SlideShare a Scribd company logo
1 of 3
Cloud Access Control and the Balance Between Complexity and
Compromise
Many of us inthe securityfieldare addressingthe complexandoftenmisleadingfunctionalityassertions
made by our outsourcedservice providersinthe “cloud” whenitcomesto security. Functionalitylike:
Data Loss Prevention,eDiscovery,Federatedauthenticationaccess,SAML,OAUTH2,etc..
Security…the bugaboointhe “cloud”.
However,there isalotof IT service managementthat formsthe very foundation of security,and
because of that,cloudservicesare becomingextremelyattractive fromasecurityperspective. From
personnel supportcosts,tohardware maintenance,youcanaddresssome of the mostaggressive
securitychallenges we all face byadoptingcloudservices. Andtheyinclude; patching,configuration
management,andinventorycontrol. The topthree SANScontrols. I’ll repeatthat;the topthree (3)
securitycontrols. Despite the concernthatall of us face inmovingto the cloud,there are a lot of
compellingsecurity reasonstodojustthat. E.g. Considerthe benefitsof platformasa service inthe
cloudthe nexttime a HeartBleedbugarisesinthe news,andyourorganizationneedstoaddressit. How
longdidit take to update all of the SSL libraries onyourmyriadwebservers tocalmthe fearsof your
customers,andclients? Innearlyall cases,the PaaScloudofferingshadthe patchand remediation
online within24 hoursof the issue.
Still, like anysecurityblog, thisisacautionarytale focusedonthe concern withwhathappenswhen
thingsare headedinthe wrongdirection,andmore specifically wheretheycangowrong. Because
many of us knowwhathappenswhenoutsourcingsome partof theirservicesandmaintenance toa
thirdparty vendor- you needtounderstandthe riskof doingso. Take Target,for example,puttingtheir
HVACvendoronthe networktomanage theirheating/coolingsystemswhichsubsequentlyledtothe
compromise of theirPoSsystems. Knowingthe riskisthe firststeptowardaddressingthatrisk.
I wantto focus onone area where the riskmay notoutweighthe reward:Cloudaccesssecuritybrokers
(CASB).
A CASBcan addressyour biggestchallenge ineasinguseracceptance of cloudservices –whichis:using
the systemsaseasilyasif theywere inyour owndata center. How manyof youhave beenasked;“why
can’t we have single sign-on(SSO) tothe hostedcorporate website?”Orto Salesforce,or DropBox, or
Google,etc.? A CASBcan provide thatsolution:secure authenticatedaccesstoan externallyhosted
service. Yetlike the hostedserviceitself,itisanothercog inthe machineryof thirdparty vendorsoutof
your control:providingthe enterprisewithclient-to-service authentication,justlikeyourinternal Active
Directorywoulddoforinternal resource access. Onlyinthe cloud.
The old folksfromCambridge willquicklychime intostate – “yup,Kerberos, we getthe idea”- the
OASISgroupin Burlington–“done that withSAML”. It shouldbe clear,that the requirementsto
enablingtransparentauthenticationto externalsystemsandservices have beendefinedfornearly 20
years,thoughonlywithSAML 2.0 hasit been relatively widelyadopted. Andeventhen,itisalot of
efforttoget itto work right. To quote one writer:“itis an extremelycomplex,andobfuscatedprotocol”
basedon XML. Andit isbecause of thiscomplexitythatthe nextgenerationof SSOvendorshave taken
advantage of thisgreat marketopportunity tofill thatgap:Okta,OneLogin,PingIdentity,Netskope
SkyHigh,etc.
To highlightthisconcept;let’suse athirdpartyvendorto handle accesstoanotherthirdparty vendorby
providingourmostsensitiveaccesscontrol:authentication.
To a securityprofessionalthis seemsriskyrightoutof the box. If notfor the concern of; yetanother
thirdparty vendorexacerbatingyourthirdpartyvendorriskfurther,thenbecause thatexternal entityis
gettingaccessto yourmost sensitivedata;authenticationcredentialsfor yourpersonnel. Similarly,it
wouldbe a concernthat such a vendorhad accessto your personnel dataatall. How manyof youwant
the worldto knowwhoyour entire ‘C’levelstaff is,where theyare located,theirphone number,ande -
mail addresses touse forphishing?
Security101 – neverreleasemore informationintothe wild thanwhatisnecessary.
Unfortunately, more informationisjustwhatisneeded;relationalinformation,because itisnotjust
authenticationwe are lookingfor,be authorizationaswell –whatareasof a cloudservice should the
membersof yourenterprise getaccessto? Shoulddeveloperssee the CRMdata enteredinbySales?
How doesone collaborate withmembersinyourgroupwithoutknowingwhothe membersinthat
groupare? Despite the availablestandard, SAMLisonlythe componentof authentication inthe
solutionof cloudservicesaccesscontrol. Whatisalsoneededis authorization. Fortunately, like SAML,
there isa standard forthisportionof the solutionaswell: OAUTH.
Currently manyCASBseschew bothsecurity standards.
The market leadersinthisspace provide anincreasinglynecessary solution thatmanyof usare looking
for: easy accesscontrol to informationinthe cloud.Itis how thisis done thatis the devil inthe details.
Let’slookat the market leaderforthissegment(accordingthe Gartner),OneLogin,forinsightintothis
process(notingrightupfront,that not all CASBsare made the same). OneLogin’s designintroducesa
systemrunninginthe enterprisetoconnectOneLogininthe cloudtothe enterprise’securitydata:
knownas an active directoryconnector(ADC). Touse an engineeringterm;itisa “blackbox”. A non-
standards basedapplicationwhose functionalityisunpublished,andnon-interactive. Itrequires
NetBIOStoidentifythe domainserversinyourenvironment,connecttothem, and subsequently enable
the OneLoginservicesinthe cloudaccesstothat data. Andwhile thatisa bluntassessmentof the
functionality of whatis happening,itisnotthatfar from whata SAML gatewaymight alsoprovide,with
a lot lesseffort.
It ishow thisisdone that isdisquieting.
OneLoginrequiresthisblackbox be equippedwithadomainadministratoraccountto accessyour
domaincontrollerwith. Despite anypublicationsontheirwebsitetothe contrary,any lessprivileged
account causesthe synchronization processtofail. I.e.,if the blackbox,cannotread specificattributes
and Organizational Units(OUs) inyouractive directory,the ADCfails. The ADChasno configurable
settingsforthe user,itis a dumbLDAP replicator;cloningthe clientADinformation fromyourActive
Directory intothe cloud. The cloudhowever, doeshave configurationcontrol, anditcanbe configured
to publish areduced subsetof the over1300 Active Directoryattributesforuse in subsequent
federation. Whatit doeswiththe restof the data fromyour organizationislefttothe imagination. And
thisisparticularlytroublingwhenthe on-premise clientreportsproblemswithreadingOUsthat were
specificallyconfiguredNOTtobe read. Like deletedaccounts. Sothe agenttriestoread AD information
that youspecificallyconfiguredit nottoread regardlessof yourcloudconfigurationsettings. Whether
that isan artifact of the queryandthe agentis subsequentlyfilteringthisdataoutbefore itissentto the
cloudislessimportantthan the fact that data is comingoutof yourActive Directoryandgoingintothe
OneLogininfrastructure that youdonotwant goingthere.
..like all of the accountinformationforyourdomainadministrators. …andyouruserpasswordhashes.
Betteryet, let’stake themtogether:yourdomainadministratorpasswordinformation. How manyof us
are willingtotrusttheirthirdparty vendortothislevel of authenticationinformation? How aboutto a
thirdparty vendorthatis specificallyusedtoenableaccess toyetanotherthirdparty – and isbeingused
by that otherpartyto access yourinformation? Ina federatedcloudmodel,yourcompanymaynotbe
the onlyadministratorsoveryouridentitydata,particularlybecauseyou aretryingto federate access
data.
I wouldargue that thisisnot a good idea. Surprisingly, OneLoginisnotalone inthismodel;Oktaalso
providesanon-standardon-prembox toaccessyourdomainauthenticationcredentials,and according
to Gartner these are the twomarket leadersin thissegmentatthe moment. Perhapsbecause they are
so easyto implement.
For those of you thatlike togo the lastpage and skipthe beginning,let’stake amomenttosummarize
where we are:
1) You have a thirdpartyvendorusinga blackbox construct to access yourmostsensitive data
and senditto the cloud
2) You have no ideawhat isbeingsentoutto the cloud
3) You have no administrative controlsoverthe blackbox todiscoveror control that data
The cold hard truthis this - unlessyoucanconfigure NetBIOSacrossyourfirewalltoisolate thissystem,
youcan’t evenlimitthe impactof whathappenstoyour environmentwhenthe cloudvendorishacked
and those responsible decide totake overthatbox on yourinside network,because youcouldnot
firewall the systemoff. All youknowiswhatisshownona UI inthe cloud to reassure youthatthis
shouldneverhave happened…
Regardlessof where anycontrolsmay infact be withthese companies,thisisanightmare scenariofor
all securitypractitioners. Butthere isa realisticbalance between securityandease-of use,because not
all CASBvendorsfunctioninthisway,manysupportsecuritystandardssuchas SAML 2.0 and OAUTH2 to
achieve whatwe all needtoaccomplish;federation and security.
The point? We live inanincreasinglycomplex environment.Butitisnot necessaryto compromise
security forease-of-use. Thiskindof out-of-the-boxsolution maycome ata steepprice,andinorderto
avoidpayingthatprice,demanda standards-compliantsolutionforall of yourthird-partyvendors
wheneveritispossible. There are manyotherCASBproviders thatcan do thissame functionality
withoutguttingyourenterprisesecuritymodel. If youare curiousas to who,please don’thesitate to
reach outto me viae-mail atdavid.humphrey@hphc.org

More Related Content

What's hot

a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2Mike Revell
 
Cloud Insecurity and True Accountability - Guardtime Whitepaper
Cloud Insecurity and True Accountability - Guardtime WhitepaperCloud Insecurity and True Accountability - Guardtime Whitepaper
Cloud Insecurity and True Accountability - Guardtime WhitepaperMartin Ruubel
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureBurCom Consulting Ltd.
 
With-All-Due-Diligence20150330
With-All-Due-Diligence20150330With-All-Due-Diligence20150330
With-All-Due-Diligence20150330Jim Kramer
 
security_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepapersecurity_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepaperAlan Rudd
 
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Martin Ruubel
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - WebFahd Khan
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperMartin Ruubel
 
Attributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperAttributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperMartin Ruubel
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environmentIaetsd Iaetsd
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataEMC
 
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)Happiest Minds Technologies
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskCloudMask inc.
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranGSTF
 
Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011Atlantic Security Conference
 
Hands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill ChainHands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill ChainSplunk
 
Hands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill ChainHands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill ChainSplunk
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...Ulf Mattsson
 

What's hot (20)

a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2
 
Cloud Insecurity and True Accountability - Guardtime Whitepaper
Cloud Insecurity and True Accountability - Guardtime WhitepaperCloud Insecurity and True Accountability - Guardtime Whitepaper
Cloud Insecurity and True Accountability - Guardtime Whitepaper
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business Secure
 
With-All-Due-Diligence20150330
With-All-Due-Diligence20150330With-All-Due-Diligence20150330
With-All-Due-Diligence20150330
 
security_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepapersecurity_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepaper
 
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 
Attributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperAttributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime Whitepaper
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environment
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud Data
 
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMask
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011
 
Hands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill ChainHands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill Chain
 
Hands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill ChainHands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill Chain
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
 

Similar to OneLogin Review

Network Security
Network SecurityNetwork Security
Network SecurityBeth Hall
 
Protect your Data even under breach
Protect your Data even under breachProtect your Data even under breach
Protect your Data even under breachCloudMask inc.
 
How to implement cloud computing security
How to implement cloud computing securityHow to implement cloud computing security
How to implement cloud computing securityRandall Spence
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...Erin Moore
 
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based   Cloud Computing     Two Aspect Endorsement Access Control for web Based   Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing IRJET Journal
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcriptionService2Media
 
GBS - Prevent network security fires
GBS - Prevent network security firesGBS - Prevent network security fires
GBS - Prevent network security firesKristin Helgeson
 
Hands-On Security - Disrupting the Kill Chain
Hands-On Security - Disrupting the Kill ChainHands-On Security - Disrupting the Kill Chain
Hands-On Security - Disrupting the Kill ChainSplunk
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for GovernmentsCloudMask inc.
 
TierPoint White Paper_With all due diligence_2015
TierPoint White Paper_With all due diligence_2015TierPoint White Paper_With all due diligence_2015
TierPoint White Paper_With all due diligence_2015sllongo3
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementJumpCloud
 
The security of SAAS and private cloud
The security of SAAS and private cloudThe security of SAAS and private cloud
The security of SAAS and private cloudAzure Group
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 
Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?Web Werks Data Centers
 
Hands on Security - Disrupting the Kill Chain Breakout Session
Hands on Security - Disrupting the Kill Chain Breakout SessionHands on Security - Disrupting the Kill Chain Breakout Session
Hands on Security - Disrupting the Kill Chain Breakout SessionSplunk
 

Similar to OneLogin Review (17)

Big security for big data
Big security for big dataBig security for big data
Big security for big data
 
Network Security
Network SecurityNetwork Security
Network Security
 
Protect your Data even under breach
Protect your Data even under breachProtect your Data even under breach
Protect your Data even under breach
 
Wfh remote access tips
Wfh   remote access tipsWfh   remote access tips
Wfh remote access tips
 
How to implement cloud computing security
How to implement cloud computing securityHow to implement cloud computing security
How to implement cloud computing security
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
 
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based   Cloud Computing     Two Aspect Endorsement Access Control for web Based   Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
 
GBS - Prevent network security fires
GBS - Prevent network security firesGBS - Prevent network security fires
GBS - Prevent network security fires
 
Hands-On Security - Disrupting the Kill Chain
Hands-On Security - Disrupting the Kill ChainHands-On Security - Disrupting the Kill Chain
Hands-On Security - Disrupting the Kill Chain
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
 
TierPoint White Paper_With all due diligence_2015
TierPoint White Paper_With all due diligence_2015TierPoint White Paper_With all due diligence_2015
TierPoint White Paper_With all due diligence_2015
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity Management
 
The security of SAAS and private cloud
The security of SAAS and private cloudThe security of SAAS and private cloud
The security of SAAS and private cloud
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?
 
Hands on Security - Disrupting the Kill Chain Breakout Session
Hands on Security - Disrupting the Kill Chain Breakout SessionHands on Security - Disrupting the Kill Chain Breakout Session
Hands on Security - Disrupting the Kill Chain Breakout Session
 

OneLogin Review

  • 1. Cloud Access Control and the Balance Between Complexity and Compromise Many of us inthe securityfieldare addressingthe complexandoftenmisleadingfunctionalityassertions made by our outsourcedservice providersinthe “cloud” whenitcomesto security. Functionalitylike: Data Loss Prevention,eDiscovery,Federatedauthenticationaccess,SAML,OAUTH2,etc.. Security…the bugaboointhe “cloud”. However,there isalotof IT service managementthat formsthe very foundation of security,and because of that,cloudservicesare becomingextremelyattractive fromasecurityperspective. From personnel supportcosts,tohardware maintenance,youcanaddresssome of the mostaggressive securitychallenges we all face byadoptingcloudservices. Andtheyinclude; patching,configuration management,andinventorycontrol. The topthree SANScontrols. I’ll repeatthat;the topthree (3) securitycontrols. Despite the concernthatall of us face inmovingto the cloud,there are a lot of compellingsecurity reasonstodojustthat. E.g. Considerthe benefitsof platformasa service inthe cloudthe nexttime a HeartBleedbugarisesinthe news,andyourorganizationneedstoaddressit. How longdidit take to update all of the SSL libraries onyourmyriadwebservers tocalmthe fearsof your customers,andclients? Innearlyall cases,the PaaScloudofferingshadthe patchand remediation online within24 hoursof the issue. Still, like anysecurityblog, thisisacautionarytale focusedonthe concern withwhathappenswhen thingsare headedinthe wrongdirection,andmore specifically wheretheycangowrong. Because many of us knowwhathappenswhenoutsourcingsome partof theirservicesandmaintenance toa thirdparty vendor- you needtounderstandthe riskof doingso. Take Target,for example,puttingtheir HVACvendoronthe networktomanage theirheating/coolingsystemswhichsubsequentlyledtothe compromise of theirPoSsystems. Knowingthe riskisthe firststeptowardaddressingthatrisk. I wantto focus onone area where the riskmay notoutweighthe reward:Cloudaccesssecuritybrokers (CASB). A CASBcan addressyour biggestchallenge ineasinguseracceptance of cloudservices –whichis:using the systemsaseasilyasif theywere inyour owndata center. How manyof youhave beenasked;“why can’t we have single sign-on(SSO) tothe hostedcorporate website?”Orto Salesforce,or DropBox, or Google,etc.? A CASBcan provide thatsolution:secure authenticatedaccesstoan externallyhosted service. Yetlike the hostedserviceitself,itisanothercog inthe machineryof thirdparty vendorsoutof your control:providingthe enterprisewithclient-to-service authentication,justlikeyourinternal Active Directorywoulddoforinternal resource access. Onlyinthe cloud. The old folksfromCambridge willquicklychime intostate – “yup,Kerberos, we getthe idea”- the OASISgroupin Burlington–“done that withSAML”. It shouldbe clear,that the requirementsto enablingtransparentauthenticationto externalsystemsandservices have beendefinedfornearly 20 years,thoughonlywithSAML 2.0 hasit been relatively widelyadopted. Andeventhen,itisalot of efforttoget itto work right. To quote one writer:“itis an extremelycomplex,andobfuscatedprotocol” basedon XML. Andit isbecause of thiscomplexitythatthe nextgenerationof SSOvendorshave taken advantage of thisgreat marketopportunity tofill thatgap:Okta,OneLogin,PingIdentity,Netskope SkyHigh,etc.
  • 2. To highlightthisconcept;let’suse athirdpartyvendorto handle accesstoanotherthirdparty vendorby providingourmostsensitiveaccesscontrol:authentication. To a securityprofessionalthis seemsriskyrightoutof the box. If notfor the concern of; yetanother thirdparty vendorexacerbatingyourthirdpartyvendorriskfurther,thenbecause thatexternal entityis gettingaccessto yourmost sensitivedata;authenticationcredentialsfor yourpersonnel. Similarly,it wouldbe a concernthat such a vendorhad accessto your personnel dataatall. How manyof youwant the worldto knowwhoyour entire ‘C’levelstaff is,where theyare located,theirphone number,ande - mail addresses touse forphishing? Security101 – neverreleasemore informationintothe wild thanwhatisnecessary. Unfortunately, more informationisjustwhatisneeded;relationalinformation,because itisnotjust authenticationwe are lookingfor,be authorizationaswell –whatareasof a cloudservice should the membersof yourenterprise getaccessto? Shoulddeveloperssee the CRMdata enteredinbySales? How doesone collaborate withmembersinyourgroupwithoutknowingwhothe membersinthat groupare? Despite the availablestandard, SAMLisonlythe componentof authentication inthe solutionof cloudservicesaccesscontrol. Whatisalsoneededis authorization. Fortunately, like SAML, there isa standard forthisportionof the solutionaswell: OAUTH. Currently manyCASBseschew bothsecurity standards. The market leadersinthisspace provide anincreasinglynecessary solution thatmanyof usare looking for: easy accesscontrol to informationinthe cloud.Itis how thisis done thatis the devil inthe details. Let’slookat the market leaderforthissegment(accordingthe Gartner),OneLogin,forinsightintothis process(notingrightupfront,that not all CASBsare made the same). OneLogin’s designintroducesa systemrunninginthe enterprisetoconnectOneLogininthe cloudtothe enterprise’securitydata: knownas an active directoryconnector(ADC). Touse an engineeringterm;itisa “blackbox”. A non- standards basedapplicationwhose functionalityisunpublished,andnon-interactive. Itrequires NetBIOStoidentifythe domainserversinyourenvironment,connecttothem, and subsequently enable the OneLoginservicesinthe cloudaccesstothat data. Andwhile thatisa bluntassessmentof the functionality of whatis happening,itisnotthatfar from whata SAML gatewaymight alsoprovide,with a lot lesseffort. It ishow thisisdone that isdisquieting. OneLoginrequiresthisblackbox be equippedwithadomainadministratoraccountto accessyour domaincontrollerwith. Despite anypublicationsontheirwebsitetothe contrary,any lessprivileged account causesthe synchronization processtofail. I.e.,if the blackbox,cannotread specificattributes and Organizational Units(OUs) inyouractive directory,the ADCfails. The ADChasno configurable settingsforthe user,itis a dumbLDAP replicator;cloningthe clientADinformation fromyourActive Directory intothe cloud. The cloudhowever, doeshave configurationcontrol, anditcanbe configured to publish areduced subsetof the over1300 Active Directoryattributesforuse in subsequent federation. Whatit doeswiththe restof the data fromyour organizationislefttothe imagination. And thisisparticularlytroublingwhenthe on-premise clientreportsproblemswithreadingOUsthat were specificallyconfiguredNOTtobe read. Like deletedaccounts. Sothe agenttriestoread AD information that youspecificallyconfiguredit nottoread regardlessof yourcloudconfigurationsettings. Whether
  • 3. that isan artifact of the queryandthe agentis subsequentlyfilteringthisdataoutbefore itissentto the cloudislessimportantthan the fact that data is comingoutof yourActive Directoryandgoingintothe OneLogininfrastructure that youdonotwant goingthere. ..like all of the accountinformationforyourdomainadministrators. …andyouruserpasswordhashes. Betteryet, let’stake themtogether:yourdomainadministratorpasswordinformation. How manyof us are willingtotrusttheirthirdparty vendortothislevel of authenticationinformation? How aboutto a thirdparty vendorthatis specificallyusedtoenableaccess toyetanotherthirdparty – and isbeingused by that otherpartyto access yourinformation? Ina federatedcloudmodel,yourcompanymaynotbe the onlyadministratorsoveryouridentitydata,particularlybecauseyou aretryingto federate access data. I wouldargue that thisisnot a good idea. Surprisingly, OneLoginisnotalone inthismodel;Oktaalso providesanon-standardon-prembox toaccessyourdomainauthenticationcredentials,and according to Gartner these are the twomarket leadersin thissegmentatthe moment. Perhapsbecause they are so easyto implement. For those of you thatlike togo the lastpage and skipthe beginning,let’stake amomenttosummarize where we are: 1) You have a thirdpartyvendorusinga blackbox construct to access yourmostsensitive data and senditto the cloud 2) You have no ideawhat isbeingsentoutto the cloud 3) You have no administrative controlsoverthe blackbox todiscoveror control that data The cold hard truthis this - unlessyoucanconfigure NetBIOSacrossyourfirewalltoisolate thissystem, youcan’t evenlimitthe impactof whathappenstoyour environmentwhenthe cloudvendorishacked and those responsible decide totake overthatbox on yourinside network,because youcouldnot firewall the systemoff. All youknowiswhatisshownona UI inthe cloud to reassure youthatthis shouldneverhave happened… Regardlessof where anycontrolsmay infact be withthese companies,thisisanightmare scenariofor all securitypractitioners. Butthere isa realisticbalance between securityandease-of use,because not all CASBvendorsfunctioninthisway,manysupportsecuritystandardssuchas SAML 2.0 and OAUTH2 to achieve whatwe all needtoaccomplish;federation and security. The point? We live inanincreasinglycomplex environment.Butitisnot necessaryto compromise security forease-of-use. Thiskindof out-of-the-boxsolution maycome ata steepprice,andinorderto avoidpayingthatprice,demanda standards-compliantsolutionforall of yourthird-partyvendors wheneveritispossible. There are manyotherCASBproviders thatcan do thissame functionality withoutguttingyourenterprisesecuritymodel. If youare curiousas to who,please don’thesitate to reach outto me viae-mail atdavid.humphrey@hphc.org