Cloud Computing Security
Cloud Computing Security
Agenda
Confidentiality
Availability Integrity
4
Confidentiality
Authorized to Know
5
Integrity
Availability
Customer
Data
Customer
Customer
Code
Provider Premises
8
Loss of control
Lack of trust
Multi-tenancy
Insider?
• Malicious employees at client
• Malicious employees at Cloud
provider
• Cloud provider itself
Outsider?
• Intruders
• Network attackers?
14
Attacker Capability: Malicious
Insiders
• At client
Learn passwords/authentication information
Gain control of the VMs
• At cloud provider
Log client communication
15
• What?
Launch DoS
17
Threats
19
Organizing the threats using
STRIDE
• Spoofing identity
●
One person or program successfully pose as another by falsifying
data, thereby gaining an illegitimate advantage
• Repudiation
●
To repudiate means to deny
• Information disclosure
• Denial of service
• Elevation of privilege
20
• Identify Threats
• Identify Countermeasures
• Threats
Laws and regulations may prevent cloud computing
Requirements to retain control
Certification requirements not met by provider
Geographical limitations – EU Data Privacy
●
New locations may trigger new laws and regulations
• Countermeasures
Evaluate legal issues
Require provider compliance with laws and regulations
Restrict geography as needed
23
Integrating Provider and Customer
Security
• Threat
Disconnected provider and customer security systems
Fired employee retains access to cloud
Misbehavior in cloud not reported to customer
• Countermeasures
At least, integrate identity management
Consistent access controls
Better, integrate monitoring and notifications
24
• 4 Cloud Models
Public
Private (internal, external)
Community
●
multi-tenant infrastructure that is shared among
several organizations from a specific group with
common computing concerns.
Hybrid
Legal
• Both parties must understand each other’s roles
Portability, Interoperability
• Business dispute
29
Incident Response
Virtualization