Chapter 17 Cloud Securityand Privacy
Chapter 17 Cloud Securityand Privacy
Introduction
• Previous chapters describe cloud infrastructure, technologies, and the design of cloud-
native software.
o Extensive use of software from the cloud provider and third parties
▪ Traditional IT departments either purchase software from well-known,
trusted suppliers or hire software engineers to create custom software.
▪ Building cloud-native software has added complexity, such as
designing microservices that can be orchestrated leading to many cloud
users now incorporate pieces of open-source software into their
systems. For example, container software can be downloaded from
Docker repositories or GitHub.
o Perimeter security
▪ To prevent outside attackers, organizations deploy perimeter security
mechanisms at each outside connection to control access. Example
perimeter security mechanisms include firewalls, Deep Packet
Inspection (DPI) systems, and scanners used to detect viruses and
other malware in emails and imported files.
▪ Perimeter security extends the idea of insiders/outsiders by making it
especially difficult for an attacker who does not have physical access to
the organization’s IT infrastructure.
• The lack of a physical perimeter has consequences: a tenant cannot divide potential users
into insiders and outsiders or depend on perimeter control mechanisms to stop attackers.
Identity Management
• To remain secure without using separate authentication for each service, an Identity
Management (IdM) software system uses a Single Sign On (SSO), which means a
user has the same login and password credentials for all services.
• An IdM system stores information about each individual, including their login,
password, and access rights and all services use the IdM system (which can be replicated
to handle scale) to ascertain whether a given individual can access the service.
• Accesses to the identity management system use encryption to ensure that the
information is kept safe.
• An IdM system can be designed to return a digital capability. The capability can
be passed to other services, allowing each service to decide whether a user is authorized
to access the service without requiring the user to enter their credentials multiple times
• An IdM system offers convenience for users, while assuring that a user’s access to a
service has been authenticated and the access has been authorized.
• PAM systems log all accesses, providing a detailed record of which individual accessed
a system at a given time. The systems also record failed login attempts, providing a way
to track attackers.
• Some PAM systems provide further checks on the use of accounts and can send an alert
to the manager reporting suspicious activity.
AI Technologies And Their Effect On Security
• Artificial Intelligence (AI) technologies can influence security in negative ways.
Attackers can use AI techniques to bypass safeguards and gain unauthorized access to
data or systems and AI technology can be used to fool employes as well. Deep fakes
using machine learning (ML) systems have been used to obtain confidential data.
• Analytics software determines “normal” behavior, and then looks for exceptions.
• Security analytics software can be context-aware so it can flag any access as unusual
if it does not occur in the usual context.
• Organizations must comply with regulations that require special treatment for some
forms of data (e.g., in the US, HIPAA regulations apply to the collection, storage, and
transmission of data containing individuals’ medical information).
• Privacy is not just about keeping an individual’s data confidential. Because the Internet
contains so much information about individuals, an organization must ask whether any
new data including aggregate statistics can be used in combination with data from
other sources to deduce information about individuals.
o If login credentials are stolen, an attacker can use them to launch attacks
against any web applications the user is authorized for.
o The hardware and software technologies used for virtualization work well, and
most achieve complete isolation. However, flaws, including flaws in the
underlying hardware, allow data to transfer from one application to another
through a side channel.
o Attackers can also try to insert a back door into systems that send copies of
data to the attacker.
Cloud Providers As Partners For Security And Privacy
• When it moves its computing to the cloud, an organization must learn to use the
configuration and management interfaces the provider offers. A new interface can be
difficult to master, and small mistakes can lead to security problems. This becomes
more complex in a multi-cloud environment because security systems available from
one provider may not be available from another.
• To keep attackers at bay, in a traditional IT infrastructure, the IT staff follows the maxim
“trust no outsiders”. However, in a cloud environment, an IT staff becomes dependent
on the cloud provider so they must learn to view the provider as a partner. Specifically,
the tenant specifies its security policies and trusts the provider to help implement the
policies.
• Cooperation with a provider and the tenant is particularly critical when an incident
occurs or when an anomaly has been detected. If a tenant is unable to analyze the
problem, discover the cause, and affect a repair, the problem may be rooted in the
underlying infrastructure where only the provider has the authority needed to diagnose
the cause.
Summary
• The cloud environment poses special concerns for a tenant:
o The tenant has less control and visibility into the underlying systems, making it
difficult to diagnose problems.
o Because a tenant must share the infrastructure with outsiders, potential attackers
have much closer proximity to the tenant’s systems.
o The remote user access mandated by cloud means a tenant must ensure
confidentiality of business data while allowing employees to communicate over
the Internet.
o A tenant must depend on software from the cloud provider and third parties.
• Traditional security divides users into insiders who work for the organization
(employees and contractors) and outsiders who have no relationship to the organization.
However, in a cloud environment, where potential attackers may have access to shared
networks, using the insider/outsider distinction does not provide sufficient security.
• With zero trust, a tenant uses an identity management system that controls each user’s
access rights, allowing fine-grained restrictions. A Privileged Access Management
system handles administrative (superuser) privileges and logs all accesses.
• Artificial Intelligence technologies can be used both to break security and to strengthen
security. Attackers use AI schemes to probe vulnerabilities. Organizations use AI
technologies, especially machine learning, to detect anomalous behavior of users,
applications, and network traffic. AI technologies can also use the context in which
accesses occur to identify anomalies.
• Encryption and Virtual Private Network technologies can keep data confidential when
an employee uses remote access. In addition, an organization must take steps to prevent
outsiders from accessing data on a user’s device. An organization can use workflow
security, which means a security policy stays with data, even if the data moves to
an employee’s device.
• The availability of many information sources makes privacy difficult, particularly when
it is possible to combine such things as statistical aggregates of data with other sources
of information to associate facts with specific individuals.
• Cloud complicates privacy by increasing the risk of back doors and side channels
through which personal data can leak. Although most virtualization technologies
provide the needed isolation for applications, flaws in hardware and software can
create side channels.
• Learning to use the provider’s interfaces for configuration and management can be
difficult, and configuration errors can cause security problems. When defining security
in a cloud environment, a tenant must change the philosophy of not trusting any
outsiders and learn to view the cloud provider as a partner who can help ensure systems
follow the tenant’s security policies and who can identify and repair problems in the
underlying infrastructure.