Threat Modeling Cloud Applications



Similar documents
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

Cloud Models and Platforms

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Security Issues in Cloud Computing

APIs The Next Hacker Target Or a Business and Security Opportunity?

Alfresco Enterprise on AWS: Reference Architecture

USER CONFERENCE 2011 SAN FRANCISCO APRIL Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB

Cloud models and compliance requirements which is right for you?

A Survey on Cloud Security Issues and Techniques

ur skills.com

Cloud Computing. Adam Barker

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Cloud Computing Trends

Security Information & Policies

Managing Cloud Computing Risk

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

Cloud Computing In Reality: Experience sharing in cloud solution developments and evaluations

Application Security Best Practices. Matt Tavis Principal Solutions Architect

Security Issues in Cloud Computing

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

Chapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok

Cloud Security Case Study Amazon Web Services. Ugo Piazzalunga Technical Manager, IT Security

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

Top 10 Cloud Risks That Will Keep You Awake at Night

Amazon AWS Security Basics

SECURING SENSITIVE DATA WITHIN AMAZON WEB SERVICES EC2 AND EBS

Cloud computing - Architecting in the cloud

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

How To Protect Your Cloud Computing Resources From Attack

Zend Server Amazon AMI Quick Start Guide

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Amazon Elastic Beanstalk

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Information Technology: This Year s Hot Issue - Cloud Computing

Security & Cloud Services IAN KAYNE

Cyber Security and Cloud Computing. Dr Daniel Prince Course Director MSc in Cyber Security

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

An Introduction to Cloud Computing Concepts

Securing the Microsoft Platform on Amazon Web Services

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

How to Grow and Transform your Security Program into the Cloud

Implementing Multi-Tenanted Storage for Service Providers with Cloudian HyperStore. The Challenge SOLUTION GUIDE

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Essentials for Architects using OpenStack

This computer will be on independent from the computer you access it from (and also cost money as long as it s on )

Chapter 11 Cloud Application Development

SECURE CLOUD COMPUTING

Securing Sensitive Data within Amazon Web Services EC2 and EBS

AWS Account Setup and Services Overview

NCTA Cloud Architecture

CompTIA Cloud+ 9318; 5 Days, Instructor-led

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

Deploy Remote Desktop Gateway on the AWS Cloud

2013 AWS Worldwide Public Sector Summit Washington, D.C.

Chapter 8 Security Pt 2

Architecture Overview

Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems

Object Storage: A Growing Opportunity for Service Providers. White Paper. Prepared for: 2012 Neovise, LLC. All Rights Reserved.

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

Cloud Computing and Amazon Web Services. CJUG March, 2009 Tom Malaher

managing SSO with shared credentials

Securing Amazon Web Services (AWS) and Simple Storage Service (Amazon S3) Security David Boland

TECHNOLOGY WHITE PAPER Jun 2012

Cloud Security Who do you trust?

Securing Platform as a Service: A Technical Whitepaper on Security Practices at CloudBees

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Enterprise Architecture Review Checklist

With Great Power comes Great Responsibility: Managing Privileged Users

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

Cloud Security Introduction and Overview

Deploy XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 with Amazon VPC

How To Use Arcgis For Free On A Gdb (For A Gis Server) For A Small Business

OTM in the Cloud. Ryan Haney

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Cloud Computing Security Issues And Methods to Overcome


CSE543 Computer and Network Security Module: Cloud Computing

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Securing The Cloud With Confidence. Opinion Piece

Take Control of Identities & Data Loss. Vipul Kumra

The Need for Service Catalog Design in Cloud Services Development

1 The intersection of IAM and the cloud

RemoteApp Publishing on AWS

Transcription:

Threat Modeling Cloud Applications What You Don t Know Will Hurt You Scott Matsumoto Principal Consultant smatsumoto@cigital.com Software Confidence. Achieved. www.cigital.com info@cigital.com +1.703.404.9293 1

Agenda Cloud Terminology and Background Threat Modeling Basics Threat Modeling a Hybrid, IaaS Application Canonical use case for S3 AWS Security Credentials EC2 Security Groups S3 Security Controls Cloud Doomsday Scenarios and Attackers 2

Terminology and Concepts CLOUD COMPUTING 3

NIST Cloud Definition Framework 4

Cloud Applications Are Subtly Different Cloud platforms (PaaS and IaaS) change application design as designers leverage platform strengths Security for applications written on these platforms requires understanding the application architectures emerging from these designs and identifying their inherent weakness Threat Modeling is an effective method for understanding how/where/what security implications arise from cloud-based applications 5

Security Design Analysis THREAT MODELING BASICS 6

What is a Threat Model A model of the a software system that depicts The system structure: its components and the flow of control relationships The assets (data and function) in the system The security controls protecting the assets This model of the system is juxtaposed against A list of potential "Doomsday Scenarios" A list of potential attackers

Use Threat Modeling to Identify Where potential attackers exist relative to the architecture How attackers escalate privilege become more formidable Specific vectors of attack Components and assets needing additional protection Ties technical risk & business assets to application design; Ties attacks to role, privilege, and capability; Drives security analysis, testing.

Elements of a Threat Model System Structure Assets Security Controls Doomsday scenarios Attackers 9

Threat Modeling High-level process 1 Diagram the System Structure 2 Identify Assets and Security Controls 3 Enumerate Doomsday Scenarios 4 Identify Attackers 5 Derive misuse/abuse cases 6 Integrate with Risk Management 7 Iterate

Use Case: Leveraging S3 Storage A HYBRID, IAAS THREAT MODEL 11

Using S3 Storage Use Case Use Case: Use S3 Storage for long term storage rather than self hosted storage Data items are large and unstructured Require immediate access S3 Advantages: No up-front capital expenditure Disaster Recovery is built into the S3 service Examples: Medical Images Large media files 12

Classic Architecture: Primary with DR Site Primary Application Components DR Site Application Components nnn TB Replication nnn TB The traditional solution is having a Disaster Recovery site that is a mirror of the primary site Data replication is needed for persistent data Pay for un-used capacity even for DR 13

Cloud Architecture: Augment DR with AWS Primary Application Components AWS DR DR Site Application Components During DR Components nnn TB Provide immediate, limited DR capabilities Maintain data needing 99.99 availability in S3 Pay only for the storage that's needed 14

It's Really a New Application Original App Traditional enterprise application (assume n- Tier for this example) New App Multiple applications interacting across two network zones Primary Application Components nnn TB Primary Application Components During DR Components nnn TB 15

Threat Modeling High-level process 1 Diagram the System Structure 2 Identify Assets and Security Controls 3 Enumerate Doomsday Scenarios 4 Identify Attackers 5 Derive Misuse/Abuse Cases 6 Integrate with Risk Management 7 Iterate

What Does Cloud Do to Our Threat Model? Thin Client Network Attacker User Servlets Admin Servlets SiteMinder Business Components DBMS Filesystem ACL DB RBAC Malicious Client App Server Host Malicious Admin Host Internet Hosting LAN For an n-tier application, the canonical OWASP-ish threat model applies 17

To the Cloud New Application Structure Servlets During DR Components DBMS EC2 Instance EBS Volume App Server EC2 Instance S3 Bucket AWS Thin Client Network Attacker User Servlets Admin Servlets SiteMinder Application Components DBMS DB RBAC Malicious Client App Server Host Malicious Admin Host Internet Hosting LAN System structure reflects the AWS framework 18

Who, What, When, Where, Why, How Who What How Impact Risk <external> <external> Web-application Multi-tenant res, <internal> & <external> <external> Disclosure of PCI data from the database Gaining access to administrative functions The Threat Modeling Process Builds a sparse matrix Start with the obvious and derive the interesting Postulate what bad things can happen without knowing "How". Postulate Hows without knowing Whats 19

Threat Modeling High-level process 1 Diagram the System Structure 2 Identify Assets and Security Controls 3 Enumerate Doomsday Scenarios 4 Identify Attackers 5 Derive Misuse/Abuse Cases 6 Integrate with Risk Management 7 Iterate

Identify the Assets and Security Controls DBMS Network Attacker Servlets App Server During DR Components EC2 Instance EBS Volume Thin Client EC2 Instance S3 Bucket AWS Malicious Client App Server Host Malicious Admin Host Internet Hosting LAN Data assets move with the new design Additional functional assets exist with new features The AWS Security Controls are different 21

AWS Security Control Differences Thin Client Network Attacker Security Group Servlets AuthN/AuthZ App Server EC2 Instance During DR Components Security Group DB RBAC DBMS EC2 Instance EBS Volume AWS S3 Bucket Malicious Client Internet App Server Host Malicious Admin Hosting LAN Host AWS and the Internet are equivalent network zones; user AWS Security Groups Enterprise infrastructure, e.g. SiteMinder, probably won't extend into AWS. What is the replacement? 22

EC2 Security Groups An EC2 Security Group is a set of ACCEPT firewall rules Protocol: tcp, udp, icmp Port Range From: Set of IP addresses (generally external hosts) Security Group An EC2 instance can reside in one or more Security Groups Use a Security Group is a "role" Associate permissions with the Security Group ("role") 23

Integration with Enterprise Authentication Stand alone application mechanism means that the user store must be provisioned Integration with the enterprise user store implies Connection from AWS back into the data center Federated Identity mechanism The Threat Model depends on the actual control For this particular example, assume a SAML assertion passed through the browser 24

Elasticity Drives Change Security Group Security Group AuthN/AuthZ DB RBAC DBMS Network Attacker Servlets App Server During DR Components EC2 Instance EBS Volume Thin Client EC2 Instance S3 Bucket AWS Malicious Client App Server Host Malicious Admin Host Host Internet Hosting LAN Will the During DR site be up 100% of the time and costing the company for CPU time? No. An EC2 Key Pair is required to launch an instance AWS Access Keys are required to access S3 25

Most Common AWS Security Credentials Type Usage Purpose Sign-In Credentials Enter email-address and password to access secure pages Access AWS Security Credentials Page User Use AWS IAM API or interface Authentication and Authorization for AWS Management Console and AWS Credentials Access Keys * Access Key ID * Secret Access Key Access Key ID identifies your AWS Account Secret Access Key is used to digitally sign the request AWS SOAP and REST API requests Key Pairs * Key pair name * Private Key * Public Key The Key pair name is specified when an instance is launched. The Public-Private key is used for SSH root access. Admin access to the running instance Authorization is handled through the Access Policy Language 26

S3 ACLs and Bucket Policies Thin Client Network Attacker Security Group Servlets AuthN/AuthZ App Server EC2 Instance During DR Components Security Group DB RBAC DBMS EC2 Instance EBS Volume S3 ACL or Bucket Policy SAML AWS S3 Bucket Malicious Client Internet App Server Host Buckets and Objects have separate ACLs or Policies User identity is an Amazon S3 user/account Policies are more flexible and expressive Define access rules for sets of object Restrict by IP address, date, etc. Malicious Admin Hosting LAN Host 27

Using S3 Drives Design Changes Thin Client Network Attacker Security Group Servlets AuthN/AuthZ Query App String Server Auth EC2 Instance During DR Components Security Group DB RBAC DBMS EC2 Instance EBS Volume S3 ACL or Bucket Policy SAML AWS S3 Bucket Malicious Client Internet App Server Host Deliver content directly from S3 to the user More efficient bandwidth usage How do you handle S3 ACL or Bucket Policy? S3 provides for "query string authentication" A time limited URL signed with your Access Key Malicious Admin Hosting LAN Host 28

Threat Modeling High-level process 1 Diagram the System Structure 2 Identify Assets and Security Controls 3 Enumerate Doomsday Scenarios 4 Identify Attackers 5 Derive Misuse/Abuse Cases 6 Integrate with Risk Management 7 Iterate

Cloud "Doomsday" Scenarios to Consider Reprioritized or Changed by Cloud Malicious Insider Data In Transit Management interface compromise Infrastructure supply chain stability DDoS - direct attacks and attacks against other tenants Unique to Cloud Cloud termination Changes in jurisdiction Subpoena and e- Discovery of another tenant Multi-tenant violation of isolation 30

Threat Modeling High-level process 1 Diagram the System Structure 2 Identify Assets and Security Controls 3 Enumerate Doomsday Scenarios 4 Identify Attackers 5 Derive Misuse/Abuse Cases 6 Integrate with Risk Management 7 Iterate

Additional Attackers Thin Client SAML Malicious Client Network Attacker Security Group Servlets AuthN/AuthZ App Server EC2 Instance During DR Components Network Attacker AWS DBMS Security Group DB RBAC EC2 Instance S3 Bucket EBS Volume Malicious AWS Admin Malicious Instance S3 ACL or Bucket Policy Is the AWS Admin someone to worry about? App Server Host Malicious Admin Host Internet Hosting LAN Additional attackers are network, AWS Admin and malicious instances The multi-document shape indicates multi-tenant 32

Threat Modeling High-level process 1 Diagram the System Structure 2 Identify Assets and Security Controls 3 Enumerate Doomsday Scenarios 4 Identify Attackers 5 Derive Misuse/Abuse Cases 6 Integrate with Risk Management 7 Iterate

Enumeration and Risk Management Who What How Impact Risk Hacker Read all stored data Access a patients Web-application Failure to certify with HIPAA audit Failure to certify with PCI audit Hacker Cause system to.. Known Tomcat, Failure to comply with customer SLA Admin & Hacker Disclosure of PCI Access DB cred Failure to certify with PCI audit Hacker Gaining access to Intercept AWS cred Breach of all application assets Admin, Staff & Hacker Viewing patient inf Direct access to Failure to certify with HIPAA audit Failure to comply with customer SLA Failure to certify with PCI audit Failure to certify with HIPAA audit Risk management must be done in conjunction with the business 34

Conclusion Cloud application security is platform specific Application design will exploit platform features and constraints Platform security controls are an important consideration in the threat model Threat Modeling is an effective way to move from cloud security FUD to a specific set of technical security requirements for applications 35

Thank you for your time Questions? Software Confidence. Achieved. Scott Matsumoto smatsumoto@cigital.com