Cloud Security Chapter
Cloud Security Chapter
On-demand self-service
Broad network access
Resource pooling
Rapid elasticity
Measured service
12
Three Cloud Service Models
Cloud Software as a Service (SaaS)*
– To use the provider’s applications
Cloud Platform as a Service (PaaS) *
– To deploy customer-created and acquired applications
Cloud Infrastructure as a Service (IaaS)
– To provision processing, storage, networks, and other
fundamental computing resources
* To be considered as cloud services, they must be running on top of
an cloud infrastructure.
13
Cloud Service Delivery Models
SaaS
PaaS
IaaS
Cloud Service Models –IaaS
• It delivers computer
infrastructure as a
service, along with raw
storage and networking
• Rather than purchasing
servers, software, data-
center space, or network
equipment, clients buy
them as a fully
outsourced service
What is IaaS?
17
Cloud Service Models – PaaS
• It delivers a computing
platform and solution stack
as a service. PaaS offering
facilitate deployment of
applications without the
cost and complexity of
buying and managing the
underlying hardware and
software and provisioning
hosting capabilities
What is PaaS?
20
Software as a Service SaaS
• Cloud computing services, such as
Amazon's EC2 and Google Apps, are
booming.
• With Software as a Service, you’re not
writing an app, just using someone else’s.
• Changes the dynamic of pricing the software
(pay on a per-use basis).
• 20% growth in SaaS products per year.
Cloud Service Models – SaaS
Software and data are hosted on the cloud and are typically
accessed by users using a thin client (browser with internet
access)
What is SaaS?
24
Cloud Deployment Models
Public Private
Cloud
Deployment
Models
Community Hybrid
Src: Securosis, L.L.C. / Cloud Security Alliance
Cloud Deployment Models
• Deployment Options
o Private
o Public
o Community
o Hybrid
• Controlled/Owned By
o Internal
o External
Cloud Computing Infrastructures – Public
Clouds
• Run by 3rd parties such as Amazon,
Google or Microsoft.
• Employ statistical multiplexing to
provide hardware and software
resources.
• Are hosted away from user
premises.
• For security, other applications
running on the same clouds are
transparent to cloud users.
– Cost Efficiency
Cons:
– Security
– Control
Cloud Computing Infrastructures –
Private Clouds
• Built for only one client.
• Provide complete control
over data, security and QoS.
• Deployed on enterprise
datacenter or co-location
facility.
– Availability
– Speed of Access
Cons:
– Scalability
– Maintenance
Community Cloud
I n a community cloud
Multiple organizations
and infrastructures from
Industry Y
the same community Industry X Community
Community Cloud
share the cloud Cloud
infrastructure.
hey all have similar
T C
concerns and goals B D
– Legal/compliance
Cons
– Development
– Cost
Cloud Computing Infrastructures –
Hybrid Clouds
• Combines both private and public
clouds.
• Private clouds are augmented with
resources of public cloud.
• Are used to support Web 2.0
applications
• Also used to handle workload
spikes, i.e. surge computing.
37
Companies are still afraid to use clouds
[Chow09ccsw]
38
Top Cyberattacks in 2014 so far!
Analysts, Hold Security, startlingly announced in February that it had
managed to obtain a list of 360 million account credentials for web services
from the black market. That’s just after three weeks of research.
According to research from Arbor Networks, the number of DDoS events
topping 20Gbps in the first half of 2014, are double that of 2013.
Akamai Technologies State of the Internet report also showed that hacker
attacks on websites went up 75% in the final quarter of 2013, with hackers in
China responsible for 43% of all attacks
This incredible cybermap.kaspersky.com
interactive map from Antivirus software firm Kaspersky, which depicts all the
current cyber attacks occurring around the world in real time, shows the growing
intensity of hacks as the year progresses.
Top Cyberattacks in 2014 - continue
In May, eBay revealed that hackers had managed to steal personal records of 233
million users, with usernames, passwords, phone numbers and physical addresses
compromised.
Community Health Services (health care). The personal data for 4.5 million patients
were compromised between April and June. The sophisticated malware used in the
attack reportedly originated in China. (September 2014)
Google (communications). Reportedly, 5 million Gmail usernames and passwords
were compromised.[23] About 100,000 were released on a Russian forum site.
(September 2014)
Apple iCloud (technology). Hackers reportedly used passwords hacked with brute-
force tactics and third-party applications to access Apple user’s online data storage,
leading to the subsequent posting of celebrities’ private photos online. (September 2014)
J.P. Morgan Chase (financial). The contact information for 76 million households and 7
million small businesses was compromised. The hackers may have originated in Russia
and may have ties to the Russian government. (October 2014)
Causes of Problems Associated
with Cloud Computing
ost security problems stem from:
M
– Loss of control
– Lack of trust (mechanisms)
– Multi-tenancy
These problems exist mainly in 3rd party
management models
– Self-managed clouds still have security
issues, but not related to above
Loss of Control in the Cloud
Consumer’s loss of control
– Data, applications, resources are located with provider
Integrity
– How do I know that the cloud provider is doing the
computations correctly?
44
Taxonomy of Fear (cont.)
Availability
– Will critical systems go down at the client, if the
provider is attacked in a Denial of Service attack?
www.cs.jhu.edu/~ragib/sp10/cs412
45
Taxonomy of Fear (cont.)
• Privacy issues raised via massive data mining
– Cloud now stores data from a lot of clients, and can run data mining
algorithms to get large amounts of information on clients
• Increased attack surface
– Entity outside the organization now stores and computes data, and
so
– Attackers can now target the communication link between cloud
provider and client
– Cloud provider employees can be phished
46
Taxonomy of Fear (cont.)
Auditability and forensics (out of control of data)
– Difficult to audit data held outside organization in a cloud
47
Cloud Computing: who should use it?
Cloud computing definitely makes sense if your own security is
weak, missing features, or below average.
ltimately, if
U
– the cloud provider’s security people are “better” than yours
(and leveraged at least as efficiently),
50
Threat Model
Basic components
– Attacker modeling
• Choose what attacker to consider
– insider vs. outsider?
– single vs. collaborator?
• Attacker motivation and capabilities
– Attacker goals
– Vulnerabilities / threats
www.cs.jhu.edu/~ragib/sp10/cs412
51
Delivery model Security Issues
The lower the cloud provider stands
in terms of service delivery, the more
security the service customer is
responsible for!
Delivery model Security Issues
Customer
Providers
Software/Application
Development Platform
SaaS Computing
Network
Security Responsibility
Security Responsibility
Storage
Software/Application
Development Platform
PaaS Computing
Network
Storage
Software/Application
Development Platform
IaaS Computing
Network
Storage
Cloud Security Taxonomy
Based on Service Models Based on Layers
SaaS
-Cross Site Scripting
-Access Control Weaknesses
-SQL Injection Flaws
-Network Penetration
-Insecure SSL trust configuration
-Data Security
PaaS
-Data Security Issues
IaaS
-Data Reliability
Source:V. S. Subashini, "A survey on security issues in service Source: C. Modi, D. Patel, B. Borisaniya, A. Patel and M. Rajarajan,
delivery models of cloud computing," Journal of Network and "A survey on security issues and solutions at different layers of
Computer Applications, vol. 34, pp. 1-11, 2011. Cloud computing," The Journal of Supercomputing, pp. 1-32, 2012.
Delivery model Security Issues
Cloud Risk and Impact
Analysis
The Notorious Nine
he CSA(Cloud Security
T 1. Data Breaches
Alliance) has identified 2. Data Loss
"The Notorious Nine", the 3. Account Hijacking
top 9 cloud computing 4. Insecure APIs
threats for 2013. 5. Denial of Service
6. Malicious Insiders
7. Abuse of Cloud Services
8. Insufficient Due Diligence
9. Shared Technology Issues
Data Breaches/Loss
eletion or alteration of records without a backup, Loss
D
of an encoding key are some of the common examples
which leads to data loss.
s the data resides on the third parties data centers,
A
security of data is becoming the main concern for cloud
adoption.
hus it is the duty of Cloud security provider to prevent
T
the unauthorized parties from gaining access to the
sensitive data.
Data Loss Remediation
Implementing strong access controls
Strong encryption and decryption for data.
I mplement strong key generation, storage and
management, and destruction practices.
aintaining back up for the data and updating the
M
changes timely.
Data Breaches
Source: https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
Taxonomy of Security
CIANA
– stands for Confidentiality, Integrity, Availability, Non-Repudiation,
and Authentication (Information Assurance, Information Security)
Source: https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
Account, Service and Traffic
Hijacking
I f an attacker gains access to the credentials,
they can eavesdrop on your activities and
transactions, manipulate data, return falsified
information, and redirect your clients to
illegitimate sites.
sing the credentials and passwords for longer
U
time without changing and reusing the same for
different accounts makes this type of attack easy.
Remediation
ollowing the password rules to create strong
F
passwords
Changing the passwords timely
rohibiting the use of passwords on unknown
P
machines and sharing of the passwords with
other users
Account or Service
Traffic Hijacking
Source: https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
Insecure APIs
he security of the cloud services is dependent
T
on how secure is their API's
ccidental and malicious attempts must be
a
taken into consideration when designing the APIs
rganizations are facing a variety of
O
authenticity, confidentiality, and integrity, issues
due to their dependence on a weak set of APIs
Insecure APIs
Source: https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
Remediation
nalyze the security model of cloud
A
provider interfaces.
nsure strong authentication and
E
access controls are implemented in
concert with encrypted transmission.
Denial of Service
reventing users from accessing cloud
P
services.
sing resource exhaustion attacks or
U
software vulnerability attacks.
he cloud becomes irresponsive or legal
T
users will pay more for using more
resources.
Denial of Service
Source: https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
Remediation
None is provided by CSA
Anomaly Behavior Analysis (ABA)
I ntrusion Tolerance by using diversity
and redundancy
Malicious Insiders
alicious insider threat is well-known to most
M
organizations.
provider may not reveal how it grants
A
employees access to physical and virtual assets,
how it monitors these employees, or how it
analyzes and reports on policy compliance.
his kind of situation clearly creates an attractive
T
opportunity for hobbyist hacker.
Malicious Insiders
Source: https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
Remediation
uman resource required specifications
H
should be part of legal contract.
Source: https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
Impact
ttackers are coming up with new technologies to
A
improve their reach, avoid detection and improve
the effectiveness of their activities.
The reasons for this type of attacks are:
– Weak registration systems that are facilitating the
anonymity.
Source: https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
Remediation
Source: https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
Remediation
I mplementing and applying security best practices
for both the installation and configuration processes
ontinuously monitoring for the environment to
C
detect unauthorized activities.
nforcing strict access control and strong
E
authentication for all critical operations.
ontinuously searching for vulnerabilities and
C
threats.
Unknown risk Profile
he features and functionality of the
T
cloud services are well informed to the
customer, but the details of internal
security procedures, auditing, logging,
internal access control remains
unanswered leaving customers with an
unknown risk profile
General Security Issues
I n addition to the above mentioned top threats there are
many other threats that are effecting cloud computing.
They are:
Insider Threats
Hypervisor vulnerabilities
Denial of Service attacks
Malware Injection attacks
Man-In-The Middle Cryptographic attacks
UA Ongoing Cybersecurity
Research Projects
Big Data Analytics Pipeline
Extraction/ Integration/
Acuistion/ Analysis/ Interpretati
Cleaning/ Aggregation/
Recording Modeling ons
Annotation Representations
Research Challenges
Heterogeneity
Collaboration
Timliness
Privacy
Human
Scale
Big Data Analytics for Cyberecurity
Architecture
89
User Cyber Flow (UCF)
Biometric
Mouse Keyboard
authentication
Social Sites
Gaming Social Media
Identify External
Entertainment Threats/
Alerts
Packet Rate
SIEM
Network Tools
Bandwidth Flow
Number of
Connection
HR Software Hardware
Web Sites Systems Flow
Computer
Role Privileges Mobile
Apps Files
90
Application-Cyber Flow (ACF)
USER
Java Applets
HTML Flash
J.S.
HTML5 CSS
AJAX GRAPHS
OWF User
91
Server-Cyber Flow (SCF)
API Responses
NodeJS
SQLITE Python
PHP ASP
High Performance API
SQL JAVA
NoSQL
MongoDB Glassfish Tomcat
MySQL
MVC
PostgresQL OWF Server
Symphony
Zend Cake
92
Insider Threat Detection (ITD) with Smart
Big Data Analytics
AVIRTEK
AIM-ITD
PRODUCT
93
Conclusion
• Cloud computing is sometimes viewed as a reincarnation
of the classic mainframe client-server model
– However, resources are ubiquitous, scalable, highly virtualized
– Lack of trust
– Multi-tenancy problems