Top Banner
Are Clouds Secure? Security and Privacy Implications of Cloud Computing Subra Kumaraswamy, Sun Tim Mather, RSA 04/21/09 | Session ID: HOT-105 Session Classification: Intermediate
31

Are Clouds Secure? Security and Privacy Implications of Cloud Computing

Jan 14, 2016

Download

Documents

moshe

Are Clouds Secure? Security and Privacy Implications of Cloud Computing. Subra Kumaraswamy, Sun Tim Mather, RSA 04/21/09 | Session ID: HOT-105 Session Classification: Intermediate. What We’re Not Going to Discuss. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

Are Clouds Secure? Security and Privacy Implications of Cloud Computing

Subra Kumaraswamy, SunTim Mather, RSA

04/21/09 | Session ID: HOT-105Session Classification: Intermediate

Page 2: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

2

What We’re Not Going to Discuss

• Existing aspects of information security which are not impacted by ‘cloud computing’

• There are plenty of existing sources of useful information about information security, and we will not attempt to recreate those sources, nor rehash unchanged practices

Page 3: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

3

What Not a Cloud?

Page 4: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

4

What We Are Going to Discuss

Information Security – Data

Information Security – Infrastructure(network-, host-, application-level)

Security Management Services(security management, security monitoring, identity services)

Other Important Considerations(audit & compliance, privacy)

Security-as-a- [Cloud] Service (SaaS)

Where Risk Has Changed: Where Risk Has Changed:

Page 5: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

5

The Cloud: Types

Page 6: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

6

The Cloud: Pyramid of Flexibility

(IaaS)

(PaaS)

(SaaS)

Page 7: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

7

Flavors of Cloud Computing

Page 8: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

8

The Cloud: How are people using it?

Page 9: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

9

Components of Information Security

Information Security – InfrastructureInformation Security – Infrastructure

Network-level

Host-level

Application-level

Information Security – DataInformation Security – Data

Encryption, data masking, content protection

Security Management ServicesSecurity Management Services

Management – patching, hygiene, VA, ACL management

Security monitoring – network, host, application

Identity services – provisioning, AAA, federation, delegation

Page 10: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

Information Security – Infrastructure

Page 11: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

11

Infrastructure – Network-level

• Shared Infrastructure• VLAN – private and public (tagged)

• DHCP server, firewall, load balancer

• Limitations• No zones – domains instead

• Traditional port/protocol filtering irrelevant

• Point-to-point encryption (in transit) is doable

• Extranet security jeopardized – unless ‘you’ control cloud (IP) addressing (questionable)

• Security monitoring – no transparency

Page 12: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

12

Infrastructure – Network-level

• Threats• Lack of widespread adoption of secure BGP

• Secure BGP (S-BGP), Secure Origin BGP (soBGP), and Pretty Good BGP (pgBGP)

• Traffic redirection for eavesdropping

• DNS: domain hijacking• Lack of widespread adoption of Secure DNS

• Only country-wide adoption: Sweden

• DoS / DDoS

• Mitigations• Virtual private cloud – VPN-based solution with strong

authentication

• SSL with client-side certs

Page 13: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

13

Infrastructure – Host-level

• Shared infrastructure• Hardware – CPU, memory, disks, network

• Software – virtualization layer (e.g., Xen)

• Web Console – provisioning, image management

• Limitations• Ephemeral IP address assignment

• Patch, configuration management of large number of dynamic nodes

• SLAs are mostly standard – click-through user agreement

• Host-based IDS is customer responsibility

• Access management – OS and vendor specific

Page 14: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

14

Infrastructure – Host-level

• Threats• Image configuration drift and vulnerabilities

• Targeted DOS attack

• Potential breakout of VMs; examples: Subvert, Blue Pill, HyperVM

• Attack on standard OS services

• Mitigations• Reduce attack surface – Secure-by-default, harden image, turn off OS

services, use software firewall, enable logging

• Institute process – Access provisioning, patch, config. mgmt.

• Extend existing IT security standards, practice & processes

• Host-based IDS – Tripwire, OSSEC

Page 15: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

15

Infrastructure – Application-level

• Shared Infrastructure• Virtualized host, network, firewall (if hosted on IaaS or PaaS)

• Virtualized stack (e.g., LAMP)

• Database Vs Dataspace (e.g., SimpleDB, BigTable)

• Limitations• SaaS – application security is a black box

• SaaS/PaaS – no CVE participation

• IaaS/PaaS – customer responsibility to secure applications

• IaaS/PaaS – Limited capabilities for encryption, identity management

• No option to install application firewall

Page 16: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

16

Infrastructure – Application-level

• Threats• OWASP Top 10

• Mash up security

• Denial of service by corporate IPS/Firewalls

• Developers side stepping controls

• Mitigations• Traditional application security testing and monitoring

• Review provider SDLC and security assurance process

• If possible encrypt data stored in DB

• Manage and protect application “secret keys”

• User awareness – phishing attacks on users

Page 17: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

Information Security – Data

Page 18: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

18

Data Security

• Confidentiality, Availability• Multi-tenancy

• Data-at-rest possibly not encrypted

• Data being processed definitely not encrypted

• Data lineage (mapping data flows)

• Data provenance

• Data remanence

Page 19: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

Security Management Services

Page 20: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

Security Management – Customer Responsibilities

Activities IaaS PaaS SaaS

OS, DB, Application Hardening and Patching

• Manage VM Image hardening• Manage patching of VM , app and DB using your established process

• Harden applications by integration by integrating security into SDLC• Test for OWASP Top 10 vulnerabilities

• Not applicable

Change and configuration management

• Manage change and configuration management of host , DB, Application using your established process

• Customer deployed application only

• Not applicable

Vulnerability management

• Manage OS, Application vulnerabilities leveraging your established vulnerability management process

• Customer deployed application only

• Not applicable

Access Control management

• Manage Access control to VM, zone firewall using vendor consoles. Install and manage host firewall policies

• Manage user provisioning• Restrict access using authentication and IP based restriction• Delegate authentication if SAML supported

• Manage user provisioning• Restrict access using authentication and IP based restriction• Delegate authentication if SAML supported

Page 21: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

Security Monitoring – Customer view

Activities IaaS PaaS SaaS

Network monitoring • Not available

• Not available • Not available

Host monitoring • Install and manage HIDS such as OSSEC

• Monitor security events using logs stored in VM

• Not available • Not available

Database monitoring • Install DB security monitoring tool on the VM hosting DB

• Not available • Not available

Application monitoring • Monitor application security logs• Monitor application vulnerabilities using your preferred tool

• Monitor application logs that may be available – No standard

• Not available

Sun Confidential- Internal Only

Page 22: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

22

Identity Services

• Generally, strong authentication is available only through delegation

• Federated identity generally not available• Support for SAML v2, WS* and XACML is sporadic

• OpenID is not enterprise-ready

• OpenID OATH OAuth OpenAuth OpenSSO

• All five are “open” and deal with authentication, but….

• Delegated authorization generally not available

• Generally weak credential management – of weak credentials

Page 23: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

Other Important Considerations

Page 24: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

24

Audit & Compliance

• No audit standards specific to the ‘cloud’• Not operational, procurement (e.g., FAR), or security

• SAS-70 Type 2 is an audit format – not specific audit criteria• Most cloud providers don’t even have a SAS-70

• Compliance: so-called Patriot Act Problem• Location, location, location

• Issue is assurance of compliance (e.g., data lineage – let alone data providence)

Page 25: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

25

Privacy

• Loss of Fourth Amendment protection• Legal order served on provider – not ‘you’

• Some data can be accessed merely by NSLs

• Magistrate judge court orders under §215

• Probably no encryption of data-at-rest• No indexing or sorting of encrypted data

• Definitely no encryption while data processed• Promise of 2-DNF (homomorphic encryption), Predicate Encryption

(asymmetric encryption)

• Data remanence: limited attempt to address• NIST Special Publication 800-88, Guidelines for Media Sanitization

Page 26: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

Security-as-a- [Cloud] Service

Page 27: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

27

Security Through the Cloud

• Proliferation of endpoints

• Different OSs, form factors – but all with access to organizational data

• Scalability & manageability of existing solutions stretched too far

• USENIX paper in July 2008 in San Jose• “CloudAV: N-Version Antivirus in the Network Cloud”

• Network-centric: e-mail, vulnerability assessment

• Former host resident: anti-malware, content filtering

Page 28: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

28

Conclusions

• Part of ‘your’ infrastructure security moves beyond your control – Get Ready!

• Provider’s infrastructure security may (enterprise) or may not (SMB) be less robust than ‘your’ expectations

• Data security becomes significantly more important

• Weak access control, credential mgmt. – unless delegated back to ‘you’

Page 29: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

29

Conclusions

• No established standards for redaction, obfuscation, or truncation’

• No cloud-specific audit requirements or guidance• “Extending” SAS-70 Type 2 to cloud providers

• No cloud-specific regulatory requirements – yet• Some foreign prohibitions on using U.S. cloud providers

Page 30: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

30

Questions?

Page 31: Are Clouds Secure? Security and Privacy Implications of Cloud Computing

31

Speakers

• Subra Kumaraswamy, Senior Security Manager– Sun Microsystems

[email protected]

• Tim Mather, Chief Security Strategist– RSA, The Security Division of EMC

[email protected]