Unit-8 - Threats Security Mechanism
Unit-8 - Threats Security Mechanism
Module: Security
Cloud Computing Reference Model
Security Cross-layer Function
Module: Security
Lesson: Introduction to Cloud Security
This lesson covers the following topic:
• Key information security terminologies
Module: Security
Drivers for Securing Cloud Infrastructure
Module: Security
Information Security
Information Security
A term that includes a set of practices that protect information and information systems from
unauthorized access, use, information disclosure, disruption, modification, or destruction.
— US Federal law (Title 38 Part IV, Chapter 57, Subchapter III USC 5727)
Module: Security
Key Terminologies of Information Security
Module: Security
Confidentiality, Integrity, and Availability
• Confidentiality
– Provides required secrecy of information
– Ensures only authorized users have access to data
• Integrity
– Ensures unauthorized changes to data are not allowed
• Availability
– Ensures authorized users have reliable and timely access to resources
Module: Security
Authentication, Authorization, and Auditing
• Authentication
– Process to ensure users or assets are who they claim to be
– Two methods: single-factor and multi-factor
• Authorization
– Process of determining access rights of a user, device, application, or process to a
service or resource
– Authorization should be performed only if authentication is successful
• Auditing
– Process to evaluate the effectiveness of security enforcement mechanisms
Module: Security
Defense-in-depth
Defense-in-depth
A strategy in which multiple layers of defense are deployed throughout the infrastructure to help
mitigate the risk of security threats in case one layer of the defense is compromised.
Module: Security
Trusted Computing Base (TCB)
Trusted Computing Base
A set of all those components that are critical to the security of the cloud infrastructure.
Module: Security
Secure Multi-tenancy
• Requires mechanisms that prevent a tenant or its process from affecting another
tenant’s information/process
• Providers are responsible for ensuring secure multi-tenancy
Key focus areas Description
Availability • Ensures that resources are accessible to all consumers by adhering to BC practices
Service assurance • Ensures that SLOs are met by dedicating runtime resources and QoS control
Management • Enables end-to-end infrastructure and service management for service providers
• Provides ability to delegate day-to-day management activities to the consumers
Module: Security
Velocity-of-attack
Velocity-of-attack
Refers to a situation where an existing security threat in a cloud may spread rapidly and have large
impact.
• Mitigation requires:
– Strong and robust security enforcement
– Containment mechanisms
Module: Security
Information Assurance
Module: Security
Data Privacy
Module: Security
Data Ownership
• Data ownership remains with the creator based on factors such as:
Data created on- – Contractual ownership
premise and then
– Copyright law
stored in the
cloud – Trade secret
– Intellectual property
• Determination of who owns the data depends on:
Data created in – Terms of services (defined in service contract)
the cloud
– Type of information
environment
– Country in which it is generated and stored
Module: Security
Security Concepts and Relationships
Module: Security
Lesson Summary
During this lesson the following topics were covered:
• Confidentiality, integrity, and availability
• Authentication, authorization, and auditing
• Defense-in-depth and trusted computing base
• Multi-tenancy and velocity of attack
• Information assurance
• Data ownership and data privacy
Module: Security
Lesson: Cloud Security Threats
This lesson covers the following topic:
• Key threats in a cloud environment
Module: Security
Key Security Threats in a Cloud
Environment
• Key security threats according to CSA and ENISA
– Data leakage
– Data loss
– Account hijacking
– Insecure APIs
– Malicious insiders
– Denial of service
– Abuse of cloud services
– Shared technology vulnerabilities
– Insufficient due diligence
– Loss of governance and compliance
Module: Security
Data Leakage
Module: Security
Data Loss
Module: Security
Account Hijacking
Module: Security
Insecure APIs
Module: Security
Denial of Service (DoS) Attack
Module: Security
Distributed Denial of Service (DoS) Attack
Module: Security
Malicious Insiders
Malicious Insiders
Module: Security
Abuse of Cloud Services
Module: Security
Insufficient Due Diligence
• Understanding the full scope of the undertaking while offering cloud services
• Increase risks if services are offered without complete understanding of
operational responsibilities such as:
– Incident response
– Encryption
– Governance and compliance
– Security monitoring
Module: Security
Shared Technology Vulnerabilities
Module: Security
Loss of Compliance
Loss of Compliance
Occur when a cloud service provider or cloud broker does not adhere to, and demonstrating
adherence to external laws and regulations as well as corporate policies and procedures.
Module: Security
Loss of Governance
Module: Security
Lesson Summary
During this lesson the following topics were covered:
• Data leakage and data loss
• Account hijacking and insecure APIs
• Malicious insiders and denial of service
• Abuse of cloud services and shared technology vulnerabilities
• Insufficient due diligence
• Loss of compliance and governance
Module: Security
Lesson: Security Mechanisms – I
This lesson covers the following topics:
• Physical security
• Identity and access management
Module: Security
Introduction to Security Mechanisms
Mechanisms Description
Security and personnel policies or standard procedures to direct the safe execution of
Administrative
various operations
Usually implemented through tools or devices deployed on computer systems, networks,
Technical
or storage
Module: Security
Key Security Mechanisms
• Physical security • Virtual LAN and virtual SAN
• Identity and access management • Zoning and iSNS discovery domain
• Role-based access control • Security hypervisor and management server
• Network monitoring and analysis • Virtual machine hardening
• Firewall • Securing operating system and applications
• Intrusion detection and prevention system • LUN masking
• Adaptive security • Data encryption
• Port binding and fabric binding • Data shredding
• Virtual private network
Module: Security
Physical Security
Module: Security
Identity and Access Management
Identity and Access Management
A process of managing consumers’ identifiers, and their authentication and authorization to access
cloud resources.
Restricts accessibility and sharing of files Windows ACLs, UNIX permissions, and
Authorization
and folders OAuth
Module: Security
Windows ACL and UNIX Permission
Windows ACL UNIX Permission
• Types of ACLs: • Common permissions:
– DACL: determine access control Read/Write/Execute
– SACL: determine what accesses needs • Specify operations by ownership relation
to be audited with respect to a file:
– What the owner can do?
• Support object ownership in addition to
– What the owner group can do?
ACLs
– What everyone else can do?
– Child objects inherit ACL of parent
object
Module: Security
OAuth
OAuth
An open authorization mechanism allows a client to access protected resources from a resource
server on behalf of a resource owner.
• Entities involved in
authorization:
– Resource owner
– Resource server
– Client
– Authorization server
Module: Security
Multi-factor Authentication
Module: Security
Kerberos
Kerberos
Module: Security
Challenge Handshake Authentication
Protocol
• Provides a method for initiators and targets to authenticate each other by
utilizing a secret code
Module: Security
OpenID
OpenID
An open standard for authentication in which a service provider uses authentication services from
an OpenID provider.
Module: Security
Lesson Summary
During this lesson the following topics were covered:
• Physical security
• Windows ACLs and UNIX permissions
• OAuth
• Multi-factor authentication
• Kerberos and CHAP
• OpenID
Module: Security
Lesson: Security Mechanisms – II
This lesson covers the following topics:
• Role-based access control
• Network monitoring and analysis
• Firewall and intrusion detection and prevention system
• Adaptive security
• VPN, VLAN, VSAN, zoning and iSNS discovery domain
• Port binding and fabric binding
Module: Security
Key Security Mechanisms
• Physical security • Zoning and iSNS discovery domain
• Identity and access management • Port binding and fabric binding
• Role-based access control • Security hypervisor and management server
• Network monitoring and analysis • Virtual machine hardening
• Firewall • Securing operating system and applications
• Intrusion detection and prevention system • LUN masking
• Adaptive security • Data encryption
• Virtual private network • Data shredding
• Virtual LAN and virtual SAN
Module: Security
Role-based Access Control
Module: Security
Network Monitoring and Analysis
Active Monitoring tools transmit data between two endpoints that are monitored
Passive Information about a link or device is collected by probing the link or device
Module: Security
Firewall
Firewall
A security mechanism designed to examine data packets traversing a network and
compare them to a set of filtering rules.
Module: Security
Firewall
Demilitarized Zone
Module: Security
Intrusion Detection and Prevention System
Intrusion Detection and Prevention System
A security tool that automates the process of detecting and preventing events that can compromise
the confidentiality, integrity, or availability of IT resources.
Module: Security
Intrusion Detection and Prevention System
Types of implementations
IDPS Implementation Description
Module: Security
Adaptive Security
Adaptive Security
A mechanism that integrate with the cloud service providers’ standalone mechanisms such as
IDPS and firewalls and use heuristics to learn user behavior and detect fraudulent activity.
Module: Security
Virtual Private Network
Module: Security
Virtual LAN and SAN
Module: Security
Zoning
Module: Security
iSNS Discovery Domain
Module: Security
Port Binding
• Port binding limits the devices that can be attached to a specific switch port
Module: Security
Fabric Binding
Module: Security
Lesson Summary
During this lesson the following topics were covered:
• Role-based access control
• Network monitoring and analysis
• Firewall, IDPS, and adaptive security
• Port binding and fabric binding
• VPN, VLAN, and VSAN
• Zoning and iSNS discovery domain
Module: Security
Lesson: Security Mechanisms – III
This lesson covers the following topics:
• Security hypervisor and management server
• Virtual machine hardening
• Securing operating system and applications
• LUN masking
• Data encryption
• Data shredding
Module: Security
Key Security Mechanisms
• Physical security • Virtual LAN and virtual SAN
• Identity and access management • Zoning and iSNS discovery domain
• Role-based access control • Security hypervisor and management server
• Network monitoring and analysis • Virtual machine hardening
• Firewall • Securing operating system and applications
• Intrusion detection and prevention system • LUN masking
• Adaptive security • Data encryption
• Port binding and fabric binding • Data shredding
• Virtual private network
Module: Security
Securing Hypervisor and Management
Server
• Compromising a hypervisor or management server places all VMs at risk
• Control measures:
– Install security-critical hypervisor updates
– Harden hypervisor using specifications provided by CSI and DISA
– Restrict core functionality to selected administrators
– Encrypt network traffic when managing remotely
– Deploy firewall between management system and rest of the network
– Rotate or delete log files when they reach a certain size
Module: Security
Virtual Machine Hardening
Module: Security
Securing Operating Systems and
Applications
• Three key security mechanisms for OS and application:
– Hardening OS and applications
– Malware protection software
– Sandboxing
Module: Security
Hardening OS and Applications
• OS hardening:
– Configure system and network components as per a hardening checklist provided
by CIS and DISA
– Delete unused files and applications, and install current OS updates
– Perform vulnerability scan and penetration test to identify existing vulnerabilities
• Application hardening:
– Design with proper architecture, threat modeling, and secure coding
– Installing current application updates
Module: Security
Malware Protection Software
Module: Security
Sandboxing
Module: Security
LUN Masking
LUN Masking
Refers to the assignment of LUNs to specific host bus adapter world-wide names.
Module: Security
Data Encryption
Data Encryption
Module: Security
Data Shredding
Data Shredding
A process of deleting data or residual representations (sometimes called remanence) of data and
making it unrecoverable
Module: Security
Security as a Service
Security as a Service
Refers to the provision of security applications and services via the cloud either to cloud-based
infrastructure and software or from the cloud to the customers’ on-premise systems. This will
enable enterprises to make use of security services in new ways, or in ways that would not be cost
effective if provisioned locally.
— Cloud Security Alliance, “Security as a Service” Version 1.0 (2011)
Module: Security
Lesson Summary
During this lesson the following topics were covered:
• Security hypervisor and management server
• Virtual machine hardening
• Securing operating system and applications
• LUN masking and data encryption
• Data shredding and security as a Service
Module: Security
Lesson: Governance, Risk, and
Compliance (GRC)
This lesson covers the following topics:
• Focus areas of cloud governance
• Key steps of risk management
• Types of compliance that control IT operations in cloud
• Key auditing activities in cloud
Module: Security
Introduction to GRC
GRC
A term encompassing processes that help an organization to ensure that their acts are ethically
correct and in accordance with their risk appetite (the risk level an organization chooses to
accept), internal policies and external regulations.
Module: Security
Governance
Governance
Determine the purpose, strategy, and operational rules by which companies are directed and
managed.
Module: Security
Risk Management
Risk and Risk Management
Risk is the effect of uncertainty on business objectives. Risk management is a systematic process
of assessing its assets, placing a realistic valuation on each asset, and creating a risk profile that is
rationalized for each information asset across the business.
Module: Security
Compliance
Compliance
Act of adhering to, and demonstrating adherence to, external laws and regulations, corporate
policies and procedures, service provider's own demands, consumers' demands, and/or the
demands of participating cloud providers (in case of hybrid cloud and cloud brokers).
Module: Security
Compliance Management
Compliance Management
Ensures that the cloud services, service creation processes, and cloud infrastructure resources
adhere to relevant policies and legal requirements.
Module: Security
Auditing
Auditing
A process that determines the validity and reliability of information about the enforcement of
controls presented by a provider. Audit also provides an assessment of the cloud provider’s
control mechanisms and their ability to provide the consumers, the logs required to verify the
mechanisms.
Module: Security
Key Auditing Activities in the Cloud
Security Audit
Module: Security
Key Auditing Activities in the Cloud
Privacy Audit
Module: Security
Lesson Summary
During this lesson the following topics were covered:
• Governance in the cloud
• Risk management for the cloud
• Compliance for the cloud
• Cloud auditing
Module: Security
Concepts in Practice
• RSA SecurID
• RSA Security Analytics
• RSA Archer eGRC
• RSA Adaptive Authentication
• VMware vCloud Networking and Security
Module: Security
RSA Security Products
Module: Security
RSA and VMware Security Products
Module: Security
Module Summary
Key points covered in this module:
• Key security terminologies
• Key security threats in the cloud
• Security mechanisms for the cloud
• Governance, risk, and compliance
Module: Security