Intro The Speaker. Raoul Chiesa



Similar documents
Managing Security of the Grid in the Cloud

Data Breaches, Data Leaks, Web Defacements: why secure coding is important.

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Top 10 Cloud Risks That Will Keep You Awake at Night

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

Cloud Computing. What is Cloud Computing?

Cloud Security. DLT Solutions LLC June #DLTCloud

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Managing your Information Assets in the Cloud

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Cloud Computing Technology

Cloud Security An Overview OWASP. The OWASP Foundation

Big Data, Big Risk, Big Rewards. Hussein Syed

Novel Network Computing Paradigms (I)

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Security & Risk. Adam Cravedi, CISA Senior IT Auditor acravedi@compassitc.com

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Walking the talk. Marnix Dekker. about the EC as cloud customer. CISO team, European Commission

About me & Submission details

Proactively Secure Your Cloud Computing Platform

CLOUD COMPUTING OVERVIEW

Cloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak

Cloud Computing Now and the Future Development of the IaaS

Guideline on Implementing Cloud Identity and Access Management

How To Protect Your Cloud Computing Resources From Attack

What Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen

Certified Cyber Security Analyst VS-1160

Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken )

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Security Introduction and Overview

Cloud Security:Threats & Mitgations

Privacy, Security and Identity in the Cloud. Giles Hogben ENISA

Cloud Storage: Where Does It Fit Into Tomorrow s IT?

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Electronic Records Storage Options and Overview

How to ensure control and security when moving to SaaS/cloud applications

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

Certified Cyber Security Analyst VS-1160

A Survey on Cloud Security Issues and Techniques

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

CHAPTER 8 CLOUD COMPUTING

ASK PC Certified Information Systems Security Expert - CISSE

Cloud Computing Guide & Handbook. SAI USA Madhav Panwar

How To Understand Cloud Computing

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages

Lecture 02a Cloud Computing I

Introduction to Engineering Using Robotics Experiments Lecture 18 Cloud Computing

What Cloud computing means in real life

Cloud Architecture and Management. M.I. Deen General Manager (Enterprise Solutions) Sri Lanka Telecom

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

The SMB Cyber Security Survival Guide

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Penetration Testing in Romania

24/11/14. During this course. Internet is everywhere. Frequency barrier hit. Management costs increase. Advanced Distributed Systems Cloud Computing

A Gentle Introduction to Cloud Computing

CLOUD COMPUTING. Dana Petcu West University of Timisoara

Introduction to Computer Networking: Trends and Issues

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing

On Premise Vs Cloud: Selection Approach & Implementation Strategies

The Cloud Computing Revolution: Beyond the Hype

Introduction to Ethical Hacking and Network Defense. Objectives. Hackers

Cloud-Security: Show-Stopper or Enabling Technology?

Demystifying the Cloud Computing

Cloud Essentials for Architects using OpenStack

Cloud computing: benefits, risks and recommendations for information security

Virtualization Impact on Compliance and Audit

Cloud Computing Summary and Preparation for Examination

Transcription:

Cloud Security, from an Hacker s Perspective ( 从 专 业 视 角 看 云 安 全 ) Raoul Nobody Chiesa Founder, Partner, Security Brokers Principal, Cyberdefcon Ltd. Founder, Owner, @ Mediaservice.net Perugia, July 23, 2012

Agenda Introductions What s this cloud? History plays back Known issues First problems Unknown issues? Conclusions Contacts, Q&A

Intro The Speaker Raoul Chiesa Founder, Partner, Security Brokers Principal, CyberDefcon UK Senior Advisor & Strategic Alliances on Cybercrime @ UNICRI (United Nations Interregional Crime & Justice Research Institute) PSG Member, ENISA (Permanent Stakeholders Group, European Network & Information Security Agency) Founder, Memberof the Steering Committee and Technical Board, CLUSIT, Italian Information Security Association) Steering Committee, AIP/OPSI, Privacy & Security Observtory Board of Directors, ISECOM Board of Directors, OWASP Italian Chapter Founder, Owner, @ Mediaservice.net 4

Intro Security Brokers The Security Brokers Security Brokers (SB) wasestablishedin order to filla gap: the actualict Security just doesn t work SB è un marketplace globale dell Information Security avanzata e non convenzionale, Security Brokers (SB) was established after three year-long phase of «human start-up» and bootstrapping. SB s concept can be summarized as an agile IT and InfoSec marketplace provider with 360 visionand an unconventionalapproach, which uses a business model similiar to traditional brokerages: we locate the best «product»(expert, service, product), typically located in «niche» sectors to best serve our clients. The model itself is based chiefly upon personal relationships and networks cultivated over 20 years and tried & tested in the field over the past 10 years. This said, SB has as «input» its own key Suppliers(Associates) and its High-Level Independent Consulting Services as «output». The full listing of SB s Associates is not yet public (ETA: SEPT 2012), though it encompass many respected Ethical Hackers, IT Security Researchers and top-class experts. Some names: Andrea Zapparoli Manzoni, Elena Bassoli, Gianna Detoni, Fabio Massa, Selene Giupponi and many, many more! 5

Intro Security Brokers: what, how We focus on critical and interesting topics. Thanks to the know-how and specialization our 30+ global experts have gathered over 20 years of demonstrable field experiencein the Information Securityand Cyber Intelligencecommunities (and a few others!), we can claim over 600 combined references per year. Our main service areas can be summarized here: Proactive Security With a focus on mobile networks and devices, modern telco networks, SCADA/NCI security, Cloud, IA in the Transport, Space & Air sectors, Social Networks, proactive identification and mitigation of security issues. Post-Incident & Incident Response Attackerprofiling(MO, Behaviour, Motivations), Digital Forensics (Host, Network, Mobile, GPS, Cloud, etc..), Trainings Cyber Security Strategic Consulting (Technical, Legal, Compliance, PR, Strategy) On-demand «Ninja Teams» Security Incident PR Handling & Management Psychological, Behavioural and Social aspects of hacking and infosec Cybercrime Botnet takeovers and takedowns, Cybercriminal profiling and bounties, Cyber Intelligence reports, facilitator towards external CERTs and LEAs/LEOs,[ ] Information Warfare, Information Superiority & Cyber War(intended exclusively for MoD clients) 0-day vulnerabilites and digital munitions ; OSINT Trainings & Services; CNA/CND/CNE. 6

What s this cloud? The very official, serious term: Cloud Computing Wikipedia: Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). Henry J. Sienkiewicz DISA (Defense Information Systems Agency) A style of computing where massively scalable (and elastic) IT-related capabilities are provided as a service to external customers using Internet technologies. 7

Cloud /2 IaaS: Infrastructure As-a-Service Processing, networking, storage, virtualization PaaS: Platform-As-a-Service Applications development, platforms to develop and test and study SaaS applications. Intended for sw developers communities. SaaS: Software-As-a-Service Pay-per-Use your application through the Web XaaS: Whatever-As-a-Service: Data-As-a-Service (on-line storage or DaaS) Cracking-As-a-Service? DDoS-aaS? Crime-As-a-Service (already existing!) 8

History plays back Traditional Data Center 9

Cloud s fans and opponents (PROs/CONs) Cloud sucks because... It doesn t has security I want to manage my stuff on my own I don t go for cloud cause I don t have any stuff on cloud and I never will I don t cloud cause I already have my cloud: it s my datacenter, close to my town Cloud is cool because... IDC/Gartner/whoever said it s the future It s SO trendy I save money on electricity I got a lot of CPU power The son of a friend of mine runs a Facebook page with +1000 friends and told me that cloud is a must-have Because everything is on the Internet If it s gonna rain, I ll lose my data On cloud they would steal my data and the USA would read my emails They already screwed up MegaUpload! 10

Known issues/1 Recording Logging? Which type of logs? And what about the data-retention laws? Where s my data, in which country?? -> EU vs rest-of-the-world Privacy Laws Access Who can access my data? What if I CAN T access my own data?? Backups and safeties What is backuped? When? How long (data retention, again) Compliance Which kind of Security Audits are allowed to be run? Despite the «compliances» What about Penetration Tests? Who will legally authorise the pentesters? 11

Known issues/2 Lawful Interception TLC Service providers must be compliance with LIS/LIG laws In this case laws are pretty similar, both into UE and extra-eu countries Legal Where is the datacenter physically located? Local laws (i.e. Privacy) Cloud Provider VS data management (privacy, once again) Transferring this data abroad.? DLP (Data Loss Prevention) How can I monitor what is happening to my boxes/applications/services? what about Digital Forensics?!? Insurance s aspect (break-ins)?? We ll check this out later thanks to Eng. Selene Giupponi Hidden costs Is there anything billed in an hidden way? CPU? Data Traffic? Disk space & Backups quotas? 12

First problems September 8, 2001 Google Docs stopped working. 30 minutes black-out Those data people was working on, just got lost And, people wasn t able to work btw!! 13

Be secure? A good start from the folks at NIST, ENISA & CSA NIST Releases Secure Cloud Computing Guidelines (September 15, 2011) Read the articles on Infosec Island! NIST Cloud Computing Standards Roadmap (NIST SP-500-291): http://www.nist.gov/manuscript-publicationsearch.cfm?pub_id=909024 The full document: http://collaborate.nist.gov/twiki-cloud- computing/pub/cloudcomputing/standardsroadmap/nist_sp_500-291_jul5a.pdf ENISA, Cloud Computing - Benefits, risks and recommendations for information security, November 2009 http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-riskassessment ENISA, Cloud Computing - SME Survey, November 2009 http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-sme-survey ENISA, Cloud Computing Information Assurance Framework, November 2009 http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-informationassuranceframework CSA Cloud Security Alliance - https://cloudsecurityalliance.org/ 14

Unknown issues?/1 DDoS attacks Running on cloud can be extremely helpful when mitigating DDoS attacks These attacks would not be as much easy to mitigate within your standard infrastructure On the other hand, from an attacker s point of view, the cloud infrastructure itself would represent a very powerful shotgun 15

Unknown issues?/2 Password cracking Attackers already have abused Cloud s ISPs resources in order to run password cracking software: https://www.infosecisland.com/blogview/11018- Cracking-WPA-Protected-WiFi-in-Six-Minutes.html Roth was able to crack 400.000 passwords per second http://www.darkreading.com/authentication/16790107 2/security/client-security/229301362/researcherovercomes-legal-setback-over-cloud-crackingsuite.html Apparent mis-translation by a German newspaper of English-speaking reports on researcher's Amazon EC2- based password-cracking tool led to raid, frozen bank account 11 Jan 2011 Researcher cracks Wi-Fi passwords with Amazon cloud... computers available for 28 cents per minute, the cost of the crack came to just $1.68. http://www.theregister.co.uk/2011/01/11/amazon_clou d_wifi_cracking/ 16

Unknown issues?/3 https://www.wpacracker.com/ 17

Unknown issues?/4 Hosting mass-template configurations Just like those mass-hacks at ISPs: 1 hole, 1.000.000 data breaches in one shot! Cheap Cloud Providers [choose_your_cheap_service-provider]-like: no grant of security if you pay them 5 EUR/month «Not CSA» (OSSTMM, OWASP, ISO/IEC, NIST,..) compliance Providers Compliance means something! BGP attacks Remember China VS USA? Mass-attacks i.e. recent Linkedin break-in followed by mass spearphishing attacks (Yahoo! and others will follow!) 18

Conclusions Cloud is a tool now available to us. It s not the final panacea aka the very one solution to everything. It can help us, tough. Ahead to going cloud, please run: Cost analysis IT infrastructure analysis Network and OS Security Testing (don t bring your holes into the cloud!) Web Applications penetration testing!!! Legal advisoring When gone into the cloud, please run: Web Applications penetration testing (at least!) Social Engineering tests towards the physical access? 19

Questions? Thanks for your attention! Raoul «nobody» Chiesa raoul@cyberdefcon.com GPG Key: http://raoul.eu.org/raoulchiesa.asc 20