Cloud Security Framework (CSF): Gap Analysis & Roadmap



Similar documents
Cloud Security Framework (CSF): Gap Analysis & Roadmap

Virtual Desktop Infrastructure (VDI)

How To Write A Cloud Security Framework

Adobe Systems Incorporated

Cloud Security:Threats & Mitgations

Where every interaction matters.

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Magento Security and Vulnerabilities. Roman Stepanov

Sitefinity Security and Best Practices

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Hack Proof Your Webapps

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Web application security

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Web Application Penetration Testing

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

(WAPT) Web Application Penetration Testing

Passing PCI Compliance How to Address the Application Security Mandates

Web Application Vulnerability Testing with Nessus

05.0 Application Development

Using Free Tools To Test Web Application Security

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

OWASP Top Ten Tools and Tactics

Security Issues in Cloud Computing

Attack Vector Detail Report Atlassian

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

Addressing Cyber Security in Oracle Utilities Applications

SERENA SOFTWARE Serena Service Manager Security

Smart (and safe) Lighting:

What Cloud computing means in real life

The Top Web Application Attacks: Are you vulnerable?

What is Web Security? Motivation

Web Application Security Assessment and Vulnerability Mitigation Tests

Last update: February 23, 2004

SQuAD: Application Security Testing

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Integrating Security Testing into Quality Control

SOLUTIONS. Secure Infrastructure as a Service for Production Workloads

Penta Security 3rd Generation Web Application Firewall No Signature Required.

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Nuclear Regulatory Commission Computer Security Office Computer Security Standard

CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

OWASP TOP 10 ILIA

Lecture 11 Web Application Security (part 1)

Securing SaaS Applications: A Cloud Security Perspective for Application Providers

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Essential IT Security Testing

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Enterprise Application Security Workshop Series

Requirement Priority Name Requirement Text Response Comment

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Hardening Moodle. Concept and Realization of a Security Component in Moodle. a project by

How to complete the Secure Internet Site Declaration (SISD) form

Web Application Security

Top Ten Web Application Vulnerabilities in J2EE. Vincent Partington and Eelco Klaver Xebia

Annex B - Content Management System (CMS) Qualifying Procedure

Cloud Security. Securing what you can t touch. Presentation to Malaysia Government Cloud Computing Forum HUAWEI TECHNOLOGIES CO., LTD.

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

How To Protect Your Cloud Computing Resources From Attack

Cloud Security and Managing Use Risks

MANAGED SECURITY TESTING

Web Application Security

VMware vcloud Service Definition for a Public Cloud. Version 1.6

Web Application Security

Check list for web developers

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

From the Bottom to the Top: The Evolution of Application Monitoring

Cloud Computing Security Issues

Web Application Report

REDCap General Security Overview

How To Test A Computer System On A Microsoft Powerbook 2.5 (Windows) (Windows 2) (Powerbook 2) And Powerbook (Windows 3) (For Windows) (Programmer) (Or

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

AppDefend Application Firewall Overview

Network Test Labs (NTL) Software Testing Services for igaming

The Electronic Arms Race of Cyber Security 4.2 Lecture 7

Columbia University Web Security Standards and Practices. Objective and Scope

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Public Cloud Service Definition

OWASP AND APPLICATION SECURITY

FileRunner Security Overview. An overview of the security protocols associated with the FileRunner file delivery application

Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,

Security in the Sauce Labs Cloud. Practices and protocols used in Sauce s infrastructure and Sauce Connect

Cloud Security. DLT Solutions LLC June #DLTCloud

Web Application Attacks And WAF Evasion

IT Security Conference Romandie - Barracuda Securely Publishing Web Application a field dedicated to expert only?

It ain t all fluffy and blue sky out there!

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Statistics Whitepaper

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Transcription:

Cloud Security Framework (CSF): Gap Analysis & Roadmap Contributors: Suren Karavettil, Bhumip Khasnabish Ning So, Gene Golovinsky, Meng Yu & Wei Yinxing Please send comments & suggestions to Suren Karavettil (surenck@gmail.com) February 11 th, 2010 1

IETF IPR and Copyright Statements This document (future Internet-Draft) is being prepared for IETF in full conformance with the provisions of BCP 78 and BCP 79 Copyright Notice Copyright (c) 2010 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents in effect on the date of publication of this document (http://trustee.ietf.org/license-info) 2

List of Acronyms IETF Internet Engineering Task Force CSF - Cloud Security Framework GRC Governance, Risk & Compliance CSA Cloud Security Alliance SDO Standards Development Organizations OWASP Open Web Application Security Project XSS Cross-Site Scripting CSRF Cross-Site Request Forgery PCI - Payment Card Industry DSS - Data Security Standards SOX Sarbanes Oxley 01/07/2011 3

Outline Purpose Background on Cloud from Cloud Security Alliance Essential Characteristics of Cloud Cloud model to security control & compliance model Cloud Service security risks consumer vs provider Top Security Risks Reasons for Standardizations in Cloud Gap Analysis & Roadmap CSP Services Requirements Categories Typical Web Application Architecture & Content Types General Application Security Requirements Security Attributes & Methods Functional Apps & Systems Core Services Requirements Administration & Management Requirements Network (Non-Functional) Requirements Governance, Risk & Compliance Requirements Facilities Management Services Requirements Other Standards Development Organizations (SDO) Gap Analysis & Roadmap Next steps 4

Purpose The purpose of the Cloud Security Framework: Gap Analysis & Roadmap is to come up with requirements for: Protocol & Profiles Interfaces API s That helps develop & provide secure applications for users and reduce human interventions in provisioning & management of resources for these cloud applications & services. 5

Essential Characteristics of Cloud On-demand self-service Broad network access Resource pooling using Multi-Tenant model Rapid elasticity Measured service Courtesy of Cloud Security Alliance (CSA) Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 6

Cloud Model to Security Control & Compliance Model Diagram is courtesy of Cloud Security Alliance (CSA) Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 7

Cloud Services Security Risks Consumer vs Provider Portion of diagram is courtesy of Cloud Security Alliance (CSA) Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 OSI Layers + Addons 8

Top Security Risks Top Threats to Cloud Computing, version 1.0 identified by CSA are: Abuse and Nefarious Use of Cloud Computing Insecure Application Programming Interfaces Malicious Insiders Shared Technology Vulnerabilities Data Loss/Leakage Account, Service & Traffic Hijacking Unknown Risk Profile The OWASP Top 10 Web Application Security Risks for 2010 are: Injection Cross-Site Scripting (XSS) Broken Authentication and Session Management Insecure Direct Object References Cross-Site Request Forgery (CSRF) Security Mis-configuration Insecure Cryptographic Storage Failure to Restrict URL Access Insufficient Transport Layer Protection Un-validated Redirects and Forwards 9

Reasons for Standardizations in Cloud Ease of Integration Portability Transparency Inter-operability Reuse Security Others? 10

Gap Analysis & Roadmap Governance, Risk & Compliance (GRC) General Application Services Functional Apps Core Services Functional Admin & Management Services Non- Functional Virtualized & Hardware Systems Resources Facilities Management Non-Functional Network Resources 11

CSP Services Requirements Categories General Applications Security Functional - Apps & Systems Core Services API Administration & Management API (incl. Non Functional for systems) Resources Allocation, Locking, Control & Management Non Functional - Network Governance, Risk & Compliance (GRC) Governance, Risk Assessment & Mitigation, Compliance Facilities Management Services Personnel, premises monitoring, etc 12

Typical Web Application Architecture Application Security Client Attributes Network Security Network Attributes Video Data Voice VLAN Systems Security Host Attributes Data Security Information (Data) Attributes Physical Security Facility (Physical) Attributes 13

Cloud Content Data Types Live Web Application Form Data (Structured text/html) Image Voice Video Attachments (unstructured/mime data types) Unstructured data Archive Structured Data (Database, etc) Files Data PDF, DOC, Excel, etc Image - JPEG, GIF, PNG, etc Voice archive MP-3, etc Video Archive MPEG-4, MPEG-2, MJPEG, AVCHD, etc Unstructured data Note: Assuming data security as part of application security for this discussion purposes 14

General Application Security Requirements Authentication, Authorization & Auditing (AAA) Runtime user authentication & session management Authorized access to data and resources Track access and usage of services, data and other resources (auditing & logging) Secure token identifiers for applications, instances of systems (servers), device types (clients), request/response (pages), etc Data Validation Sanitized data (user or systems) input into applications (from Browsers, CLI, Web Services, etc to avoid injection into OS, SQL, LDAP, etc). Validated and appropriately escaped data output to the clients (browser, CLI, etc) Checking length of data to avoid overflows. Securing the persistent data/ information Data Security Appropriate encryption of data. Multi-tenant isolation through proper configuration of virtualization & other mechanisms? Secure Channels Use of authenticated and encrypted transport layer for apps network traffic 15

Client Attributes General Application Security Attributes & Methods Host Attributes Data Attributes Network Channel Attributes Facility Attributes URL Protocol attributes referrer, etc Encrypted or Not Secure Channel Personnel Access Control Session Id Hostname (virtual or hard) & port Location DMZ or Core Data center Servers RFIDs Page Id Context root Sanitized or Not Bandwidth Available Data center room cameras User Identity Application Context Connection Type Cookie Enabled Session Context Route Http Only & Secure Flag Query parameters Consumer Id & Location Id Method Id Page Context Cluster, Load Balanced, Failover & DR Provider Id & Resource Location Id Server Configurations (Timeouts) Identity Management I/O Data Validation Safe Coding Practices Safe Install & Config Practices Facility Management Multi-factor, Single-Sign on Federation, Authentication Input Sanitization for SQL, LDAP, Header Injection Encoding, Logging, etc LDAP/AD config for multitenancy Time of Day rules Authorization Encoding of output of javascript or HTML data Database configuration for multi-tenancy Access Controls Auditing Input Length Check to avoid overflows VLAN for multi-tenancy Note: Do not assume all cloud resources are virtualized to support multi-tenancy 16

Functional Apps & Systems Core Services Requirements Identity & Access Management (IAM) Virtual Desktop Infrastructure (VDI) Video Streaming Directory Services (DS) Database Management Systems (DBMS) Logging 17

Functional Apps & Systems - Admin & Management Requirements Systems Resource Allocation Services System, Storage (private/public, or varying provider), etc for multi tenancy Systems Resource Mobility Resources Allocation Services Availability, etc Systems Resource Configuration Services Security Single Sign On, Multi-Factor Authentication, Access Control, Encryption Named Services Systems Management Services Asset tracking, Status & Statistics of various Services Systems Failover & Performance Services With different physical infrastructure providers Load Balancing, Backup & Recovery, Business Continuity Systems Interoperability 18

Network (Non-Functional) Requirements Network Connectivity Resources (how to handle multi-tenancy) Addressing Services Allocation Services Network resource like Bandwidth, Routing, VLAN, etc for predictable performance Availability Network Management Services Virtual network management Network Security Services VPN, virtual extension to private cloud (VEPC) Network Failover & Performance Resources Allocation Services With different physical infrastructure providers - Load Balancing, Backup & Recovery, Business Continuity Network Resource Mobility Resources Allocation Services Virtual resource management Interoperability across CSP s Import/export 19

Governance, Risk & Compliance (GRC) Requirements Payment Card Industry (PCI) Data Security Standards (DSS) PCI DSS Health Insurance Portability & Accountability Act (HIPAA) Sarbanes Oxley Act (SOX) Personal Identification Information (PII) - Massachusetts Regulation 201 CMR 17.00 SAS 70 Auditing Standards NERC CIP Standards Gramm Leach Bliley Act (GLBA) for Financial Services GRC applies to CSP and their clients 20

Facilities Management Services Requirements Resources Tracking (assets scan) Manage personnel access to assets/resources by business hours, location, etc. Track assets/resources. 21

Other Standards Development Organizations (SDO) Cloud Security Alliance (CSA) VMWare s DMTF vcloud API & Open Virtualization Format (OVF) TM Forum s Cloud Program Open Cloud Computing Interface Working Group Amazon EC2 API Sun s Open Cloud API Rackspace API GoGrid API 22

Gap Analysis Thoughts & Ideas for next steps Generic Header (protocol+) Functional Header Non Functional Header GRC Rules Header Payload 23

Roadmap Next Steps Thoughts & Ideas for next steps 24