Securely Moving Your Business Into the Cloud



Similar documents
Application Security Best Practices. Matt Tavis Principal Solutions Architect

Cloud Security Best Practices

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

Lecture 02b Cloud Computing II

Cloud S ecurity Security Processes & Practices Jinesh Varia

TECHNOLOGY WHITE PAPER Jan 2016

TECHNOLOGY WHITE PAPER Jun 2012

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

Amazon Elastic Beanstalk

CISCO IOS NETWORK SECURITY (IINS)

vcloud Director User's Guide

CTS2134 Introduction to Networking. Module Network Security

Every Silver Lining Has a Vault in the Cloud

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Chapter 11 Cloud Application Development

How To Create A Virtual Private Cloud On Amazon.Com

Network Security Guidelines. e-governance

ENTERPRISE IT SECURITY ARCHITECTURE SECURITY ZONES: NETWORK SECURITY ZONE STANDARDS. Version 2.0

IINS Implementing Cisco Network Security 3.0 (IINS)

A Comparison of Clouds: Amazon Web Services, Windows Azure, Google Cloud Platform, VMWare and Others (Fall 2012)

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Network Segmentation

How To Extend Security Policies To Public Clouds

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

IPOP-TinCan: User-defined IP-over-P2P Virtual Private Networks

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Deploy Remote Desktop Gateway on the AWS Cloud

Network Virtualization Network Admission Control Deployment Guide

Deploying ACLs to Manage Network Security

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Virtual Data Centre. User Guide

Case Study for Layer 3 Authentication and Encryption

Cloud Computing Business, Technology & Security. Subra Kumaraswamy Director, Security Architecture, ebay

Implementing Cisco IOS Network Security

Opsview in the Cloud. Monitoring with Amazon Web Services. Opsview Technical Overview

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Securing the Journey to the Private Cloud. Dominique Dessy RSA, the Security Division of EMC

Recommended IP Telephony Architecture

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Information Security Basic Concepts

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

FortiGate-AWS Deployment Guide

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Security Best Practices for Microsoft Azure Applications

Critical Security Controls

CMPT 471 Networking II

A Survey on Cloud Security Issues and Techniques

Mirantis OpenStack Express: Security White Paper

Overcoming Security Challenges to Virtualize Internet-facing Applications

SSL VPN A look at UCD through the tunnel

Netzwerkvirtualisierung? Aber mit Sicherheit!

Centrify Cloud Connector Deployment Guide

Tim Bovles WILEY. Wiley Publishing, Inc.

Implementing Cisco IOS Network Security v2.0 (IINS)

How to Configure an Initial Installation of the VMware ESXi Hypervisor

Altus UC Security Overview

319 MANAGED HOSTING TECHNICAL DETAILS

Web Application Hosting in the AWS Cloud Best Practices

Cisco Certified Security Professional (CCSP)

Set Up the VM-Series Firewall in AWS

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Secure Segmentation of Tier 1 Applications in the DMZ

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

Executive Summary and Purpose

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10

Cloud Security Overview

How To Set Up A Vns3 Controller On An Ipad Or Ipad (For Ahem) On A Network With A Vlan (For An Ipa) On An Uniden Vns 3 Instance On A Vn3 Instance On

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

Deployment Guide: Unidesk and Hyper- V

Locking down a Hitachi ID Suite server

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Big Drivers for IT Security

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

About the VM-Series Firewall

74% 96 Action Items. Compliance

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release

Extending Networking to Fit the Cloud

Aerohive Networks Inc. Free Bonjour Gateway FAQ

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Cloud Security. Securing what you can t touch. Presentation to Malaysia Government Cloud Computing Forum HUAWEI TECHNOLOGIES CO., LTD.

CCNA Security. IINS v2.0 Implementing Cisco IOS Network Security ( )

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Covering my IaaS: Security and Extending the Datacenter. Brian Bourne Tadd Axon

A Better Way to Segregate Data by Classification Level

Threat Modeling Cloud Applications

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network

Chapter 20 Firewalls. Cryptography and Network Security Chapter 22. What is a Firewall? Introduction 4/19/2010

Securing Cisco Network Devices (SND)

Chapter 1 The Principles of Auditing 1

Internet infrastructure. Prof. dr. ir. André Mariën

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK

Transcription:

Securely Moving Your Business Into the Cloud Alex Stamos Partner SOURCE Boston April 21, 2010

Your Humble Narrator Alex Stamos Co Founder and Partner of isec LBNL, Loudcloud, @stake UC Berkeley BS EECS 2

Takeaways Current conventional wisdom on cloud computing is missing the point You cannot securely move into the cloud without rewriting your software Secure cloud applications collapse the perimeter Properly going through this process should leave you more secure than before 3

Convention Wisdom Best reflected in work of: Cloud Security Alliance ENISA Cloud Computing Report Lots of focus on multi tenant risk, little focus on operational changes Still worth reading, but somewhat reflect application of 2003 compliance standards to new paradigm 4

Keeping It Real What are the realistic threats to cloud computing? 1. Loss of credentials via attacks against individuals Spear Phishing, malware, rubber hose Gain access to (under EC2): List of machines Persistent Storage (EBS, SDB and S3) Consoles Don t automatically get access to: Running machine state/memory Login credentials Non persistent storage 5

Keeping It Real 2. Operational security breakdown Going from 50 machines/sysadmin to 500 is lifechanging Need to plan from the start your security process Patching Hardening Identity management Logging Application identification Distribution of secure files Forensics and IR This is where a direct port to the cloud kills you 6

Keeping It Real 3. Misuse of new cloud technologies Security promises of new technologies aren t well understood i.e. Access control in Hadoop Easy to poorly architect system Easy to downgrade security via change Security zones in AWS vshield zones in VMW based cloud 7

Silly Concerns Physical datacenter security Side channel attacks 8

Before You Move, Ask Why are you moving into the cloud? Performance Cost Security What security promises are you making? Users will not be able to access the medical records of patients belonging to other medical institutions. Access controls in web logic Encryption of PII with per doctor key Secure coding 9

Traditional 3-Tier Architecture 10

Physical configuration 11

What are we getting from this design? Network segmentation Control traffic SSH SNMP RDP File services Production traffic Internal app server ports DB connections Network configuration simplicity Slicing up internal VLANs No on machine firewall, just IP config 12

What is enforcing our segmentation? Custom OS on Routers ACLs Routes Custom OS no Switches VLANs Port Security L3 ACLs? Custom OS on Firewalls Stateful rules VPN IDP? 13

Does this still make sense? 14 Traditional Exploit Web Exploit

Traditional Cloud Architecture 15

Problems with the Traditional Cloud Classical network segmentation now harder Per tier scalability is problematic Relies on manual creation of relationships How does the proxy server find the app server? How does the app server authenticate to the DB? DB performance will be pretty bad 16

What is the alternative? Go Flat Collapse the Perimeter Use cloud glue services Enforce access control via cryptography 17

Go Flat 18

Why Go Flat? 19

Why Go Flat? http://www.nyquistcapital.com/2007/11/16/googles-secret-10gbe-switch/ 20

Collapse the Perimeter Per OS or Per Hypervisor Software Firewall Software load balancer with TLS termination Use secure control protocols for top down management Per device PKI 21

Can I Trust a Software Firewall? Worried about outside access, use routing to segment internal and external systems Can use separate broadcast domain/physical network for public IPs Cannot trust for egress filtering. Use static routes to limit access for private IPs to proxy servers Can still have non blocking IDS, although speed is a problem Need to treat every machine as a secure individual unit 22

Overlay Networks Another option if you don t trust your network: overlay IPsec Easy with OpenBSD, KAME tools on Linux Need per host certificate No easy open source option right now 23

Use Cloud Glue Services Variable scalability means loosely coupled applications Can use: Asynchronous web service calls Message bus Cloud provided Queuing Service (like SQS) 24

Loosely Coupled http://media.amazonwebservices.com/aws_cloud_best_practices.pdf 25

Database Replacement Running single instance MySQL is bound to disappoint What are your real data consistency requirements? If you use memcached already, then answer is none Lots of great work on NoSQL DBs Document Store Name/Value BigTable SimpleDB 26

Can You Trust These Services? Maybe, maybe not But you don t have to. End to end encryption with symmetric keys between endpoints 27

Access Control via Cryptography With NoSQL, you already are losing a lot of crosstable capabilities Might as well take the plunge Consider per entity encryption Generate key on entity creation User Institution Store key in authentication server Web service request on login Runs in separate cloud or administrative domain Encrypt private fields in the application Helps with cloud and web app security issues 28

Centralized Configuration Management How do you safely get secrets onto cloud VMs? AMIs can t be encrypted Manual provisioning misses the point One option, chroot from shared storage 1. Boot script on instance creation with built in key 2. Download opt.tar.gz.gpg and etc.tar.gz.gpg from S3 bucket 3. Decrypts using symmetric passphase gpg 4. Change into chroot 5. Symmetric key is gone when script is complete 29

So where did we end up? 30

Still to be done Easy PKI Need to: Associate new instances Grant individual asymmetric identities Register in DNS Authenticate requests to key server Receive per user or per institution keys Automagically negotiate IKE with peers Revoke dead instances Windows does this much better with AD/IPSec Easier configuration management RightScale is moving in the right direction 31

Thank you for coming! alex@isecpartners.com