Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security,

Slides:



Advertisements
Similar presentations
Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate. Presented by: Sabrina M. Segal, USITC, Counselor to the.
Advertisements

Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Cloud Computing NSAA Tallahassee September 2010 Brian Rue
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
The Microsoft Cloud Azure Platform This presentation incorporates some content from Microsoft.
Security in the Cloud: Can You Trust What You Can’t Touch? Rob Johnson Security Architect, Cloud Engineering Unisys Corp.
Security Controls – What Works
Introduction to Cloud Computing and Secure Cloud Computing
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
July 8-9, 2014 | Ronald Reagan Building | Washington, DC Federal Cloud Computing Summit Dr. Barry C. West Cloud Tools and Integration.
The Cloud: Demystified Neil Cattermull Frontier Technology.
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 4.
Cloud Computing Security
Be Smart, Use PwrSmart What Is The Cloud?. Where Did The Cloud Come From? We get the term “Cloud” from the early days of the internet where we drew a.
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Cloud computing Tahani aljehani.
Security in Cloud Computing Presented by : Ahmed Alalawi.
Discussion on LI for Mobile Clouds
Plan Introduction What is Cloud Computing?
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
Effectively and Securely Using the Cloud Computing Paradigm.
Security and Privacy: Can we trust the cloud?
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Jim Reavis, Executive Director Cloud Security Alliance November 22, 2010 Developing a Baseline On Cloud Security.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
Computer Science and Engineering 1 Cloud ComputingSecurity.
Introduction to Cloud Technology StratusLab Tutorial (Orsay, France) 28 November 2012.
InfoSecurity Conference 2011 The Challenges of Cloud Computing John R. Robles John R. Robles and Associates
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
Cloud Use Cases, Required Standards, and Roadmaps Excerpts From Cloud Computing Use Cases White Paper
Overview Abstract Vulnerability: An Overview Cloud Computing Cloud-Specific Vulnerabilities Architectural Components and Vulnerabilities Conclusion.
Javier Salido, CIPP Sr. Program Manager Trustworthy Computing Group Microsoft Corporation SESSION CODE: SIA337.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
LEGAL ISSUES IN CLOUD COMPUTING
Cloud Computing. Definition  The Cloud is a metaphor for the Internet  Cloud computing is a model for enabling ubiquitous, convenient, on-demand network.
Chapter 8 – Cloud Computing
Cloud computing Cloud Computing1. NIST: Five essential characteristics On-demand self-service Computing capabilities, disks are demanded over the network.
Web Technologies Lecture 13 Introduction to cloud computing.
Lecture XIV: Cloud Software Security CS 4593 Cloud-Oriented Big Data and Software Engineering.
Cloud Computing 3. TECHNOLOGY GUIDE 3: Cloud Computing 2 Copyright John Wiley & Sons Canada.
INTRODUCTION TO CLOUD COMPUTING. CLOUD  The expression cloud is commonly used in science to describe a large agglomeration of objects that visually appear.
Private KEEP OFF! Private KEEP OFF! Open! What is a cloud? Cloud computing is a model for enabling convenient, on-demand network access to a shared.
© 2011 IBM Corporation IBM Cloud Computing Data en Cloud Computing Frank van der Wal, Technical Advocate.
CS 6027 Advanced Networking FINAL PROJECT ​. Cloud Computing KRANTHI ​ CHENNUPATI PRANEETHA VARIGONDA ​ SANGEETHA LAXMAN ​ VARUN ​ DENDUKURI.
Corporate Concerns on Cloud Services Environment กษิภัท ธนิตธนาคุณ คอลัมนิสต์ “IT Auditing” นิตยสาร ELEADER กรรมการผู้จัดการ บริษัท เคที ไอที โซลูชั่น.
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Introduction to Cloud Technology
Chapter 6: Securing the Cloud
Understanding The Cloud
Managing the Cloud.
VIRTUALIZATION & CLOUD COMPUTING
Hot Topics:Mobility in the Cloud
Chapter 21: Cloud Computing and Related Security Issues
Introduction to Cloud Computing
Chapter 22: Cloud Computing Technology and Security
Cloud Computing Team Members: Aleksandra Knezevic Willie Robbins
Developing a Baseline On Cloud Security Jim Reavis, Executive Director
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
Fundamental Concepts and Models
Computer Science and Engineering
NIST Cloud Computing Reference Architecture
IT Management Services Infrastructure Services
Cloud Computing for Wireless Networks
Presentation transcript:

Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security,

Something Old, Something New New: Cloud describes the use of a collection of services, applications, information, and infrastructure comprised of pools of compute, network, information and storage resources. These components can be rapidly orchestrated, provisioned, implemented and decommissioned, and scaled up or down providing for an on- demand utility-like model of allocations and consumption Old: The Network is the Computer (Sun Microsystems, 1997) 2

Cloud Computing Parts NIST defines cloud computing by: 5 essential characteristics 3 cloud service models 4 cloud deployment models 3

Essential Characteristics On-demand service Get computing capabilities as needed automatically Broad Network Access Services available over the net using desktop, laptop, PDA, mobile phone 4

Essential Characteristics Resource pooling Provider resources pooled to server multiple clients Rapid Elasticity Ability to quickly scale in/out service Measured service control, optimize services based on metering 5

Cloud Service Models Software as a Service (SaaS) We use the provider apps User doesn’t manage or control the network, servers, OS, storage or applications Platform as a Service (PaaS) User deploys their apps on the cloud Controls their apps User doesn’t manage servers, IS, storage 6

Cloud Service Models Infrastructure as a Service (IaaS) Consumers gets access to the infrastructure to deploy their stuff Doesn’t manage or control the infrastructure Does manage or control the OS, storage, apps, selected network components 7

Deployment Models Public Cloud infrastructure is available to the general public, owned by org selling cloud services Private Cloud infrastructure for single org only, may be managed by the org or a 3 rd party, on or off premise 8

Deployment Models Community Cloud infrastructure shared by several orgs that have shared concerns, managed by org or 3 rd party Hybrid Combo of >=2 clouds bound by standard or proprietary technology 9

What, When, How to Move to the Cloud Identify the asset(s) for cloud deployment Data Applications/Functions/Process Evaluate the asset Determine how important the data or function is to the org 10

Evaluate the Asset How would we be harmed if –the asset became widely public & widely distributed? –An employee of our cloud provider accessed the asset? –The process of function were manipulated by an outsider? –The process or function failed to provide expected results? –The info/data was unexpectedly changed? –The asset were unavailable for a period of time? 11

12 Map Asset to Models 4 Cloud Models Public Private, internal, on premise Private, external Community Hybrid Which cloud model addresses your security concerns?

Map Data Flow Map the data flow between your organization, cloud service, customers, other nodes Essential to understand whether & HOW data can move in/out of the cloud Sketch it for each of the models Know your risk tolerance! 13

Cloud Domains Service contracts should address these 13 domains Architectural Framework Governance, Enterprise Risk Mgt Legal, e-Discovery Compliance & Audit Information Lifecycle Mgt Portability & Interoperability 14

Cloud Domains Security, Business Continuity, Disaster Recovery Data Center Operations Incident Response Issues Application Security Encryption & Key Mgt Identity & Access Mgt Virtualization 15

Security Stack IaaS: entire infrastructure from facilities to HW PaaS: application, Middleware, database, messaging supported by IaaS SaaS: self contained operating environment: content, presentation, apps, mgt 16

Security Stack Concerns Lower down the stack the cloud vendor provides, the more security issues the consumer has to address or provide Who do you trust? 17

Key Takeaways SaaS Service levels, security, governance, compliance, liability expectations of the service & provider are contractually defined PaaS, IaaS Customer sysadmins manage the same with provider handling platform, infrastructure security 18

Sample Clouds 19 From “Security Guidance for Critical Areas of Focus in Cloud Computing v2.1, p.18

20 SaaS Paas IaaS

Security Pitfalls How cloud services are provided confused with where they are provided Well demarcated network security border is not fixed Cloud computing implies loss of control 21

Overall Security Concerns Gracefully lose control while maintaining accountability even if operational responsibility falls upon 3 rd parties Provider, user security duties differ greatly between cloud models 22

Governance Identify, implement process, controls to maintain effective governance, risk mgt, compliance Provider security governance should be assessed for sufficiency, maturity, consistency with user ITSEC process 23

3 rd Party Governance Request clear docs on how facility & services are assessed Require defn of what provider considers critical services, info Perform full contract, terms of use due diligence to determine roles, accountability 24

Legal, e-Discovery Functional: which functions & services in the Cloud have legal implications for both parties Jurisdictional: which governments administer laws and regs impacting services, stakeholders, data assets Contractual: terms & conditions 25

Legal, e-Discovery Both parties must understand each other’s roles –Litigation hold, Discovery searches –Expert testimony Provider must save primary and secondary (logs) data Where is the data stored? laws for cross border data flows 26

Legal, e-Discovery Plan for unexpected contract termination and orderly return or secure disposal of assets You should ensure you retain ownership of your data in its original form 27

Compliance & Audit Hard to maintain with your sec/reg requirements, harder to demonstrate to auditors Right to Audit clause Analyze compliance scope Regulatory impact on data security Evidence requirements are met Do Provider have SAS 70 Type II, ISO 27001/2 audit statements? 28

Info Lifecycle Mgt Data security (CIA) Data Location All copies, backups stored only at location allowed by contract, SLA and/or regulation Compliant storage (EU mandate) for storing e-health records 29

Portability, Interoperability When you have to switch cloud providers Contract price increase Provider bankruptcy Provider service shutdown Decrease in service quality Business dispute 30

Security, BC, DS Centralization of data = greater insider threat from within the provider Require onsite inspections of provider facilities Disaster recover, Business continuity, etc 31

Data Center Ops How does provider do: On-demand self service Broad network access Resource pooling Rapid elasticity Measured service 32

Incident Response Cloud apps aren’t always designed with data integrity, security in mind Provider keep app, firewall, IDS logs? Provider deliver snapshots of your virtual environment? Sensitive data must be encrypted for data breach regs 33

Application Security Different trust boundaries for IaaS, PaaS, Saas Provider web application security? Secure inter-host communication channel 34

Encryption, Key Mgt Encrypt data in transit, at rest, backup media Secure key store Protect encryption keys Ensure encryption is based on industry/govt standards. NO proprietary standard Limit access to key stores Key backup & recoverability Test these procedures 35

ID, Access Mgt Determine how provider handles: Provisioning, deprovisioning Authentication Federation Authorization, user profile mgt 36

Virtualization What type of virtualization is used by the provider? What 3 rd party security technology augments the virtual OS? Which controls protect admin interfaces exposed to users? 37

38

Summary We already do some sort of cloud computing NFS, Samba shares, SAN, NAS, Web applications Decide on public or private cloud Public cloud implies loss of control 39

Reference All material from “Security Guidance for Critical Areas of Focus in Cloud Computing v2.1”, All figures in this talk taken from this paper NIST Cloud Model: computing/index.html computing/index.html Various cloud working groups Open Cloud Computing Interface Working Group, Amazon EC2 API, Sun Open Cloud API, Rackspace API, GoGrid API, DMTF Open Virtualization Format (OVF) 40