122
Rob Witoff, Director CLOUD SECURITY & USABLE PROTECTIONS FROM REAL WORLD THREATS

Cloud Security & Real World Threats

Embed Size (px)

Citation preview

Page 1: Cloud Security & Real World Threats

R o b W i t o f f , D i r e c t o r

CLOUD SECURITY & USABLE PROTECTIONS FROM REAL WORLD THREATS

Page 2: Cloud Security & Real World Threats

coinbase.com

Page 3: Cloud Security & Real World Threats

coinbase.com

Page 4: Cloud Security & Real World Threats

coinbase.com

Page 5: Cloud Security & Real World Threats

coinbase.com

Secp256k1: 32 Sun Years of Energy

Page 6: Cloud Security & Real World Threats

coinbase.com

PRIVATE KEY PUBLIC KEY

1EBHA1ckUWzNKN7BMfDwGTx6GKEbADUozX

BITCOIN ADDRESS

Page 7: Cloud Security & Real World Threats

coinbase.com

Page 8: Cloud Security & Real World Threats

coinbase.com

Page 9: Cloud Security & Real World Threats

coinbase.com

TWO TYPES OF BANKS

us them

Page 10: Cloud Security & Real World Threats

coinbase.com

Page 11: Cloud Security & Real World Threats

Observe Orient Decide Act

Page 12: Cloud Security & Real World Threats

coinbase.com

VPC

IAM

NACL

SecurityGroups

RouteTable

ShareSnapshotCloudtrail

Flow Logs

DENY

Geo

Volume

Misconfiguration

Data Exfiltration

Anomalous Activity

Page 13: Cloud Security & Real World Threats

coinbase.com

Cloudtrail S3

→Lambda

→Kinesis

→ →

Page 14: Cloud Security & Real World Threats

coinbase.com

Page 15: Cloud Security & Real World Threats

coinbase.com

Page 16: Cloud Security & Real World Threats

coinbase.com

Page 17: Cloud Security & Real World Threats

coinbase.com

Page 18: Cloud Security & Real World Threats

coinbase.com

Page 19: Cloud Security & Real World Threats

coinbase.com

Page 20: Cloud Security & Real World Threats

coinbase.com

Page 21: Cloud Security & Real World Threats

2015 Verizon Data Breach Investigations

Report

Page 22: Cloud Security & Real World Threats
Page 23: Cloud Security & Real World Threats
Page 24: Cloud Security & Real World Threats
Page 25: Cloud Security & Real World Threats
Page 26: Cloud Security & Real World Threats
Page 27: Cloud Security & Real World Threats

2/22 google trends search for “glibc”

Page 28: Cloud Security & Real World Threats

2/22 google trends search for “glibc”

Page 29: Cloud Security & Real World Threats

Friday → Weekend!

Page 30: Cloud Security & Real World Threats
Page 31: Cloud Security & Real World Threats
Page 32: Cloud Security & Real World Threats

coinbase.com

“Asset Discovery”

“Digital Footprint Detection”

“Unknown Asset Indexing”

Page 33: Cloud Security & Real World Threats

coinbase.com

Know Your Infrastructure

Patch Your Infrastructure

Page 34: Cloud Security & Real World Threats

coinbase.com

Know Your Infrastructure

Patch Your Infrastructure

Page 35: Cloud Security & Real World Threats

coinbase.com

Page 36: Cloud Security & Real World Threats

coinbase.com

api

Page 37: Cloud Security & Real World Threats

coinbase.com

30 Day Project

No Coinbase Server Lives > 30 Days

Page 38: Cloud Security & Real World Threats

coinbase.com

www api admin

Page 39: Cloud Security & Real World Threats

coinbase.com

30 Day Project

- Automation - Codification - Knowledge Sharing - Disaster Recovery

Page 40: Cloud Security & Real World Threats

coinbase.com

30 day plan -> impact on automation AWS Cache, Discovery & Charting

5

0

Page 41: Cloud Security & Real World Threats

coinbase.com

Know Your Infrastructure

Patch Your Infrastructure

Page 42: Cloud Security & Real World Threats

coinbase.com

Page 43: Cloud Security & Real World Threats

coinbase.com

Page 44: Cloud Security & Real World Threats

coinbase.com

Page 45: Cloud Security & Real World Threats

Disclosure Feb 17, 2016_________________________________________________________________________________________________________________________

Discovery < July 13, 2015

?

Page 46: Cloud Security & Real World Threats
Page 47: Cloud Security & Real World Threats

“At this point, the probability is close to one that every target has had its private keys extracted by multiple intelligence

agencies”

https://www.schneier.com/blog/archives/2014/04/heartbleed.html

Page 48: Cloud Security & Real World Threats

https://xkcd.com/1353/

Page 49: Cloud Security & Real World Threats
Page 50: Cloud Security & Real World Threats
Page 51: Cloud Security & Real World Threats

Secure By $$$ Optimization -or-

Secure By Design?

https://www.washingtonpost.com/blogs/the-switch/files/2014/02/mainroom.jpg

Page 52: Cloud Security & Real World Threats

Secure by $$$ Optimization -or-

Secure by Design

Page 53: Cloud Security & Real World Threats

coinbase.com

Page 54: Cloud Security & Real World Threats

coinbase.com

Page 55: Cloud Security & Real World Threats

coinbase.com

shamir secret

sharing

m-of-n

Page 56: Cloud Security & Real World Threats

coinbase.com

multisig transaction

3-of-5

Page 57: Cloud Security & Real World Threats

coinbase.com

Page 58: Cloud Security & Real World Threats

coinbase.com

Page 59: Cloud Security & Real World Threats

coinbase.com

Page 60: Cloud Security & Real World Threats

coinbase.com

Page 61: Cloud Security & Real World Threats

coinbase.com

Page 62: Cloud Security & Real World Threats

coinbase.com

Page 63: Cloud Security & Real World Threats

coinbase.com

Page 64: Cloud Security & Real World Threats

coinbase.com

Page 65: Cloud Security & Real World Threats

coinbase.com

~99% of bitcoin will never touch a routable electron

… and neither should your root MFA tokens!

Page 66: Cloud Security & Real World Threats

coinbase.com

Page 67: Cloud Security & Real World Threats

coinbase.com

Page 68: Cloud Security & Real World Threats
Page 69: Cloud Security & Real World Threats

coinbase.com

Page 70: Cloud Security & Real World Threats

coinbase.com

Page 71: Cloud Security & Real World Threats

coinbase.com

Self Service IAM

Page 72: Cloud Security & Real World Threats

coinbase.com

Self Service IAM

Page 73: Cloud Security & Real World Threats

coinbase.com

Self Service IAM

Page 74: Cloud Security & Real World Threats

coinbase.com

Self Service IAM

Page 75: Cloud Security & Real World Threats

coinbase.com

Self Service IAM

Page 76: Cloud Security & Real World Threats

coinbase.com

Self Service IAM

Page 77: Cloud Security & Real World Threats

coinbase.com

https://github.com/coinbase/self-service-iam

Page 78: Cloud Security & Real World Threats

coinbase.com

Page 79: Cloud Security & Real World Threats

coinbase.com

Cloudtrail S3 Lambda Kinesis

→ → → →

Page 80: Cloud Security & Real World Threats
Page 81: Cloud Security & Real World Threats

Accessing User Data via Metadata Service SSRF

Page 82: Cloud Security & Real World Threats
Page 83: Cloud Security & Real World Threats

https://tools.ietf.org/html/rfc6890

Page 84: Cloud Security & Real World Threats

https://tools.ietf.org/html/rfc6890

Page 85: Cloud Security & Real World Threats

EC2 Instance

169.254.169.254

Page 86: Cloud Security & Real World Threats
Page 87: Cloud Security & Real World Threats
Page 88: Cloud Security & Real World Threats
Page 89: Cloud Security & Real World Threats
Page 90: Cloud Security & Real World Threats
Page 91: Cloud Security & Real World Threats
Page 92: Cloud Security & Real World Threats
Page 93: Cloud Security & Real World Threats
Page 94: Cloud Security & Real World Threats
Page 95: Cloud Security & Real World Threats
Page 96: Cloud Security & Real World Threats
Page 97: Cloud Security & Real World Threats
Page 98: Cloud Security & Real World Threats
Page 99: Cloud Security & Real World Threats
Page 100: Cloud Security & Real World Threats
Page 101: Cloud Security & Real World Threats
Page 102: Cloud Security & Real World Threats
Page 103: Cloud Security & Real World Threats
Page 104: Cloud Security & Real World Threats

https://github.com/Crypt0s/FakeDns

Page 105: Cloud Security & Real World Threats
Page 106: Cloud Security & Real World Threats

Resolution #1

Resolution #2!

Page 107: Cloud Security & Real World Threats
Page 108: Cloud Security & Real World Threats

coinbase.com

via @Lukasa https://github.com/kennethreitz/requests/issues/2008#issuecomment-40793099

Page 109: Cloud Security & Real World Threats

coinbase.com

Page 110: Cloud Security & Real World Threats

coinbase.com

1.Lookup IP Address 2.Validate IP Address Against RFC 6890 3.Make Request Bound to this Validated IP Address

Making A Safe Web Request inside Your Cloud

Page 111: Cloud Security & Real World Threats

coinbase.com

Page 112: Cloud Security & Real World Threats
Page 113: Cloud Security & Real World Threats

Accessing User Data 1. Metadata Service SSRF

Page 114: Cloud Security & Real World Threats

Accessing User Data 1. Metadata Service SSRF 2. AWS API

Page 115: Cloud Security & Real World Threats

coinbase.com

Page 116: Cloud Security & Real World Threats

coinbase.com

11911 actions x 471 servicesPolicies Are Hard

Page 117: Cloud Security & Real World Threats

coinbase.com

11911 actions x 471 servicesPolicies Are Hard

instanceType ebsOptimized deviceMapping

shutdownBehavior userData

Page 118: Cloud Security & Real World Threats

coinbase.com

11911 actions x 471 servicesPolicies Are Hard

instanceType ebsOptimized deviceMapping

shutdownBehavior userData

Page 119: Cloud Security & Real World Threats

coinbase.com

Page 120: Cloud Security & Real World Threats

coinbase.com

ec2:Describe* ec2:DescribeInstance ec2:DescribeInstanceAttribute

Write Explicit IAM Policies

Page 121: Cloud Security & Real World Threats

coinbase.com

Cloud Can Be Very Secure

Insight Without Access

Security Through Consensus

Security Can Empower

Page 122: Cloud Security & Real World Threats

coinbase.com@rwitoff

Thanks!