securityyp implications of cloud computing · va 22202-4302. respondents should be aware that...

28
Security Implications of Cloud Computing Doc Shankar IBM Distinguished Engineer Federal CTO Office [email protected]

Upload: others

Post on 30-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

Security Implications of Cloud y pComputing

Doc ShankarIBM Distinguished Engineer

Federal CTO [email protected]

Page 2: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

Report Documentation Page Form ApprovedOMB No. 0704-0188

Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering andmaintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information,including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, ArlingtonVA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if itdoes not display a currently valid OMB control number.

1. REPORT DATE APR 2010 2. REPORT TYPE

3. DATES COVERED 00-00-2010 to 00-00-2010

4. TITLE AND SUBTITLE Security Implications of Cloud Computing

5a. CONTRACT NUMBER

5b. GRANT NUMBER

5c. PROGRAM ELEMENT NUMBER

6. AUTHOR(S) 5d. PROJECT NUMBER

5e. TASK NUMBER

5f. WORK UNIT NUMBER

7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) IBM Corporation ,1 New Orchard Road ,Armonk,NY,10504-1722

8. PERFORMING ORGANIZATIONREPORT NUMBER

9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S)

11. SPONSOR/MONITOR’S REPORT NUMBER(S)

12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution unlimited

13. SUPPLEMENTARY NOTES Presented at the 22nd Systems and Software Technology Conference (SSTC), 26-29 April 2010, Salt LakeCity, UT. Sponsored in part by the USAF. U.S. Government or Federal Rights License

14. ABSTRACT

15. SUBJECT TERMS

16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as

Report (SAR)

18. NUMBEROF PAGES

27

19a. NAME OFRESPONSIBLE PERSON

a. REPORT unclassified

b. ABSTRACT unclassified

c. THIS PAGE unclassified

Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18

Page 3: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

Myths or Realities?Myths or Realities?• Cloud is not as secure as a traditional IT operation• Security patching is better in a cloud• Demonstrating compliance is harder in a cloud• Data loss is less likely in a cloud• More control leads to better security• Cloud providers can handle insecure apps better

C f• Cloud providers have a better view of threats• Cloud offers more availability than in-house IT

C• Cloud providers are more concerned with protecting themselves than the client

4/6/2010 Doc Shankar 2

Page 4: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

AgendaAgendaP t I Cl d C ti (CC) P III Cl d C i• Part I - Cloud Computing (CC) Overview– A Simple Definition

• Part III - Cloud Computing Security– Customer Security

– A Complete Definition– Security Implications

yConcerns

– How do we get attacked?S it B fit• Part II – Is CC New?

– Distributed Systems Evolution

– Security Benefits– Security Risks– Security IssuesEvolution

– Security Pain Points– CC vs SOA

Security Issues

– CC vs Outsourcing– CC vs SaaS

4/6/2010 Doc Shankar 3

Page 5: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

A Simple Definition of CloudA Simple Definition of CloudCloud is really about moving computing workloadsCloud is really about moving computing workloads off premise and delivering them as a “anytime, anywhere” serviceanywhere service.

The hope is that, it more cost effective then traditional IT.traditional IT.

4/6/2010 Doc Shankar 4

Page 6: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

Historical AnalogyHistorical Analogy

In 1907 70 percent of the industrialIn 1907, 70 percent of the industrial electrical generation in the United States was in house but by the 1920s that samewas in-house, but by the 1920s that same percentage was generated by utility companies. Initially you had to own your own plant, but later it became a pdisadvantage.

4/6/2010 Doc Shankar 5

Page 7: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

A Complete Definition of Cloud*A Complete Definition of Cloud• Cloud Computing is a (pay per use)• Cloud Computing is a (pay-per-use)

model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g. g p g ( gnetworks, servers, storage, applications, and services) that can be rapidlyand services) that can be rapidly provisioned and released with minimal management effort or service providermanagement effort or service provider interaction

4/6/2010 Doc Shankar 6* NIST Definition – Still an evolving paradigm; e.g. pay-per-use deleted

Page 8: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

Delivery ModelsDelivery Models• Software as a Service (SaaS)Software as a Service (SaaS)

– Use provider’s applications– Access through thick/thin clients, Browser, etc.– E g email google docs Sales force CRM Desktop Apps– E.g. email, google docs, Sales force CRM, Desktop Apps.

• Platform as a Service (PaaS)– Deploy client applications using programming languages, tools

supported by providersupported by provider– E.g. MS Azure, Google app engine, Force, Amazon SimpleDB

• Infrastructure as a Service (IaaS)– Rent processing, storage, networks and other fundamental

computing resources– Deploy arbitrary software including operating systems– Client could select networking components (firewalls, load

balancers)– E.g. Amazon EC2, S3, Terremark, Rackspace

4/6/2010 Doc Shankar 7

Page 9: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

Security Implications of the Delivery Models

Service Security by ExtensibilityCloud Provider

SaaS Greatest Least

IaaS Least Greatest

PaaS Middle Middle

The lower down the stack the cloud provider stops, the more security youare tactically responsible for implementing and managing yourself

4/6/2010 Doc Shankar 8

are tactically responsible for implementing and managing yourself

Page 10: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

Top Security Threats/ConcernsTop Security Threats/Concerns• SaaS (All (almost) concerns handled by provider)

– Weak authentication credentials– Insecure protocols– Web-based application flaws

P S (C th li ti )• PaaS (Consumers secure the applications)– Default application configurations (e.g. LAMP)– SSL protocol & implementation flaws

I i i l d d t– Insecure permissions on cloud data• IaaS (Consumers secure the applications + OS & Services)

– Caused by vulnerabilities in OS & servicesMAC b d OS ill t i th d (l t i il i i l )– MAC-based OS will contain the damage (least privilege principle)

– Different mitigation strategies for OS & services; 3 options• Remove the threats• Disable the threatsDisable the threats• Block the threats

Does cloud computing have any threats not in other computing environments?

4/6/2010 Doc Shankar 9

Does cloud computing have any threats not in other computing environments?

Page 11: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

Deployment ModelsDeployment Models• Private Cloud

Owned or leased by a single organization– Owned or leased by a single organization– No public access

• Public Cloud– Owned by an organization selling cloud services

• Managed CloudO d b i l i i– Owned by a single organization

– No public access• Community CloudCommunity Cloud

– Shared by several organizations– Supports a specific community that has shared concerns

• Hybrid Cloud– Composition of 2 or more clouds

Enable data & application portability (e g cloud bursting)4/6/2010 Doc Shankar 10

– Enable data & application portability (e.g. cloud bursting)

Is private cloud an oxymoron?

Page 12: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

Security Implications of the Deployment Models

Cl d T M O L ti CCloud Type Manager Owner Location Consumers

Private Client or 3rd

party providerClient or 3rd

party providerOn-premise or Off-premise

Trustedparty provider party provider Off premise

Public 3rd party provider

3rd party provider

Off-premise Untrusted

Managed 3rd party provider

3rd party provider

On-premise Trusted or Untrusted

Community All clients & 3rd party provider

All clients & 3rd party provider

On-premise or Off-premise

Trusted(All Clients)

p pHybrid Both client &

3rd party provider

Both client & 3rd party provider

Both On-premise & Off-premise

Trusted or Untrusted

4/6/2010 Doc Shankar 11

provider provider Off-premise

Page 13: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

AgendaAgendaP t I Cl d C ti (CC) P III Cl d C i• Part I - Cloud Computing (CC) Overview– A Simple Definition

A Complete Definition

• Part III - Cloud Computing Security– Customer Security – A Complete Definition

– Security Implications

Part II Is CC New?

yConcerns

– How do we get attacked?S it B fit• Part II – Is CC New?

– Distributed Systems Evolution– Security Pain Points

CC SOA

– Security Benefits– Security Risks– Security Issues– CC vs SOA

– CC vs Outsourcing– CC vs SaaS

Security Issues

4/6/2010 Doc Shankar 12

Page 14: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

Is CC New?• Distributed Systems Evolution

– Computer– Computer Utility (Phrase coined)– Computer NetworkingComputer Networking– LAN– Client/Server– Thin Clients– Internet– Web ApplicationsWeb Applications– Grid Computing– Web Services

C O i ti l W b S i– Cross Organizational Web Services– SaaS– Cloud Computing

4/6/2010 Doc Shankar 13

p g

Page 15: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

Customer Pain PointsCustomer Pain Points

• P - Privacy (Confidentiality)• A Authorization (Authentication)• A - Authorization (Authentication)• I - Integrity (Assurance)g y ( )• N - Non-Repudiation (Accountability)

The fundamentals of security haven’t changed for a long time.However, in the last few years due to viruses, worms, intrusions & DDoSattacks, another one has been added called “Assured Information Access”.

4/6/2010 Doc Shankar 14

Page 16: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

CC vs SOACharacteristic SOA CC

Dynamic Linking YesDynamic Linking YesStandard Protocols for Access YesDynamic Discovery Yesy yRelative Autonomy YesTrust Chain YesFederation YesOn-demand self-service YesUbiquitous Network Access YesMulti-tenancy YesR id El i i YRapid Elasticity YesMeasured Service Yes

4/6/2010 Doc Shankar 15SOA is to cloud computing as HTML is to the internet

Page 17: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

CC vs OutsourcingCC vs OutsourcingCharacteristic Outsourcing Cloud Computingg p gStandalone Computing

Yes – Move your server or hire a SP

No

Workloads Known & controlled Unknown & Uncontrolled

Workload Placement & Mi ti

Static Dynamic – e.g. VMs i t d d i ll& Migration migrated dynamically

Dedicated HW/SW for a customer

Yes Nofor a customerData Location Known Unknown

Data replication Not allowed Unknowna a ep ca o o a o ed U o

Multi-tenancy No YesMulti-jurisdiction No Yes

4/6/2010 Doc Shankar 16

j

Page 18: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

CC vs SaaSCC vs SaaS

SaaS User

SaaS User/SaaS Provider

Mashup Applications

SaaS User/SaaS Provider

Web Applications

Cloud User/SaaS Provider

Cloud Provider

Utility Computing

4/6/2010 Doc Shankar 17

Cloud Provider

Page 19: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

AgendaAgendaP t I Cl d C ti (CC) P III Cl d C i• Part I - Cloud Computing (CC) Overview– A Simple Definition

A Complete Definition

• Part III - Cloud Computing Security– Customer Security – A Complete Definition

– Security Implications

Part II Is CC New?

yConcerns

– How do we get attacked?S it B fit• Part II – Is CC New?

– Distributed Systems Evolution– Security Pain Points

CC SOA

– Security Benefits– Security Risks– Security Issues– CC vs SOA

– CC vs Outsourcing– CC vs SaaS

Security Issues

4/6/2010 Doc Shankar 18

Page 20: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

Cloud Security 101: Simple ExampleyTODAY TOMORROW

?? ?

?

We Have ControlIt’s located at X

Who Has Control?Wh i it l t d?

? ??

It’s located at X.It’s stored in server’s Y, Z.We have backups in place.Our admins control access.

Where is it located?Where is it stored?Who backs it up?Who has access?

Our uptime is sufficient.The auditors are happy.Our security team is engaged.

o as accessHow resilient is it?How do auditors observe?How does our securityt ?team engage?

Lesson Learned: We have responded to these questions before…

4/6/2010 Doc Shankar 1919

clouds demand fast, responsive, agile answers.

Page 21: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

Categories of Cloud ComputingControl Data

Categories of Cloud Computing Risks

ControlMany companies and governments are uncomfortable with the idea of

their information located on systems they do not control.

Data Migrating workloads to a shared

network and compute infrastructure increases the potential for unauthorized exposure.

ReliabilityHi h il bilit ill b k

y y p

Providers must offer a high degree of security transparency to help

put customers at ease.

Authentication and access technologies become increasingly important.

High availability will be a key concern. IT departments will worry about a loss

of service should outages occur.

Mission critical applications

ComplianceComplying with SOX, HIPAA and other regulations may

prohibit the use of clouds for

Security ManagementEven the simplest of tasks may be

behind layers of abstraction or

may not run in the cloud without strong availability guarantees.

prohibit the use of clouds for some applications.

behind layers of abstraction or performed by someone else.

Comprehensive auditing capabilities are essential.

Providers must supply easy controls to manage security settings for

li ti d ti i t

4/6/2010 Doc Shankar 20

application and runtime environments.

Page 22: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

CC Security Customer ConcernsCC Security Customer Concerns• “I am nervous about someone else controlling my data”• “My data is on the same disks as data from other users IfMy data is on the same disks as data from other users. If

another customer’s data is raided by FBI, could mine go with it?”“I am not willing to say that the copy of the data in the cloud is• “I am not willing to say that the copy of the data in the cloud is the only copy I’ve got”

• “I am fearful of vendor lock-in”• “I am still responsible for demonstrating compliance”• “I don’t know where my data is stored – in which country?”

“I d ’t d t d h d t i k t t f th ”• “I don’t understand how my data is kept separate from others”• “I don’t see how I recover my data in case of a disaster”• “I want to investigate any illegal activity over my data”• I want to investigate any illegal activity over my data• “I want to ensure my data is available when I need it”

S Cl d it f bl !4/6/2010 Doc Shankar 21

Some say, Cloud security fears are overblown!

Page 23: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

Cloud Security Breach ExamplesCloud Security Breach Examples• Google Cyber attack• Google Cyber attack

– http://googleblog.blogspot.com/2010/01/new-approach-to-china.html

• Google Doc allowed shared permission without user knowledgeknowledge

– http://www.google.com/support/forum/p/Google+Docs/thread?tid=2ef115be2ce4fd0e&hl=en

• Salesforce.com phishing attack led to leak of a customer list; subsequent attackslist; subsequent attacks

– http://voices.washingtonpost.com/securityfix/2007/11/salesforcecom_acknowledges_dat.html

• Vasrev.com Webhost hack wipes out data for 100,000 sitessites

– http://www.theregister.co.uk/2009/06/08/webhost_attack/

• Twitter company files leaked in Cloud Computing security failurey

– http://www.infosecurity-us.com/view/2554/twitter-company-files-leaked-in-cloud-computing-security-failure/• DDoS attack that downed Twitter also hit Facebook

– http://www.computerworld.com/s/article/9136340/DDoS_attack_that_downed_Twitter_also_hit_Facebook?source=CTWNLE_nlt_security_2009-08-07

4/6/2010 Doc Shankar 22

y_

Page 24: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

Attack Categoriesg• Misconfigured Programs • Applicationsg g• Buggy Programs

– Buffer Overflows– Parsing Errors

pp– Cross site scripting– Injection flaws– Malicious file executionParsing Errors

– Formatting Errors– Bad input to cgi bin

• Malicious Programs

Malicious file execution• Eavesdropping• Spamming• IP Spoofing• Malicious Programs

– Trojans– Virus

W

• IP Spoofing• Phishing• Pharming

D S/DD S– Worms– Root kits– Botnets

• DoS/DDoS• People

– Social Engineering• Unsafe Programs• Identity Theft

– Weak passwords– Sloppy Admins.

4/6/2010 Doc Shankar 23

Page 25: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

Security BenefitsSecurity Benefits• Security measures are better & cheaper due to larger scale• Security is a market differentiatory• Information assurance is superior due to replication in multiple locations• Cloud providers can afford to hire specialists with specific cyber security

threats• Large cloud providers can offer standardized, open interfaces to MSS

(Managed Security Services)• Cloud providers can dynamically allocate resources for filtering, traffic

shaping inspection encryption etc due to cloud elasticityshaping, inspection, encryption, etc due to cloud elasticity• Cloud computing (using virtualization) can provide pay-per-use forensic

images of virtual machines which are accessible without taking infrastructure off-line, leading to less down time

f• Updates can be rolled out more rapidly across a homogeneous platform• Better Intrusion Tolerance • Resource concentration is both a benefit & risk

Cheaper ph sical peremeteri ation– Cheaper physical peremeterization– Cheaper physical access control– Easier/cheaper application of policy– Better control over management of data, patching, incidents, maintenance

4/6/2010 Doc Shankar 24

g , p g, ,

Page 26: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

Security RisksSecurity Risks• Lock-in (SaaS, PaaS, IaaS) • Resource Exhaustion( , , )• Loss of Governance• Compliance Challenges

• Isolation Failure• Malicious Insider

M t I t f• Loss of reputation due to co-tenant activitiesCl d i t i ti

• Management Interface Compromise

• Intercepting data in transit• Cloud service termination

or failure• Cloud provider acquisition

p g• Insecure/Ineffective data

deletion• DDoSCloud provider acquisition

• Supply Chain Failure• Jurisdiction risks

• DDoS• Hardening Requirement

ConflictsJurisdiction risks• E-discovery

4/6/2010 Doc Shankar 25

Page 27: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

Security IssuesSecurity Issues1. Data Security2 Identity Management

1. Governance & Risk Management2. Identity Management

3. Single Sign On4. Applications Security5 Secure Multi tenancy

g2. Compliance3. Vulnerability & Patch

Management5. Secure Multi-tenancy6. Logs & Audit Trails

(Forensics)7 Cyber Security (DPI)

g4. Physical/personal Security5. Operational security6 Availability7. Cyber Security (DPI)

8. Encryption & Key Management

9 Virtualization Security

6. Availability7. Incident response8. Privacy9 Business Continuity9. Virtualization Security

10. Storage security11. Information Lifecycle

Management

9. Business Continuity10.Legal Issues

Are security controls in a cloud anyManagement12. Portability & interoperability13. US Federal Specific Issues

Are security controls in a cloud anydifferent than any other computingenvironments?

4/6/2010 Doc Shankar 26

Page 28: Securityyp Implications of Cloud Computing · VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for

Conclusions• Look under the hood

– Perform onsite inspection of CP facilities whenever possible– Ensure CP meets all security requirements

• Be clear about your security requirements & solutions• Be clear about your security requirements & solutions– Convert all/some into CP requirements– State integration requirements (Hybrid cloud)– Understand how CP will meet these

Be specific about your needs in the SLA– Be specific about your needs in the SLA• Insider threat is a significant concern

– Robust compartmentalization of job duties– Privileged user access control

M li i t t– Malicious tenants• Ensure discovery & forensics requirements are met• Understand the handling of transitive trust

– What suppliers does the cloud provider depend on? (Recursive)• Evolving convergence of physical & IT security introduce new risks• Shop around for multiple CP’s (inter cloud integration)• Have open and frequent discussion with CP

Cloud computing provides new economies for information technologies as wellas new challenges. Properly constructed, it can be more secure than traditionalIT infrastructure, but that construction requires the use of strong, integrated and

4/6/2010 Doc Shankar 27

usable security mechanisms.