Cloud Security Delivery Models: Security Risks & Recommendations
Cloud Security Delivery Models: Security Risks & Recommendations
96% of respondents had virtualized at some portion of their infrastructure. 52% had moved data and applications into a Cloud environment, and of those that had not, 46% planned to within 12 months. 58% believed their Cloud environment was not adequately secured.
18%
Public
64%
Private Hybrid
importance and have a higher level of confidence in their organizations ability to meet security objectives than providers of public and hybrid cloud solutions.
Poll Question: In whic h ye ar was the first public ly disc lo se d hype rviso r e xplo it?
Correct Answer: No ve m be r o f 20 0 6!
Oct 31, 2006 Buffer overflow vulnerability introduced in 4532 kernel Nov 16, 2006 Anonymous Hacker completes Proof of Concept Jan 3, 2007 Vulnerability disclosed to Microsoft Jan 9, 2007 MS releases patch Feb 28, 2007 Responsible public disclosure
Allows code to be executed in Host from within Guest VM Exploit tunnels MOSDEF connection over Frame Buffer of the Guest VM to communicate with VMware Host Defeats DEP/ ASLR on Vista and reliable on Linux
Guest OS sends request to virtual hardware Can cause virtual HW to write to uncontrolled physical memory Affected Products
ESX and ESXi Workstation, Player, Server, and Fusion ACE
Risk due to vulnerabilities in virtualization- related tech is amplified within the Cloud
Alerts
Vulns
Other Predictions
Phishing targets Cloud provider credentials Incident Response is slowed by involvement of 3rd parties Post- compromise forensic analysis made more difficult in Cloud Time to Remediate vulnerabilities may increase
Lower priority for Cloud provider? Use of canned VM Images impact to vulnerability management
Insider Threat
e.g., provider has their own Pfc. Bradley Manning employed as sysadmin
Multi-Tenancy
Guests
Operating system / applications
SaaS
Control Exposure
PaaS
M O R E
IaaS
Customer Has Less Shared Exposure
L E S S
In addition to shared virtualized infrastructure, Guest OS and Platform Stack are shared with Neighbor Potential for exploitation of vulnerabilities in Platform and Guest OS expose Organizations using PaaS to some risk from Neighbor
Neighbors Userbase
Neighb ors App 1 Neighb ors App 2
Neighbors Userbase
Neighb ors App 1 Neighb ors App 2
Potential for exploitation of vulnerabilities in the shared virtual infrastructure expose Organizations using IaaS to some level of risk from Neighbor Exploitation of shared physical infrastructure also a consideration
Hypervisor
Hardware Network Storage
Dec 5, Amazon Web Service (AWS) announces Level 1 PCI DSS certification
AWS certified from concrete to hypervisor AWS customer must certify their in- scope elements on top of IaaS
Guest OS, Application Stack, Apps, Controls, Operational Processes
Merchants and other service providers can now run their applications on AWS PCI- compliant technology infrastructure to store, process and transmit credit card information in the cloud.
Neighbors Userbase
Neighb ors App 1 Neighb ors App 2
Hypervisor
Hardware Network Storage
Neighbors Userbase
Neighb ors App 1 Neighb ors App 2
Neighbors Userbase
Neighb ors App 1 Neighb ors App 2
Hypervisor
Hardware Network Storage
Neighbors Userbase
Neighb ors App 1 Neighb ors App 2
Neighbors Userbase
Neighb ors App 1 Neighb ors App 2
Neighbors Userbase
Hypervisor
Hardware Network Storage Hardware
Network
Storage
Hardware
Network
Storage
L E S S
SaaS
Control
PaaS IaaS
Exposure
M O R E
Virtualization
Is with us
Traditional security techniques have limited effect Guest to Host hacks have existed and will exist
Some Recommendations
Assess the security of your cloud services providers Consider the impact that a violation of isolation would have at various layers / in various components Evaluate security trade- offs between Public, Private and Hybrid cloud service delivery models Tightly manage cloud providers network access controls Assess security of any 3rd party virtual appliance images (e.g., AMIs) to be used Investigate new cloud- based security solutions from both established and upstart vendors Monitor logs from cloud deployments
Trade- off of direct operational control vs. need to increase visibility and transparency
Q&A
Any Questions?