SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Beyond the Hype: Understanding Cloud
    Security for Your Application
            Bryan D. Payne
To the    Learn all                       Security        This is
    cloud!   about cloud                      concerns        hard!




              Bryan D. Payne, Director of Security Research
2
                             @bdpsecurity
Trust guest
       Cloud                                                      Attackers?
                        network?
      provider

      My               How to access                                 Where is
    security           my instances?                                 my data?
    policies?
                            Is there a
    Other cloud            right way?                               Etc…
      tenants




                  Bryan D. Payne, Director of Security Research
3
                                 @bdpsecurity
Computer Security: What We Know

Better                                     Worse

Design for security from the start         Retrofit security when it’s important

Understand your threats                    Just make it secure

Understand your goals                      Seriously, just add some security

Pervasive security culture                 That paranoid guy has it under control




                          Bryan D. Payne, Director of Security Research
4
                                         @bdpsecurity
Security Requires A Good Foundation




               Bryan D. Payne, Director of Security Research
5
                              @bdpsecurity
Security Needs System-Level Thinking




               Bryan D. Payne, Director of Security Research
6
                              @bdpsecurity
Example: Gene Sequence Analysis

                                      •    Variable workload
                                      •    Sensitive patient data
          +                           •    Regulatory compliance
                                      •    Computational integrity
                                      •    Multiple tenants
                                      •    Billing



              Bryan D. Payne, Director of Security Research
7
                             @bdpsecurity
4 SECURITY QUESTIONS


             Bryan D. Payne, Director of Security Research
8
                            @bdpsecurity
1. What are you protecting?

                                • Data
                                • Computation

                                • CIA
                                       – Confidentiality
                                       – Integrity
                                       – Availability



           Bryan D. Payne, Director of Security Research
9
                          @bdpsecurity
2. What is your risk tolerance?


                                    • Mindset
                                    • Budget
                                    • Repercussions




              Bryan D. Payne, Director of Security Research
10
                             @bdpsecurity
3. What are your threats?

                            •     Adware
                            •     Botnets
                            •     Spyware
                            •     Corporate Espionage
                            •     Nation State Attacks
                            •     Curious Neighbor




           Bryan D. Payne, Director of Security Research
11
                          @bdpsecurity
4. What is your attack surface?

                                 •    Network architecture
                                 •    Cloud provider
                                 •    Software config
                                 •    API Usage
                                 •    Users / Admins




              Bryan D. Payne, Director of Security Research
12
                             @bdpsecurity
CLOUD SECURITY


              Bryan D. Payne, Director of Security Research
13
                             @bdpsecurity
Public or Private (or Hybrid)?
               Inside / Outside Firewall
               Hardware / software control
     protect
               Policy / regulation allow public?
               Professional management
      risk     Can’t choose your neighbors

               Physical control
               Insight into software stack
     threats

               APIs available on the Internet
               Architectural specificity
     surface

                 Bryan D. Payne, Director of Security Research
14
                                @bdpsecurity
What IaaS Provider?

     protect



      risk



     threats



     surface

                  Bryan D. Payne, Director of Security Research
15
                                 @bdpsecurity
Key Points

     • Get IaaS-layer security from provider

     • Choose wisely, based on your needs




                Bryan D. Payne, Director of Security Research
16
                               @bdpsecurity
CLOUD APPLICATION SECURITY


              Bryan D. Payne, Director of Security Research
17
                             @bdpsecurity
What Does Your App Look Like?




             Bryan D. Payne, Director of Security Research
18
                            @bdpsecurity
Access to App: Who and How?




           Other cloud tenants (e.g., guest network)

           Cloud admin


              Bryan D. Payne, Director of Security Research
19
                             @bdpsecurity
Protecting App Data




        Bryan D. Payne, Director of Security Research
20
                       @bdpsecurity
Protecting App Computation




            Bryan D. Payne, Director of Security Research
21
                           @bdpsecurity
Unique Cloud App Security Concerns

• Entropy is hard to come by
• Be careful with reusing images
• Rapid, code-driven deployment
     – Keys stored inside your app, be careful
• Data persistence is tricky




                    Bryan D. Payne, Director of Security Research
22
                                   @bdpsecurity
Key Points
     • Custom security is always hard
     • The right IaaS platform can help
     • Follow the community
     • Cloud isn’t Legacy




             Bryan D. Payne, Director of Security Research
23
                            @bdpsecurity
PUTTING IT ALL TOGETHER


              Bryan D. Payne, Director of Security Research
24
                             @bdpsecurity
Cloud Provider Is Key
     • Understand what you need
     • Get the security you need at this level
     • Don’t do this yourself



     Protecting?   Risk tolerance?                 Threats?            Attack surface?




                       Bryan D. Payne, Director of Security Research
25
                                      @bdpsecurity
Cloud App Security is Specialized

                • Unique security concerns
                • Get expert help, if needed




      Protecting?   Risk tolerance?                 Threats?            Attack surface?




                        Bryan D. Payne, Director of Security Research
26
                                       @bdpsecurity
Trends to Watch For
• OpenStack Security Group
     https://launchpad.net/~openstack-ossg



• Cloud Attestation
     http://wiki.openstack.org/OpenAttestation
     http://code.google.com/p/vmitools/



• Attack Surface Research
     https://cloudsecurityalliance.org/research/big-data/




                           Bryan D. Payne, Director of Security Research
27
                                          @bdpsecurity
Bryan D. Payne
     bryan.payne@nebula.com

            @bdpsecurity
     http://www.bryanpayne.org




28

Weitere ähnliche Inhalte

Was ist angesagt?

Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare NelsonZero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare NelsonSSIMeetup
 
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk AdvisoryHow COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk AdvisoryCR Group
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...APNIC
 
"make secure" securing the development supply chain All Things Open 2019
"make secure" securing the development supply chain All Things Open 2019"make secure" securing the development supply chain All Things Open 2019
"make secure" securing the development supply chain All Things Open 2019Wes Widner
 
Securing the Development Supply Chain
Securing the Development Supply ChainSecuring the Development Supply Chain
Securing the Development Supply ChainAll Things Open
 
Cybersecurity is the Future of Computing
Cybersecurity is the Future of ComputingCybersecurity is the Future of Computing
Cybersecurity is the Future of ComputingDavid Fry
 
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESET
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESETMITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESET
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESETMITRE - ATT&CKcon
 
Navigating the Security Landscape
Navigating the Security LandscapeNavigating the Security Landscape
Navigating the Security LandscapeSucuri
 
Alerting, Reminding, Reminding, Reminding And Releasing Vulnerabilities
Alerting, Reminding, Reminding, Reminding And Releasing VulnerabilitiesAlerting, Reminding, Reminding, Reminding And Releasing Vulnerabilities
Alerting, Reminding, Reminding, Reminding And Releasing Vulnerabilitiestmacuk
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterSpanning Cloud Apps
 
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.marketingunitrends
 
2018 CISSP Mentor Program Session 1
2018 CISSP Mentor Program Session 12018 CISSP Mentor Program Session 1
2018 CISSP Mentor Program Session 1FRSecure
 
Anton Chuvakin on What is NOT Working in Security 2004
Anton Chuvakin on What is NOT Working in Security 2004Anton Chuvakin on What is NOT Working in Security 2004
Anton Chuvakin on What is NOT Working in Security 2004Anton Chuvakin
 
Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyVeriato
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationJeff Zahn
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015Daniel Miessler
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyb coatesworth
 
Avoid Rolling a Critical Fail
Avoid Rolling a Critical FailAvoid Rolling a Critical Fail
Avoid Rolling a Critical FailDomainTools
 
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup SuccessWebinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup SuccessStorage Switzerland
 

Was ist angesagt? (20)

Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare NelsonZero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
 
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk AdvisoryHow COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
"make secure" securing the development supply chain All Things Open 2019
"make secure" securing the development supply chain All Things Open 2019"make secure" securing the development supply chain All Things Open 2019
"make secure" securing the development supply chain All Things Open 2019
 
Securing the Development Supply Chain
Securing the Development Supply ChainSecuring the Development Supply Chain
Securing the Development Supply Chain
 
Cybersecurity is the Future of Computing
Cybersecurity is the Future of ComputingCybersecurity is the Future of Computing
Cybersecurity is the Future of Computing
 
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESET
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESETMITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESET
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESET
 
Navigating the Security Landscape
Navigating the Security LandscapeNavigating the Security Landscape
Navigating the Security Landscape
 
Alerting, Reminding, Reminding, Reminding And Releasing Vulnerabilities
Alerting, Reminding, Reminding, Reminding And Releasing VulnerabilitiesAlerting, Reminding, Reminding, Reminding And Releasing Vulnerabilities
Alerting, Reminding, Reminding, Reminding And Releasing Vulnerabilities
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware Disaster
 
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.
 
2018 CISSP Mentor Program Session 1
2018 CISSP Mentor Program Session 12018 CISSP Mentor Program Session 1
2018 CISSP Mentor Program Session 1
 
Anton Chuvakin on What is NOT Working in Security 2004
Anton Chuvakin on What is NOT Working in Security 2004Anton Chuvakin on What is NOT Working in Security 2004
Anton Chuvakin on What is NOT Working in Security 2004
 
Security for Thinkers
Security for ThinkersSecurity for Thinkers
Security for Thinkers
 
Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your Company
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
Avoid Rolling a Critical Fail
Avoid Rolling a Critical FailAvoid Rolling a Critical Fail
Avoid Rolling a Critical Fail
 
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup SuccessWebinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
 

Ähnlich wie Beyond the Hype: Understanding Cloud Security by Bryan D. Payne

[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...bugcrowd
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Symantec APJ
 
Public Cloud is Not Always the Answer... but Sometimes it is
Public Cloud is Not Always the Answer... but Sometimes it isPublic Cloud is Not Always the Answer... but Sometimes it is
Public Cloud is Not Always the Answer... but Sometimes it isAxway
 
2018 CISSP Mentor Program Session 2
2018 CISSP Mentor Program Session 22018 CISSP Mentor Program Session 2
2018 CISSP Mentor Program Session 2FRSecure
 
Software Security & Network Security
Software Security & Network SecuritySoftware Security & Network Security
Software Security & Network SecurityMaruf Hasan
 
Adaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery NetworksAdaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery Networksdigitallibrary
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlSecureAuth
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021Adam Shostack
 
Threat Modeling Everything
Threat Modeling EverythingThreat Modeling Everything
Threat Modeling EverythingAnne Oikarinen
 
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...Aggregage
 
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...Skycure
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Cathy Dwyer
 
Secure, social, cloud - mutually exclusive or perfect partners?
Secure, social, cloud - mutually exclusive or perfect partners?Secure, social, cloud - mutually exclusive or perfect partners?
Secure, social, cloud - mutually exclusive or perfect partners?Stuart Barr
 
Rv defcon25 osint tactics on source code intelligence - simon roses
Rv defcon25   osint tactics on source code intelligence - simon rosesRv defcon25   osint tactics on source code intelligence - simon roses
Rv defcon25 osint tactics on source code intelligence - simon rosesreconvillage
 
Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Intel IT Center
 
Applied data analytics_v1_6.23
Applied data analytics_v1_6.23Applied data analytics_v1_6.23
Applied data analytics_v1_6.23John C. Havens
 
How to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanHow to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanResilient Systems
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 

Ähnlich wie Beyond the Hype: Understanding Cloud Security by Bryan D. Payne (20)

[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
 
Public Cloud is Not Always the Answer... but Sometimes it is
Public Cloud is Not Always the Answer... but Sometimes it isPublic Cloud is Not Always the Answer... but Sometimes it is
Public Cloud is Not Always the Answer... but Sometimes it is
 
2018 CISSP Mentor Program Session 2
2018 CISSP Mentor Program Session 22018 CISSP Mentor Program Session 2
2018 CISSP Mentor Program Session 2
 
Day 1-1-intro-sw-vuls
Day 1-1-intro-sw-vulsDay 1-1-intro-sw-vuls
Day 1-1-intro-sw-vuls
 
Software Security & Network Security
Software Security & Network SecuritySoftware Security & Network Security
Software Security & Network Security
 
Adaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery NetworksAdaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery Networks
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021
 
Threat Modeling Everything
Threat Modeling EverythingThreat Modeling Everything
Threat Modeling Everything
 
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
 
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"
 
Secure, social, cloud - mutually exclusive or perfect partners?
Secure, social, cloud - mutually exclusive or perfect partners?Secure, social, cloud - mutually exclusive or perfect partners?
Secure, social, cloud - mutually exclusive or perfect partners?
 
Rv defcon25 osint tactics on source code intelligence - simon roses
Rv defcon25   osint tactics on source code intelligence - simon rosesRv defcon25   osint tactics on source code intelligence - simon roses
Rv defcon25 osint tactics on source code intelligence - simon roses
 
Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary
 
Applied data analytics_v1_6.23
Applied data analytics_v1_6.23Applied data analytics_v1_6.23
Applied data analytics_v1_6.23
 
How to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanHow to Audit Your Incident Response Plan
How to Audit Your Incident Response Plan
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 

Beyond the Hype: Understanding Cloud Security by Bryan D. Payne

  • 1. Beyond the Hype: Understanding Cloud Security for Your Application Bryan D. Payne
  • 2. To the Learn all Security This is cloud! about cloud concerns hard! Bryan D. Payne, Director of Security Research 2 @bdpsecurity
  • 3. Trust guest Cloud Attackers? network? provider My How to access Where is security my instances? my data? policies? Is there a Other cloud right way? Etc… tenants Bryan D. Payne, Director of Security Research 3 @bdpsecurity
  • 4. Computer Security: What We Know Better Worse Design for security from the start Retrofit security when it’s important Understand your threats Just make it secure Understand your goals Seriously, just add some security Pervasive security culture That paranoid guy has it under control Bryan D. Payne, Director of Security Research 4 @bdpsecurity
  • 5. Security Requires A Good Foundation Bryan D. Payne, Director of Security Research 5 @bdpsecurity
  • 6. Security Needs System-Level Thinking Bryan D. Payne, Director of Security Research 6 @bdpsecurity
  • 7. Example: Gene Sequence Analysis • Variable workload • Sensitive patient data + • Regulatory compliance • Computational integrity • Multiple tenants • Billing Bryan D. Payne, Director of Security Research 7 @bdpsecurity
  • 8. 4 SECURITY QUESTIONS Bryan D. Payne, Director of Security Research 8 @bdpsecurity
  • 9. 1. What are you protecting? • Data • Computation • CIA – Confidentiality – Integrity – Availability Bryan D. Payne, Director of Security Research 9 @bdpsecurity
  • 10. 2. What is your risk tolerance? • Mindset • Budget • Repercussions Bryan D. Payne, Director of Security Research 10 @bdpsecurity
  • 11. 3. What are your threats? • Adware • Botnets • Spyware • Corporate Espionage • Nation State Attacks • Curious Neighbor Bryan D. Payne, Director of Security Research 11 @bdpsecurity
  • 12. 4. What is your attack surface? • Network architecture • Cloud provider • Software config • API Usage • Users / Admins Bryan D. Payne, Director of Security Research 12 @bdpsecurity
  • 13. CLOUD SECURITY Bryan D. Payne, Director of Security Research 13 @bdpsecurity
  • 14. Public or Private (or Hybrid)? Inside / Outside Firewall Hardware / software control protect Policy / regulation allow public? Professional management risk Can’t choose your neighbors Physical control Insight into software stack threats APIs available on the Internet Architectural specificity surface Bryan D. Payne, Director of Security Research 14 @bdpsecurity
  • 15. What IaaS Provider? protect risk threats surface Bryan D. Payne, Director of Security Research 15 @bdpsecurity
  • 16. Key Points • Get IaaS-layer security from provider • Choose wisely, based on your needs Bryan D. Payne, Director of Security Research 16 @bdpsecurity
  • 17. CLOUD APPLICATION SECURITY Bryan D. Payne, Director of Security Research 17 @bdpsecurity
  • 18. What Does Your App Look Like? Bryan D. Payne, Director of Security Research 18 @bdpsecurity
  • 19. Access to App: Who and How? Other cloud tenants (e.g., guest network) Cloud admin Bryan D. Payne, Director of Security Research 19 @bdpsecurity
  • 20. Protecting App Data Bryan D. Payne, Director of Security Research 20 @bdpsecurity
  • 21. Protecting App Computation Bryan D. Payne, Director of Security Research 21 @bdpsecurity
  • 22. Unique Cloud App Security Concerns • Entropy is hard to come by • Be careful with reusing images • Rapid, code-driven deployment – Keys stored inside your app, be careful • Data persistence is tricky Bryan D. Payne, Director of Security Research 22 @bdpsecurity
  • 23. Key Points • Custom security is always hard • The right IaaS platform can help • Follow the community • Cloud isn’t Legacy Bryan D. Payne, Director of Security Research 23 @bdpsecurity
  • 24. PUTTING IT ALL TOGETHER Bryan D. Payne, Director of Security Research 24 @bdpsecurity
  • 25. Cloud Provider Is Key • Understand what you need • Get the security you need at this level • Don’t do this yourself Protecting? Risk tolerance? Threats? Attack surface? Bryan D. Payne, Director of Security Research 25 @bdpsecurity
  • 26. Cloud App Security is Specialized • Unique security concerns • Get expert help, if needed Protecting? Risk tolerance? Threats? Attack surface? Bryan D. Payne, Director of Security Research 26 @bdpsecurity
  • 27. Trends to Watch For • OpenStack Security Group https://launchpad.net/~openstack-ossg • Cloud Attestation http://wiki.openstack.org/OpenAttestation http://code.google.com/p/vmitools/ • Attack Surface Research https://cloudsecurityalliance.org/research/big-data/ Bryan D. Payne, Director of Security Research 27 @bdpsecurity
  • 28. Bryan D. Payne bryan.payne@nebula.com @bdpsecurity http://www.bryanpayne.org 28

Hinweis der Redaktion

  1. This slide should be done graphically showing a timeline with the above events on them. Ideally, reveal the timeline one step at a time, leading up to something funny (but tasteful!) for the final point
  2. Before we get our hands too dirty, let’s think about what we mean by security!
  3. The idea of this slide is to drill home the concept that security must come from the bottom up. In the cloud world, this means that you can’t – for example – trust inter-tenant isolation if you don’t trust the cloud software. You can’t trust the cloud software if you don’t trust the cloud provider. Etc…
  4. The idea of this slide is to drill home the concept that security must come from the bottom up. In the cloud world, this means that you can’t – for example – trust inter-tenant isolation if you don’t trust the cloud software. You can’t trust the cloud software if you don’t trust the cloud provider. Etc…
  5. Introduce a running example that we will use for the rest of the presentation. Tom is tasked with transitioning an internal corporate application into the cloud. The application has the following characteristics: highly variable workload requirements, sensitive data, different tenants need strict firewalling for compliance reasons, etc. Working example could be a gene sequencing system in a hospital of the future?? We will then use this to understand the security questions you need to be asking as you think about the cloud.
  6. For each of the following 5 questions, I’m thinking we should just have a slide with the question and one graphic / icon that depicts the question. Then, in the next section we can bring back the icons to demonstrate thinking about these 5 security questions as we make decisions about a cloud deployment.
  7. Understand what you are trying to protect. And what would be the consequences if your protection failed. Think about CIA (confidentiality, integrity, availability) and think about the various pieces of your system (all of the pieces of your cloud application, data in various forms / places, what parts need to be accessible to whom, what parts need to be private, etc)
  8. How bad would it be if you had a security breach. How much are you willing to spend to prevent such a breach. Are you a state-run intelligence agency? Or are you hosting a family blog?
  9. Who are you worried about breaking your security? The kid next door? Typical malware? Targeted corporate espionage from a competitor. Nation state level attacker?
  10. Where in your system are you potentially vulnerable to attack. This could be from within the cloud. From the cloud provider. From a vulnerability in your cloud app. From a social engineering attack on your cloud account. From someone that finds a vulnerability in the cloud APIs and steals your credentials. Etc…
  11. For each of the following 5 questions, I’m thinking we should just have a slide with the question and one graphic / icon that depicts the question. Then, in the next section we can bring back the icons to demonstrate thinking about these 5 security questions as we make decisions about a cloud deployment.
  12. Discuss security tradeoffs (professionally maintained, but out in the open vs. behind your firewall and optionally professionally maintained) (auditability differences) (…)
  13. If private, are you setting it up yourself? Or are you choosing a canned solution? If the former, do you have the expertise to get the security properties you need? If the later, does your provider offer the security you need? How can you verify any of this? Discuss different options (AWS, Rackspace, HP, Nebula, OpenStack, Eucalyptus,OpenCloud, ???). Can your cloud prove that it is running the right software to you? Can your cloud allow you to monitor your own instances (network traffic, host monitoring, related logs from cloud services, etc)?
  14. “Security rapidly becoming a differentiator”, “Understand what you need and ensure you get that from your provider”, “Lots of choices”, “avoiding lock-in is always a plus”
  15. For each of the following 5 questions, I’m thinking we should just have a slide with the question and one graphic / icon that depicts the question. Then, in the next section we can bring back the icons to demonstrate thinking about these 5 security questions as we make decisions about a cloud deployment.
  16. 2-3 pictures of different cloud application architectures
  17. 2-3 pictures of different cloud application architectures
  18. 2-3 pictures of different cloud application architectures
  19. 2-3 pictures of different cloud application architectures
  20. For each of the following 5 questions, I’m thinking we should just have a slide with the question and one graphic / icon that depicts the question. Then, in the next section we can bring back the icons to demonstrate thinking about these 5 security questions as we make decisions about a cloud deployment.
  21. For each of the following 5 questions, I’m thinking we should just have a slide with the question and one graphic / icon that depicts the question. Then, in the next section we can bring back the icons to demonstrate thinking about these 5 security questions as we make decisions about a cloud deployment.