ENISA Cloud Computing Security Strategy



Similar documents
Cloud computing: benefits, risks and recommendations for information security

Cloud Computing Security ENISA. Daniele Catteddu, CISM, CISA. DigitPA egovernment e Cloud computing.

Cloud Computing Security ENISA. Daniele Catteddu, CISM, CISA. Convegno Associazione Italiana Information Systems Auditors.

How to procure a secure cloud service

Privacy, Security and Identity in the Cloud. Giles Hogben ENISA

Cloud Computing Governance & Security. Security Risks in the Cloud

Benefits, risks and recommendations for information security

Security of Cloud Computing

Cloud Computing November 09. Benefits, risks and recommendations for information security

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects

ENISA and Cloud Security

How to ensure control and security when moving to SaaS/cloud applications

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

FACING SECURITY CHALLENGES

SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING

Troux Hosting Options

Cloud Computing November 09. Benefits, risks and recommendations for information security

Assessing Risks in the Cloud

From Private to Hybrid Clouds through Consistency and Portability

AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II

ENISA and Cloud Security

Cloud S ecurity Security Processes & Practices Jinesh Varia

Study on Cloud security in Japan

International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: , Volume-1, Issue-5, February 2014

Lecture 02b Cloud Computing II

Proactively Secure Your Cloud Computing Platform

Overcoming Security Challenges to Virtualize Internet-facing Applications

What Cloud computing means in real life

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

Cloud Computing for SCADA

Cloud Computing Trends

Cloud-Security: Show-Stopper or Enabling Technology?

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

How cloud computing can transform your business landscape

GoodData Corporation Security White Paper

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

A Survey on Cloud Security Issues and Techniques


WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING. Carlos de Alfonso Andrés García Vicente Hernández

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

The Role of the Operating System in Cloud Environments

Lecture 02a Cloud Computing I

Applying Cryptography as a Service to Mobile Applications

Information Security: Cloud Computing

How To Choose A Cloud Computing Solution

Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken )

Cloud Models and Platforms

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India

cloud functionality: advantages and Disadvantages

Control your corner of the cloud.

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Cloud Security Overview

CLOUD COMPUTING. When It's smarter to rent than to buy

Top 10 Cloud Risks That Will Keep You Awake at Night

Cloud Infrastructure Security

Computer Forensics and Incident Response in the Cloud. Stephen Coty AlertLogic, AlertLogic_ACID

Druva Phoenix: Enterprise-Class. Data Security & Privacy in the Cloud

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Building Success on Acquia Cloud:

Cloud Computing. What is Cloud Computing?

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

APIs The Next Hacker Target Or a Business and Security Opportunity?

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

A Decision Maker s Guide to Securing an IT Infrastructure

Cloud Security Who do you trust?

Simple Storage Service (S3)

Can PCI DSS Compliance Be Achieved in a Cloud Environment?

Managing Cloud Computing Risk

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

Security & Trust in the Cloud

How To Secure Cloud Computing

KeyLock Solutions Security and Privacy Protection Practices

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

The Education Fellowship Finance Centralisation IT Security Strategy

Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

The Threat of Coexisting With an Unknown Tenant in a Public Cloud

Transcription:

ENISA Cloud Computing Security Strategy Dr Giles Hogben European Network and Information Security Agency (ENISA)

What is Cloud Computing? Isn t it just old hat?

What is cloud computing ENISA s understanding Cloud computing is not a new technology. Cloud computing is a new business model It is a way of delivering computing resources

50,000 Machines for 1 Minute cost ~ the same as 1 machine for 1 year 4

5

6

7

8

What is cloud computing ENISA s understanding Near instant scalability and flexibility Near instantaneous provisioning Service On demand, usually with a pay as you go billing system Programmatic management (e.g. through Web Services API) Highly abstracted hardware and software resources Shared resources (hardware, database, memory, etc...)

LOTS AND LOTS of old hat, put together with some very clever resource distribution algorithms To make NEW Hat

Which you can rent by the hour

Which can resize (up and down) to your requirements

Types of cloud

What is cloud computing ENISA s understanding Cloud computing is a new business model o It is a way of delivering computing resources Cloud computing is not a new technology.

ENISA Cloud Computing Objectives Help business and governments to gain the cost benefits of cloud computing. While avoiding exposure to excessive NIS risks. 15

Reaching the objectives ENISA Deliverables and Ongoing Activities Cloud Computing: Benefits, Risks and Recommendations for Information security 2009 http://is.gd/cem9h Assurance framework 2009 Research Recommendations 2009 Common Assurance Maturity Model (CAMM) consortium 2010 Gov-cloud security and resilience analysis (2010) 2011 (proposed) procurement and monitoring guidance for government cloud contracts. 16

Cloud Computing: Benefits, Risks and Recommendations for Information security 17

Security Benefits 18

Economy of Scale

Economies of scale and Security o All kinds of security measures are cheaper when implemented on a larger scale. o (e.g. filtering, patch management, hardening of virtual machine instances and hypervisors, etc) o The same amount of investment in security buys better protection.

Other benefits of scale o Multiple locations by default -> redundancy and failure independence. o Edge networks: content delivered or processed closer to its destination. o Staff specialization & experience Cloud providers big enough to hire specialists in dealing with specific security threats.

Improved management of updates and defaults o Updates can be rolled out much more rapidly across a homogenous platform o Default VM images and software modules can be updated with the latest patches and security settings. o Snapshots of virtual infrastructure (in IaaS) to be taken regularly and compared with a security baseline.

The Risks

Very high value assets Most risks are not new, but they are amplified by resource concentration o Trustworthiness of insiders. o Hypervisors - hypervisor layer attacks on virtual machines are very attractive. o More Data in transit (Without encryption?) o Management interfaces big juicy targets

Isolation failure o Storage (e.g. Side channel attacks see http://bit.ly/12h5yh) o Memory o Virtual machines o Entropy pools (http://bit.ly/41siin) o Resource use (e.g. Bandwidth)

RESOURCE EXHAUSTION o Overbooking Underbooking Caused by: Resource allocation algos Denial of Service Freak events

Key management o Key management is (currently) the responsibility of the cloud customer. o Key provisioning and storage is usually off-cloud o One key-pair per machine doesn t scale to multiple account holders/rbac. o Credential recovery sometimes available through management interface (protected by UN/PWD by) o Copies of VM images may contain keys if not wellmanaged.

Key management 1 o Key storage and provisioning almost impossible to do on-cloud with current technologies o HSM s don t scale to the cloud o PKCS#10,11 don t talk cloud o Revocation is even more complicated.

Encryption: Data must be processed in cleartext (most operations). o Alternative 1. HARD TO IMPLEMENT! Customer Cloud => If you want to do anything useful with cloud computing, you have to trust the provider.

Data storage and processing without security guarantees? o Alternative 2. Customer In the cloud provider (and their SLA) we trust... Trust the cloud provider

Lock in o Few tools, procedures or standard formats for data and service portability. o Difficult to migrate from one provider to another, or to migrate data and services to or from an in-house IT environment. o Potential dependency of service provision on a particular CP.

Loss of Governance o The client cedes control to the Provider e.g.: o External pen testing not permitted. o Very limited logs available. o Usually no forensics service offered o No information on location/jurisdiction of data. o Outsource or sub-contract services to third-parties (fourth parties?)

Legal and contractual risks o Lack of compliance with EU Data Protection Directive o Potentially difficult for the customer (data controller) to check the data handling practices of the provider o Multiple transfers of data exacerbated the problem o Data in multiple jurisdictions, some of which may be risky.. o Subpoena and e-discovery o Risk Allocation and limitation of liability o Confidentiality and Non-disclosure o Intellectual Property

Somebody else s problem (SEP) syndrome Appirio Cloud Storage fully encrypts each piece of data as it passes from your computer to the Amazon S3 store. Once there, it is protected by the same strong security mechanisms that protect thousands of customers using Amazon s services (Thanks to Craig Balding, cloudsecurity.org for spotting this)

Amazon AWS ToS o YOU ARE SOLELY RESPONSIBLE FOR APPLYING APPROPRIATE SECURITY MEASURES TO YOUR DATA, INCLUDING ENCRYPTING SENSITIVE DATA. o You are personally responsible for all Applications running on and traffic originating from the instances you initiate within Amazon EC2. As such, you should protect your authentication keys and security credentials. Actions taken using your credentials shall be deemed to be actions taken by you.

Compliance Challenges Cloud Provider cannot provide evidence of their own compliance to the relevant requirements. Cloud Provider does not permit audit by the Cloud Customer. In certain cases, using a cloud implies certain kind of compliance cannot be achieved

Assurance Overload

Common Assurance Maturity Model (CAMM) A minimum baseline for: o Comparing cloud (and 3 rd party) offers o Assessing the risk to go Cloud o Reducing audit burden and security risks

Common Assurance Maturity Model (CAMM) An example o o o o Network architecture controls Well-defined controls are in place to mitigate DDoS (distributed denial of-service) attacks e.g. o o Defence in depth (traffic throttling, packet black-holing, etc..) Defences are in place against internal (originating from the cloud providers networks) attacks as well as external (originating from the Internet or customer networks) attacks. Measures are specified to isolate resource usage between accounts for virtual machines, physical machines, network, storage (e.g., storage area networks), management networks and management support systems, etc. The architecture supports continued operation from the cloud when the customer is separated from the service provider and vice versa (e.g., there is no critical dependency on the customer LDAP system).

2010 CAM framework aims at provider benchmarking on security

Governments and the Cloud DK UK... USA Gov Agencies and Public Organizations around the globe are moving non critical applications towards a "cloud approach". Some governments (e.g. Korea) are even offering public cloud infrastructure as an innovation platform. In Europe we have some fast adopters, i.e. Denmark and UK, announcing/planning to move into the cloud. Australia Japan Singapore 41

42

2010 11 Supporting EU Governments in Cloud Migration Government towards the Cloud: impact on service security & resilience ENISA aims to: analyze and evaluate the impact of cloud computing on the resilience and security of GOV services. provide recommendations and good practices for European Members State planning to migrate to cloud computing. 43

2011 procurement and monitoring guidelines Procurement Criteria CERT, ISAC Monitoring and Supervision

Conclusions Cloud computing can represent an improvement in security for non-critical applications and data. But transparency is crucial: customers must be given a means to assess and compare provider security practices Much more effort is required to achieve security levels required for higher assurance applications in the cloud For once we can build security in by design, let s not miss the chance

Contact Dr Giles Hogben Secure Services Programme Manager European Network and Information Security Agency Giles.hogben@enisa.europa.eu