internet -> Cloud computing - Considered a strategic technology 8

Defining The Cloud Cloud Server characteristics: - Widely distributed across wide geographic range. - Virtualized environments (Amazon EC2), virtualized data centers. - Diverse access mechanisms Desktop clients. Mobile clients. - Single tenant or multi-tenant apps Single tenant better for security. Multi-tenant more cost effective. 9

Defining The Cloud Public - Multi-tenant. - CSP provides security. Private - Owner responsible for security. - SLAs (vendor owned and operated) - Managed (owner and vendor have different roles) Hybrid - Mixes both, data sensitivity determines what goes where. Sensitive data and apps: private cloud Public data and apps: public cloud 10

Defining The Cloud - Specifics IaaS - Virtual environment Examples: Amazon EC2, Verizon, IBM Management and provisioning Internet connectivity Desktop virtualization AKA Hardware as a Service (HaaS) Servers in the virtualized environment 11

Defining The Cloud - Specifics PaaS - Examples: Google App Engine, RedHat - Thought of as an outgrowth of SaaS. Where SaaS does processing, background functions such as storage, integration etc. comprise PaaS. - Disks in the virtualized environment. - The foundation for the development environment. 12

Defining The Cloud - Specifics SaaS - Examples: Google Apps, Oracle SaaS, NetSuite - Common applications and libraries for customized development. - Both disks and servers in the virtualized environment. 13

Security Implications First the good: - Cost savings. - Improved performance. - Better reliability. - Scalability as needed. - Personnel cost savings. - Reduced ownership costs. 14

Security Implications Next the not as good - Cloud providers are expected to consolidate. Consolidation means that there will be winners and losers. Also means procedures will migrate to the most common, or most cost effective. Not necessarily the most secure. Increases likelihood of some providers not surviving, what happens to data when that occurs? 15

Security Implications Not as good - International issues Transborder data flow How do agreements get enforced. Should some data stay out of the cloud? - Cross tenant hacking? - Mapping of virtual environments to physical servers. - How are the paths between servers managed? - How are the different servers and libraries managed? 16

Security Implications Risks - DoS attacks. - Custom security features unavailable. - Legal risks and costs. - Excessive trust in CSP. - Potential for fast flux hacking points. - Concerns about data location, ownership, and more. - Co-mingled data, even if not co-mingled may use shared memory. 17

Security Implications Risks (continued) - Will data be encrypted? When at rest or in motion or both? Encryption adds significant overhead. Key management? - Exploitation of hypervisor vulnerabilities. - Are CSP data elements really deleted? 18

Security Implications Risks (continued) - Insider threat at CSP is much more costly, than at individual sites. - Inconsistent security profiles between CSPs and between tenants. - Because of the nature of the cloud, threats and vulnerabilities must be dealt with more aggressively than in conventional environments. 19

Security Implications: IaaS IaaS: Platform Virtualization - Consider that paths for configurable files are likely to be the same across each virtual environment. Private key paths DNS zone files, and DNSSEC key files. Virtual hosts will still map to physical IP addresses. The hypervisor is under the control of the ISP. A single vulnerability to the hypervisor provides direct and trusted access to all tenants environments. Client hosts will need to protect themselves from servers, even if all the hosts belong to the same organization. 20

Security Implications: IaaS IaaS: Platform virtualization - Running multiple copies of software platforms (most often OSs) on a single piece of hardware - A quick analysis revealed 20 environments per server. - Each piece of software behaves as if there is a oneto-one relationship between it and the hardware. - No awareness whatsoever of the other VMs that run on the same physical hardware. - VMs can all have the same MAC address. - Ability to remove the entire environment. - Myth of virtualization improving security 21

Security Implications: PaaS PaaS: Virtual Environments - Provides dynamic load balancing capacity across multiple file systems and machines. - Provides ability to pool computing resources (e.g., Linux clustering). - Provides convenience for users in accessing different OSs (as opposed to systems with multiple boot capability). - Allows custom VMs, each of which can serve as a container for delivery of applications. 22

Security Implications: PaaS PaaS: Virtual Environments - Can be implemented through software apps or hardware and software hybrid appliances. - Can utilize storage area networks (SANs) - Hides complexity of SAN functions. 23

Security Implications: SaaS SaaS: Virtual Environments - Application security is not easy nor cheap. - Apps, especially client apps, are being developed for a variety of platforms. Each interface represents a potential attack vector. - Lack of standards. Software Developers - Rush to market. 24

Security Implications: SaaS SaaS: Virtual Environments - Even if the app is secure, that may not be enough. Libraries Environment or sand box. - CSPs are largely in control of application security In IaaS, should provide at least a minimum set of security controls In PaaS, should provide sufficiently secure development tools - Customers can control access & authentication into their network. - SLAs can be written to further tighten controls and determine roles and responsibilities. 25

DLP There are many concerns about data safety with the cloud. - Data in motion. - Data at rest. Depending on your security posture there are ways to navigate DLP issues. - Some encrypt objects before they go to the cloud. - Encrypt the path (SSL) - Encrypt objects when they are stored. - Policy: No sensitive data in the cloud (processed or stored) ever. - Auditing of the CSP s cloud. 26

DLP Consider confidentiality of data in motion. Consider integrity of data in motion. Consider availability of data in motion. Consider the integrity of audit logs and permanence. Consider the impact of IP address re-cycling on access control devices. 27

DLP End user issues - Acceptable use policy - Training and awareness 28

Other How to secure the transition to the cloud. Who owns what in the cloud? How does clustering and back-ups work? How will identity management be supported? How will tokens or other related software be secured in the cloud? How will the cloud be audited? 29

What Can You Do? First determine what is of value. - Not everything needs to be migrated to the cloud. - Determine the various levels of security to associate with the data. Develop cloud policies and procedures. Avoid over trusting, minimal trust and verify that! 30

What Can You Do? Create SLAs/SOWs for your CSP. Do not accept the CSP SLA/SOW. - Determine how breaches will be handled. - Determine if foreign servers will be used for backups. - Data destruction. - If you like your present security posture insist on re-creating it in the cloud. - Audit - Monitor 31

Conclusion Cloud rhetoric is starting to quiet down. The cloud means different things to different people. When embarking on a migration be sure to find out which cloud areas your organization plans to utilize. CSPs are getting to work on answering many of the early security questions. CSPs are also consolidating. 32

Conclusion Each layer has it s own unique security challenges. - Software poorly written code. - Platform weak access controls, cross tenant target. - Infrastructure - vulnerabilities in this environment can expand dramatically across tenants and go undetected. - Hypervisor Vulnerabilities at this layer provide trusted access to each environment. 33

Conclusion Threat detection in the cloud will improve. Cloud audits will become part of the landscape. Trust assurance or certification will be used as a differentiator. Cloud Security Standard are being developed. - Implementation - Adherence 34

Conclusion SLAs and SOWs will need to be carefully written. Ultimately the customer owns the data; therefore, great care and planning is required for DIT and DAR. The black hat community is focusing on creating tools to exploit virtual environments, eventually something will work, be prepared. 35

Conclusion Securing the data against DLP requires: - Careful planning. - Understanding of security implications for your data and connections. - Determining via cost benefit analysis which data should migrate to the cloud. - Creating and enforcing policies that enforce your goals. - Use of technology to ensure: confidentiality, integrity and availability. 36

Q&A Questions and answers 37

Contact Char Sample Security Engineer, Carnegie Mellon University CERT char_sample@yahoo.com Featured Member of the TechTarget Editorial Speaker Bureau Information Security Decisions TechTarget