How To Protect Your Data In An Amazon Cloud (Ec2) From Being Hacked (Awes) On A Microsoft Cloud) On An Ama 2.5 (Cloud) On Your Computer (S3) On The Microsoft Web



Similar documents
Chapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok

Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida

Get Off of My Cloud : Cloud Credential Compromise and Exposure. Ben Feinstein & Jeff Jarmoc Dell SecureWorks Counter Threat Unit

Managing Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015

Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions

Amazon AWS Security Basics

unisys Unisys Stealth(cloud) for Amazon Web Services Deployment Guide Release 1.0 January

Using SUSE Studio to Build and Deploy Applications on Amazon EC2. Guide. Solution Guide Cloud Computing.

Introduction to Cloud Computing on Amazon Web Services (AWS) with focus on EC2 and S3. Horst Lueck

How To Create A Virtual Private Cloud On Amazon.Com

How To Create A Virtual Private Cloud In A Lab On Ec2 (Vpn)

Paul Vlissidis Group Technical Director NCC Group plc

Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions

DiamondStream Data Security Policy Summary

Best Practice Strategies for Managing and Mitigating Key Cyber Risks. Brendan Saunders, Principal Security Consultant - November 2015

Simple Storage Service (S3)

Cloud Computing. Adam Barker

Background on Elastic Compute Cloud (EC2) AMI s to choose from including servers hosted on different Linux distros

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

Amazon Elastic Beanstalk

Rstudio Server on Amazon EC2

USER CONFERENCE 2011 SAN FRANCISCO APRIL Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB

Deploy XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 with Amazon VPC

Technology and Cost Considerations for Cloud Deployment: Amazon Elastic Compute Cloud (EC2) Case Study

From baseband to bitstream and back again: What security researchers really want to do with SDR. Andy Davis, Research Director NCC Group

Securely Moving Your Business Into the Cloud

Cloud Models and Platforms

Cloud Security Case Study Amazon Web Services. Ugo Piazzalunga Technical Manager, IT Security

AdWhirl Open Source Server Setup Instructions

MATLAB on EC2 Instructions Guide

Deploy Remote Desktop Gateway on the AWS Cloud

Famly ApS: Overview of Security Processes

ArcGIS 10.3 Server on Amazon Web Services

3CX IP PBX with Twilio Elastic SIP Trunking Interconnection Guide

Securing public cloud

This computer will be on independent from the computer you access it from (and also cost money as long as it s on )

AWS Service Catalog. User Guide

Amazon EFS (Preview) User Guide

IaaS Configuration for Cloud Platforms

Running Oracle Applications on AWS

ur skills.com

Securing Platform as a Service: A Technical Whitepaper on Security Practices at CloudBees

IaaS Configuration for Cloud Platforms

Threat Modeling Cloud Applications

Using ArcGIS for Server in the Amazon Cloud

Security Gateway R75. for Amazon VPC. Getting Started Guide

Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10

Servers. Servers. NAT Public Subnet: /20. Internet Gateway. VPC Gateway VPC: /16

McAfee Public Cloud Server Security Suite

Information is your organisation s greatest asset

Hosted File Back-up for business. Keep your data safe with our cloud back-up service

Interagency Advisory Board Meeting Agenda, Wednesday, September 26, 2012

AWS Account Setup and Services Overview

Online Backup Guide for the Amazon Cloud: How to Setup your Online Backup Service using Vembu StoreGrid Backup Virtual Appliance on the Amazon Cloud

Using ArcGIS for Server in the Amazon Cloud

Hosted Acronis Backup Cloud. Keep your data safe with our cloud backup service, powered by Acronis

Alfresco Enterprise on AWS: Reference Architecture

DVS-100 Installation Guide

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO Annual 3rd party application Pen Tests.

Cloud Computing For Bioinformatics. EC2 and AMIs

Securing Amazon Web Services (AWS) and Simple Storage Service (Amazon S3) Security David Boland

How To Use Arcgis For Free On A Gdb (For A Gis Server) For A Small Business

DVS-100 Installation Guide

AWS Toolkit for Visual Studio. User Guide Version v1.30

The Evolution of Media Workflows

Third Party Supplier Security

VX 9000E WiNG Express Manager INSTALLATION GUIDE

The Wingu guide to creating your first cloud server.

Hosted File Backup for business. Keep your data safe with our cloud backup service

319 MANAGED HOSTING TECHNICAL DETAILS

Amazon S3 Essentials

FortiGate-AWS Deployment Guide

jbase 5 Install on Amazon AWS a Primer

Managing Multi-Tiered Applications with AWS OpsWorks

Cloud Computing for Education Workshop

TechNote. Configuring SonicOS for Amazon VPC

Tibbr Installation Addendum for Amazon Web Services

Learning Management Redefined. Acadox Infrastructure & Architecture

MATLAB Distributed Computing Server Cloud Center User s Guide

AWS for M&E. Bhavik Vyas / bhavikv@amazon.com Amazon Web Services M&E Partner Eco-System Manager DEG Up in the Clouds May 2015

Application Security Best Practices. Matt Tavis Principal Solutions Architect

Opsview in the Cloud. Monitoring with Amazon Web Services. Opsview Technical Overview

SERVER CLOUD DISASTER RECOVERY. User Manual

Integrating cloud services with Polaris. Presented by: Wes Osborn

SMB in the Cloud David Disseldorp

Building Energy Security Framework

Potential Targets - Field Devices

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

Best Practices for Security and Compliance with Amazon Web Services. A Trend Micro White Paper I April 2013

The steps will take about 4 hours to fully execute, with only about 60 minutes of user intervention. Each of the steps is discussed below.

Cloud Computing project Report

System Acquisition Security Risk Survey for Service Providers

Deployment Topologies - DPAdmin An isoagroup Product

UTILIZING CLOUDCHECKR FOR SECURITY

Cloud Computing and Amazon Web Services. CJUG March, 2009 Tom Malaher

WELCOME TO CITUS CLOUD LOAD TEST

Every Silver Lining Has a Vault in the Cloud

Transcription:

Demystifying Security in the Cloud AWS Scout Jonathan Chittenden

Quick Introduction

Agenda Motivation Elastic Compute Cloud (EC2) Simple Storage Service (S3) Identity Access Management (IAM)

Brief Introduction of EC2 EC2 is an Amazon Web Service that allows users to rent virtual machines. The process is extremely easy: Select an Amazon Machine Image (AMI) E.g. Ubuntu x64 Specify some instance details (like what zone or kernel) Select a key pair Place instance in a security group E.g. web-prod

AMI Security Concerns Sharing your AMI? At a minimum you should: Securely delete credentials, certificates, and key material Using a community AMI? Check for: SSH Authorized Keys Active connections to unknown hosts (ncat backdoor, etc)

EC2 Key Pairs The use of key pairs allow you to securely and remotely connect to your instance. Amazon will help you generate and prompt you to save your private key. And what of shared environments? Employee Turnover How do you monitor access?

EC2 Security Groups User defined access rules that specify what traffic may be delivered to your instance(s). Anyone want to take a shot at deciphering the security group below?

Misconfigured Security Groups AWS response to SensePost s BlackHat research on Memcached http://www.sensepost.com/blog/4873.html

Managing Security Groups There can be up to 500 security groups. Containing up to 100 rules per group. These are then applied to instances Production, Staging, Development, Management, etc.

Meet The Scout https://github.com/isecpartners/scout Image Source: http://youtu.be/genmz0j9teq

Scout and Security Groups Manual Analysis: List-instances: list all instances and their security groups List-groups: list all security groups and their instances Instance: Security Group: webserver01 rdp Security Instances: Groups: production jmpserv staging webserv01 rdp

Scout and Security Groups Automated Analysis: Audit-groups: highlight dangerous ingress permissions Based on port ratings provided by user and the source. Security Group with port 3389 open to 0.0.0.0/0 Compare-groups: compare known good with reality

Brief Introduction of S3 Simply put it s an online storage service Variety of uses Access objects through: REST SOAP BitTorrent

S3 Security Functionality Security features: Access Controls ACLs Bucket Policy IAM Policy Access Logs Encryption Client Side vs Server Side

S3 Access Controls: ACLs Coarse-grained permission model So either READ, WRITE, READ_ACP, WRITE_ACP, FULL_CONTROL E.g. Grant AllUsers permission to Read to PublicPhotos Grantee can be: An AWS Account Predefined Group Authenticated Users All Users Log Delivery

Typical Instagram User

S3 Access Controls: Bucket Policy Fine-grained permission model Grant * permission to GetObjectTorrent to PreviewReleases, if DateGreaterThan 2012-10-25T15:00:00 DateLessThan 2012-10-25T16:00:00 Amazon Policy Generator can be used to assist administrator. Uses their JSON access policy language.

Obligatory Justin Bieber Slide

S3 Access Controls: IAM Policy Fine-grained permission model Create IAM principal and attach IAM policies to it.

Brief Introduction of IAM Identity Access Management Allows you to create and manage users/groups Allows you to grant access to AWS resources E.g. EC2 or S3 Identity Federation

S3 Access Controls: IAM Policy Fine-grained permission model Create IAM principal and attach IAM policies to it. Create Various Department Groups & Buckets Create IAM Policy for the Specific Buckets Attach the Policies to the Groups

How should they be used? ACLs Can scale with your application Limited in functionality simple reads/writes Bucket Policy Specific Actions & Conditionals Size Limit of 20kb IAM Policy Identity Federation

How does S3 evaluate these?

S3: Server Side Encryption Server Side Encryption Amazon manages keys with AES-256 bit Objects are encrypted, not buckets Benefits: No need to manage keys Risk transfer

S3: Client Side Encryption Client Side Encryption You take ownership of managing your keys AWS SDK can make this process very easy Uses Envelope Encryption Benefits: More control Master Key compromise simplified

Scout and S3 Access Controls ACLs Costs money to review the ACL for every object/bucket Bucket Policy IAM Policy IAM policies are attached to IAM users so chances are you are aware of them already. Enforcing Encryption

References Amazon Documentation http://aws.amazon.com/documentation/ Jeff Jarmoc Get Off My Cloud https://cloudsecurityalliance.org/wp- content/uploads/2012/02/3.conference- Presentation.Jarmoc.Updated.pdf Sense Post Mining Memcache http://www.sensepost.com/blog/4873.html

Thank You Jonathan Chittenden Senior Security Consultant at isec Partners jonathan@isecpartners.com @loljawn Davis Gallinghouse Former Associate Consultant at isec Partners @dgalling

Questions?

UK Offices Manchester - Head Office Cheltenham Edinburgh Leatherhead London Thame European Offices Amsterdam - Netherlands Munich Germany Zurich - Switzerland North American Offices San Francisco Atlanta New York Seattle Australian Offices Sydney