Week 13 - Cloud
Week 13 - Cloud
ITSS 4362
Cloud Security
Professor Khan
Introduction
Learning Objectives
• Understand and apply Cloud Technology
• What is it?
• How can it be used?
• Pros and Cons
• Understand and apply Cloud Security Principles
• Security concepts
• How to protect
• Threat vectors
Cloud Computing
Ubiquitous Accessibility – Internet, and perform same task from any where and using any network device
Improves collaboration
Security ***
Cloud Computing Potential Disadvantages
Platform unity
Data
Platform
concentration
strength
for mobile users
Uniform, Specialized
secured technical
endpoints resources
Backup, Recovery
Resource
and Incident
Availability
Processes
What Comprises Cloud Computing?
resources.
– Reliability
– Cost Efficiency
Cons:
– Security
– Control
Private Clouds
• Built for only one client.
provider.
– Control / Security
– Availability
– Speed of Access
Cons:
– Scalability
– Maintenance
Community Cloud
– Security
– Legal/compliance
Cons
– Development
– Cost
Hybrid Clouds
public cloud.
– High performance:
– Expanded capacity
– Scalability
– Security
– Low cost
Cons:
– Complex SLAs
– Complex networking
Market Domination
If cloud computing is so great, why isn’t everyone doing it?
• Uncertainty:
– The cloud acts as a big black box, nothing inside the cloud is visible to the clients
• Malicious Actors:
– Even if the cloud provider is honest, it can have malicious system admins who
can tamper with the VMs and violate confidentiality and integrity
• Threats:
– Clouds are still subject to traditional data confidentiality, integrity,
availability, and privacy issues, plus some additional attacks
Causes of Problems Associated with Cloud Computing
• User access control rules, security policies and enforcement are managed by
– Resource availability
Integrity
• How do I know that the cloud provider is doing the computations correctly?
• How do I ensure that the cloud provider really stored my data without tampering
with it?
Availability
• Will critical systems go down at the client, if the provider is attacked in a Denial of
Service attack?
• What happens if cloud provider goes out of business?
• Would cloud scale well-enough?
Taxonomy of Fear (cont.)
The CSA(Cloud Security Alliance) has identified "The Notorious Nine", the
top 9 cloud computing threats
1. Data Breaches
2. Data Loss
3. Account Hijacking
4. Insecure APIs
5. Denial of Service
6. Malicious Insiders
7. Abuse of Cloud Services
8. Insufficient Due Diligence
9. Shared Technology Issues
Data Breaches/Loss
Threat:
• If an attacker gains access to the credentials, they can eavesdrop on your activities and
transactions, manipulate data, return falsified information, and redirect your clients to
illegitimate sites.
• Using the credentials and passwords for longer time without changing and reusing the
same for different accounts makes this type of attack easy.
Remediation:
• Following the password rules to create strong passwords
• Changing the passwords timely
• Prohibiting the use of passwords on unknown machines and sharing of the passwords
with other users
• Multi Factor Authentication
Insecure APIs
Threat:
• The security of the cloud services is dependent on how secure is their Application
Programming Interface API’s
• Accidental and malicious attempts must be taken into consideration when designing
the APIs
• Organizations are facing a variety of authenticity, confidentiality, and integrity, issues
due to their dependence on a weak set of APIs
Remediation:
• Analyze the security model of cloud provider interfaces.
• Ensure strong authentication and access controls are implemented in concert with
encrypted transmission
Denial of Service
Threat:
• Distributed Denial of Service (DDoS) Attacks
• Preventing users from accessing cloud services.
• Using resource exhaustion attacks or software vulnerability attacks.
• The cloud becomes irresponsive or legal users will pay more for using more resources
Remediation:
• Anomalous Behavior Analysis (ABA)
• Intrusion Tolerance by using diversity and redundancy
Malicious Insiders
Threat:
• Malicious insider threat is well-known to most organizations.
• A provider may not reveal how it grants employees access to physical and virtual
assets, how it monitors these employees, or how it analyzes and reports on policy
compliance.
• This kind of situation clearly creates an attractive opportunity for hobbyist hacker.
Remediation:
• Human resource required specifications should be part of legal contract.
• Cloud Service Provider should provide transparently all security and management
• practices
Abuse of Cloud Services
Threat:
• The registration process for cloud resources has become so easy that anyone with a
valid credit card can register and immediately begin using services.
• Thus, spammers, malicious code authors, and other criminals have been able to
conduct their activities with relative impunity
• Thus PaaS and IaaS providers are suffering from these kind of attacks.
Remediation:
• Strict initial registration and validation
• Enhanced credit card fraud monitoring and coordination
• Constant monitoring of customer network traffic.
• Monitoring public blacklists for one’s own network blocks
Insufficient Due Diligence
Threat:
• Organizations moving fast toward the cloud for its cost reductions, operational
• efficiencies and improved security.
• However, without a full understanding of the cloud service provider environment
• and responsibilities, they are increasing their risk.
Remediation:
• Organizations need to understand the risk of moving to the cloud.
• 24/7 Continuous Monitoring, Analysis, and Mitigation
Shared Technology Vulnerabilities
Threat:
• Cloud Service Providers deliver their services in a scalable way by sharing
infrastructure.
• Cloud services depend on utilizing virtualization.
• Virtualization Hypervisors, like any other software, have flaws that allow attackers
with access to the guest operating system to attack the host.
• This impacts the operations of other cloud customers and allow attackers to gain
access to unauthorized data.
Remediation:
• Implementing and applying security best practices for both the installation and
configuration processes
• Continuously monitoring for the environment to detect unauthorized activities.
• Enforcing strict access control and strong authentication for all critical operations.
• Continuously searching for vulnerabilities and threats
Unknown Risk Profile
The features and functionality of the cloud services are well informed to the customer, but
the details of internal security procedures, auditing, logging, internal access control
remains unanswered leaving customers with an unknown risk profile
• Strong info sec practices allow for better integrations and utility