Cloud Computing Security Tutorial
Cloud Computing Security Tutorial
William R. Claycomb, PhD. Lead Research Scientist CERT Enterprise Threat and Vulnerability Management Team
Agenda
Background: Cloud Computing Threats to Cloud Security Insider Threats in the Cloud Present, Past, and Future Attacks Threats to Cloud Security 2.0 Future Research
actual resources
Five Characteristics
On-demand self-service Ubiquitous network access Location independent resource pooling Rapid elasticity Measured service
Private cloud
Enterprise owned or leased
Community cloud
Shared infrastructure for specific community
Public cloud
Sold to the public, mega-scale infrastructure
Hybrid cloud
Composition of two or more clouds
Agenda
Background: Cloud Computing Threats to Cloud Security Insider Threats in the Cloud Present, Past, and Future Attacks Threats to Cloud Security 2.0 Future Research
Abuse and Nefarious Use of Cloud Computing Insecure Application Programming Interfaces Malicious Insiders Shared Technology Vulnerabilities Data Loss/Leakage Account, Service, and Traffic Hijacking Unknown Risk Profile
10
Could expose more functionality than intended Policy could be circumvented Credentials may need to be passed is the interface secure?
11
Malicious Insiders
Particularly poignant for cloud computing Little risk of detection System administrator qualifications and vetting process for cloud services provider may be different that that of the data owner
12
Underlying architecture (CPU cache, GPU, etc.) not intended to offer strong isolation properties Virtualization hypervisor used to mediate access between guest OS and physical resources Exploits exist (Blue Pill, Red Pill)
13
Data is outside the owners control Data can be deleted or decoupled (lost) Encryption keys can be lost Unauthorized parties may gain access Caused by
Insufficient authentication, authorization, and
access controls Persistence and remanance Poor disposal procedures Poor data center reliability
14
15
Does the combination of different service providers create previously unseen vulnerabilities?
16
Agenda
Background: Cloud Computing Threats to Cloud Security Insider Threats in the Cloud Present, Past, and Future Attacks Threats to Cloud Security 2.0 Future Research
17
Scope
Cloud Computing
Cloud Computing Security
18
What is CERT?
Center of Internet security expertise Established in 1988 by the US Department of Defense on the heels of the Morris worm that created havoc on the ARPANET, the precursor to what is the Internet today Part of the Software Engineering Institute (SEI)
Federally Funded Research & Development Center (FFRDC) Operated by Carnegie Mellon University (Pittsburgh,
Pennsylvania)
19
20
has or had authorized access to an organizations network, system or data and intentionally exceeded or misused that access in a manner that negatively affected the confidentiality, integrity, or availability of the organizations information or information systems.
21
250
277
200
150
148
100
99
50
69
Sabotage
Fraud
Theft of IP
Misc
22
Water 1%
Banking and Finance 29% Chemical Industry & Hazardous Materials 2% Commercial Facilities 6%
Government-State/Local 9%
Food 2% Government-Federal 7%
Education 4% Energy 1%
Emergency Services 1%
24
25
26
Source: 2011 CyberSecuirty Watch Survey, CSO Magazine, U.S. Secret Service, Software Engineering Institute CERT Program at Carnegie Mellon University and Deloitte, January 2011.
27
Source: 2011 CyberSecuirty Watch Survey, CSO Magazine, U.S. Secret Service, Software Engineering Institute CERT Program at Carnegie Mellon University and
28
76%
Concerns about negative publicity Concerns about liability Concerns that competitors would use incident to their advantage Prior negative response from law enforcement Unaware that we could report these crimes
Internally (without legal action or law enforcement) Internally (with legal action) Externally (notifying law enforcement)
Other
Source: 2011 CyberSecuirty Watch Survey, CSO Magazine, U.S. Secret Service, Software Engineering Institute CERT Program at Carnegie Mellon University and
29
IT Sabotage
30
31
32
A logic bomb sits undetected for 6 months before finally wreaking havoc on a telecommunications firm A security guard at a U.S. hospital, after submitting resignation notice, obtained physical access to computer rooms
A contractor, whos request for permanent employment was rejected, planted malicious code following termination
System administrator at a manufacturing plant, passed over for promotion, deployed logic bomb prior to resigning, deleting critical software required to run operation
Summary of Findings
IT Sabotage
Summary of Findings
IT Sabotage
Network, systems, or data Unauthorized Outside normal working hours Remote access None None
35
36
TRUE STORY:
Research scientist downloads 38,000 documents containing his companys trade secrets before going to work for a competitor
37
Simulation software for the reactor control room in a nuclear power plant was being run from a different country
A former software engineer born in that country took it with him when he left the company.
38
Summary of Findings
IT Sabotage Theft of Intellectual Property 18% Current Technical (71%) scientists, programmers, engineers Sales (29%)
35% Former
Type of position
Gender
Male
Male
Summary of Findings
Theft of Intellectual Property IP (trade secrets) Network, systems, or 71% data Customer Info 33% Unauthorized Authorized Outside normal During normal working hours working hours Remote access At work IT Sabotage None Less than 1/4 Almost colluded with at least one insider; acted alone
None
40
Fraud
41
42
Fake drivers license sold to undercover agent claiming to be on the No Fly list
43
A database administrator at major US Insurance Co. downloaded 60,000 employee records onto removable and solicited bids for sale over the Internet An office manager for a trucking firm fraudulently puts her husband on the payroll for weekly payouts, and erases records of payments
44
Summary of Findings
IT Sabotage Theft of Intellectual Property 18% Current Technical (71%) scientists, programmers, engineers Sales (29%) Fraud 40% Current Non-technical, lowlevel positions with access to confidential or sensitive information (e.g. data entry, customer service) Fairly equally split between male and female
45
35% Former
Type of position
Gender
Male
Male
46
Cloud Provider
Resources/Availability
Employee
Data
Victim Organization
47
Weve seen cases of insider threats from trusted business partners True examples of cloud service providers are rare, but do exist Important to weigh the risks carefully; the provider has much to lose as well
48
Rogue Administrators
49
Example weakness the organization may not have direct control of the resources providing data/services Most likely Fraud or Theft of IP Dont count out sabotage, though
Access control models may be different Effecting change quickly may be difficult
weakness the Cloud is a very powerful tool; and a very powerful weapon, what if it is turned back on the org itself?
cloud services to crack password files, allowing unrestricted access to company bank accounts.
A
disgruntled insider uses several relatively cheap, easily configured cloud systems to launch a distributed denial of service attack on his organization, hindering incident investigation and limiting forensic analysis.
insider planning to leave the company leverages cloud storage to consolidate and exfiltrate sensitive information to take to a new job with a competitor.
51
Rogue Administrators
From CSA Supply chain management HR requirements as part of legal contracts Require information security and management practices transparency Determine security breach notification processes Enforcement of SLAs Encryption Where do you keep the keys? What is the cost to the host provider?
52
53
54
Socio-technical approach Predictive models Identifying cloud-based indicators Virtualization and hypervisors Awareness and reporting Normal user behavior analysis Policy integration
55
Predictive Models
Greitzer, et al.
Identifies and weighs indicators of insider risk Develops a reasoning system to integrate multiple data sources
56
SLA violation Improper virtual machine management Using suspicious software Performing similar activities across different platforms and/or customer systems Lack of concern for company policy or protection of others data
57
58
May 2012 FBI news story, Economic Espionage: How to Spot a Possible Insider Threat. Many insiders in CERTs database were detected through co-worker reporting
59
Necessary to detect the clever insider Very little research in the literature on insider threat research that compares indicators to normal data Also useful for benchmarking, etc.
60
Policy Integration
Necessary to merge policies from the org and the cloud Takabi et al. propose a trust management framework for policy integration and an ontology to address semantic heterogeneity among policies. Researchers should be careful to note implementation and/or enforcement constraints real-world organizations face.
61
Agenda
Background: Cloud Computing Threats to Cloud Security Insider Threats in the Cloud Present, Past, and Future Attacks Threats to Cloud Security 2.0 Future Research
62
Past Threats
Joanna Rutkowska, Black Hat 2006 Blue Pill Infect machine Red Pill Detect infection
Cloudburst
63
Present Threats
US-CERT VU#649219 (CloudBurst) SYSRET 64-bit operating system privilege escalation vulnerability on Intel CPU hardware
64
Future Threats
Provider collusion
65
Future Research
Measurement/metrics Forensics Incident Response SLA enforcement Isolation Attack vectors CSA Reference Architecture ???
66
67
Thank You!
Contact Info: William R. Claycomb [email protected] Lead Research Scientist CERT Insider Threat Research Center Carnegie Mellon University
68