OWASP Cloud Top 10
OWASP Cloud Top 10
org
Ludovic Petit
SFR
Chapter Leader OWASP France
OWASP Global Connections Committee
[email protected]
About me
• Motivation
• Cloud Top 10 Security Risks
• Summary & Conclusion
• Q&A
Motivation
rganization that chooses to use a public cloud for hosting its business service loses control o
poses critical security risks that the organization needs to carefully consider and mitigate.
Once the data entrusted to a third operator, what are the guarantees that you will recover
information?
very important for the enterprises to keep control over user identities as they move services
cations to the different cloud providers.
er than letting Cloud providers create multiple islands of identities that become too comple
age down the line.
s should be uniquely identifiable with a federated authentication (e.g. SAML) that works across
d providers.
experience is enhanced when he/she does not manage multiple userids and credentials. This al
r back-end data integrations between cloud provides.
R3. Legal & Regulatory Compliance
that is perceived to be secure in one country may not be perceived secure in another du
rent regulatory laws across countries or regions.
nstance, European Union has very strict privacy laws and hence data stored in US may not co
those EU laws.
R4. Business Continuity & Resilency
ness Continuity is an activity an IT organization performs to ensure that the business can
ucted in a disaster situation.
se of an organization that uses cloud, the responsibility of business continuity gets delegated to
d provider.
s personal data gets stored in the cloud as users start using social web sites. Most of the social
ague about how they will handle users personal data.
ionally most of the social sites go with the default share all (least restrictive) setup for the user.
nkedIn, Twitter, Facebook it is very easy to deduct personal details of the users.
need to ensure with your Cloud providers what data can or cannot be used by them for secon
oses.
cludes data that can be mined directly from user data by providers or indirectly based on
vior (clicks, incoming outgoing URLs, etc.).
y social application providers mine user data for secondary usage e.g. directed advertising
der when many of us use their personal gmail/hotmail or yahoo account to tell a friend your vaca
s and immediately you start seeing advertisements on hotels/flights near your destination.
R6. Service & Data Integration
nizations must be sure that their proprietary data is adequately protected as it is transfe
een the end user and the cloud data center.
e interception of data in transit should be of concern to every organization, the risk is much gre
rganizations utilizing a Cloud computing model, where data is transmitted over the Internet.
-tenancy in Cloud means sharing of resources and services among multiple clients (
orking, storage/databases, application stack).
creases dependence on logical segregation and other controls to ensure that one tenant deliber
advertently can not interfere with the security (confidentiality, integrity, availability) of the o
nts.
R8. Incidence Analysis & Forensics
e event of a security incident, applications and services hosted at a Cloud provider are difficu
tigate as logging may be distributed across multiple hosts and data centers which could be loc
rious countries and hence governed by different laws.
along with log files, data belonging to multiple customers may be co-located on the same hard
storage devices and hence a concern for law enforcing agencies for forensic recovery.
R9. Infrastructure Security
frastructure must be hardened and configured securely, and the hardening/configuration base
ld be based on Industry Best Practices.
cations, Systems and Networks must be architected and configured with tiering and security zo
access must be configured to only allow required network and application protocols.
licy and process must be in place for patching/security updates, and can based on risk/th
ssments of new security issues.
ugh the fine details of the items above must be regarded as highly sensitive information,
onable to expect a customer to want to see at least the high-level details.
non-production environments are generally not secured to the same extent as the produ
onment.
organization uses a Cloud provider for such non-production environment, then there is a high
authorized access, information modification, and information theft.
Summary &
Conclusion
Summary
oud computing is a new way of delivering computing resources, not a new technology.
puting services (ranging from data storage and processing to software, such as email handling
available instantly, commitment-free and on-demand.