Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst



Similar documents
East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

Information Technology: This Year s Hot Issue - Cloud Computing

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Cloud Computing Security Issues

Cloud Computing Governance & Security. Security Risks in the Cloud

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

John Essner, CISO Office of Information Technology State of New Jersey

Security and Privacy in Cloud Computing

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Cloud Security Introduction and Overview

Lecture 10 Cloud Security. modified from slides of Lawrie Brown, Ragib Hasan, YounSun Cho, Anya Kim

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Top 10 Cloud Risks That Will Keep You Awake at Night

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Allison Stanton Director of E-Discovery U.S. Department of Justice, Civil Division

Managing Cloud Computing Risk

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service

Cloud Courses Description

Security Issues in Cloud Computing

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab


Cloud Security: The Grand Challenge

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

Cloud Computing and Records Management

Cloud Computing: Risks and Auditing

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate.

Cloud computing: benefits, risks and recommendations for information security

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.

Cloud Courses Description

CS573 Data privacy and security in the cloud. Slide credits: Ragib Hasan, Johns Hopkins University

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Cloud Services Overview

{Moving to the cloud}

Data Security In The Cloud

How To Protect Your Cloud Computing Resources From Attack

THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK

When Security, Privacy and Forensics Meet in the Cloud

Addressing Data Security Challenges in the Cloud

SECURE CLOUD COMPUTING

Cloud Computing Technology

Digital Forensics for IaaS Cloud Computing

CLOUD COMPUTING OVERVIEW

New Requirements for Security and Compliance Auditing in the Cloud

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

IS PRIVATE CLOUD A UNICORN?

About me & Submission details

A Survey on Cloud Security Issues and Techniques

6 Cloud computing overview

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

Cloud Computing. What is Cloud Computing?

Is it Time to Trust the Cloud? Unpacking the Notorious Nine

The Cloud Computing Revolution: Beyond the Hype

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) Introduction to Cloud Security. Taniya

Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division. U.S. Department of Agriculture

Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1

CLOUD COMPUTING GUIDELINES FOR LAWYERS

Security Issues in Cloud Computing

Federal Aviation Administration. efast. Cloud Computing Services. 25 October Federal Aviation Administration

Cloud Security Alliance New Zealand Contribution to the Privacy Commissioner. 23 February 2012

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

Orchestrating the New Paradigm Cloud Assurance

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

Cloud Computing Submitted By : Fahim Ilyas ( ) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Security and Managing Use Risks

Cloud Security. DLT Solutions LLC June #DLTCloud

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Assessing Risks in the Cloud

AskAvanade: Answering the Burning Questions around Cloud Computing

Cloud Data Security. Sol Cates

Hybrid Cloud Computing

Compliance and the Cloud: What You Can and What You Can t Outsource

Security Inspection Inc. Solutions to secure your network

Security & Trust in the Cloud

Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken )

A Guide to Common Cloud Security Concerns. Why You Can Stop Worrying and Start Benefiting from SaaS

How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing

Evolving Technology Issues: Cloud Computing

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes

Seeing Though the Clouds

Incident Handling in the Cloud and Audit s Role

Transcription:

Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst

Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment models O Security Issues O Confidentiality O Integrity O Authentication O Availability O Data Remanence O Regulatory Requirements

What is the Cloud

Cloud Computing Parts O NIST defines cloud computing by: O 5 essential characteristics O 3 cloud service models O 4 cloud deployment models 5

Essential Characteristics O On-demand service O Get computing capabilities as needed automatically O Broad Network Access O Services available over the net using desktop, laptop, PDA, mobile phone 6

Essential Characteristics O Resource pooling O Provider resources pooled to server multiple clients O Rapid Elasticity O Ability to quickly scale in/out service O Measured service O Control, optimize services based on metering 7

Deployment Models Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS)

Cloud Service Models O Software as a Service (SaaS) O We use the provider apps O User doesn t manage or control the network, servers, OS, storage or applications O Platform as a Service (PaaS) O User deploys their apps on the cloud O Controls their apps O User doesn t manage servers, IS, storage 9

Cloud Service Models O Infrastructure as a Service (IaaS) O Consumers gets access to the infrastructure to deploy their stuff O Doesn t manage or control the infrastructure O Does manage or control the OS, storage, apps, selected network components 10

Deployment Models O Public O Cloud infrastructure is available to the general public, owned by org selling cloud services O Private O Cloud infrastructure for single org only, may be managed by the org or a 3 rd party, on or off premise 11

Deployment Models O Community O Cloud infrastructure shared by several orgs that have shared concerns, managed by org or 3 rd party O Hybrid O Combo of multiple clouds bound by standard or proprietary technology 12

Organizations are still afraid to use clouds 13

A Massive Concentration of Resources Also a massive concentration of risk O expected loss from a single breach can be significantly larger O concentration of users represents a concentration of threats O Ultimately, you can outsource responsibility but you can t outsource accountability.

Cloud Security Issues O Most security problems stem from: O Loss of control O Lack of trust (mechanisms) O Multi-tenancy O These problems exist mainly in 3 rd party management models O Self-managed clouds still have security issues, but not related to above

Loss of Control in the Cloud O Loss of control O Data, applications, resources are located with provider O User identity management is handled by the cloud O User access control rules, security policies and enforcement are managed by the cloud provider O Consumer relies on provider to ensure O Data security and privacy O Resource availability O Monitoring and repairing of services/resources

Lack of Trust in the Cloud O Trusting a third party requires taking risks O Defining trust and risk O Opposite sides of the same coin O Defunct third party management schemes O Hard to balance trust and risk

Multi-Tenancy O O O O Conflict between tenants opposing goals O Tenants share a pool of resources and have opposing goals How does multi-tenancy deal with conflict of interest? O Can tenants get along together and play nicely? O If they can t, can we isolate them? How to provide separation between tenants? Cloud Computing brings new threats O Multiple independent users share the same physical infrastructure O Thus an attacker can legitimately be in the same physical machine as the target

Security Issues O Confidentiality O Fear of loss of control over data O Will the sensitive data stored on a cloud remain confidential? O Will cloud compromises leak confidential client data O Will the cloud provider itself be honest and won t peek into the data? O Integrity O How do I know that the cloud provider is doing the computations correctly? O How do I ensure that the cloud provider really stored my data without tampering with it? 19

Security Issues O Availability O Will critical systems go down at the client, if the provider is attacked in a Denial of Service attack? O What happens if cloud provider goes out of business? O Would cloud scale well-enough? O Often-voiced concern O Although cloud providers argue their downtime compares well with cloud user s own data centers 20

Security Issues Privacy issues raised via massive data mining Cloud now stores data from a lot of clients, and can run data mining algorithms to get large amounts of information on clients Increased attack surface Entity outside the organization now stores and computes data, and so Attackers can now target the communication link between cloud provider and client Cloud provider employees can be phished 21

Security Issues O Auditability and forensics (out of control of data) O Difficult to audit data held outside organization in a cloud O Forensics also made difficult since now clients don t maintain data locally O Legal quagmire and transitive trust issues O Who is responsible for complying with regulations? O If cloud provider subcontracts to third party clouds, will the data still be secure? 22

Attacks O Distributed Denial Of Service (DDoS) Attacks O Man in the Middle (MITM) Attacks. O IP Spoofing O Port Scanning O Packet sniffing by other tenants

Encryption "One ring to rule them all, one ring to find them, one ring to bring them all and in the darkness bind them."

Availability

Identity and Access Management O Determine how provider handles: O Provisioning, deprovisioning O Authentication O Federation O Authorization, user profile management 26

IdAM O O O O O Organization s trust boundary will become dynamic and will move beyond the control and will extend into the service provider domain. Managing access for diverse user populations (employees, contractors, partners, etc.) Increased demand for authentication O personal, financial, medical data will now be hosted in the cloud O S/W applications hosted in the cloud requires access control Need for higher-assurance authentication O authentication in the cloud may mean authentication outside F/W O Limits of password authentication Need for authentication from mobile devices

What Are the Key Privacy Concerns? O Typically mix security and privacy O Some considerations to be aware of: O Storage O Retention O Destruction O Auditing, monitoring and risk management O Privacy breaches O Who is responsible for protecting privacy? 28

Storage O Is it commingled with information from other organizations that use the same CSP? O The aggregation of data raises new privacy issues O Some governments may decide to search through data without necessarily notifying the data owner, depending on where the data resides O Whether the cloud provider itself has any right to see and access customer data? O Some services today track user behaviour for a range of purposes, from sending targeted advertising to improving services 29

Retention O How long is personal information (that is transferred to the cloud) retained? O Which retention policy governs the data? O Does the organization own the data, or the CSP? O Who enforces the retention policy in the cloud, and how are exceptions to this policy (such as litigation holds) managed? 30

Destruction O How does the cloud provider destroy PII at the end of the retention period? O How do organizations ensure that their PII is destroyed by the CSP at the right point and is not available to other cloud users? O Cloud storage providers usually replicate the data across multiple systems and sites increased availability is one of the benefits they provide. O How do you know that the CSP didn t retain additional copies? O Did the CSP really destroy the data, or just make it inaccessible to the organization? O Is the CSP keeping the information longer than necessary so that it can mine the data for its own use? 31

Data Remanence O Cloud computing crime poses unique forensics challenges O Over time, O it's expected that clouds will contain more and more evidence of criminal activity O the use of digital evidence in criminal and civil matters will continue to expand. O Cloud providers and customers need to set up their infrastructures to meet these lawful requests or face fines and other legal repercussions.

Forensics O Traditional computer forensics must address the following steps: O Collection of media at the crime scene or location where the media was seized O Preservation of that media; and validation, analysis, interpretation, documentation and courtroom presentation of the results of the examination. O Forensic challenges raised by cloud computing are related to control of the evidence, including collection, preservation and validation

Auditing and Monitoring O How can organizations monitor their CSP and provide assurance to relevant stakeholders that privacy requirements are met when their PII is in the cloud? O Are they regularly audited? O What happens in the event of an incident? O If business-critical processes are migrated to a cloud computing model, internal security processes need to evolve to allow multiple cloud providers to participate in those processes, as needed. O These include processes such as security monitoring, auditing, forensics, incident response, and business continuity 34

Governance O DOD Memorandum July 2012 (draft) O Cloud Computing Strategy O NIST SP800-145 O NIST SP500-292 O NIST SP500-299 O NIST SP 800 53 security controls O NIST SP 800 53a assessment procedures O FedRAMP

Reference O Security Guidance for Critical Areas of Focus in Cloud Computing v2.1 http://www.cloudsecurityalliance.org O NIST Cloud Model: www.csrc.nist.gov/groups/sns/cloudcomputing/index.html O Cloud Security Alliance (CSA) O Various cloud working groups O Open Cloud Computing Interface Working Group, Amazon EC2, Splunk, McAfee, Microsoft, and Dell among others 36