79
Cloud Computing & Security: Are there clouds in our sky ?

Cloud computing security

Embed Size (px)

DESCRIPTION

A talk about Cloud computing and the risks and benefits that such an squema presents to our IT operations

Citation preview

Page 1: Cloud computing security

Cloud Computing & Security: Are there clouds in our sky ?

Page 2: Cloud computing security

> Antonio Sanz

> I3A - IT Manager

> Security Expert

> http://i3a.unizar.es

> [email protected]

> @antoniosanzalc

Page 3: Cloud computing security

Cloud Computing

Page 4: Cloud computing security

Tema 1: Diseño de software seguro

4

Cloud Computing Security

Index

> Cloud Computing

> Opportunities

> Cloud Computing risks

> Migrating to a Cloud Infraestructure

Page 5: Cloud computing security

“Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a

shared pool of configurable computing resources (e.g., networks, servers, storage,

applications, and services) that can be rapidly provisioned and

released with minimal management effort or service provider

interaction”

[*First & last boring slide. Promise]

Page 6: Cloud computing security

Tema 1: Diseño de software seguro

6

Cloud Computing Security

Cloud Computing: Main point

>On demand

>Ubiquous

>Resource pool

>Elastic

>Measureable

Page 7: Cloud computing security

Service Types

Page 8: Cloud computing security

Tema 1: Diseño de software seguro

8

Cloud Computing Security

IaaS – Infrastructure as a Service

> Raw infrastructure

> Storage, network & servers

> We do the rest

> Flexible but costly

> Ej: Amazon AWS

Page 9: Cloud computing security

Tema 1: Diseño de software seguro

9

Cloud Computing Security

PaaS – Platform as a Service

> You’ve got the OS but no apps

> IaaS + OS + Base services

> App deploying ok (.jar)

> Less control but less cost

> Ej: Google App Engine

Page 10: Cloud computing security

Tema 1: Diseño de software seguro

10

Cloud Computing Security

SaaS – Software as a Service

> You’ve got everything

> Iaas + Paas + Apps

> Ready to go

> Minimal control / Minimaleffort

> Ej: Salesforce.com (CRM)

Page 11: Cloud computing security

Tema 1: Diseño de software seguro

11

Cloud Computing Security

Public, Private Clouds

>Públic: Public access, sharedresources, (-security, -cost)

Ej: Amazon AWS

>Private: Private access, dedicated resources (+security, +cost)

Ej: NASA Nebula � OpenStack

Page 12: Cloud computing security

Tema 1: Diseño de software seguro

12

Cloud Computing Security

Community , Hybrid

>Community: Group that shares a private cloud

Ej: Business holding

>Hybrid: Mix some of the others

Page 13: Cloud computing security

Technology

Page 14: Cloud computing security

Tema 1: Diseño de software seguro

14

Cloud Computing Security

Technologies

> Virtualization

> Shared storage

> High speed networks

> Multidevice access

> Advanced Middleware (access, monitoring, provisioning)

Page 15: Cloud computing security

Advantages

Page 16: Cloud computing security

Tema 1: Diseño de software seguro

16

Cloud Computing Security

Cloud Computing Pros

> Elasticity / Scalability

> Availability

> Performance

> Ubiquous access

> Very low CAPEX

> OPEX savings

Page 17: Cloud computing security

Success Case

Page 18: Cloud computing security

Tema 1: Diseño de software seguro

18

Cloud Computing Security

Amazon AWS - http://aws.amazon.com/

> Amazon Web Services

> EC2 (Elastic Cloud Computing)

> S3 (Simple Storage Service)

> You can do … almost everything

> Others: Rackspace, vCloud, Azure, IBM (great, too)

Page 19: Cloud computing security

Tema 1: Diseño de software seguro

19

Cloud Computing Security

NetFlix - http://www.netflix.com/

> Video streaming (Films, serials, shows)

> Almost 20% of EEUU bandwidth

> Uses Amazon AWS

> Benefits: Escalability + Availability

> Video transcoding “on the fly” with EC2

> Video storage in EC3 with S3

> Usage data analysis with EC2

Page 20: Cloud computing security

Tema 1: Diseño de software seguro

20

Cloud Computing Security

Dropbox - http://www.dropbox.com/

> Backup in the cloud

> Around 12Pb (12.000 Tb)

> Uses Amazon S3

> Benefit: Escalability

> Business model (VIP): http://www.w2lessons.com/2011/04/economics-of-dropbox.html

Page 21: Cloud computing security

Technology

Cloud Is

Good!

Page 22: Cloud computing security

Cloud Computing Risks

Page 23: Cloud computing security

Business Risks

Page 24: Cloud computing security

Vendor Lock-In

Page 25: Cloud computing security

Vendor Lock-In

= To have you

by the balls

Page 26: Cloud computing security

Vendor Lock-In

Page 27: Cloud computing security

Tema 1: Diseño de software seguro

27

Cloud Computing Security

Vendor lock-in

> It’s hard to say goodbye

> SaaS : No “export” option

> PaaS : API interoperability

> IaaS : Different technologies

> Defsense: Right CP (Cloud Provider) choice

Page 28: Cloud computing security

Lack of IT Governance

Page 29: Cloud computing security

Tema 1: Diseño de software seguro

29

Cloud Computing Security

Lack of IT Governance

> IT Governance != Cloud ComputingGovernance

> Limited funcionalities / High costs

> Loss of Control of our IT

> Defense: Clear objectives & design, Right CP choice

Page 30: Cloud computing security

Compliance & Laws

Page 31: Cloud computing security

Tema 1: Diseño de software seguro

31

Cloud Computing Security

Compliance & Laws

> We need to comply with all theregulations (PCI DSS, LOPD)

> Imposes transitive compliance onthe CP

> Legal lapses

> Defense: Good analysis, right CP choice

Page 32: Cloud computing security

SLAs

Page 33: Cloud computing security

Tema 1: Diseño de software seguro

33

Cloud Computing Security

SLA (Service Level Agreements)

> Contract signed with CP

> Services offered

> Warranties offered

> Service metrics & compensations/penalties

> Defense: SLA study & tuning

Page 34: Cloud computing security

Provider Failures

Page 35: Cloud computing security

Tema 1: Diseño de software seguro

35

Cloud Computing Security

Provider failures

> “Errare machina est”

> Starting security standards

> CP Business Continuity plan

> OUR Business Continuity plan

> Defense: Business continuitydefinition, right CP choice

Page 36: Cloud computing security

Third party failures

Page 37: Cloud computing security

Tema 1: Diseño de software seguro

37

Cloud Computing Security

Third party failures

> CP = Service & Technologies Integrator

> But … what about electricity, connectivity, HVAC ?

> We have to take care of ourfacilities too

> Defense: Right CP choice, third party evaluation (CP and proper)

Page 38: Cloud computing security

Technical risks

Page 39: Cloud computing security

Resource Starvation

Page 40: Cloud computing security

Tema 1: Diseño de software seguro

40

Cloud Computing Security

Resource starvation

> Resources are assigned on demand

> CP scales up … but how ?

> Situation: No more resourcesavailable when they were mostneeded !!

> Defense: Resource reservation, rightCP choice

Page 41: Cloud computing security

Isolation Faults

Page 42: Cloud computing security

Tema 1: Diseño de software seguro

42

Cloud Computing Security

Isolation Faults

> Cloud = Shared Resources = Shared flat

> How secure is your neighbour ?

> Third party security failure � Everybodyis compromised

> Defense: Private Clouds, right CP choice

Page 43: Cloud computing security

Data leaks

Page 44: Cloud computing security

Tema 1: Diseño de software seguro

44

Cloud Computing Security

Data leaks

> Lots of sensitive info in our CP

> Disgruntled employees

> Wrong service configuration

> Defense: Right CP choice, cipher use, log reviews

Page 45: Cloud computing security

Data Transit

Page 46: Cloud computing security

Tema 1: Diseño de software seguro

46

Cloud Computing Security

Data Transit

> Network � Information flows

> Local interception

> On transit interception

> In-Cloud Intercepcion

> Defense: SSL, cipher use

Page 47: Cloud computing security

Cloud Provider Compromise

Page 48: Cloud computing security

Tema 1: Diseño de software seguro

48

Cloud Computing Security

CP Compromise

> Cloud = Technology mesh = Lots ofpossible security flaws

> Cloud interface management attacks

> Cloud user management attacks

> Infrastructure attacks

> Defense: Right CP choice, SLAs, incidentresponse planning

Page 49: Cloud computing security

DDOS

Page 50: Cloud computing security

Tema 1: Diseño de software seguro

50

Cloud Computing Security

DDOS / EDOS

> DDOS (Distributed Denial Of Service)

> Intended to take down an infrastructure �

Attack to availability

> Cloud � Neighbour are collateral damage

> EDOS (Economic Denial of Service)

> Intended to cause economic damage

> Defense: SLAs, charge limits, incidentresponse

Page 51: Cloud computing security

Cipher & Backup

Page 52: Cloud computing security

Tema 1: Diseño de software seguro

52

Cloud Computing Security

Cipher

> Sensible info � Cipher

> Secure information deletion (wipe)

> Defensas: Strong ciphers, guardar claves, SLA

Page 53: Cloud computing security

Tema 1: Diseño de software seguro

53

Cloud Computing Security

Backups

> Info is EVERYTHING � Backups

> Don’t forget your backups (even ifthe CP does … you too)

> Automated procedure

> Defensa: Procedure design, right CP choice

Page 54: Cloud computing security

Tema 1: Diseño de software seguro

54

Cloud Computing Security

Logs Access

> Logs = Activity of our IT

> Needed to do debugging

> Critic if a security incident arises

> How can access my logs ?

> Defense: SLA, right CP choice

Page 55: Cloud computing security

Disaster Recovery

Page 56: Cloud computing security

Tema 1: Diseño de software seguro

56

Cloud Computing Security

Disaster Recovery

> Shit happens (Murphy’s Law)

> Earthquakes, fires, floods, alien invasions…

> Our CP must have a Business Continuityplan

> We must have ours !!

> Defense: Business Continuity plan

Page 57: Cloud computing security

Tema 1: Diseño de software seguro

57

Cloud Computing Security

Legal Risks

Page 58: Cloud computing security

Tema 1: Diseño de software seguro

58

Cloud Computing Security

Compliance & Laws

> Lots of laws & regulations

> Is our CP compliant ?

> National & International laws

> Defense: Preliminary analysis, right CP choice

Page 59: Cloud computing security

Tema 1: Diseño de software seguro

59

Cloud Computing Security

Data protection

> LOPD (Ley Orgánica de Protecciónde Datos)

> Cloud implies sometimes international data transfers �Complicated issues

> Safe Harbour � Amazon, Google

> Defense: Preliminary analysis, right CP choice

Page 60: Cloud computing security

Tema 1: Diseño de software seguro

60

Cloud Computing Security

Computer Forensic

> Security incident in our CP �Someone has set up a child pornography site

> Maybe anyone in our cloud !!

> Possible result = Server seizure

> Defense: Right CP choice, SLA, Business Continuity plan

Page 61: Cloud computing security

Using Cloud Computing

Page 62: Cloud computing security

Analyze

Page 63: Cloud computing security

Tema 1: Diseño de software seguro

63

Cloud Computing Security

Identify Services

> Services that can benefit most fromCloud Computing

> Main benefits: Scalability, Availability & Elasticity

> Intermitent but heavy resource use services (Ej: Sports newspapers onmondays)

Page 64: Cloud computing security

Tema 1: Diseño de software seguro

64

Cloud Computing Security

Evaluate CC models

> IaaS, PaaS, SaaS ?

> ¿Public, Private, Hybrid, Community?

> See what others like us are doing

> Decide which model fits our needsbest

Page 65: Cloud computing security

Know

Page 66: Cloud computing security

Tema 1: Diseño de software seguro

66

Cloud Computing Security

Defining security needs

> Know our service throughly

> Define the information flows

> Identify sensitive info

> Measure how critical the service is

> Assign a value to the srevice

Page 67: Cloud computing security

Tema 1: Diseño de software seguro

67

Cloud Computing Security

Risk Analysis

> Know the existing risks when usingcloud computing

> Apply them to our service

> Define a maximum risk level

> Important!: Be utterly objective

Page 68: Cloud computing security

Plan

Page 69: Cloud computing security

Tema 1: Diseño de software seguro

69

Cloud Computing Security

Evaluate cloud providers

> Read carefully the SLA (ServiceLevel Agreements)

> Read it again

> Evaluate security compliance

> Added value services

> Price !

Page 70: Cloud computing security

Tema 1: Diseño de software seguro

70

Cloud Computing Security

Security controls

> Define security controls

> Controls in the cloud & our IT

> Technical & procedural control

> Target: Lower our real risk

Page 71: Cloud computing security

Decide

Page 72: Cloud computing security

Tema 1: Diseño de software seguro

72

Cloud Computing Security

Bean counting …

> Migration costs

> Cloud operation costs

> Current operation costs

> Troubleshooting costs (both cloud& current)

> Make money talk …

Page 73: Cloud computing security

Tema 1: Diseño de software seguro

73

Cloud Computing Security

Make a decision

> Evaluate pros & cons of our currentIT model & cloud computing

> It’s not all about money …

> Informed decision taking

> You always should have a plan B

Page 74: Cloud computing security

CC offers great

opportunities

CC has risks

There has to

be a planplanplanplan

Page 75: Cloud computing security

Tema 1: Diseño de software seguro

75

Cloud Computing Security

Conclusiones

>Cloud computing is here

>Lots of business models & opportunities

>Must know all the risks

>Must have a sensible business plan

Page 76: Cloud computing security

Conclusiones

I love itwhen a

cloudplan

comes together

Page 77: Cloud computing security

Don’t be under a cloud !

Page 78: Cloud computing security

Tema 1: Diseño de software seguro

78

Cloud Computing Security

More info?. Press here !

Cloud Security Alliance

https://cloudsecurityalliance.org/

Cloud Computing Security Guide - CSA

http://cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf

ENISA – Cloud Computing Security Risks

http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment

Australia Gov. - Cloud Computing Risk Analysis Report

http://www.dsd.gov.au/publications/Cloud_Computing_Security_Considerations.pdf

Page 79: Cloud computing security

Antonio Sanz / [email protected] / @antoniosanzalc

Have a plan and jump into the sky !

$slides = http://www.slideshare.net/ansanz