Cloud Security Alliance: Assuring the future of Cloud Computing Sergio Loureiro, CSA founding member [email protected] IBM La Gaude, 23 rd June 2010
Oct 19, 2014
Cloud Security Alliance: Assuring the future of
Cloud Computing
Sergio Loureiro, CSA founding [email protected]
IBM La Gaude, 23rd June 2010
www.cloudsecurityalliance.orgCopyright © 2010 Cloud Security Alliance
About the Cloud Security Alliance• Global, not-for-profit organization
• Inclusive membership, supporting broad spectrum of subject matter expertise: cloud experts, security, legal, compliance, virtualization, and on and on…
• We believe Cloud Computing has a robust future, we want to make it better
“To promote the use of best practices for providing security assurance within Cloud Computing, and provide education
on the uses of Cloud Computing to help secure all other forms of computing.”
www.cloudsecurityalliance.orgCopyright © 2010 Cloud Security Alliance
Membership
• 50+ Corporate Members• 12 non-profit affiliations• 10,000 individual members growing
by 300/week• Broad Geographical Distribution• Working Group activities performed
through individual membership class
www.cloudsecurityalliance.orgCopyright © 2010 Cloud Security Alliance
Corporate Members
www.cloudsecurityalliance.orgCopyright © 2010 Cloud Security Alliance
S-P-I Framework
IaaSInfrastructure as a Service
You buildsecurity in
You “RFP”security in
PaaSPlatform as a Service
SaaSSoftware as a Service
www.cloudsecurityalliance.orgCopyright © 2010 Cloud Security Alliance
Top Threats to Cloud Computing
Cloud Security Risks / Threats•Shared Technology Vulnerabilities •Data Loss/Data Leakage•Malicious Insiders •Account Service or Hijacking of Traffic• Insecure APIs •Nefarious Use of Service •Unknown Risk Profile
www.cloudsecurityalliance.orgCopyright © 2010 Cloud Security Alliance
Shared Technology Vulnerabilities
• Exposed hardware, operating systems, middleware, application stacks and network components may posses known vulnerabilities
Description
• Successful exploitation could impact multiple customers
Impact
• Cloudburst - Kostya Kortchinksy (Blackhat 2009)• Arbitrary code execution vulnerability identified in VMware
SVGA II device, a virtualized PCI Display Adapter• Vulnerable component present on VMware Workstation,
VMware Player, VMware Server and VMware ESX
Example
www.cloudsecurityalliance.orgCopyright © 2010 Cloud Security Alliance
Data Loss / Data Leakage
• Data compromise due to improper access controls or weak encryption
• Poorly secured data is at greater risk due to the multi-tenant architecture
Description
• Data integrity and confidentiality
Impact
• Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds (UCSD/MIT)• Research detailing techniques to ensure that images are
deployed on the same physical hardware as a victim and then leveraging cross-VM attacks to identify data leakage
Example
www.cloudsecurityalliance.orgCopyright © 2010 Cloud Security Alliance
Malicious Insiders
• Employees of the cloud vendor may abuse privileges to access customer data/functionality
• Reduced visibility into internal processes may inhibit detection of the breach
Description
• Data confidentiality and integrity• Reputational damage• Legal repercussions
Impact
• Google Investigates Insider Threat After China Hack (eWeek)• “Google is investigating whether some of its own staff are behind
the repeated attempts to hack into the Gmail accounts of Chinese human rights activists”
Example
www.cloudsecurityalliance.orgCopyright © 2010 Cloud Security Alliance
Interception or Hijacking of Traffic
• Intercept and/or redirect traffic destined for the clients or cloud
• Steal credentials to eavesdrop or manipulate account information / services
Description
• Confidentiality and integrity of data• Damage to reputation• Consequences (legal) from malicious use of resources
Impact
• Twitter DNS account compromise• Zeus botnet C&Cs on compromised Amazon EC2 accounts
Example
www.cloudsecurityalliance.orgCopyright © 2010 Cloud Security Alliance
Insecure APIs
• APIs designed to permit access to functionality and data may be vulnerable or improperly utilized, exposing applications to attack
Description
• Data confidentiality and integrity• Denial of service
Impact
• P0wning the Programmable Web (Websense – AusCERT 2009_• 80% of tested applications not using available security in
APIs (e.g. unencrypted traffic and basic authentication)• Demonstrated CSRF, MITM and data leakage attacks
Example
www.cloudsecurityalliance.orgCopyright © 2010 Cloud Security Alliance
Nefarious Use of Service
• Attackers are drawn to the cloud for the same reasons as legitimate consumers – access to massive proceesing power at a low cost
Description
• Password cracking, DDoS, malware hosting, spam, C&C servers, CAPTCHA cracking, etc.
Impact
• Current search of MalwareDomainList.com for ‘amazonaws.com’ returns 21 results
• “In the past three years, ScanSafe has recorded 80 unique malware incidents involving amazonaws” – ScanSafe blog
• Amazon's EC2 Having Problems With Spam and Malware - Slashdot
Example
www.cloudsecurityalliance.orgCopyright © 2010 Cloud Security Alliance
Unknown Risk Profile
• A lack of visibility into security controls could leave cloud consumers exposed to unnecessary risk.
Description
• Significant data breaches could occur, possibly without the knowledge of the cloud consumer.
Impact
• Heartland Payment Systems was “willing to do only the bare minimum and comply with state laws instead of taking the extra effort to notify every single customer, regardless of law, about whether their data [had] been stolen.” http://www.pcworld.com/article/158038/heartland_has_no_heart_for_violated_customers.html
Example
www.cloudsecurityalliance.orgCopyright © 2010 Cloud Security Alliance
Top Threats - Status
• Top threats list will be updated 2x per year
Revisions
• Recommended changes will be solicited from CSA participants
• Panel of judges will be established with representation from the security community, solution providers and cloud consumers
• Recommendations will be summarized and solicited to judges for review
• Judges will vote on any recommended changes• Contact project team to recommend judges
Process
www.cloudsecurityalliance.orgCopyright © 2010 Cloud Security Alliance
CSA Research Projects
Go to www.cloudsecurityalliance.org/Research.html for Research dashboard and Working Group signup
www.cloudsecurityalliance.orgCopyright © 2010 Cloud Security Alliance
CSA Guidance Research
Guidance > 100k downloads: cloudsecurityalliance.org/guidance
Governance and Enterprise Risk Management
Legal and Electronic Discovery
Compliance and Audit
Information Lifecycle Management
Portability and Interoperability
Security, Bus. Cont,, and Disaster Recovery
Data Center Operations
Incident Response, Notification, Remediation
Application Security
Encryption and Key Management
Identity and Access Management
Virtualization
Cloud Architecture
Op
erat
ing
in
th
e C
lou
d
Go
vernin
g th
e C
lou
d
• Popular best practices for securing cloud computing
• 13 Domains of concern – governing & operating groupings
• Foundation for CSA research
www.cloudsecurityalliance.orgCopyright © 2010 Cloud Security Alliance
CSA Guidance Research - Status
Governance and Enterprise Risk Management
Legal and Electronic Discovery
Compliance and Audit
Information Lifecycle Management
Portability and Interoperability
Security, Bus. Cont,, and Disaster Recovery
Data Center Operations
Incident Response, Notification, Remediation
Application Security
Encryption and Key Management
Identity and Access Management
Virtualization
Cloud Architecture
Op
erat
ing
in
th
e C
lou
d
Go
vernin
g th
e C
lou
d
• Ver 2.1 released Dec 2009
• Ver 3 mid-2011
• 2010 focus
• Translations
• Wiki format
• Per domain whitepapers (not official guidance)
www.cloudsecurityalliance.orgCopyright © 2010 Cloud Security Alliance
Guidance Highlights - Governance• Best opportunity to secure cloud engagement
is before procurement – contracts, SLAs, architecture
• Know provider’s third parties, BCM/DR, financial viability, employee vetting
• Identify data location when possible
• Plan for provider termination & return of assets
• Preserve right to audit
• Reinvest provider cost savings into due diligence
www.cloudsecurityalliance.orgCopyright © 2010 Cloud Security Alliance
Guidance Highlights - Operating• Encrypt data when possible, segregate key
mgt from cloud provider
• Adapt secure software development lifecycle
• Understand provider’s patching, provisioning, protection
• Logging, data exfiltration, granular customer segregation
• Hardened VM images
• Assess provider IdM integration, e.g. SAML, OpenID
www.cloudsecurityalliance.orgCopyright © 2010 Cloud Security Alliance
CSA Research Projects
• Cloud Controls Matrix Tool
• Trusted Cloud Initiative
• Consensus Assessments Initiative
• Cloud Metrics Research
www.cloudsecurityalliance.orgCopyright © 2010 Cloud Security Alliance
Contact
• Help us secure cloud computing
• www.cloudsecurityalliance.org
• LinkedIn: www.linkedin.com/groups?gid=1864210
• Twitter: @cloudsa
www.cloudsecurityalliance.orgCopyright © 2010 Cloud Security Alliance
Summary• Cloud Computing is real and transformational
• Challenges for People, Process, Technology, Organizations and Countries
• Broad governance approach needed
• Tactical fixes needed
• Combination of updating existing best practices and creating completely new best practices
• Adapting controls into “all virtual” environment
www.cloudsecurityalliance.org
Thank [email protected]
Blog elastic-security.com, Twitter @elasticsecurity