SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Cloud Security Perspectives

                              Dan Carlsen
                              Certified Security IT Specialist – IBM
                              dcarlsen@us.ibm.com




                                                      © 2011 IBM Corporation
Perspectives

               Security is one of the top customer
               concerns about Cloud Computing

               What does this mean?


               Cloud customers need assurance that providers are
               following sound security practices in mitigating the risks
               facing both the customer and the provider.

               The security requirements in cloud computing are not
               different from other distributed environments operated in
               a service provider model.

               However, through the low price points offered in a cloud
               and an often more anonymous consumer-provider-
               interaction, worries can grow.
               .                                       IBM Corporation




2                                                             © 2011 IBM Corporation
Security in the Cloud

         A recent Appirio survey of 150+ mid to                                         According to IBM's Institute for
         large-sized firms that have already                                            Business Value 2010 Global IT Risk
         adopted cloud applications:                                                    Study, cloud computing raised
                                                                                        serious concerns among respondents
                                                                Very Important
                                                                                        about the use, access and control of
                                                         Important
                                         Somewhat Important
                                                                                        data
                            Of Little Importance
                     Unimportant


    Ensuring security
    & compliance



                                                                                        Cloud M akes pr ot ect ing
           Single Biggest Misconception about the Cloud                                   pr ivacy more difficult                      77%
           % of Respondents

                Security is an issue with the cloud                    28%                 Concerned about a                50%
                                                                                           dat a breach or loss
          Cloud solutions are difficult to integrate          15%

    Cloud solutions have a higher chance of lock-in          13%

         Cloud solutions are difficult to customize          12%
                                                                                 concer ned about a weakening
                                                                                     of t he cor por at e net wor k   23%
                   Cloud solutions are not reliable     10%


                  Cloud vendors are not yet viable      8%

                                              None     7%

                    The cloud model is not proven      6%




3                                                                                                                           © 2011 IBM Corporation
Customer Concerns with Cloud Computing *
     LOSS OF GOVERNANCE: Customer relinquishes some control over the infrastructure. TRUST in the provider is
      paramount. Providers experience with outsourcing provides evidence of trust.
     COMPLIANCE RISKS: The providers operational characteristics directly affect the ability for a customer to achieve
      compliance with appropriate regulations and industry standards.
     ISOLATION FAILURE: multi-tenancy and shared resources are defining characteristics of cloud computing. This risk
      category covers the failure of mechanisms separating storage, memory, routing and even reputation between different
      tenants (e.g., so-called guest-hopping attacks). However it should be considered that attacks on resource isolation
      mechanisms (e.g.,. against hypervisors) are still less numerous and much more difficult for an attacker to put in practice
      compared to attacks on traditional Operating Systems
     DATA HANDLING
        - DATA PROTECTION: The customer relinquishes control over their data to the provider. The provider must give
          demonstrable assurances to the customer that their data is maintained securely from other tenants of the cloud.
          These assurances are part of the basis for trust in the provider
        - INSECURE or INCOMPLETE DATA DELETION: Does the provider ensure that data is deleted in a manner that
          does not allow leakage upon re-allocation.
     MANAGEMENT INTERFACE COMPROMISE: customer management interfaces of a public cloud provider are
      accessible through the Internet and mediate access to larger sets of resources (than traditional hosting providers) and
      therefore pose an increased risk, especially when combined with remote access and web browser vulnerabilities
     MALICIOUS INSIDER: Cloud architectures necessitate certain roles which give the provider highly privileged
      capabilities. Provider operations, monitoring and incident handling build trust with the customer. Providers history of
                                                                                                             IBM Corporation
      running outsourcing contracts also builds trust


* 2009 European Network and Information Security Agency (ENISA)
Cloud Computing: Benefits, risks and recommendations for information security

4                                                                                                                   © 2011 IBM Corporation
Loss of Governance

     TRUST
      - Concerns that at some level the customer is relinquishing control
     Raises the questions
      - Can I trust the provider to handle my data in a manner that meets my
        requirements
      - How assured am I that the provider is managing the cloud in a competent
        manner
      - How assured am I that my data is separated from other tenants
      - How assured am I that my data is protected from insiders at the provider




                                                                           IBM Corporation




5                                                                                © 2011 IBM Corporation
Compliance Risks
     Challenges
      - Myriad of different regulations, industry practices that a customer must meet
      - Customer is ultimately responsible for being compliant with the appropriate measures
      - Cloud provider capabilities factor into how a customer achieves their compliance
        objectives
      - Different cloud types put different burden on the provider (e.g. Infrastructure-as-a-
        Service on data center operations, Software-as-a-Service on application compliance)
     Measures in Development/Test Cloud and Desktop Cloud
      - Our current infrastructure-focused service products, customer data is opaque to the
        provider. Provider is a custodian of the data, and does not touch the customer data
      - Typically in industry-specific compliance policies, from an infrastructure perspective,
        deal with:
           Managing privileged access
           Auditing of accesses to data by provider staff
                                                                                  
           Policies and practices for dealing with incidents                         IBM Corporation




6                                                                                          © 2011 IBM Corporation
Isolation Failure
 Challenges
    - Providing robust means of separating customers from each other.


 Measures in Development/Test Cloud and Desktop Cloud
    - Development/Test cloud is a “multi-instance” form of multi-tenancy
        Customers get “instances” of operating system images, which execute on
         resources that are shared between multiple tenants.
    - Mechanisms
        Hypervisors - enforces separation of operating system instances within a single
         physical hardware system. Provides a “logical” air-gap between customers
        Network Separation
          -Firewalls - Customer controlled
              -implemented independent of the operating systems at the hypervisor utilizing Trusted Virtual Domains
          -Virtual LANs
                                                                                                    IBM Corporation
              -Customers can choose to have their guest images on a dedicated virtual LAN
              -VLANs connect back to the customer using Virtual Private Networks



7                                                                                                         © 2011 IBM Corporation
Data Handling
 Challenges
    - Ensuring that customer data is available to only that customer
    - Ensuring that when a customer deletes data (or ephemeral data is no longer in use)
      that it becomes unreadable
 Measures in Development/Test Cloud and Desktop Cloud
    - Data Protection
        Customers provided with the ability to create “virtual disk drives”(VDD) (files which
         are presented to virtual machines as block devices). Customer can utilize
         operating system and application level encryption against these as they are
         accessed as native file systems to the guests.
        Each customers data is stored in a unique “file set” within the CC storage structure
        Access Control Lists (ACL’s) are used to ensure separation of customers. Guests
         run as a specific “customer” user. ACL’s on files are set to that user.
    - Data Destruction
        Any data on disk is securely erased using a US DoD algorithm when deleted
                                                                            IBM Corporation


        Ephemeral storage - when the storage is no longer used by a virtual machine
        Customer VDDs - when deleted from the management console.
8                                                                                     © 2011 IBM Corporation
Management Interface Compromise
 Challenges
    - Ensuring customer operations are separated from other customers
    - Ensuring that web based interfaces implement robust security practices
    - Ensuring customer accesses to their resources are managed and controlled by the
      customer
 Measures in Development/Test Cloud and Desktop Cloud
    - Administrative Portal
        Authenticated via Web Identity
        Authorized via Portal Access Controls
        Provides interfaces to initiate automated work flows for discrete tasks
          - Customer manages the privileges of their user base
        Operations logged - end to end transaction auditing
    - Operating Systems Guests
        Once provisioned IBM has no direct access to the guest VM;s
                                                                                      IBM Corporation
        Customers provided with initial SSH Key pair or Administrative password
          - Customers MUST change these and any middleware administrative passwords upon taking
            control over the guest

9                                                                                           © 2011 IBM Corporation
Malicious Insider
  Challenges
     - Ensuring that Cloud providers enforce policies for administrative operations to the
       infrastructure. This includes disciplinary policies.
     - Ensuring that the provider has documented policies which are applied for all
       administrators
  Measures in Development/Test Cloud and Desktop Cloud
     - Automation
         Not a traditional Security construct
         Automation assures control over specific administrative tasks which are broken
          down to well defined work flow sequences.
            -Automation is audited end to end to be able to re-construct a given work flow
     - Human Administration
         All infrastructure components are managed/operated to the same policies as IBM
          Internal systems (ITCS104).
         Shared user ID’s are prohibited. Each administrative user uses their own ID to
          authenticate.
                                                                                IBM Corporation
         User authorizations assigned based on least privilege principles.
         IBM’s business conduct guidelines provide the framework for disciplinary action
          should administrative privileges be abused.
10                                                                                           © 2011 IBM Corporation
Monitoring/Reporting
 Challenges
     - Ensuring that the infrastructure is managed per provider specified policies
     - Providing reports to customers about operations which affect the infrastructure as a
       whole or their specific resources.
 Measures in Development/Test cloud and Desktop Cloud
     - Logging
         Infrastructure systems enable operating system audit capabilities
         End to end operation flows are logged and auditable
         Audit log data is retained for 90 days
         Logs are monitored and incident tickets raised for any actions which are not
           permitted.
     - Intrusion
         Infrastructure is monitored by Intrusion Detection & Protection systems (IDS/IPS)
         Internet points of ingress and egress are monitored with IDS/IPS
         Future - will provide customer specific IDS/IPS through hypervisor introspection
           technology
     - Reporting                                                                   IBM Corporation
         Internal reporting of security incidents through monitoring of audit data
         Future - customer level reports of actions which affect/alter the security of the
           infrastructure that directly relates to their resources.
11                                                                                          © 2011 IBM Corporation
For more information on Cloud computing

 http://www.ibm.com/cloud
 Cloud Security Whitepaper - http://www-
  03.ibm.com/press/us/en/attachment/32799.wss?fileId=ATTA
  CH_FILE1&fileName=10-0861_US Cloud Computing White
  Paper_Final_LR.pdf




                                                    © 2011 IBM Corporation

Weitere ähnliche Inhalte

Was ist angesagt?

Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntelAPAC
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15finalMahmoud Moustafa
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2JD Sherry
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesHyTrust
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...Andris Soroka
 
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBMUndgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBMIBM Danmark
 
Oded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud SecurityOded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud SecurityCSAIsrael
 
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End PointVirtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End PointHyTrust
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Arrow ECS UK
 
Monitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsMonitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsIBM India Smarter Computing
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud SecurityIT@Intel
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Cisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & MoreCisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & Moreceriumnetworks
 

Was ist angesagt? (18)

Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
 
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBMUndgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
 
Oded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud SecurityOded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud Security
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End PointVirtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
 
Ibm security virtual server protection
Ibm security virtual server protectionIbm security virtual server protection
Ibm security virtual server protection
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
 
Bi cloud saa_s
Bi cloud saa_sBi cloud saa_s
Bi cloud saa_s
 
Monitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsMonitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring Options
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
TrendMicro
TrendMicroTrendMicro
TrendMicro
 
Cisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & MoreCisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & More
 

Andere mochten auch

Good Cloud Bad Cloud NG security summit june 2011
Good Cloud Bad Cloud NG security summit june 2011Good Cloud Bad Cloud NG security summit june 2011
Good Cloud Bad Cloud NG security summit june 2011graywilliams
 
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...Doug Newdick
 
Reviews kindle fire hd 7
Reviews kindle fire hd 7Reviews kindle fire hd 7
Reviews kindle fire hd 7Nyton Amazon
 
The Age of the Brandividual
The Age of the BrandividualThe Age of the Brandividual
The Age of the BrandividualMike Merrill
 
0748496- Evolution of the Video Game Console
0748496- Evolution of the Video Game Console0748496- Evolution of the Video Game Console
0748496- Evolution of the Video Game ConsoleAli G
 

Andere mochten auch (7)

Good Cloud Bad Cloud NG security summit june 2011
Good Cloud Bad Cloud NG security summit june 2011Good Cloud Bad Cloud NG security summit june 2011
Good Cloud Bad Cloud NG security summit june 2011
 
Test
TestTest
Test
 
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
 
Reviews kindle fire hd 7
Reviews kindle fire hd 7Reviews kindle fire hd 7
Reviews kindle fire hd 7
 
The Age of the Brandividual
The Age of the BrandividualThe Age of the Brandividual
The Age of the Brandividual
 
0748496- Evolution of the Video Game Console
0748496- Evolution of the Video Game Console0748496- Evolution of the Video Game Console
0748496- Evolution of the Video Game Console
 
Computer Essentials
Computer EssentialsComputer Essentials
Computer Essentials
 

Ähnlich wie Cloud securityperspectives cmg

Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloudTrend Micro
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityIBM Security
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Safe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsASBIS SK
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...Khazret Sapenov
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...cVidya Networks
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementNishant Kaushik
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud securityArun Gopinath
 
Ast 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAst 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAccenture
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfDataSpace Academy
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementOracleIDM
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!centralohioissa
 

Ähnlich wie Cloud securityperspectives cmg (20)

Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Safe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security Solutions
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
 
Security of,for & by cloud
Security of,for & by cloudSecurity of,for & by cloud
Security of,for & by cloud
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity Management
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Ast 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAst 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_security
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!
 

Kürzlich hochgeladen

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Kürzlich hochgeladen (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Cloud securityperspectives cmg

  • 1. Cloud Security Perspectives Dan Carlsen Certified Security IT Specialist – IBM dcarlsen@us.ibm.com © 2011 IBM Corporation
  • 2. Perspectives Security is one of the top customer concerns about Cloud Computing What does this mean? Cloud customers need assurance that providers are following sound security practices in mitigating the risks facing both the customer and the provider. The security requirements in cloud computing are not different from other distributed environments operated in a service provider model. However, through the low price points offered in a cloud and an often more anonymous consumer-provider- interaction, worries can grow. .  IBM Corporation 2 © 2011 IBM Corporation
  • 3. Security in the Cloud A recent Appirio survey of 150+ mid to According to IBM's Institute for large-sized firms that have already Business Value 2010 Global IT Risk adopted cloud applications: Study, cloud computing raised serious concerns among respondents Very Important about the use, access and control of Important Somewhat Important data Of Little Importance Unimportant Ensuring security & compliance Cloud M akes pr ot ect ing Single Biggest Misconception about the Cloud pr ivacy more difficult 77% % of Respondents Security is an issue with the cloud 28% Concerned about a 50% dat a breach or loss Cloud solutions are difficult to integrate 15% Cloud solutions have a higher chance of lock-in 13% Cloud solutions are difficult to customize 12% concer ned about a weakening of t he cor por at e net wor k 23% Cloud solutions are not reliable 10% Cloud vendors are not yet viable 8% None 7% The cloud model is not proven 6% 3 © 2011 IBM Corporation
  • 4. Customer Concerns with Cloud Computing *  LOSS OF GOVERNANCE: Customer relinquishes some control over the infrastructure. TRUST in the provider is paramount. Providers experience with outsourcing provides evidence of trust.  COMPLIANCE RISKS: The providers operational characteristics directly affect the ability for a customer to achieve compliance with appropriate regulations and industry standards.  ISOLATION FAILURE: multi-tenancy and shared resources are defining characteristics of cloud computing. This risk category covers the failure of mechanisms separating storage, memory, routing and even reputation between different tenants (e.g., so-called guest-hopping attacks). However it should be considered that attacks on resource isolation mechanisms (e.g.,. against hypervisors) are still less numerous and much more difficult for an attacker to put in practice compared to attacks on traditional Operating Systems  DATA HANDLING - DATA PROTECTION: The customer relinquishes control over their data to the provider. The provider must give demonstrable assurances to the customer that their data is maintained securely from other tenants of the cloud. These assurances are part of the basis for trust in the provider - INSECURE or INCOMPLETE DATA DELETION: Does the provider ensure that data is deleted in a manner that does not allow leakage upon re-allocation.  MANAGEMENT INTERFACE COMPROMISE: customer management interfaces of a public cloud provider are accessible through the Internet and mediate access to larger sets of resources (than traditional hosting providers) and therefore pose an increased risk, especially when combined with remote access and web browser vulnerabilities  MALICIOUS INSIDER: Cloud architectures necessitate certain roles which give the provider highly privileged capabilities. Provider operations, monitoring and incident handling build trust with the customer. Providers history of  IBM Corporation running outsourcing contracts also builds trust * 2009 European Network and Information Security Agency (ENISA) Cloud Computing: Benefits, risks and recommendations for information security 4 © 2011 IBM Corporation
  • 5. Loss of Governance  TRUST - Concerns that at some level the customer is relinquishing control  Raises the questions - Can I trust the provider to handle my data in a manner that meets my requirements - How assured am I that the provider is managing the cloud in a competent manner - How assured am I that my data is separated from other tenants - How assured am I that my data is protected from insiders at the provider  IBM Corporation 5 © 2011 IBM Corporation
  • 6. Compliance Risks  Challenges - Myriad of different regulations, industry practices that a customer must meet - Customer is ultimately responsible for being compliant with the appropriate measures - Cloud provider capabilities factor into how a customer achieves their compliance objectives - Different cloud types put different burden on the provider (e.g. Infrastructure-as-a- Service on data center operations, Software-as-a-Service on application compliance)  Measures in Development/Test Cloud and Desktop Cloud - Our current infrastructure-focused service products, customer data is opaque to the provider. Provider is a custodian of the data, and does not touch the customer data - Typically in industry-specific compliance policies, from an infrastructure perspective, deal with:  Managing privileged access  Auditing of accesses to data by provider staff   Policies and practices for dealing with incidents IBM Corporation 6 © 2011 IBM Corporation
  • 7. Isolation Failure  Challenges - Providing robust means of separating customers from each other.  Measures in Development/Test Cloud and Desktop Cloud - Development/Test cloud is a “multi-instance” form of multi-tenancy  Customers get “instances” of operating system images, which execute on resources that are shared between multiple tenants. - Mechanisms  Hypervisors - enforces separation of operating system instances within a single physical hardware system. Provides a “logical” air-gap between customers  Network Separation -Firewalls - Customer controlled -implemented independent of the operating systems at the hypervisor utilizing Trusted Virtual Domains -Virtual LANs  IBM Corporation -Customers can choose to have their guest images on a dedicated virtual LAN -VLANs connect back to the customer using Virtual Private Networks 7 © 2011 IBM Corporation
  • 8. Data Handling  Challenges - Ensuring that customer data is available to only that customer - Ensuring that when a customer deletes data (or ephemeral data is no longer in use) that it becomes unreadable  Measures in Development/Test Cloud and Desktop Cloud - Data Protection  Customers provided with the ability to create “virtual disk drives”(VDD) (files which are presented to virtual machines as block devices). Customer can utilize operating system and application level encryption against these as they are accessed as native file systems to the guests.  Each customers data is stored in a unique “file set” within the CC storage structure  Access Control Lists (ACL’s) are used to ensure separation of customers. Guests run as a specific “customer” user. ACL’s on files are set to that user. - Data Destruction  Any data on disk is securely erased using a US DoD algorithm when deleted  IBM Corporation  Ephemeral storage - when the storage is no longer used by a virtual machine  Customer VDDs - when deleted from the management console. 8 © 2011 IBM Corporation
  • 9. Management Interface Compromise  Challenges - Ensuring customer operations are separated from other customers - Ensuring that web based interfaces implement robust security practices - Ensuring customer accesses to their resources are managed and controlled by the customer  Measures in Development/Test Cloud and Desktop Cloud - Administrative Portal  Authenticated via Web Identity  Authorized via Portal Access Controls  Provides interfaces to initiate automated work flows for discrete tasks - Customer manages the privileges of their user base  Operations logged - end to end transaction auditing - Operating Systems Guests  Once provisioned IBM has no direct access to the guest VM;s  IBM Corporation  Customers provided with initial SSH Key pair or Administrative password - Customers MUST change these and any middleware administrative passwords upon taking control over the guest 9 © 2011 IBM Corporation
  • 10. Malicious Insider  Challenges - Ensuring that Cloud providers enforce policies for administrative operations to the infrastructure. This includes disciplinary policies. - Ensuring that the provider has documented policies which are applied for all administrators  Measures in Development/Test Cloud and Desktop Cloud - Automation  Not a traditional Security construct  Automation assures control over specific administrative tasks which are broken down to well defined work flow sequences. -Automation is audited end to end to be able to re-construct a given work flow - Human Administration  All infrastructure components are managed/operated to the same policies as IBM Internal systems (ITCS104).  Shared user ID’s are prohibited. Each administrative user uses their own ID to authenticate.  IBM Corporation  User authorizations assigned based on least privilege principles.  IBM’s business conduct guidelines provide the framework for disciplinary action should administrative privileges be abused. 10 © 2011 IBM Corporation
  • 11. Monitoring/Reporting  Challenges - Ensuring that the infrastructure is managed per provider specified policies - Providing reports to customers about operations which affect the infrastructure as a whole or their specific resources.  Measures in Development/Test cloud and Desktop Cloud - Logging  Infrastructure systems enable operating system audit capabilities  End to end operation flows are logged and auditable  Audit log data is retained for 90 days  Logs are monitored and incident tickets raised for any actions which are not permitted. - Intrusion  Infrastructure is monitored by Intrusion Detection & Protection systems (IDS/IPS)  Internet points of ingress and egress are monitored with IDS/IPS  Future - will provide customer specific IDS/IPS through hypervisor introspection technology - Reporting  IBM Corporation  Internal reporting of security incidents through monitoring of audit data  Future - customer level reports of actions which affect/alter the security of the infrastructure that directly relates to their resources. 11 © 2011 IBM Corporation
  • 12. For more information on Cloud computing  http://www.ibm.com/cloud  Cloud Security Whitepaper - http://www- 03.ibm.com/press/us/en/attachment/32799.wss?fileId=ATTA CH_FILE1&fileName=10-0861_US Cloud Computing White Paper_Final_LR.pdf © 2011 IBM Corporation

Hinweis der Redaktion

  1. Appirio recently surveyed 150 executives of large firms they found that security remains the number one concern, at the same time they found 28% of those execs felt that the concerns expressed about security are false and fear related. In another study (right) IBM found that of the fears customers have 77% are afraid they will lose data…