Cloud Computing & Security: Are
    there clouds in our sky ?
> Antonio Sanz
  > I3A - IT Manager
    > Security Expert
> http://i3a.unizar.es
 > ansanz@unizar.es
  > @antoniosanzalc
Cloud
Computing
Index                                        4




     > Cloud Computing

     > Opportunities

     > Cloud Computing risks

     > Migrating to a Cloud Infraestructure



Tema 1: Diseño de software seguro
Cloud Computing Security
“Cloud computing is a model for
  enabling ubiquitous, convenient,
 on-demand network access to a
    shared pool of configurable
     computing resources (e.g.,
     networks, servers, storage,
applications, and services) that can
    be rapidly provisioned and
released with minimal management
      effort or service provider
             interaction”

    [*First & last boring slide. Promise]
Cloud Computing: Main point        6




         >On demand
         >Ubiquous
         >Resource pool
         >Elastic
         >Measureable
Tema 1: Diseño de software seguro
Cloud Computing Security
Service Types
IaaS – Infrastructure as a Service                        8



                            > Raw infrastructure

                            > Storage, network & servers

                            > We do the rest

                            > Flexible but costly

                            > Ej: Amazon AWS



Tema 1: Diseño de software seguro
Cloud Computing Security
PaaS – Platform as a Service                           9



                         > You’ve got the OS but no
                           apps

                         > IaaS + OS + Base services

                         > App deploying ok (.jar)

                         > Less control but less cost

                         > Ej: Google App Engine



Tema 1: Diseño de software seguro
Cloud Computing Security
SaaS – Software as a Service                             10



                            > You’ve got everything

                            > Iaas + Paas + Apps

                            > Ready to go

                            > Minimal control / Minimal
                              effort

                            > Ej: Salesforce.com (CRM)



Tema 1: Diseño de software seguro
Cloud Computing Security
Public, Private Clouds                      11




         > Públic: Public access, shared
           resources, (-security, -cost)
           Ej: Amazon AWS

         > Private: Private access,
           dedicated resources (+security,
           +cost)
           Ej: NASA Nebula     OpenStack



Tema 1: Diseño de software seguro
Cloud Computing Security
Community , Hybrid                        12




        > Community: Group that shares
          a private cloud
          Ej: Business holding

        > Hybrid: Mix some of the others




Tema 1: Diseño de software seguro
Cloud Computing Security
Technology
Technologies                            14



        > Virtualization

        > Shared storage

        > High speed networks

        > Multidevice access

        > Advanced Middleware (access,
          monitoring, provisioning)



Tema 1: Diseño de software seguro
Cloud Computing Security
Advantages
Cloud Computing Pros                16



        > Elasticity / Scalability

        > Availability

        > Performance

        > Ubiquous access

        > Very low CAPEX

        > OPEX savings


Tema 1: Diseño de software seguro
Cloud Computing Security
Success Case
Amazon AWS - http://aws.amazon.com/          18



        > Amazon Web Services

        > EC2 (Elastic Cloud Computing)

        > S3 (Simple Storage Service)

        > You can do … almost everything

        > Others: Rackspace, vCloud, Azure,
          IBM (great, too)



Tema 1: Diseño de software seguro
Cloud Computing Security
NetFlix - http://www.netflix.com/               19



     > Video streaming (Films, serials, shows)

     > Almost 20% of EEUU bandwidth

     > Uses Amazon AWS

     > Benefits: Escalability + Availability

     > Video transcoding “on the fly” with EC2

     > Video storage in EC3 with S3

     > Usage data analysis with EC2



Tema 1: Diseño de software seguro
Cloud Computing Security
Dropbox - http://www.dropbox.com/                 20



        > Backup in the cloud

        > Around 12Pb (12.000 Tb)

        > Uses Amazon S3

        > Benefit: Escalability

        > Business model (VIP):
          http://www.w2lessons.com/2011/04/econo
          mics-of-dropbox.html



Tema 1: Diseño de software seguro
Cloud Computing Security
Technology

             Cloud
               Is
             Good!
Cloud Computing Risks
Business Risks
Vendor Lock-In
= To have you
  by the   balls

Vendor Lock-In
Vendor Lock-In
Vendor lock-in                                     27



     > It’s hard to say goodbye

     > SaaS : No “export” option

     > PaaS : API interoperability

     > IaaS : Different technologies

     > Defsense: Right CP (Cloud Provider) choice



Tema 1: Diseño de software seguro
Cloud Computing Security
Lack of IT Governance
Lack of IT Governance                      29




    > IT Governance != Cloud Computing
      Governance

    > Limited funcionalities / High costs

    > Loss of Control of our IT

    > Defense: Clear objectives & design,
      Right CP choice



Tema 1: Diseño de software seguro
Cloud Computing Security
Compliance & Laws
Compliance & Laws                          31




       > We need to comply with all the
         regulations (PCI DSS, LOPD)

       > Imposes transitive compliance on
         the CP

       > Legal lapses

       > Defense: Good analysis, right CP
         choice



Tema 1: Diseño de software seguro
Cloud Computing Security
SLAs
SLA (Service Level Agreements)       33



      > Contract signed with CP

      > Services offered

      > Warranties offered

      > Service metrics &
        compensations/penalties

      > Defense: SLA study & tuning



Tema 1: Diseño de software seguro
Cloud Computing Security
Provider Failures
Provider failures                       35



        > “Errare machina est”

        > Starting security standards

        > CP Business Continuity plan

        > OUR Business Continuity plan

        > Defense: Business continuity
          definition, right CP choice



Tema 1: Diseño de software seguro
Cloud Computing Security
Third party failures
Third party failures                             37



        > CP = Service & Technologies
          Integrator

        > But … what about electricity,
          connectivity, HVAC ?

        > We have to take care of our
          facilities too

        > Defense: Right CP choice, third party
          evaluation (CP and proper)


Tema 1: Diseño de software seguro
Cloud Computing Security
Technical risks
Resource
Starvation
Resource starvation                            40




       > Resources are assigned on demand

       > CP scales up … but how ?

       > Situation: No more resources
         available when they were most
         needed !!

       > Defense: Resource reservation, right
         CP choice


Tema 1: Diseño de software seguro
Cloud Computing Security
Isolation Faults
Isolation Faults                                 42




     > Cloud = Shared Resources = Shared flat

     > How secure is your neighbour ?

     > Third party security failure   Everybody
       is compromised

     > Defense: Private Clouds, right CP choice




Tema 1: Diseño de software seguro
Cloud Computing Security
Data leaks
Data leaks                                       44




        > Lots of sensitive info in our CP

        > Disgruntled employees

        > Wrong service configuration

        > Defense: Right CP choice, cipher use,
          log reviews




Tema 1: Diseño de software seguro
Cloud Computing Security
Data Transit
Data Transit                                46




        > Network        Information flows

        > Local interception

        > On transit interception

        > In-Cloud Intercepcion

        > Defense: SSL, cipher use




Tema 1: Diseño de software seguro
Cloud Computing Security
Cloud Provider Compromise
CP Compromise                                    48



     > Cloud = Technology mesh = Lots of
       possible security flaws

     > Cloud interface management attacks

     > Cloud user management attacks

     > Infrastructure attacks

     > Defense: Right CP choice, SLAs, incident
       response planning


Tema 1: Diseño de software seguro
Cloud Computing Security
DDOS
DDOS / EDOS                                        50



        > DDOS (Distributed Denial Of Service)

        > Intended to take down an infrastructure
          Attack to availability

        > Cloud    Neighbour are collateral damage

        > EDOS (Economic Denial of Service)

        > Intended to cause economic damage

        > Defense: SLAs, charge limits, incident
          response



Tema 1: Diseño de software seguro
Cloud Computing Security
Cipher & Backup
Cipher                                        52



        > Sensible info      Cipher

        > Secure information deletion (wipe)

        > Defensas: Strong ciphers, guardar
          claves, SLA




Tema 1: Diseño de software seguro
Cloud Computing Security
Backups                                        53




        > Info is EVERYTHING        Backups

        > Don’t forget your backups (even if
          the CP does … you too)

        > Automated procedure

        > Defensa: Procedure design, right CP
          choice




Tema 1: Diseño de software seguro
Cloud Computing Security
Logs Access                                     54



        > Logs = Activity of our IT

        > Needed to do debugging

        > Critic if a security incident arises

        > How can access my logs ?

        > Defense: SLA, right CP choice




Tema 1: Diseño de software seguro
Cloud Computing Security
Disaster
Recovery
Disaster Recovery                                    56



     > Shit happens (Murphy’s Law)

     > Earthquakes, fires, floods, alien invasions…

     > Our CP must have a Business Continuity
       plan

     > We must have ours !!

     > Defense: Business Continuity plan



Tema 1: Diseño de software seguro
Cloud Computing Security
57
Legal Risks




Tema 1: Diseño de software seguro
Cloud Computing Security
Compliance & Laws                               58




        > Lots of laws & regulations

        > Is our CP compliant ?

        > National & International laws

        > Defense: Preliminary analysis, right
          CP choice




Tema 1: Diseño de software seguro
Cloud Computing Security
Data protection                                 59



        > LOPD (Ley Orgánica de Protección
          de Datos)

        > Cloud implies sometimes
          international data transfers
          Complicated issues

        > Safe Harbour       Amazon, Google

        > Defense: Preliminary analysis, right
          CP choice


Tema 1: Diseño de software seguro
Cloud Computing Security
Computer Forensic                          60



       > Security incident in our CP
         Someone has set up a child
         pornography site

       > Maybe anyone in our cloud !!

       > Possible result = Server seizure

       > Defense: Right CP choice, SLA,
         Business Continuity plan


Tema 1: Diseño de software seguro
Cloud Computing Security
Using Cloud Computing
Analyze
Identify Services                             63




       > Services that can benefit most from
         Cloud Computing

       > Main benefits: Scalability,
         Availability & Elasticity

       > Intermitent but heavy resource use
         services (Ej: Sports newspapers on
         mondays)



Tema 1: Diseño de software seguro
Cloud Computing Security
Evaluate CC models                           64



        > IaaS, PaaS, SaaS ?

        > ¿Public, Private, Hybrid,
          Community?

        > See what others like us are doing

        > Decide which model fits our needs
          best



Tema 1: Diseño de software seguro
Cloud Computing Security
Know
Defining security needs                        66



        > Know our service throughly

        > Define the information flows

        > Identify sensitive info

        > Measure how critical the service is

        > Assign a value to the srevice



Tema 1: Diseño de software seguro
Cloud Computing Security
Risk Analysis                                67




       > Know the existing risks when using
         cloud computing

       > Apply them to our service

       > Define a maximum risk level

       > Important!: Be utterly objective




Tema 1: Diseño de software seguro
Cloud Computing Security
Plan
Evaluate cloud providers                   69



        > Read carefully the SLA (Service
          Level Agreements)

        > Read it again

        > Evaluate security compliance

        > Added value services

        > Price !



Tema 1: Diseño de software seguro
Cloud Computing Security
Security controls                        70




       > Define security controls

       > Controls in the cloud & our IT

       > Technical & procedural control

       > Target: Lower our real risk




Tema 1: Diseño de software seguro
Cloud Computing Security
Decide
Bean counting …                              72



        > Migration costs

        > Cloud operation costs

        > Current operation costs

        > Troubleshooting costs (both cloud
          & current)

        > Make money talk …



Tema 1: Diseño de software seguro
Cloud Computing Security
Make a decision                                73



        > Evaluate pros & cons of our current
          IT model & cloud computing

        > It’s not all about money …

        > Informed decision taking

        > You always should have a plan B




Tema 1: Diseño de software seguro
Cloud Computing Security
CC offers great
  opportunities
CC has   risks
          There has to
            be a plan
Conclusiones                              75




     >Cloud computing is here

     >Lots of business models &
      opportunities

     >Must know all the risks

     >Must have a sensible business plan



Tema 1: Diseño de software seguro
Cloud Computing Security
Conclusiones


               I love it
               when a
               cloud
                 plan
                comes
               together
Don’t be under a cloud !
More info?. Press here !                                          78



  Cloud Security Alliance
  https://cloudsecurityalliance.org/

  Cloud Computing Security Guide - CSA
  http://cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf

  ENISA – Cloud Computing Security Risks
  http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-
     risk-assessment

  Australia Gov. - Cloud Computing Risk Analysis Report
  http://www.dsd.gov.au/publications/Cloud_Computing_Security_Consid
     erations.pdf




Tema 1: Diseño de software seguro
Cloud Computing Security
Have a plan and jump into the sky !




Antonio Sanz / ansanz@unizar.es / @antoniosanzalc
    $slides = http://www.slideshare.net/ansanz

Cloud computing security

  • 1.
    Cloud Computing &Security: Are there clouds in our sky ?
  • 2.
    > Antonio Sanz > I3A - IT Manager > Security Expert > http://i3a.unizar.es > ansanz@unizar.es > @antoniosanzalc
  • 3.
  • 4.
    Index 4 > Cloud Computing > Opportunities > Cloud Computing risks > Migrating to a Cloud Infraestructure Tema 1: Diseño de software seguro Cloud Computing Security
  • 5.
    “Cloud computing isa model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction” [*First & last boring slide. Promise]
  • 6.
    Cloud Computing: Mainpoint 6 >On demand >Ubiquous >Resource pool >Elastic >Measureable Tema 1: Diseño de software seguro Cloud Computing Security
  • 7.
  • 8.
    IaaS – Infrastructureas a Service 8 > Raw infrastructure > Storage, network & servers > We do the rest > Flexible but costly > Ej: Amazon AWS Tema 1: Diseño de software seguro Cloud Computing Security
  • 9.
    PaaS – Platformas a Service 9 > You’ve got the OS but no apps > IaaS + OS + Base services > App deploying ok (.jar) > Less control but less cost > Ej: Google App Engine Tema 1: Diseño de software seguro Cloud Computing Security
  • 10.
    SaaS – Softwareas a Service 10 > You’ve got everything > Iaas + Paas + Apps > Ready to go > Minimal control / Minimal effort > Ej: Salesforce.com (CRM) Tema 1: Diseño de software seguro Cloud Computing Security
  • 11.
    Public, Private Clouds 11 > Públic: Public access, shared resources, (-security, -cost) Ej: Amazon AWS > Private: Private access, dedicated resources (+security, +cost) Ej: NASA Nebula OpenStack Tema 1: Diseño de software seguro Cloud Computing Security
  • 12.
    Community , Hybrid 12 > Community: Group that shares a private cloud Ej: Business holding > Hybrid: Mix some of the others Tema 1: Diseño de software seguro Cloud Computing Security
  • 13.
  • 14.
    Technologies 14 > Virtualization > Shared storage > High speed networks > Multidevice access > Advanced Middleware (access, monitoring, provisioning) Tema 1: Diseño de software seguro Cloud Computing Security
  • 15.
  • 16.
    Cloud Computing Pros 16 > Elasticity / Scalability > Availability > Performance > Ubiquous access > Very low CAPEX > OPEX savings Tema 1: Diseño de software seguro Cloud Computing Security
  • 17.
  • 18.
    Amazon AWS -http://aws.amazon.com/ 18 > Amazon Web Services > EC2 (Elastic Cloud Computing) > S3 (Simple Storage Service) > You can do … almost everything > Others: Rackspace, vCloud, Azure, IBM (great, too) Tema 1: Diseño de software seguro Cloud Computing Security
  • 19.
    NetFlix - http://www.netflix.com/ 19 > Video streaming (Films, serials, shows) > Almost 20% of EEUU bandwidth > Uses Amazon AWS > Benefits: Escalability + Availability > Video transcoding “on the fly” with EC2 > Video storage in EC3 with S3 > Usage data analysis with EC2 Tema 1: Diseño de software seguro Cloud Computing Security
  • 20.
    Dropbox - http://www.dropbox.com/ 20 > Backup in the cloud > Around 12Pb (12.000 Tb) > Uses Amazon S3 > Benefit: Escalability > Business model (VIP): http://www.w2lessons.com/2011/04/econo mics-of-dropbox.html Tema 1: Diseño de software seguro Cloud Computing Security
  • 21.
    Technology Cloud Is Good!
  • 22.
  • 23.
  • 24.
  • 25.
    = To haveyou by the balls Vendor Lock-In
  • 26.
  • 27.
    Vendor lock-in 27 > It’s hard to say goodbye > SaaS : No “export” option > PaaS : API interoperability > IaaS : Different technologies > Defsense: Right CP (Cloud Provider) choice Tema 1: Diseño de software seguro Cloud Computing Security
  • 28.
    Lack of ITGovernance
  • 29.
    Lack of ITGovernance 29 > IT Governance != Cloud Computing Governance > Limited funcionalities / High costs > Loss of Control of our IT > Defense: Clear objectives & design, Right CP choice Tema 1: Diseño de software seguro Cloud Computing Security
  • 30.
  • 31.
    Compliance & Laws 31 > We need to comply with all the regulations (PCI DSS, LOPD) > Imposes transitive compliance on the CP > Legal lapses > Defense: Good analysis, right CP choice Tema 1: Diseño de software seguro Cloud Computing Security
  • 32.
  • 33.
    SLA (Service LevelAgreements) 33 > Contract signed with CP > Services offered > Warranties offered > Service metrics & compensations/penalties > Defense: SLA study & tuning Tema 1: Diseño de software seguro Cloud Computing Security
  • 34.
  • 35.
    Provider failures 35 > “Errare machina est” > Starting security standards > CP Business Continuity plan > OUR Business Continuity plan > Defense: Business continuity definition, right CP choice Tema 1: Diseño de software seguro Cloud Computing Security
  • 36.
  • 37.
    Third party failures 37 > CP = Service & Technologies Integrator > But … what about electricity, connectivity, HVAC ? > We have to take care of our facilities too > Defense: Right CP choice, third party evaluation (CP and proper) Tema 1: Diseño de software seguro Cloud Computing Security
  • 38.
  • 39.
  • 40.
    Resource starvation 40 > Resources are assigned on demand > CP scales up … but how ? > Situation: No more resources available when they were most needed !! > Defense: Resource reservation, right CP choice Tema 1: Diseño de software seguro Cloud Computing Security
  • 41.
  • 42.
    Isolation Faults 42 > Cloud = Shared Resources = Shared flat > How secure is your neighbour ? > Third party security failure Everybody is compromised > Defense: Private Clouds, right CP choice Tema 1: Diseño de software seguro Cloud Computing Security
  • 43.
  • 44.
    Data leaks 44 > Lots of sensitive info in our CP > Disgruntled employees > Wrong service configuration > Defense: Right CP choice, cipher use, log reviews Tema 1: Diseño de software seguro Cloud Computing Security
  • 45.
  • 46.
    Data Transit 46 > Network Information flows > Local interception > On transit interception > In-Cloud Intercepcion > Defense: SSL, cipher use Tema 1: Diseño de software seguro Cloud Computing Security
  • 47.
  • 48.
    CP Compromise 48 > Cloud = Technology mesh = Lots of possible security flaws > Cloud interface management attacks > Cloud user management attacks > Infrastructure attacks > Defense: Right CP choice, SLAs, incident response planning Tema 1: Diseño de software seguro Cloud Computing Security
  • 49.
  • 50.
    DDOS / EDOS 50 > DDOS (Distributed Denial Of Service) > Intended to take down an infrastructure Attack to availability > Cloud Neighbour are collateral damage > EDOS (Economic Denial of Service) > Intended to cause economic damage > Defense: SLAs, charge limits, incident response Tema 1: Diseño de software seguro Cloud Computing Security
  • 51.
  • 52.
    Cipher 52 > Sensible info Cipher > Secure information deletion (wipe) > Defensas: Strong ciphers, guardar claves, SLA Tema 1: Diseño de software seguro Cloud Computing Security
  • 53.
    Backups 53 > Info is EVERYTHING Backups > Don’t forget your backups (even if the CP does … you too) > Automated procedure > Defensa: Procedure design, right CP choice Tema 1: Diseño de software seguro Cloud Computing Security
  • 54.
    Logs Access 54 > Logs = Activity of our IT > Needed to do debugging > Critic if a security incident arises > How can access my logs ? > Defense: SLA, right CP choice Tema 1: Diseño de software seguro Cloud Computing Security
  • 55.
  • 56.
    Disaster Recovery 56 > Shit happens (Murphy’s Law) > Earthquakes, fires, floods, alien invasions… > Our CP must have a Business Continuity plan > We must have ours !! > Defense: Business Continuity plan Tema 1: Diseño de software seguro Cloud Computing Security
  • 57.
    57 Legal Risks Tema 1:Diseño de software seguro Cloud Computing Security
  • 58.
    Compliance & Laws 58 > Lots of laws & regulations > Is our CP compliant ? > National & International laws > Defense: Preliminary analysis, right CP choice Tema 1: Diseño de software seguro Cloud Computing Security
  • 59.
    Data protection 59 > LOPD (Ley Orgánica de Protección de Datos) > Cloud implies sometimes international data transfers Complicated issues > Safe Harbour Amazon, Google > Defense: Preliminary analysis, right CP choice Tema 1: Diseño de software seguro Cloud Computing Security
  • 60.
    Computer Forensic 60 > Security incident in our CP Someone has set up a child pornography site > Maybe anyone in our cloud !! > Possible result = Server seizure > Defense: Right CP choice, SLA, Business Continuity plan Tema 1: Diseño de software seguro Cloud Computing Security
  • 61.
  • 62.
  • 63.
    Identify Services 63 > Services that can benefit most from Cloud Computing > Main benefits: Scalability, Availability & Elasticity > Intermitent but heavy resource use services (Ej: Sports newspapers on mondays) Tema 1: Diseño de software seguro Cloud Computing Security
  • 64.
    Evaluate CC models 64 > IaaS, PaaS, SaaS ? > ¿Public, Private, Hybrid, Community? > See what others like us are doing > Decide which model fits our needs best Tema 1: Diseño de software seguro Cloud Computing Security
  • 65.
  • 66.
    Defining security needs 66 > Know our service throughly > Define the information flows > Identify sensitive info > Measure how critical the service is > Assign a value to the srevice Tema 1: Diseño de software seguro Cloud Computing Security
  • 67.
    Risk Analysis 67 > Know the existing risks when using cloud computing > Apply them to our service > Define a maximum risk level > Important!: Be utterly objective Tema 1: Diseño de software seguro Cloud Computing Security
  • 68.
  • 69.
    Evaluate cloud providers 69 > Read carefully the SLA (Service Level Agreements) > Read it again > Evaluate security compliance > Added value services > Price ! Tema 1: Diseño de software seguro Cloud Computing Security
  • 70.
    Security controls 70 > Define security controls > Controls in the cloud & our IT > Technical & procedural control > Target: Lower our real risk Tema 1: Diseño de software seguro Cloud Computing Security
  • 71.
  • 72.
    Bean counting … 72 > Migration costs > Cloud operation costs > Current operation costs > Troubleshooting costs (both cloud & current) > Make money talk … Tema 1: Diseño de software seguro Cloud Computing Security
  • 73.
    Make a decision 73 > Evaluate pros & cons of our current IT model & cloud computing > It’s not all about money … > Informed decision taking > You always should have a plan B Tema 1: Diseño de software seguro Cloud Computing Security
  • 74.
    CC offers great opportunities CC has risks There has to be a plan
  • 75.
    Conclusiones 75 >Cloud computing is here >Lots of business models & opportunities >Must know all the risks >Must have a sensible business plan Tema 1: Diseño de software seguro Cloud Computing Security
  • 76.
    Conclusiones I love it when a cloud plan comes together
  • 77.
  • 78.
    More info?. Presshere ! 78 Cloud Security Alliance https://cloudsecurityalliance.org/ Cloud Computing Security Guide - CSA http://cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf ENISA – Cloud Computing Security Risks http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing- risk-assessment Australia Gov. - Cloud Computing Risk Analysis Report http://www.dsd.gov.au/publications/Cloud_Computing_Security_Consid erations.pdf Tema 1: Diseño de software seguro Cloud Computing Security
  • 79.
    Have a planand jump into the sky ! Antonio Sanz / ansanz@unizar.es / @antoniosanzalc $slides = http://www.slideshare.net/ansanz