SlideShare a Scribd company logo
1 of 114
Security in the Cloud 
Akash Mahajan
Akash Mahajan - Profile 
Heard of that Web App Security Guy? 
Am the chapter lead for OWASP Bangalore 
Co-founded a security community; null 
Kick-started an eco system for start-ups 
Ever attended a Startup Saturday? 
Realized that I love to learn about security!
You will not learn anything new today 
The interesting part is learning why you 
won’t learn anything new today
WHAT IS CLOUD COMPUTING?
“Today Internet is Cloud CD Based, if you use Google 
your docs get stored in cloud, have you ever seen 
Google software CD? No it’s not here, it’s in the 
cloud. Called as Cloud CD! When you check, it 
Cloud gives error because it is raining!!!! ” 
- Vishwa Bandhu Gupta
Cloud computing is computing in which large 
groups of remote servers are networked to 
allow the centralized data storage, and 
online access to computer services or 
resources. 
- From http://en.wikipedia.org/wiki/Cloud_computing
How is Cloud Computing different 
From? 
Grid computing 
Distributed computing 
Large Scale Clusters
Elasticity 
is the degree to which a system is able 
to adapt to workload changes
How do we get Elasticity? 
by provisioning and de-provisioning resources 
in an autonomic manner, such that at each 
point in time the available resources match 
the 
current demand as closely as possible.
Autonomic Manner 
The system makes decisions on its own, 
using high-level policies; it will 
constantly check and optimize its 
status and automatically adapt itself to 
changing conditions.
AWS Auto-scale – Example of Elasticity
The tech behind 
cloud computing 
is not new
WHAT MAKES UP THE CLOUD 
COMPUTING STACK?
Virtualization 
The main enabling technology for cloud computing
Service Oriented 
Architecture 
(SOA) 
Breaking of business problems into services that can 
be integrated
Programmable 
APIs 
Ability to interact with the services offered using 
programs and the libraries provided
Management 
Layer 
Ability to interact with the services offered using a 
web based front-end for management & billing
High Speed 
Networks 
All of the above talk to each other using 
high speed networks
Cloud Computing Stack 
Management Layer 
Programmable APIs 
Service Layer 
OS Level Virtualization
OS LEVEL VIRTUALIZATION
What is Virtualization? 
it separates a physical 
computing device into one or 
more "virtual" devices
OS Level Virtualization 
It essentially creates a scalable 
system of multiple 
independent computing 
devices.
OS Level Virtualization 
Idle computing resources can be 
allocated and used more efficiently
Virtualization provides agility 
• Speed up IT operations 
• Reduces cost by 
increasing 
infrastructure utilization
Virtualization provides automation 
• Computing automates the process through 
which the user can provision resources on-demand. 
• By minimizing user involvement, 
automation speeds up the process, reduces 
labor costs and reduces human errors
SERVICE ORIENTED ARCHITECTURE 
FOR CLOUD SERVICES
What does SOA contain?
Compute 
processor , random access 
memory,
Storage 
persistent, redundant, 
scalable, infinite and cheap
Network 
all pervasive, based on TCP/IP 
gigabit fast and more
Management 
what we use to manage or 
work with the service
Metrics and Measured Service 
billing is like utility services 
and every service is 
measurable
PROGRAMMABLE APIS AND 
MANAGEMENT LAYER
Programmable APIs 
Start, stop, pause virtual 
servers 
ec2-run-instances 
gcloud compute instances create
Management Layer 
Basically a web based control panel
Management Layer
SERVICE MODELS
Cloud Service Models
Software As A Service 
Meant for end users to consume a service 
using applications and data storage
Platform As A Service 
Meant for developers to utilize an integrated 
development platform and framework
Infrastructure As A Service 
Basic Cloud Service building blocks are given 
like server instance, storage and network
DEPLOYMENT MODELS FOR THE 
CLOUD
Cloud can be in your office too
Deployment Models 
• Public 
• Private 
• Hybrid
Public Cloud 
A cloud is called a "public cloud" when the 
services are rendered over a network that is 
open for public use.
Private Cloud 
Private cloud is cloud infrastructure operated 
solely for a single organization, whether 
managed internally or by a third-party, and 
hosted either internally or externally
Hybrid Cloud 
Hybrid cloud is a composition of two or more 
clouds (private, community or public) that 
remain distinct entities but are bound 
together, offering the benefits of multiple 
deployment models.
We will restrict our discussion about the security of the public cloud 
SECURITY IN THE PUBLIC CLOUD
Shared Sense of 
Security 
Public cloud vendors and customers have a shared 
sense of security
Shared 
Responsibility of 
security 
Public cloud vendors and customers have to share 
security responsibility
Division of Responsibility
Amazon AWS takes care of 
• Physical Security (Nobody should walk away 
with the server including Govt.) 
• Host OS which runs the virtualization software 
• Virtualization Security (Rogue VMs can't harm 
others)
Amazon AWS takes care of 
• Environmental Safeguards (DC is safe to run 
servers) 
• Administrative Controls (Policies and 
Procedures) 
• Certifications and Accreditations (SAS70, SOC1, 
PCI, ISO27K1)
You take care of 
• Guest OS (The Compute instance) 
• Application Security (The application on the 
compute instance) 
• Data Security (The data being generated, 
processed by the application) 
• Network security for the guest & 
applications 
• Security Monitoring of Guest OS & 
applications
A few public cloud vendors
Does Cloud Need 
Security? 
Wrong question to ask, the question should be…
Do we need to 
worry about our 
data, our infra, our 
apps stored in the 
public cloud?
Our apps in the public cloud 
• This applies only to IAAS and PAAS as in 
SAAS it is not our application 
• An in secure app can expose underlying 
infrastructure and data to theft, corruption 
and exposure
Security Testing of Apps 
• No different from testing any application for 
security 
• We might require permission to run 
automated scanners against the app 
• Ideal framework to test against is OWASP 
Top 10 and OWASP Testing Guide
App Insecurity Scenario 
• App has a Local File Inclusion bug 
• The AWS root credentials are being used 
• They are stored in a world readable file on the 
server 
• Attacker reads the credentials and starts 
multiple large instances to mine bitcoins 
• Victim saddled with a massive bill at the end of 
the month
Our infra in the public cloud 
• This applies only to IAAS as in SAAS and 
PAAS it is not our application or infra 
• Infrastructure vulnerabilities can derail any 
app security in place.
Security Testing of Infra 
• No different from testing server for security 
• We may require permission to run 
automated scanners against the server 
• Ideal framework to test against is any 
Penetration Testing Standard PTES / 
OSSTMM
Infra Insecurity Scenario 
• MySQL Production database is listening on external 
port 
• Developers work directly on production database 
and require SQL Management Software 
• They log in using the root user of MySQL Database 
server and a simple password 
• Attacker runs a brute force script and cracks the 
password, gains full access to the database
HEARTBLEED – AN ILLUSTRATION OF AN 
INFRASTRUCTURE VULNERABILITY
Servers (Infra) 
were leaking 
sensitive 
information
What kind of information? 
• Session IDs 
• Usernames 
• Password 
• Server Certificate’s Private Keys
CloudFlare hosted a vulnerable server 
A security researcher sent 2.5 million requests 
and got the private keys
What is the big deal about that? 
• Private Keys for the SSL certificate 
can decrypt all past and future traffic 
• Private Keys allow for impersonation of that 
service as well. 
• What if some website could pretend to be 
https://examplebank.com ?
Armature Hour at AWS 
• https://opbeat.com/blog/posts/amateur-hour- 
at-aws/ 
• Amazon AWS took about 48 hours after 
everyone knew about Heartbleed to patch 
its servers and inform its customers 
• This caused a lot of heart-ache and pain for 
its customers
Our data in the public cloud 
• This applies only all PAAS, IAAS and SAAS 
• Our data can get leaked, exposed, stolen, 
held ransom if we don’t take care of making 
sure it is safe while being used, while being 
transmitted and while being stored
Verifying Data Security through Testing 
• This is a specialized testing requirement. A part 
of this can be tested by looking at the system 
and application architecture 
• All the places where the data can be written, 
sent, travel need to be looked at. 
• Writing to storage, exposing APIs, backups and 
even insider threats
Verifying Data uses Encryption 
• Data at rest is encrypted 
– This will ensure that if an attacker has access to the 
disk/store, they can’t use the data 
• Data in motion is encrypted 
– This will ensure that if an attacker can sniff the network 
traffic they can’t see &tamper the data 
• Data in use (tmp files, key loaded in memory) 
– This will ensue that if an attacker can’t do catastrophic 
damage if they manage to gain access to a server
Secure Key Management 
• Once we start using encryption for data 
storage and data transmission, the encryption 
keys need to be safeguarded against theft, 
accidental loss 
• A secure key management process will ensure 
that at any point keys can be revoked and 
reissued
Data Insecurity Scenario 
• Database is getting backed up regularly. 
• Due to performance reasons, database 
wasn’t encrypted when initial backups were 
done. 
• Dev team moves to newer type SSDs and 
doesn’t decommission older HDDs. 
• Attacker finds older HDD, does forensics for 
data recovery and sell the data for profit.
Cloud versus the IT department
How does being in 
the cloud change 
the traditional IT 
department?
How do IT 
departments 
manage cloud 
instances & data?
Does the company 
Info sec policy still 
apply?
Does the Countries 
cyber laws still 
apply?
How to applications get attacked?
What are the frameworks for testing cloud? 
Can we follow some best practices ? 
HOW DO YOU TEST FOR SECURITY?
Cloud Security Alliance 
• Security Guidance Document 
• https://cloudsecurityalliance.org/guidance/ 
csaguide.v2.1.pdf 
• Covers 13 Critical Area Domains
European Network and Information Security 
Agency (ENISA) 
• Cloud Computing Information Assurance 
Framework 
• http://www.enisa.europa.eu/activities/risk-management/ 
files/deliverables/cloud-computing- 
information-assurance-framework/ 
at_download/fullReport 
• Covers 15 areas in OpSec & Identity &Access 
Management
Frameworks are great, but 
• They are too extensive to be actionable 
• They are too generic for real world security 
• They provide structure but lack incisive 
steps that can be taken right now to 
become secure
10 STEPS TO SECURING A CLOUD 
DEPLOYMENT (INFRASTRUCTURE)
Why Infrastructure first? 
In all cases Cloud Service Provider (CSP) takes 
care of physical security and the host 
operating system. So we just need to worry 
about the guest OS and all the 
infrastructure running on it.
AWS and Rackspace Host OS Vuln 
24th September 2014
AWS and Rackspace Host OS Vuln 
From the Amazon AWS Blog 
XEN Hypervisor Security Issues
5 Pillars of Security in IAAS(AWS) 
• Identity and Access Management 
• Configuration and Patch Management 
• Endpoint and Network Protection 
• Vulnerability and Asset Management 
• Data Protection
How the CSPs stack up for security? 
CSP/Security 
Feature 
AWS Google 
Compute 
Engine 
Microsoft 
Azure 
Rackspace 
IAM YES YES YES Sort of 
2FA for 
Need to 
Need to 
YES* (Paid 
NO 
Management Layer 
enable 
enable 
Service) 
Network Isolation YES YES YES YES 
Virtual Private 
YES YES YES YES 
Networks 
Firewall YES YES YES YES 
Centralized Logs 
YES NO YES* NO 
and Audit Trail 
Encryption for 
Storage 
YES YES YES 
Key Management YES YES YES YES 
http://azure.microsoft.com/en-us/pricing/details/multi-factor-authentication/ 
http://t.co/tig66fyu9K-Thanks 
to @govindk
The 10 steps are 
1. Enumerate all the network interfaces 
2. List all the running services 
3. Harden Each Service separately based on best 
practices 
4. Secure Remote access for server management 
(SSH, RDP) 
5. Check Operating System Patch Levels
The 10 steps are 
6. Harden the networking parameters of the 
Kernel (Linux Specific) 
7. Enable a Host Firewall 
8. Do an inventory all user accounts on the 
server and audit them 
9. Enable Centralized Logging 
10. Enable Encryption on disks, storage etc.
Demo for 10 steps
AWS IAM Best Practices 
• Lock away your AWS account access keys 
• Create individual IAM users 
• Use groups to assign permissions to IAM 
users 
• Grant least privilege
AWS IAM Best Practices 
• Configure a strong password policy for your users 
• Enable MFA for privileged users 
• Use roles for applications that run on Amazon EC2 
instances 
• Delegate by using roles instead of by sharing 
credentials 
• Rotate credentials regularly
Real world security incidents we can all learn from 
CASE STUDIES
Case Study 1 
• Company Not following best practices 
• Data loss 
• Security Incident 
• Catastrophic Business Failure
Case Study 1 
CODESPACES AWS HACK
Anatomy of the attack 
1. Distract by doing DDOS against the target 
2. Gain access to the root credentials of AWS 
3. All storage devices, hard disks, S3 storage 
deleted 
Company was a hosting company 
They went bankrupt due to this and 100s of 
customers lost all their data
Case Study 2 – Application Security 
• Relatively benign bug causes major security 
hole in the cloud
Case Study 2 
APPLICATION (IN)SECURITY LOVES 
XXE
Application (In)Security & XXE 
• Researcher finds that, he can inject his own 
file name and path in AWS EC2 
• EC2 uses Auto Scaling 
• Auto Scaling requires information to be 
present on the EC2 instance 
• Meta Web Server allows local HTTP 
Requests to be made and server and its 
credentials are pwned
Case Study 3 – Infrastructure 
Security 
• Un-patched server causes major security 
breach
Case Study 3 
INFRASTRUCTURE SECURITY FAIL
Browser Stack 
• Old neglected server, not being used. 
• Server is brought up to check something. 
• Un patched server is left running on the 
Internet without any network protection 
• Attacker compromises the server, steals the 
AWS credentials and manages to email all 
its customers, how bad the company is
Conclusions 
• Security in the cloud is really not very 
different from regular security 
• Same principles and processes apply 
• Same tools and techniques apply 
• IT folks need to simply understand what is 
the best way to get the same thing done
Questions? 
Contact 
Twitter @makash 
Linkedin https://linkd.in/webappsecguy 
Email akashmahajan@gmail.com
Attributions 
• Cloud Image Background from www.perspecsys.com 
• Video of Vishwa Bandhu https://www.youtube.com/watch?v=ApQlMm39xr0 
• Virtualization image By Qingqing Chen (Own work) [Public domain], via Wikimedia Commons 
• CPU Usage https://www.wormly.com/help/windows-server/cpu-usage-win32 
• Yoga agility By Earl McGehee (Own work) [CC-BY-SA-3.0 (http://creativecommons.org/licenses/by-sa/ 
3.0)], via Wikimedia Commons 
• Toyota Robot at Toyota Kaikan 
• AWS Scale on Demand http://docs.aws.amazon.com/AutoScaling/latest/DeveloperGuide/as-scale-based- 
on-demand.html 
• SOA for Cloud Computing http://www.communitydatalink.com/portfolio/cloudservices/ 
• http://www.rackspace.com/knowledge_center/whitepaper/understanding-the-cloud-computing-stack-saas- 
paas-iaas 
• By Sam Joton (wikipedia) [CC-BY-SA-3.0 (http://creativecommons.org/licenses/by-sa/3.0)], via 
Wikimedia Commons 
• Big Thanks to @govindk for fixing errors in Slide #96

More Related Content

What's hot

AWS Summit Auckland Sponsor Presentation - Vocus
AWS Summit Auckland Sponsor Presentation - VocusAWS Summit Auckland Sponsor Presentation - Vocus
AWS Summit Auckland Sponsor Presentation - VocusAmazon Web Services
 
AWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAmazon Web Services
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the CloudSecurity Innovation
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...SlideTeam
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud securityRaj Sarode
 
Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing Reza Pahlava
 
Cloud Computing security issues
Cloud Computing security issuesCloud Computing security issues
Cloud Computing security issuesPradeepti Kamble
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Chap 5 software as a service (saass)
Chap 5 software as a service (saass)Chap 5 software as a service (saass)
Chap 5 software as a service (saass)Raj Sarode
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingveena venugopal
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingRitesh Dwivedi
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityPiyush Mittal
 
Cloud university intel security
Cloud university intel securityCloud university intel security
Cloud university intel securityIngram Micro Cloud
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securitymaheralgamdi
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computingsaurabh soni
 

What's hot (20)

AWS Summit Auckland Sponsor Presentation - Vocus
AWS Summit Auckland Sponsor Presentation - VocusAWS Summit Auckland Sponsor Presentation - Vocus
AWS Summit Auckland Sponsor Presentation - Vocus
 
AWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - Intel
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
 
Cloud security
Cloud security Cloud security
Cloud security
 
Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud Computing security issues
Cloud Computing security issuesCloud Computing security issues
Cloud Computing security issues
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Chap 5 software as a service (saass)
Chap 5 software as a service (saass)Chap 5 software as a service (saass)
Chap 5 software as a service (saass)
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud university intel security
Cloud university intel securityCloud university intel security
Cloud university intel security
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computing
 

Viewers also liked

Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
App sec in the time of docker containers
App sec in the time of docker containersApp sec in the time of docker containers
App sec in the time of docker containersAkash Mahajan
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud ComputingJyotika Pandey
 
Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10Rugby7277
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Hybrid Cloud Computing - Seccurity Aspects and Challanges
Hybrid Cloud Computing - Seccurity Aspects and ChallangesHybrid Cloud Computing - Seccurity Aspects and Challanges
Hybrid Cloud Computing - Seccurity Aspects and ChallangesRoman Nedzelsky
 
AWS Survival Guide
AWS Survival GuideAWS Survival Guide
AWS Survival GuideKen Johnson
 
Cloud Computing Without The Hype An Executive Guide (1.00 Slideshare)
Cloud Computing Without The Hype   An Executive Guide (1.00 Slideshare)Cloud Computing Without The Hype   An Executive Guide (1.00 Slideshare)
Cloud Computing Without The Hype An Executive Guide (1.00 Slideshare)Lustratus REPAMA
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityBob Rhubart
 
Cloud Economics: Optimising for Cost
Cloud Economics: Optimising for CostCloud Economics: Optimising for Cost
Cloud Economics: Optimising for CostAmazon Web Services
 
Oracle Cloud Reference Architecture
Oracle Cloud Reference ArchitectureOracle Cloud Reference Architecture
Oracle Cloud Reference ArchitectureBob Rhubart
 
Cloud computing architecture and vulnerabilies
Cloud computing architecture and vulnerabiliesCloud computing architecture and vulnerabilies
Cloud computing architecture and vulnerabiliesVinay Dwivedi
 
Scaling the Cloud - Cloud Security
Scaling the Cloud - Cloud SecurityScaling the Cloud - Cloud Security
Scaling the Cloud - Cloud SecurityBill Burns
 

Viewers also liked (20)

Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
App sec in the time of docker containers
App sec in the time of docker containersApp sec in the time of docker containers
App sec in the time of docker containers
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Startups Security
Startups SecurityStartups Security
Startups Security
 
Hybrid Cloud Computing - Seccurity Aspects and Challanges
Hybrid Cloud Computing - Seccurity Aspects and ChallangesHybrid Cloud Computing - Seccurity Aspects and Challanges
Hybrid Cloud Computing - Seccurity Aspects and Challanges
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
What is cloud ?
What is cloud ?What is cloud ?
What is cloud ?
 
Hack like a pro with burp suite - nullhyd
Hack like a pro with burp suite - nullhydHack like a pro with burp suite - nullhyd
Hack like a pro with burp suite - nullhyd
 
AWS Survival Guide
AWS Survival GuideAWS Survival Guide
AWS Survival Guide
 
Cloud Computing Without The Hype An Executive Guide (1.00 Slideshare)
Cloud Computing Without The Hype   An Executive Guide (1.00 Slideshare)Cloud Computing Without The Hype   An Executive Guide (1.00 Slideshare)
Cloud Computing Without The Hype An Executive Guide (1.00 Slideshare)
 
Burp Suite Starter
Burp Suite StarterBurp Suite Starter
Burp Suite Starter
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
Cloud Economics: Optimising for Cost
Cloud Economics: Optimising for CostCloud Economics: Optimising for Cost
Cloud Economics: Optimising for Cost
 
Oracle Cloud Reference Architecture
Oracle Cloud Reference ArchitectureOracle Cloud Reference Architecture
Oracle Cloud Reference Architecture
 
Cloud computing architecture and vulnerabilies
Cloud computing architecture and vulnerabiliesCloud computing architecture and vulnerabilies
Cloud computing architecture and vulnerabilies
 
Scaling the Cloud - Cloud Security
Scaling the Cloud - Cloud SecurityScaling the Cloud - Cloud Security
Scaling the Cloud - Cloud Security
 

Similar to Security in the cloud Workshop HSTC 2014

Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentCryptzone
 
Cloud Computing and Virtualisation
Cloud Computing and VirtualisationCloud Computing and Virtualisation
Cloud Computing and Virtualisationanupriti
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...Amazon Web Services
 
CLOUD SEMINAR.pptx
CLOUD SEMINAR.pptxCLOUD SEMINAR.pptx
CLOUD SEMINAR.pptxsakshi126838
 
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014Amazon Web Services
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera Technologies
 
Staying Secure When Moving to the Cloud - Dave Millier
Staying Secure When Moving to the Cloud - Dave MillierStaying Secure When Moving to the Cloud - Dave Millier
Staying Secure When Moving to the Cloud - Dave MillierTriNimbus
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudAlert Logic
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud ComputingSripati Mahapatra
 
Security as an Enabler – Cloud Security
Security as an Enabler – Cloud SecuritySecurity as an Enabler – Cloud Security
Security as an Enabler – Cloud SecurityTom Laszewski
 
Cloud by SBS.pptx
Cloud by SBS.pptxCloud by SBS.pptx
Cloud by SBS.pptxYounusS2
 
Mahika cloud services
Mahika cloud servicesMahika cloud services
Mahika cloud servicesSomnath Sen
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markryAmazon Web Services LATAM
 
presentation_introduction_to_cloud_computing_1565085358_46246.pptx
presentation_introduction_to_cloud_computing_1565085358_46246.pptxpresentation_introduction_to_cloud_computing_1565085358_46246.pptx
presentation_introduction_to_cloud_computing_1565085358_46246.pptxSimmyNayak
 
Azure Fundamentals Part 2
Azure Fundamentals Part 2Azure Fundamentals Part 2
Azure Fundamentals Part 2CCG
 
Cloud computing
Cloud computingCloud computing
Cloud computingwaghu
 
Cisco + AWS Stronger Security & Greater AWS Adoption
Cisco + AWS Stronger Security & Greater AWS Adoption Cisco + AWS Stronger Security & Greater AWS Adoption
Cisco + AWS Stronger Security & Greater AWS Adoption Amazon Web Services
 
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & ComplianceAmazon Web Services
 

Similar to Security in the cloud Workshop HSTC 2014 (20)

Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS Environment
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Cloud Computing and Virtualisation
Cloud Computing and VirtualisationCloud Computing and Virtualisation
Cloud Computing and Virtualisation
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
CLOUD SEMINAR.pptx
CLOUD SEMINAR.pptxCLOUD SEMINAR.pptx
CLOUD SEMINAR.pptx
 
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
 
Staying Secure When Moving to the Cloud - Dave Millier
Staying Secure When Moving to the Cloud - Dave MillierStaying Secure When Moving to the Cloud - Dave Millier
Staying Secure When Moving to the Cloud - Dave Millier
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
Security as an Enabler – Cloud Security
Security as an Enabler – Cloud SecuritySecurity as an Enabler – Cloud Security
Security as an Enabler – Cloud Security
 
Cloud by SBS.pptx
Cloud by SBS.pptxCloud by SBS.pptx
Cloud by SBS.pptx
 
Mahika cloud services
Mahika cloud servicesMahika cloud services
Mahika cloud services
 
AZURE CC JP.pptx
AZURE CC JP.pptxAZURE CC JP.pptx
AZURE CC JP.pptx
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
 
presentation_introduction_to_cloud_computing_1565085358_46246.pptx
presentation_introduction_to_cloud_computing_1565085358_46246.pptxpresentation_introduction_to_cloud_computing_1565085358_46246.pptx
presentation_introduction_to_cloud_computing_1565085358_46246.pptx
 
Azure Fundamentals Part 2
Azure Fundamentals Part 2Azure Fundamentals Part 2
Azure Fundamentals Part 2
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cisco + AWS Stronger Security & Greater AWS Adoption
Cisco + AWS Stronger Security & Greater AWS Adoption Cisco + AWS Stronger Security & Greater AWS Adoption
Cisco + AWS Stronger Security & Greater AWS Adoption
 
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
 

More from Akash Mahajan

On Writing Well - A talk given at WinjaBlogs Session
On Writing Well - A talk given at WinjaBlogs SessionOn Writing Well - A talk given at WinjaBlogs Session
On Writing Well - A talk given at WinjaBlogs SessionAkash Mahajan
 
INCOMPLETE - OUTLINE for RootConf 2014 - The little-servcie-which-wasn't-there
INCOMPLETE - OUTLINE for RootConf 2014 - The little-servcie-which-wasn't-thereINCOMPLETE - OUTLINE for RootConf 2014 - The little-servcie-which-wasn't-there
INCOMPLETE - OUTLINE for RootConf 2014 - The little-servcie-which-wasn't-thereAkash Mahajan
 
The real incident of stealing a droid app+data
The real incident of stealing a droid app+dataThe real incident of stealing a droid app+data
The real incident of stealing a droid app+dataAkash Mahajan
 
Believe It Or Not SSL Attacks
Believe It Or Not SSL AttacksBelieve It Or Not SSL Attacks
Believe It Or Not SSL AttacksAkash Mahajan
 
I haz your mouse clicks and key strokes
I haz your mouse clicks and key strokesI haz your mouse clicks and key strokes
I haz your mouse clicks and key strokesAkash Mahajan
 
Hackers versus Developers and Secure Web Programming
Hackers versus Developers and Secure Web ProgrammingHackers versus Developers and Secure Web Programming
Hackers versus Developers and Secure Web ProgrammingAkash Mahajan
 
Secure HTTP Headers c0c0n 2011 Akash Mahajan
Secure HTTP Headers c0c0n 2011 Akash MahajanSecure HTTP Headers c0c0n 2011 Akash Mahajan
Secure HTTP Headers c0c0n 2011 Akash MahajanAkash Mahajan
 
Secure passwords-theory-and-practice
Secure passwords-theory-and-practiceSecure passwords-theory-and-practice
Secure passwords-theory-and-practiceAkash Mahajan
 
Top 10 web application security risks akash mahajan
Top 10 web application security risks   akash mahajanTop 10 web application security risks   akash mahajan
Top 10 web application security risks akash mahajanAkash Mahajan
 
Web application security
Web application securityWeb application security
Web application securityAkash Mahajan
 
Web application security
Web application securityWeb application security
Web application securityAkash Mahajan
 
Web application security
Web application securityWeb application security
Web application securityAkash Mahajan
 
Secure Programming In Php
Secure Programming In PhpSecure Programming In Php
Secure Programming In PhpAkash Mahajan
 

More from Akash Mahajan (14)

On Writing Well - A talk given at WinjaBlogs Session
On Writing Well - A talk given at WinjaBlogs SessionOn Writing Well - A talk given at WinjaBlogs Session
On Writing Well - A talk given at WinjaBlogs Session
 
INCOMPLETE - OUTLINE for RootConf 2014 - The little-servcie-which-wasn't-there
INCOMPLETE - OUTLINE for RootConf 2014 - The little-servcie-which-wasn't-thereINCOMPLETE - OUTLINE for RootConf 2014 - The little-servcie-which-wasn't-there
INCOMPLETE - OUTLINE for RootConf 2014 - The little-servcie-which-wasn't-there
 
The real incident of stealing a droid app+data
The real incident of stealing a droid app+dataThe real incident of stealing a droid app+data
The real incident of stealing a droid app+data
 
Believe It Or Not SSL Attacks
Believe It Or Not SSL AttacksBelieve It Or Not SSL Attacks
Believe It Or Not SSL Attacks
 
I haz your mouse clicks and key strokes
I haz your mouse clicks and key strokesI haz your mouse clicks and key strokes
I haz your mouse clicks and key strokes
 
Hackers versus Developers and Secure Web Programming
Hackers versus Developers and Secure Web ProgrammingHackers versus Developers and Secure Web Programming
Hackers versus Developers and Secure Web Programming
 
Secure HTTP Headers c0c0n 2011 Akash Mahajan
Secure HTTP Headers c0c0n 2011 Akash MahajanSecure HTTP Headers c0c0n 2011 Akash Mahajan
Secure HTTP Headers c0c0n 2011 Akash Mahajan
 
Php security
Php securityPhp security
Php security
 
Secure passwords-theory-and-practice
Secure passwords-theory-and-practiceSecure passwords-theory-and-practice
Secure passwords-theory-and-practice
 
Top 10 web application security risks akash mahajan
Top 10 web application security risks   akash mahajanTop 10 web application security risks   akash mahajan
Top 10 web application security risks akash mahajan
 
Web application security
Web application securityWeb application security
Web application security
 
Web application security
Web application securityWeb application security
Web application security
 
Web application security
Web application securityWeb application security
Web application security
 
Secure Programming In Php
Secure Programming In PhpSecure Programming In Php
Secure Programming In Php
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Security in the cloud Workshop HSTC 2014

  • 1. Security in the Cloud Akash Mahajan
  • 2. Akash Mahajan - Profile Heard of that Web App Security Guy? Am the chapter lead for OWASP Bangalore Co-founded a security community; null Kick-started an eco system for start-ups Ever attended a Startup Saturday? Realized that I love to learn about security!
  • 3. You will not learn anything new today The interesting part is learning why you won’t learn anything new today
  • 4. WHAT IS CLOUD COMPUTING?
  • 5. “Today Internet is Cloud CD Based, if you use Google your docs get stored in cloud, have you ever seen Google software CD? No it’s not here, it’s in the cloud. Called as Cloud CD! When you check, it Cloud gives error because it is raining!!!! ” - Vishwa Bandhu Gupta
  • 6. Cloud computing is computing in which large groups of remote servers are networked to allow the centralized data storage, and online access to computer services or resources. - From http://en.wikipedia.org/wiki/Cloud_computing
  • 7. How is Cloud Computing different From? Grid computing Distributed computing Large Scale Clusters
  • 8. Elasticity is the degree to which a system is able to adapt to workload changes
  • 9. How do we get Elasticity? by provisioning and de-provisioning resources in an autonomic manner, such that at each point in time the available resources match the current demand as closely as possible.
  • 10. Autonomic Manner The system makes decisions on its own, using high-level policies; it will constantly check and optimize its status and automatically adapt itself to changing conditions.
  • 11. AWS Auto-scale – Example of Elasticity
  • 12. The tech behind cloud computing is not new
  • 13. WHAT MAKES UP THE CLOUD COMPUTING STACK?
  • 14. Virtualization The main enabling technology for cloud computing
  • 15. Service Oriented Architecture (SOA) Breaking of business problems into services that can be integrated
  • 16. Programmable APIs Ability to interact with the services offered using programs and the libraries provided
  • 17. Management Layer Ability to interact with the services offered using a web based front-end for management & billing
  • 18. High Speed Networks All of the above talk to each other using high speed networks
  • 19. Cloud Computing Stack Management Layer Programmable APIs Service Layer OS Level Virtualization
  • 21. What is Virtualization? it separates a physical computing device into one or more "virtual" devices
  • 22. OS Level Virtualization It essentially creates a scalable system of multiple independent computing devices.
  • 23. OS Level Virtualization Idle computing resources can be allocated and used more efficiently
  • 24. Virtualization provides agility • Speed up IT operations • Reduces cost by increasing infrastructure utilization
  • 25. Virtualization provides automation • Computing automates the process through which the user can provision resources on-demand. • By minimizing user involvement, automation speeds up the process, reduces labor costs and reduces human errors
  • 26. SERVICE ORIENTED ARCHITECTURE FOR CLOUD SERVICES
  • 27. What does SOA contain?
  • 28. Compute processor , random access memory,
  • 29. Storage persistent, redundant, scalable, infinite and cheap
  • 30. Network all pervasive, based on TCP/IP gigabit fast and more
  • 31. Management what we use to manage or work with the service
  • 32. Metrics and Measured Service billing is like utility services and every service is measurable
  • 33. PROGRAMMABLE APIS AND MANAGEMENT LAYER
  • 34. Programmable APIs Start, stop, pause virtual servers ec2-run-instances gcloud compute instances create
  • 35. Management Layer Basically a web based control panel
  • 39. Software As A Service Meant for end users to consume a service using applications and data storage
  • 40. Platform As A Service Meant for developers to utilize an integrated development platform and framework
  • 41. Infrastructure As A Service Basic Cloud Service building blocks are given like server instance, storage and network
  • 43. Cloud can be in your office too
  • 44. Deployment Models • Public • Private • Hybrid
  • 45. Public Cloud A cloud is called a "public cloud" when the services are rendered over a network that is open for public use.
  • 46. Private Cloud Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third-party, and hosted either internally or externally
  • 47. Hybrid Cloud Hybrid cloud is a composition of two or more clouds (private, community or public) that remain distinct entities but are bound together, offering the benefits of multiple deployment models.
  • 48. We will restrict our discussion about the security of the public cloud SECURITY IN THE PUBLIC CLOUD
  • 49. Shared Sense of Security Public cloud vendors and customers have a shared sense of security
  • 50.
  • 51. Shared Responsibility of security Public cloud vendors and customers have to share security responsibility
  • 52.
  • 54. Amazon AWS takes care of • Physical Security (Nobody should walk away with the server including Govt.) • Host OS which runs the virtualization software • Virtualization Security (Rogue VMs can't harm others)
  • 55. Amazon AWS takes care of • Environmental Safeguards (DC is safe to run servers) • Administrative Controls (Policies and Procedures) • Certifications and Accreditations (SAS70, SOC1, PCI, ISO27K1)
  • 56. You take care of • Guest OS (The Compute instance) • Application Security (The application on the compute instance) • Data Security (The data being generated, processed by the application) • Network security for the guest & applications • Security Monitoring of Guest OS & applications
  • 57. A few public cloud vendors
  • 58. Does Cloud Need Security? Wrong question to ask, the question should be…
  • 59. Do we need to worry about our data, our infra, our apps stored in the public cloud?
  • 60. Our apps in the public cloud • This applies only to IAAS and PAAS as in SAAS it is not our application • An in secure app can expose underlying infrastructure and data to theft, corruption and exposure
  • 61. Security Testing of Apps • No different from testing any application for security • We might require permission to run automated scanners against the app • Ideal framework to test against is OWASP Top 10 and OWASP Testing Guide
  • 62. App Insecurity Scenario • App has a Local File Inclusion bug • The AWS root credentials are being used • They are stored in a world readable file on the server • Attacker reads the credentials and starts multiple large instances to mine bitcoins • Victim saddled with a massive bill at the end of the month
  • 63. Our infra in the public cloud • This applies only to IAAS as in SAAS and PAAS it is not our application or infra • Infrastructure vulnerabilities can derail any app security in place.
  • 64. Security Testing of Infra • No different from testing server for security • We may require permission to run automated scanners against the server • Ideal framework to test against is any Penetration Testing Standard PTES / OSSTMM
  • 65. Infra Insecurity Scenario • MySQL Production database is listening on external port • Developers work directly on production database and require SQL Management Software • They log in using the root user of MySQL Database server and a simple password • Attacker runs a brute force script and cracks the password, gains full access to the database
  • 66. HEARTBLEED – AN ILLUSTRATION OF AN INFRASTRUCTURE VULNERABILITY
  • 67.
  • 68.
  • 69.
  • 70. Servers (Infra) were leaking sensitive information
  • 71. What kind of information? • Session IDs • Usernames • Password • Server Certificate’s Private Keys
  • 72. CloudFlare hosted a vulnerable server A security researcher sent 2.5 million requests and got the private keys
  • 73. What is the big deal about that? • Private Keys for the SSL certificate can decrypt all past and future traffic • Private Keys allow for impersonation of that service as well. • What if some website could pretend to be https://examplebank.com ?
  • 74. Armature Hour at AWS • https://opbeat.com/blog/posts/amateur-hour- at-aws/ • Amazon AWS took about 48 hours after everyone knew about Heartbleed to patch its servers and inform its customers • This caused a lot of heart-ache and pain for its customers
  • 75. Our data in the public cloud • This applies only all PAAS, IAAS and SAAS • Our data can get leaked, exposed, stolen, held ransom if we don’t take care of making sure it is safe while being used, while being transmitted and while being stored
  • 76. Verifying Data Security through Testing • This is a specialized testing requirement. A part of this can be tested by looking at the system and application architecture • All the places where the data can be written, sent, travel need to be looked at. • Writing to storage, exposing APIs, backups and even insider threats
  • 77. Verifying Data uses Encryption • Data at rest is encrypted – This will ensure that if an attacker has access to the disk/store, they can’t use the data • Data in motion is encrypted – This will ensure that if an attacker can sniff the network traffic they can’t see &tamper the data • Data in use (tmp files, key loaded in memory) – This will ensue that if an attacker can’t do catastrophic damage if they manage to gain access to a server
  • 78. Secure Key Management • Once we start using encryption for data storage and data transmission, the encryption keys need to be safeguarded against theft, accidental loss • A secure key management process will ensure that at any point keys can be revoked and reissued
  • 79. Data Insecurity Scenario • Database is getting backed up regularly. • Due to performance reasons, database wasn’t encrypted when initial backups were done. • Dev team moves to newer type SSDs and doesn’t decommission older HDDs. • Attacker finds older HDD, does forensics for data recovery and sell the data for profit.
  • 80. Cloud versus the IT department
  • 81. How does being in the cloud change the traditional IT department?
  • 82. How do IT departments manage cloud instances & data?
  • 83. Does the company Info sec policy still apply?
  • 84. Does the Countries cyber laws still apply?
  • 85. How to applications get attacked?
  • 86. What are the frameworks for testing cloud? Can we follow some best practices ? HOW DO YOU TEST FOR SECURITY?
  • 87. Cloud Security Alliance • Security Guidance Document • https://cloudsecurityalliance.org/guidance/ csaguide.v2.1.pdf • Covers 13 Critical Area Domains
  • 88. European Network and Information Security Agency (ENISA) • Cloud Computing Information Assurance Framework • http://www.enisa.europa.eu/activities/risk-management/ files/deliverables/cloud-computing- information-assurance-framework/ at_download/fullReport • Covers 15 areas in OpSec & Identity &Access Management
  • 89. Frameworks are great, but • They are too extensive to be actionable • They are too generic for real world security • They provide structure but lack incisive steps that can be taken right now to become secure
  • 90. 10 STEPS TO SECURING A CLOUD DEPLOYMENT (INFRASTRUCTURE)
  • 91. Why Infrastructure first? In all cases Cloud Service Provider (CSP) takes care of physical security and the host operating system. So we just need to worry about the guest OS and all the infrastructure running on it.
  • 92. AWS and Rackspace Host OS Vuln 24th September 2014
  • 93. AWS and Rackspace Host OS Vuln From the Amazon AWS Blog XEN Hypervisor Security Issues
  • 94.
  • 95. 5 Pillars of Security in IAAS(AWS) • Identity and Access Management • Configuration and Patch Management • Endpoint and Network Protection • Vulnerability and Asset Management • Data Protection
  • 96. How the CSPs stack up for security? CSP/Security Feature AWS Google Compute Engine Microsoft Azure Rackspace IAM YES YES YES Sort of 2FA for Need to Need to YES* (Paid NO Management Layer enable enable Service) Network Isolation YES YES YES YES Virtual Private YES YES YES YES Networks Firewall YES YES YES YES Centralized Logs YES NO YES* NO and Audit Trail Encryption for Storage YES YES YES Key Management YES YES YES YES http://azure.microsoft.com/en-us/pricing/details/multi-factor-authentication/ http://t.co/tig66fyu9K-Thanks to @govindk
  • 97. The 10 steps are 1. Enumerate all the network interfaces 2. List all the running services 3. Harden Each Service separately based on best practices 4. Secure Remote access for server management (SSH, RDP) 5. Check Operating System Patch Levels
  • 98. The 10 steps are 6. Harden the networking parameters of the Kernel (Linux Specific) 7. Enable a Host Firewall 8. Do an inventory all user accounts on the server and audit them 9. Enable Centralized Logging 10. Enable Encryption on disks, storage etc.
  • 99. Demo for 10 steps
  • 100. AWS IAM Best Practices • Lock away your AWS account access keys • Create individual IAM users • Use groups to assign permissions to IAM users • Grant least privilege
  • 101. AWS IAM Best Practices • Configure a strong password policy for your users • Enable MFA for privileged users • Use roles for applications that run on Amazon EC2 instances • Delegate by using roles instead of by sharing credentials • Rotate credentials regularly
  • 102. Real world security incidents we can all learn from CASE STUDIES
  • 103. Case Study 1 • Company Not following best practices • Data loss • Security Incident • Catastrophic Business Failure
  • 104. Case Study 1 CODESPACES AWS HACK
  • 105. Anatomy of the attack 1. Distract by doing DDOS against the target 2. Gain access to the root credentials of AWS 3. All storage devices, hard disks, S3 storage deleted Company was a hosting company They went bankrupt due to this and 100s of customers lost all their data
  • 106. Case Study 2 – Application Security • Relatively benign bug causes major security hole in the cloud
  • 107. Case Study 2 APPLICATION (IN)SECURITY LOVES XXE
  • 108. Application (In)Security & XXE • Researcher finds that, he can inject his own file name and path in AWS EC2 • EC2 uses Auto Scaling • Auto Scaling requires information to be present on the EC2 instance • Meta Web Server allows local HTTP Requests to be made and server and its credentials are pwned
  • 109. Case Study 3 – Infrastructure Security • Un-patched server causes major security breach
  • 110. Case Study 3 INFRASTRUCTURE SECURITY FAIL
  • 111. Browser Stack • Old neglected server, not being used. • Server is brought up to check something. • Un patched server is left running on the Internet without any network protection • Attacker compromises the server, steals the AWS credentials and manages to email all its customers, how bad the company is
  • 112. Conclusions • Security in the cloud is really not very different from regular security • Same principles and processes apply • Same tools and techniques apply • IT folks need to simply understand what is the best way to get the same thing done
  • 113. Questions? Contact Twitter @makash Linkedin https://linkd.in/webappsecguy Email akashmahajan@gmail.com
  • 114. Attributions • Cloud Image Background from www.perspecsys.com • Video of Vishwa Bandhu https://www.youtube.com/watch?v=ApQlMm39xr0 • Virtualization image By Qingqing Chen (Own work) [Public domain], via Wikimedia Commons • CPU Usage https://www.wormly.com/help/windows-server/cpu-usage-win32 • Yoga agility By Earl McGehee (Own work) [CC-BY-SA-3.0 (http://creativecommons.org/licenses/by-sa/ 3.0)], via Wikimedia Commons • Toyota Robot at Toyota Kaikan • AWS Scale on Demand http://docs.aws.amazon.com/AutoScaling/latest/DeveloperGuide/as-scale-based- on-demand.html • SOA for Cloud Computing http://www.communitydatalink.com/portfolio/cloudservices/ • http://www.rackspace.com/knowledge_center/whitepaper/understanding-the-cloud-computing-stack-saas- paas-iaas • By Sam Joton (wikipedia) [CC-BY-SA-3.0 (http://creativecommons.org/licenses/by-sa/3.0)], via Wikimedia Commons • Big Thanks to @govindk for fixing errors in Slide #96

Editor's Notes

  1. NIST Special Publication 800-145
  2. Grid Computing - A form of distributed and parallel computing, whereby a 'super and virtual computer' is composed of a cluster of networked, loosely coupled computers acting in concert to perform very large tasks.“ Any large scale clusters – Usually with a main frame and bunch of terminals
  3. It is merely the result of adoption of existing technologies and paradigms.
  4. What can these services look like?
  5. What can these services look like?
  6. What can these services look like?
  7. What can these services look like?
  8. Each of which can be easily used and managed to perform computing tasks.
  9. For most physical servers, CPU utilization is less than 50% most times of the day
  10. Compute – contains processing and memory Storage – Storing data for use Network – The network that connects the various services Management – What we use to manage and work with the cloud service
  11. So from now on, whenever I say Cloud I mean Public Cloud
  12. Best example of this is Heartbleed
  13. Show the small demo
  14. Which is why, we use a simple 10 step guide to securing a cloud deployment
  15. Amazon and Rackspace need to worry about this
  16. We need to worry about this
  17. Need to add more things here
  18. Data backup service that went out of business
  19. Browser Stack