Protecting the Cloud from Inside



Similar documents
NO SQL! NO INJECTION?

No SQL! no injection? A talk on the state of NoSQL security

Emerging Approaches in a Cloud-Connected Enterprise: Containers and Microservices

Do Containers fully 'contain' security issues? A closer look at Docker and Warden. By Farshad Abasi,

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Virtualization and Cloud: Orchestration, Automation, and Security Gaps

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Put a Firewall in Your JVM Securing Java Applications!

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Computer Science. About PaaS Security. Donghoon Kim Henry E. Schaffer Mladen A. Vouk

Threat Modelling for Web Application Deployment. Ivan Ristic (Thinking Stone)

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

WHITEPAPER INTRODUCTION TO CONTAINER SECURITY. Introduction to Container Security

Passing PCI Compliance How to Address the Application Security Mandates

Container Clusters on OpenStack

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Linux A first-class citizen in Windows Azure. Bruno Terkaly bterkaly@microsoft.com Principal Software Engineer Mobile/Cloud/Startup/Enterprise

Containers, Docker, and Security: State of the Union

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Sacha Dubois RED HAT TRENDS AND TECHNOLOGY PATH TO AN OPEN HYBRID CLOUD AND DEVELOPER AGILITY. Solution Architect Infrastructure

From the Bottom to the Top: The Evolution of Application Monitoring

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

Practical Guide to Platform as a Service.

A new era of PaaS. ericsson White paper Uen February 2015

Cloud Security with Stackato

Where every interaction matters.

Application Containers

Private Cloud Management

Addressing Security for Hybrid Cloud

A Survey on Cloud Security Issues and Techniques

Cloud Courses Description

Cloud Essentials for Architects using OpenStack

Azul pitches Docker as alternative to virtualization for heavy-duty Java applications

Data Centers and Cloud Computing. Data Centers. MGHPCC Data Center. Inside a Data Center

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Cloud Courses Description

Secure Cloud-Ready Data Centers Juniper Networks

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

RED HAT CONTAINER STRATEGY

Workday Mobile Security FAQ

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Keyword: Cloud computing, service model, deployment model, network layer security.

Data Centers and Cloud Computing. Data Centers

Netzwerkvirtualisierung? Aber mit Sicherheit!

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Linstantiation of applications. Docker accelerate

How Bigtop Leveraged Docker for Build Automation and One-Click Hadoop Provisioning

Lunch and Learn: BlueMix to Mainframe making development accessible in the

External Supplier Control Requirements

IBM Bluemix, the digital innovation platform

Security in the Sauce Labs Cloud. Practices and protocols used in Sauce s infrastructure and Sauce Connect

The Definitive Guide To Docker Containers

<Insert Picture Here> Oracle Web Cache 11g Overview

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

SERENA SOFTWARE Serena Service Manager Security

Safeguarding the cloud with IBM Dynamic Cloud Security

An Architecture Vision

Web Application Security

Building Energy Security Framework

Windows Azure and private cloud

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

A lap around Team Foundation Server 2015 en Visual Studio 2015

How To Protect Your Cloud From Attack

Intel IT s Cloud Journey. Speaker: [speaker name], Intel IT

Mandatory Access Control in Linux

Capturing the New Frontier:

Security and Control Issues within Relational Databases

Enhancing Hypervisor and Cloud Solutions Using Embedded Linux Iisko Lappalainen MontaVista

Protecting Your Organisation from Targeted Cyber Intrusion

managing the risks of virtualization

Web Application Report

Security in the Sauce Labs Cloud

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Security Certification of Third- Parties Applications

Adobe Systems Incorporated

A Brief Overview. Delivering Windows Azure Services on Windows Server. Enabling Service Providers

Magento Security and Vulnerabilities. Roman Stepanov

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

SECURE APPLICATION DEVELOPMENT CODING POLICY OCIO TABLE OF CONTENTS

What is Web Security? Motivation

Marble & MobileIron Mobile App Risk Mitigation

Oracle Reference Architecture and Oracle Cloud

Advanced Systems Security

Transcription:

Protecting the Cloud from Inside Intra-cloud security intelligence Protection of Linux containers Mitigation of NoSQL injections Alexandra Shulman-Peleg, PhD Cloud Security Researcher, IBM Cyber Security Center of Excellence 1

Securely Moving Corporate Applications to a Cloud Customer s view: My infrastructure moved to a 3rd party cloud service Help me to protect my assets. Detection and remediation of cloud vulnerabilities. Public cloud Hybrid cloud Private cloud 2

Cloud Security Orchestration Layer NoSQL security Container security Cloud Application Layer (PaaS) Cloud Infrastructure Layer (IaaS) Use cloud insights to raise the security No perimeter security in clouds 3

Cloud Trends The cloud s code: Controls distributed and complex environments Executes automatically with admin privileges Has modules in scripting languages Is open source with well known weaknesses May share the same kernel and host OS between applications of different users (e.g. Linux containers) Cloud software is more vulnerable than traditional systems and applications! 4

Cloud Trends Automation brings order! Each module knows its role! Let s use automation to improve protection! 5

Automating Code Distribution and Deployment with Containers Container cloud (IaaS) Deployment packages (PaaS) 70% of organizations are evaluating Docker 49% are concerned with Docker security 6 Survey of Vmblog.com (745 participants) http://stackengine.com/infographic-state-containers-2015-docker-adoption/

Containers - Emerging Building Blocks of Clouds Lightweight OS-level virtualization via grouping resources like processes, files, and devices into isolated spaces. Benefits: Portability and easy deployment Application isolation Near native performance App A App B App C Bins/ Libs Bins/ Libs Bins/ Libs App A App B App C App D Guest OS Guest OS Guest OS Bins /Libs Bins /Libs Bins/Libs Hypervisor Host OS Host OS Server Server Containers VMs 7

Containers Threats Threats Kernel exploits Container Engine Shared resources Shared Bins/Libs Mis-configurations Private/Public cloud Attack flow: Escape to host via kernel exploits Propagating to additional servers 8

How to make my containers secure? Securing the Infrastructure and the Workloads of Linux Containers, Workshop on Security and Privacy in the Cloud, Sept. 2015. Mattetti, M., Shulman-Peleg, A., Allouche, Y., Corradi, A., Dolev, S., Foschini, L. 9

Open Source Linux Tools to the Rescue! Linux Security Modules (LSMs, e.g. AppArmor, SElinux) are lightweight, loadable kernel modules enforcing access control. Advantages of LSM: Part of Linux distributions Provide mandatory access control(mac) Disadvantages of LSMs: Complicated configuration and tuning Profile to restrict the Docker daemon (none exists) Profiles to restrict the containers (limited dockerdefault profile) 10

Tracing Execution and Profile Generation 1. Invoke Docker API (build/run etc.). 2. Use SystemTapto monitor the kernel operations. 3. Generate LSM profiles splitting between the host and the containers. https://github.com/linuxcontainersecurity/ LiCShield.git 11

Profile Distribution and Enforcement Construct the security policy once for each image -apply to all the instances. My image Deploy Docker Daemon Host OS Server 12

Overview of Host s Runtime Protection 1. Linux host + container engine high protection! Protecting server s runtime with HIDS 2. Containers protection as a service Per image training and creation of AppArmor, Selinux policies As a service workload protection Per Image profiles App A App B App C App D Bins/ Libs Bins/ Libs Bins/Libs Container Engine Host Based Intrusion Detection (HIDS) Host OS Server Secure, yet, Usable Protecting Servers and Containers S. Barlev, Z. Basil, S. Kohanim, R. Peleg, S. Regev, A. Shulman-Peleg, to appear. 13

No SQL, No Injection? Workshop on Web 2.0 Security and Privacy (W2SP) 2015 A. Ron, A. Shulman-Peleg, E. Bronshtein, A. Puzanov 14

The Popularity of NoSQLContinues to Rise db-engines.com 15

NoSQL Attack Vectors The new data models of NoSQL make old attacks, like SQL injections irrelevant. Attackers get new opportunities for injecting their malicious code into the statements passed to the database. Attackers web browser Injection added Data Attacked web server Client/Protocol wrapper Injection processed Data NoSQL data store 16

NoSQL Injection Techniques Tautologies -bypassing access control by injecting code in conditional statements that are always true. username=tolkien&password=hobbit username[$ne]=1&password[$ne]=1 db.logins.find({ username: { $ne: 1 }, password: { $ne: 1 } }) Union queries changing the data set returned for a given query. username=tolkien, $or: [ {}, { a : a&password= } ], $comment: successful MongoDB injection { username: tolkien, $or: [ {}, { a : a, password: } ], $comment: successful MongoDB injection } 17

NoSQL Injection techniques Cont JavaScript injections -Passing un-sanitized user input to queries may allow injecting arbitrary JavaScript code. Origin violation - a legitimate user and its web browser are exploited to perform some unwanted action on behalf of the attacker. 18

NoSQLInjection Techniques Caches Piggy-backed queries -where an attacker exploits some assumptions in the interpretation of escape sequences special characters (e.g. termination characters like CRLF) to insert additional queries to be executed by the database. Attackers web browser Injection added Data Attacked web front end Protocol wrapper Injection Data Cloud or BigData Framework In-memory data store Data Data Data 19

Mitigation of Attacks and Injections Development and testing Continuous Mitigation Secure Deployment Insider s view Monitoring and Protection https://developer.ibm.com/bluemix/2015/07/02/vulnerability-advisor/ 20

Protecting the Cloud from the Inside Cloud Application Layer (PaaS) cloud Foundry IDaaS, NoSQL data stores, Spark Cloud Infrastructure Layer (IaaS) Heat, Mistral,... Network, VMs, Containers, Storage, Users Cloud Operation Layer Details of the workload to be executed Security tools and policies Security and Policy Dashboard Admin disruptive: Chef, TripleO, DevOps Admin monitoring: logs, accounting etc. 21 Security Intelligence for Cloud Management Infrastructures S. Berger, S. Garion, Y. Moatti, D. Naor, D. Pendarakis, A. Shulman-Peleg JR Rao, E. Valdez, Y. Weinsberg, to appear.

IBM Cyber Security Center of Excellence https://www.research.ibm.com/haifa/ccoe/index.shtml 22