Download presentation
Presentation is loading. Please wait.
Published byWillis Anderson Modified over 9 years ago
1
Kia Manoochehri
2
Background Threat Classification ◦ Traditional Threats ◦ Availability of cloud services ◦ Third-Party Control The “Notorious Nine” Contractual Obligations
3
Security: “freedom from risk and danger” In Computer Science we define security as… ◦ “the ability of a system to protect information and system resources with respect to confidentiality and integrity”
4
Three core areas ◦ Confidentiality ◦ Integrity ◦ Authentication
5
Some other security concepts ◦ Access Control ◦ Nonrepudiation ◦ Availability ◦ Privacy
7
Cloud Service Providers (CSP) provide a “target rich environment” Consolidation of information draws potential attackers Potential problematic areas in the field of Cloud Computing aren’t transparent.
8
Three broad classifications ◦ Traditional Threats ◦ Availability Threats ◦ Third-Party Control Threats
9
Anytime a computer is connected to the internet they are at risk… ◦ When we are dealing with Cloud based applications we are amplifying these threats Question of responsibility ◦ User vs Provider
10
Authorization and Authentication ◦ Individual access vs enterprise access One solution would be to have tiered access ◦ Not every user is created equal!
11
Distributed Denial of Service attacks (DDoS) SQL Injection Phishing Cross-Site Scripting
12
Digital forensics cannot be applied to the cloud ◦ Difficult to trace where an attack is from Virtual Machine vulnerabilities extend to the cloud as well
13
System failures ◦ http://www.forbes.com/sites/anthonykosner/2012 /06/30/amazon-cloud-goes-down-friday-night- taking-netflix-instagram-and-pinterest-with-it/ http://www.forbes.com/sites/anthonykosner/2012 /06/30/amazon-cloud-goes-down-friday-night- taking-netflix-instagram-and-pinterest-with-it/ ◦ Amazon’s Elastic Compute Cloud (EC2) in North Virginia goes down due to lightning. Netflix, Instagram, and Pintrest were down for at least a few hours.
14
Problem stems from CSP outsourcing certain aspects of their operation ◦ How does this affect Introduces more points of entry and vulnerability to the Cloud
15
In 2010 the Cloud Security Alliance (CSA) had defined 7 major threats to Cloud Computing February 2013 yielded their “Notorious Nine” list ◦ 9 major threats in Cloud Computing
16
Data Breaches ◦ Currently the biggest threat ◦ The solution is encryption… but What if you lose the key? ◦ Backing up the data is not viable either Example: Epsilon
17
Data Loss ◦ Malicious deletion ◦ Accidental deletion by CSP ◦ Physical catastrophe ◦ Loss of the encryption key Compliance policies require audit audit records Example: Mat Honan
18
Account/Service Hijacking ◦ Phishing, fraud, software exploits ◦ Organizations should be proactive ◦ Two-Factor authentication Example: XSS attack on Amazon
19
Insecure Interfaces and APIs ◦ Any vulnerability in an API bleeds over ◦ Can effect security and availability ◦ Partially falls on the consumer
20
Denial of Service ◦ From the user end… most frustrating ◦ Can cost cloud users $$$ ◦ Makes the user doubt the cloud
21
Malicious Insiders ◦ Straightforward ◦ Systems that only depends on the CSP for security are at greatest risk ◦ If data-usage encryption is used the data is still vulnerable during storage
22
Abuse of Cloud Services ◦ Using CSP for malicious purpose ◦ Hacking encryption keys via cloud ◦ DDoS attacks via cloud ◦ Problems of detection arise
23
Insufficient Due Diligence ◦ Insufficient user experience ◦ Unknown levels of risk when using CSP ◦ Design and architecture issues for devs ◦ Countered by: Capable resources Extensive internal understanding of risks
24
Shared Technology Vulnerabilities ◦ CPU caches, GPUs are not designed to be isolated ◦ A single vulnerability can lead to an entire environment being compromised
25
Buffer Overflow SQL Injection Privilege escalation SSL Certificate spoofing Attacks on browser caches Phishing attacks Limiting resources Privilege-related attacks Data Distortion Injecting additional operations DDoS attacks
26
Goal is to minimize the security risks Contract between the CSP and user should: ◦ State CSP obligations to handle securely sensitive information and it’s compliance to privacy laws ◦ Spell out CSP liability for mishandling information ◦ Spell out CSP liability for data loss ◦ Spell out rules governing ownership of data ◦ Specify the geographical regions where information and backups can be stored.
27
Kia Manoochehri
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.