Cloud Computing Security

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 3 02/15/2010 Security and Privacy in Cloud Computing.
Cloud computing security related works in ITU-T SG17
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 2 08/21/2012 Security and Privacy in Cloud Computing.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 6 2/13/2015.
1 Security on OpenStack 11/7/2013 Brian Chong – Global Technology Strategist.
Security in the Cloud: Can You Trust What You Can’t Touch? Rob Johnson Security Architect, Cloud Engineering Unisys Corp.
Security Issues and Challenges in Cloud Computing
Security Controls – What Works
Supervisor : Mr. Hadi Salimi Advanced Topics in Information Systems Mazandaran University of Science and Technology February 4, 2011 Survey on Cloud Computing.
Copyright © 2009 Juniper Networks, Inc. 1 Cloud Computing: Finding the Silver Lining Steve Hanna, Juniper Networks.
BETA!BETA! Building a secure private cloud on Microsoft technologies Private cloud security concerns Security & compliance in a Microsoft private cloud.
CLOUD PRIVACY AND SECURITY CS 595 LECTURE 15 4/15/2015.
Stephen S. Yau CSE , Fall Security Strategies.
Authors: Thomas Ristenpart, et at.
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 4.
Agenda Who needs an Architect? Cloud and Security Key Security Differences in Private Cloud Cloud Security Challenges Secondary to Essential Characteristics.
Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security,
Cloud Usability Framework
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Cloud computing Tahani aljehani.
Security in Cloud Computing Presented by : Ahmed Alalawi.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Threat Modeling for Cloud Computing (some slides are borrowed from Dr. Ragib Hasan) Keke Chen 1.
©2012 Check Point Software Technologies Ltd. Cloud Security Tamir Zegman Architect.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 2 02/01/2010 Security and Privacy in Cloud Computing.
Cloud Computing Cloud Security– an overview Keke Chen.
Security and Privacy: Can we trust the cloud?
SEC835 Database and Web application security Information Security Architecture.
Storage Security and Management: Security Framework
SECURITY IN CLOUD COMPUTING By Bina Bhaskar Anand Mukundan.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Jim Reavis, Executive Director Cloud Security Alliance November 22, 2010 Developing a Baseline On Cloud Security.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Computer Science and Engineering 1 Cloud ComputingSecurity.
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
1 Suronapee Phoomvuthisarn, Ph.D. / NETE4631:Cloud Privacy and Security - Lecture 12.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Cloud Computing Issues. Why Is "Security" Everywhere on That Slide? Security is generally perceived as a huge issue for the cloud: During a keynote.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
Kia Manoochehri.  Background  Threat Classification ◦ Traditional Threats ◦ Availability of cloud services ◦ Third-Party Control  The “Notorious Nine”
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Security Vulnerabilities in A Virtual Environment
CLOUD COMPUTING-3.
Lecture XIV: Cloud Software Security CS 4593 Cloud-Oriented Big Data and Software Engineering.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IS3220 Information Technology Infrastructure Security
CS 6027 Advanced Networking FINAL PROJECT ​. Cloud Computing KRANTHI ​ CHENNUPATI PRANEETHA VARIGONDA ​ SANGEETHA LAXMAN ​ VARUN ​ DENDUKURI.
CS457 Introduction to Information Security Systems
Maciej Pęciak Robert Dąbroś
Threat Modeling for Cloud Computing
Chapter 6: Securing the Cloud
Understanding The Cloud
Managing the Cloud.
Cloud Security– an overview Keke Chen
VIRTUALIZATION & CLOUD COMPUTING
Hot Topics:Mobility in the Cloud
Paul Woods Chair, MITIGATION: Ensuring we procure cloud services taking into account of the risks involved Paul Woods Chair, ISNorthEast.
Cloud Testing Shilpi Chugh.
Developing a Baseline On Cloud Security Jim Reavis, Executive Director
How to Mitigate the Consequences What are the Countermeasures?
Computer Science and Engineering
Cloud Computing for Wireless Networks
Presentation transcript:

Cloud Computing Security

Agenda Cloud Computing Security Computer Security Computer Security Services Cloud Computing Security Issues Dangers and Vulnerabilities Attackers Threats , Concerns, Assets Cloud Computing Security Domains Solutions and Recommendations

Security Services Availability Confidentiality Integrity

Confidentiality Authorized to Know

Data Has Not Been Tampered With Integrity Data Has Not Been Tampered With

Data Never Loss Machine Never Fail Availability Data Never Loss Machine Never Fail

Cloud Security !! A major Concern Security concerns arising because both customer data and program are residing at Provider Premises. Security is always a major concern in Open System Architectures Customer Data Customer Code Provider Premises Customer

Security Is the Major Challenge

Why Cloud Computing brings new threats? Traditional system security mostly means keeping bad guys out The attacker needs to either compromise the auth/access control system, or impersonate existing users

Why Cloud Computing brings new threats? Cloud Security problems are coming from : Loss of control Lack of trust (mechanisms) Multi-tenancy These problems exist mainly in 3rd party management models Self-managed clouds still have security issues, but not related to above

Why Cloud Computing brings new threats? Consumer’s loss of control Data, applications, resources are located with provider User identity management is handled by the cloud User access control rules, security policies and enforcement are managed by the cloud provider Consumer relies on provider to ensure Data security and privacy Resource availability Monitoring and repairing of services/resources

Why Cloud Computing brings new threats? Multi-tenancy : Multiple independent users share the same physical infrastructure So, an attacker can legitimately be in the same physical machine as the target

Who is the attacker? Insider? Outsider? Malicious employees at client Malicious employees at Cloud provider Cloud provider itself Outsider? Intruders Network attackers?

Attacker Capability: Malicious Insiders At client Learn passwords/authentication information Gain control of the VMs At cloud provider Log client communication

Attacker Capability: Cloud Provider What? Can read unencrypted data Can possibly peek into VMs, or make copies of VMs Can monitor network communication, application patterns

Attacker Capability: Outside attacker What? Listen to network traffic (passive) Insert malicious traffic (active) Probe cloud structure (active) Launch DoS

Challenges for the attacker How to find out where the target is located How to be co-located with the target in the same (physical) machine How to gather information about the target

Threats

Organizing the threats using STRIDE Spoofing identity Tampering with data Repudiation Information disclosure Denial of service Elevation of privilege

Concerns At a Broad level, Two major Questions : How much secure is the Data? How much secure is the Code?

Security Issues from Virtualization Virtualization providers provide is using- ParaVirtualization or full system virtualization. Instance Isolation: ensuring that Different instances running on the same physical machine are isolated from each other. Control of Administrator on Host O/s and Guest o/s. Current VMs do not offer perfect isolation: Many bugs have been found in all popular VMMs that allow to escape from VM! Virtual machine monitor should be ‘root secure’, meaning that no level of privilege within the virtualized guest environment permits interference with the host system.

Streamlined Security Analysis Process Identify Assets Which assets are we trying to protect? What properties of these assets must be maintained? Identify Threats What attacks can be mounted? What other threats are there (natural disasters, etc.)? Identify Countermeasures How can we counter those attacks? Appropriate for Organization-Independent Analysis We have no organizational context or policies

Identify Assets & Principles Customer Data Confidentiality, integrity, and availability Customer Applications Client Computing Devices

Identify Threats Failures in Provider Security Attacks by Other Customers Availability and Reliability Issues Legal and Regulatory Issues Perimeter Security Model Broken Integrating Provider and Customer Security Systems

Failures in Provider Security Explanation Provider controls servers, network, etc. Customer must trust provider’s security Failures may violate CIA principles Countermeasures Verify and monitor provider’s security Notes Outside verification may suffice For SMB, provider security may exceed customer security

Attacks by Other Customers Threats • Provider resources shared with untrusted parties • CPU, storage, network • Customer data and applications must be separated • Failures will violate CIA principles Countermeasures • Hypervisors for compute separation • MPLS, VPNs, VLANs, firewalls for network separation • Cryptography (strong) • Application-layer separation (less strong)

Attacks by Other Customers Threats Provider resources shared with untrusted parties CPU, storage, network Customer data and applications must be separated Failures will violate CIA principles Countermeasures Hypervisors for compute separation MPLS, VPNs, VLANs, firewalls for network separation Cryptography (strong) Application-layer separation (less strong)

Legal and Regulatory Issues Threats • Laws and regulations may prevent cloud computing • Requirements to retain control • Certification requirements not met by provider • Geographical limitations – EU Data Privacy • New locations may trigger new laws and regulations Countermeasures • Evaluate legal issues • Require provider compliance with laws and regulations • Restrict geography as needed

Perimeter Security Model Broken

Perimeter Security Model

Perimeter Security with Cloud Computing?

Perimeter Security Model Broken Threats Including the cloud in your perimeter Lets attackers inside the perimeter Prevents mobile users from accessing the cloud directly Not including the cloud in your perimeter Essential services aren’t trusted No access controls on cloud Countermeasures Drop the perimeter model!

Integrating Provider and Customer Security Threat Disconnected provider and customer security systems Fired employee retains access to cloud Misbehavior in cloud not reported to customer Countermeasures At least, integrate identity management Consistent access controls Better, integrate monitoring and notifications Notes Can use SAML, LDAP, RADIUS, XACML, IF-MAP, etc.

What, When, How to Move to the Cloud Identify the asset(s) for cloud deployment Data Applications/Functions/Process Evaluate the asset Determine how important the data or function is to the organization

Evaluate the Asset How would we be harmed if The asset became widely public & widely distributed? An employee of our cloud provider accessed the asset? The process of function were manipulated by an outsider? The process or function failed to provide expected results? The info/data was unexpectedly changed? The asset were unavailable for a period of time?

Map Asset to Models 4 Cloud Models Public Private (internal, external) Community Hybrid Which cloud model addresses your security concerns?

Map Data Flow Map the data flow between your organization, cloud service, customers, other nodes Essential to understand whether & HOW data can move in/out of the cloud Sketch it for each of the models Know your risk tolerance!

Cloud Domains Service contracts should address these 13 domains Architectural Framework Governance, Enterprise Risk Mgt Legal, e-Discovery Compliance & Audit Information Lifecycle Mgt Portability & Interoperability

Cloud Domains Security, Business Continuity, Disaster Recovery Data Center Operations Incident Response Issues Application Security Encryption & Key Mgt Identity & Access Mgt Virtualization

Governance Identify, implement process, controls to maintain effective governance, risk mgt, compliance Provider security governance should be assessed for sufficiency, maturity, consistency with user ITSEC process

Legal Functional: which functions & services in the Cloud have legal implications for both parties Jurisdictional: which governments administer laws and regs impacting services, stakeholders, data assets Contractual: terms & conditions

Legal Both parties must understand each other’s roles Provider must save primary and secondary (logs) data Where is the data stored? laws for cross border data flows Plan for unexpected contract termination and orderly return or secure disposal of assets You should ensure you retain ownership of your data in its original form

Compliance & Audit Hard to maintain with your sec/reg requirements, harder to demonstrate to auditors Right to Audit clause Analyze compliance scope Regulatory impact on data security Evidence requirements are met Do Provider have SAS 70 Type II, ISO 27001/2 audit statements?

Portability, Interoperability When you have to switch cloud providers Contract price increase Provider bankruptcy Provider service shutdown Decrease in service quality Business dispute

Security, BC, DS Centralization of data = greater insider threat from within the provider Require onsite inspections of provider facilities Disaster recovery, Business continuity, etc

Incident Response Cloud apps aren’t always designed with data integrity, security in mind Provider keep app, firewall, IDS logs? Provider deliver snapshots of your virtual environment? Sensitive data must be encrypted for data breach regs

Application Security Different trust boundaries for IaaS, PaaS, Saas Provider web application security? Secure inter-host communication channel

Identity and Access Mgt Determine how provider handles: Provisioning, deprovisioning Authentication Federation Authorization, user profile mgt

Virtualization What type of virtualization is used by the provider? What 3rd party security technology augments the virtual OS? Which controls protect admin interfaces exposed to users?

Possible Solutions Minimize Lack of Trust Minimize Loss of Control Policy Language Certification Minimize Loss of Control Monitoring Utilizing different clouds Access control management Identity Management (IDM) Minimize Multi-tenancy

Possible Solutions Loss of Control Lack of trust Multi-tenancy Take back control Data and apps may still need to be on the cloud But can they be managed in some way by the consumer? Lack of trust Increase trust (mechanisms) Technology Policy, regulation Contracts (incentives): topic of a future talk Multi-tenancy Private cloud Takes away the reasons to use a cloud in the first place Strong separation

Bottom Line on Cloud Computing Security Engage in full risk management process for each case For small and medium organizations Cloud security may be a big improvement! Cost savings may be large (economies of scale) For large organizations Already have large, secure data centers Main sweet spots: Elastic services Internet-facing services Employ countermeasures listed above

Thank You

References Introduction to Cloud Computing , Prof. Yeh-Ching Chung, http://cs5421.sslab.cs.nthu.edu.tw/home/Materials/Lecture2-IntroductiontoCloudComputing.pdf?attredirects=0&d=1 NIST (National Institute of Standards and Technology). http://csrc.nist.gov/groups/SNS/cloud-computing/ M. Armbrust et. al., “Above the Clouds: A Berkeley View of Cloud Computing,” Technical Report No. UCB/EECS-2009-28, University of California at Berkeley, 2009. R. Buyya et. al., “Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility,” Future Generation Computer Systems, 2009. Cloud Computing Use Cases. http://groups.google.com/group/cloud-computing-use-cases Cloud Computing Explained. http://www.andyharjanto.com/2009/11/wanted-cloud-computing-explained-in.html From Wikipedia, the free encyclopedia All resources of the materials and pictures were partially retrieved from the Internet. All material from “Security Guidance for Critical Areas of Focus in Cloud Computing v2.1”, http://www.cloudsecurityalliance.org All figures in this talk taken from this paper Various cloud working groups Open Cloud Computing Interface Working Group, Amazon EC2 API, Sun Open Cloud API, Rackspace API, GoGrid API, DMTF Open Virtualization Format (OVF) Cloud Computing Security Issues, Randy Marchany, VA Tech IT Security, marchany@vt.edu Research in Cloud Security and Privacy, www.cs.purdue.edu/homes/bb/cloud/cloud-complete.ppt Introduction to Security and Privacy in Cloud Computing, Introduction to Security and Privacy in Cloud Computing. Spring 2010 course at the Johns Hopkins University. By Ragib Hassan