cloud top10 security risks

35
Cisco Public Top 10 Cloud Risks That Will Keep You Awake at Night Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang Photo Source – flickr.com

Upload: jay-shrotriya

Post on 16-Jul-2016

34 views

Category:

Documents


4 download

DESCRIPTION

top 10 risks

TRANSCRIPT

Page 1: Cloud Top10 Security Risks

Cisco Public

Top 10 Cloud Risks That Will Keep You Awake at Night

Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang

Photo Source – flickr.com

Page 2: Cloud Top10 Security Risks

2Cisco Public

We want to use SalesForce.com to host our next Cisco

customer application

.. Amazon EC2(Cloud) to host

Eng. Lab testing….

.. Google docs to share Cisco documents within

team…... Facebook/MySpace

to collaborate with company’s customer….

Cisco Business

User

400+ ASPs (aka Cloud Providers) in use within Cisco

Page 3: Cloud Top10 Security Risks

4Cisco Public

Outline

Cloud – Industry Adoption Trend

Cloud Taxonomy

OWASP Cloud Top 10

Cloud Security Risks

Risk Mitigations

Q & A

Page 4: Cloud Top10 Security Risks

5Cisco Public

Cloud – Industry Adoption Trend

58.6 68.3

148.8

020406080

100120140160

2009 2010 2014

Global expenditure on Cloud ($ billion)

(Source Gartner)

Page 5: Cloud Top10 Security Risks

6Cisco Public

Cloud Taxonomy

Public

Private

Hybrid

Community

Deployment ModelsService Models

Software as aService (SaaS)

Platform as aService (PaaS)

Infrastructure as aService (IaaS)

Broad Network Access

Rapid Elasticity

MeasuredService

On-Demand Self-Service

Resource Pooling

(Adapted from CSA Guide, originally from NIST)

Page 6: Cloud Top10 Security Risks

7Cisco Public

Cloud Top 10 - Motivation

Serve as a quick list of top risks with cloud adoption

Develop and maintain top 10 risks with cloud

Provide guidelines on mitigating the risks

Page 7: Cloud Top10 Security Risks

8Cisco Public

Cloud Top 10 - Approach

NIST

CSA

Publications

IndustryExperience

News

OWASPCloud Top 10

Easily ExecutableMost DamagingIncidence Frequency

IDC

ISC2

Page 8: Cloud Top10 Security Risks

9Cisco Public

Cloud Top 10 RisksR1: Accountability & Data Risk

R2: User Identity Federation

R3: Regulatory Compliance

R4: Business Continuity & Resiliency

R5: User Privacy & Secondary Usage of Data

R6: Service & Data Integration

R7: Multi-tenancy & Physical Security

R8: Incidence Analysis & Forensics

R9: Infrastructure Security

R10: Non-production Environment Exposure

Page 9: Cloud Top10 Security Risks

10Cisco Public 10

R1: Accountability

ApplicationWeb/App/DB server

ComputingNetworkStorage

In traditional data center, the owning organization is accountable for security at all layers

Organization fully accountable for security at all layers

In a cloud, who is accountable for security at these layers?

You can outsource hosted services but you cannot outsource accountability

Page 10: Cloud Top10 Security Risks

11Cisco Public

R1: Accountability (cont.)

ApplicationWeb/App/DB server

ComputingNetworkStorage

ApplicationWeb/App/DB server

ComputingNetworkStorage

ApplicationWeb/App/DB server

ComputingNetworkStorage

Cloud Consumer

SaaS

PaaS

IaaS

*

* Few exceptions

Acco

unta

ble

AccountableCloud

Provider

Page 11: Cloud Top10 Security Risks

12Cisco Public 12

R1: Data Risk

Health recordsCriminal recordsCredit historyPayroll

How sensitive is the data?

Informal blogsTwitter postsPublic newsNewsgroup messages

Data encrypted? Single vs. multiple keys

Who owns the data?

Data stored anywhere !!

Page 12: Cloud Top10 Security Risks

13Cisco Public 13

R1: Accountability & Data Risk Mitigation

Logical isolation of the data of multiple consumers

Multiple encryption keys

Provider fully destroys deleted data

Page 13: Cloud Top10 Security Risks

14Cisco Public

R2: Risks: Islands of User Identities

Enterprise

Security Risks1. Managing

Identities across multiple providers

2. Less control over user lifecycle (off-boarding)

3. User experience

Page 14: Cloud Top10 Security Risks

15Cisco Public

R2: Mitigation: User Identity Federation

Identity Federation

SAMLMitigations

1. Federated Identity2. OAuth for backend

integrations3. Tighter user

provisioning controls

Page 15: Cloud Top10 Security Risks

16Cisco Public

R3: Regulatory Compliance

DC1

Key:

DC2

Data that is perceived to be secure in one country may not be perceived secure in another country/region

DC3

European Union (EU) has very strict privacy laws and hence data stored in US may not comply with those EU laws (US Patriot Act allows federal agencies limitless powers to access any corporate data etc)

Lack of transparency in the underlying implementations makes it difficult for data owners to demonstrate compliance( SOX/HIPAA etc.)

Lack of consistent standards and requirements for global

regulatory compliance – data governance can no longer be viewed from a point-to-point

data flow perspective but rather a multi-point to multi-point.

Page 16: Cloud Top10 Security Risks

17Cisco Public 17

R3: Regulatory Compliance – Mitigation Strategy

Apply risk management framework, case-by-case basis

Define data protection requirements and SLAs

Provider / Consumer agreement to a pre-defined RACI model

Page 17: Cloud Top10 Security Risks

18Cisco Public 18

R4: Business Continuity & Resiliency

Lack of know-how and capabilities needed to ensure continuity & resiliency

Monetary losses due to an outage

Cloud provider may be acquired by a consumer’s competitor

Page 18: Cloud Top10 Security Risks

19Cisco Public 19

R4: Business Continuity & Resiliency Mitigation

Contract defines Recovery Time Objectives, and monetary penalty

for downtime

Cloud provider’s Business Continuity program certified to standard such as BS 25999

Page 19: Cloud Top10 Security Risks

20Cisco Public

Privacy of my data- Address, Email,.. (Personally Identifiable Information)

- Health, personal financial info

-Personal Details (email, IMs,….)

End Users

Keep Revenue Up/ Cost Down Push out the liabilities to user via

Privacy and Acceptable Use Policy

Build Additional Services on users behavior (targeted advertisements ) e.g. Google Email, banner adv.

Do minimal to achieve compliance

Keep their social applications more open (increased adoption)

R5: User Privacy & Secondary Usage of Data

Providers

Users vs. Providers (Priorities)

Page 20: Cloud Top10 Security Risks

21Cisco Public

User personal data mined or used (sold) without consent

- Targeted Advertisements, third parties

User Privacy data transferred across jurisdictional borders

No opt out features for user (user can not delete data)

Lack of individual control on ensuring appropriate usage, sharing and protection of their personal information.

Law Obligation for providers- Key escrows to law agencies- Subpoena

R5: Risks: User Privacy & Secondary Usage of Data

Page 21: Cloud Top10 Security Risks

22Cisco Public

R5: Mitigations: User Privacy & Secondary Usage of Data

Policy Enactment-Privacy and Acceptable Usage- Consent (Opt In / Opt Out) - Policy on Secondary Usage

De-identification of personal Information

Encrypted storage

Terms of Service with providers- Responsibility on compliance

- Geographical affinity

Page 22: Cloud Top10 Security Risks

23Cisco Public

R6: Service & Data Integration

Key:

Data traverses through the internet between end users and cloud data centers. How secure the integrations are ?

End Users Cloud Broker

Public Cloud

Internal DatabasesCloud Broker

Private Cloud / Internal Data Center

Service / App 2Service / App 1 Service / App 5 Service / App 6

Branch Office

Cloud Provider 1 Cloud Provider 2

ProxyProxy

Cloud Broker

Page 23: Cloud Top10 Security Risks

24Cisco Public 24

R6: Service & Data Integration – Mitigation Strategy

Data in TransitData at Rest

Encryption (keys, protocols etc)

Page 24: Cloud Top10 Security Risks

26Cisco Public

Web Tier App/BizTier Database Tier

Backups

Clo

ud C

onsu

mer

s (T

enan

ts)

Admin

Reach back to Enterprise

Security Risks1. Inadequate

Logical Separations

2. Co-mingled Tenant Data

3. Malicious or Ignorant Tenants

4. Shared Service-single point of failures

5. Uncoordinated Change Controls and Misconfigs

6. Performance Risks

R7: Risks: Multi-tenancy and Physical Security

Page 25: Cloud Top10 Security Risks

27Cisco Public

R7: Attacks and Incidences

MIT demonstrating cross-tenant attacks (Amazon EC2)*

-Side channel Attacks- Scanning other tenants-DoS

Wordpress Outage June 2010**-100s of tenants (CNN,..) down in multi-tenant environment.

- Uncoordinated Change in database

* http://chenxiwang.wordpress.com/2009/11/02/mit’s-attack-on-amazon-ec2-an-academic-exercise/

** http://smoothspan.wordpress.com/2010/06/11/wordpress-and-the-dark-side-of-multitenancy/

Page 26: Cloud Top10 Security Risks

28Cisco Public

R7: Mitigations: Multi-tenancy and Physical Security

Architecting for Multi-Tenancy

Virtual Private Cloud (VPC)

Data Encryption (per tenant key management)

Controlled and coordinated Change Management

Transparency/Audit-ability of

Administrative Access

Regular Third Party Assessments

Page 27: Cloud Top10 Security Risks

29Cisco Public

R8: Incidence Analysis & Forensic Support

Key:

End Users Cloud Broker

Public Cloud

Internal DatabasesCloud Broker

Private Cloud / Internal Data Center

Service / App 2Service / App 1 Service / App 5 Service / App 6

Branch Office

Cloud Provider 1 Cloud Provider 2

ProxyProxy

Cloud Broker

Complex integration and dynamics in cloud computing present significant challenges to timely diagnosis and resolution of incidents such as:

• Malware detection and • Immediate intrusion response to mitigate the impact

Implications to Traditional Forensics ? (seizing equipment and analysis on media/data recovered)

International differences in relevant regulations …

Page 28: Cloud Top10 Security Risks

30Cisco Public 30

R8: Incidence Analysis & Forensic Support –Mitigation Strategy

Comprehensive logging

Dedicated Forensic VM Images

Without compromising Performance

Page 29: Cloud Top10 Security Risks

31Cisco Public

R9: Infrastructure Security

Key:

Malicious parties are actively scanning the internet for …

Vulnerable Applications or Services

Active Unused Ports

Default Passwords

Default Configurations

Data

Page 30: Cloud Top10 Security Risks

32Cisco Public

R9: Infrastructure Security - Mitigations

Third party audits and app vulnerability assessments

Segregation of duties and role based administrative privs

Tiered architecture with appropriate security controls between them

Hardening – Networks, OS, Apps

Page 31: Cloud Top10 Security Risks

33Cisco Public 33

R10: Non-Production Environment ExposureNon-Production Environments are … used for design, development, and test activities internally within an organization

Prod Non-Prod

Data copied to non-prod from its production equivalent

Typical non-prod environment use genericauthentication credentials

Non-Prod

High risk of an unauthorized user getting access to the non production

environment

Security flaws

Page 32: Cloud Top10 Security Risks

34Cisco Public 34

R10: Non-Production Environment ExposureMitigation

Use multi layers of authentication

Prod Non-Prod

Non-prod data is not identical to production

Don’t use cloud for developing a highly sensitive app in the cloud

Page 33: Cloud Top10 Security Risks

35Cisco Public

Summary: Peaceful Sleep

• Photo - http://fineartamerica.com/featured/peaceful-sleep-ron-white.html

Page 34: Cloud Top10 Security Risks

36Cisco Public

Page 35: Cloud Top10 Security Risks

37Cisco Public

R5: Incidence: User Privacy & Secondary Usage of Data