SlideShare ist ein Scribd-Unternehmen logo
1 von 55
Security Hardening – Public Cloud Services
22-OCT-2020 | EUROPE CLOUDS SUMMIT Runcy Oommen
|Today’s Agenda|
Generic cloud security overview
Security services from GCP, AWS & Azure
Shared Responsibility Model
Categories of services for hardening
Cloud OS
Load Balancer
DNS Security
API Gateway
Platform (PaaS)
Serverless (FaaS)
Career
 Principal SDE, SONICWALL, 17+ yrs. industry experience
primarily in systems, cloud (private/public), security, networking
 10x multi-cloud certified (GCP, AWS, Azure, CNCF)
 Patent (India) in cloud security around distributed data storage
 Interested in serverless, containers and cloud native offerings.
Firm believer of a multi-hybrid cloud future
Community
 Organizer of GDG Cloud, AWS user Group and Cloud Native
meetup groups in Bangalore
 Regular speaker at domestic and international cloud, tech &
security conferences
 Multiple hackathon wins in cloud/security topics.
 Recognized by Google as a community influencer
[~]$ whoami
runcyoomme
n
https://runcy.
me
roommen
Let’s define “Cloud
security”
Cloud Security refers to a broad set of policies,
technologies, applications and controls utilized to
protect virtualized IP, data, applications, services and
the associated infrastructure of cloud computing
Reference:
https://en.wikipedia.org/wiki/Cloud_computing_secur
IT infrastructure & landscape
has undergone a paradigm
shift

Traditional view
PaaS
Modern view
So, how exactly should cloud
security differ from traditional
network security?
Ubiquitous
The cloud is always reachable
from anywhere, any time, any
device
Scalable
You can add new features and
thousands of users without breaking
a sweat
Integrated
Security and other services talk
to each other for full visibility
Comprehensive
The Cloud scans every byte –
ingress and egress – including SSL
& CDN
Intelligent
The cloud learns from every user and
connection; any new threat is blocked for
all
Important facets of
cloud
Early days of
cloud
Move
Fast
O
R
Stay
SecureModern day
cloud
Move
Fast
AN
D
Stay
Secure
Cloud Features v/s Security
Balances
 Agility
 Self-service
 Scale
 Automation
 Gate
Keeper
 Standards
 Control
 Centralized
AWS Security, Identity & Compliance
Services
GCP Security Products &
Capabilities
Azure Security
Posture
Shared Responsibility Model In
Cloud
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Hardening #1 – Cloud OS:
Amazon Linux 2, Google Container Optimized OS & Cloud Shell is
shipped with OpenSSH v7.4/v7.5 which is outdated and vulnerable to
multiple attacks
Solution: Upgrade to OpenSSH 7.8 or later!
Google Cloud ShellAmazon Linux 2
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
SITUATION RIGHT NOW!
What to do now? Here’s the elaborate
way

Default package managers from AWS & GCP
does not even have a higher version of SSH!!!
 Extract the contents
 Install the compiled package to upgrade
 Install all the relevant dependencies
 Compile package from
source
 Download the latest package from openbsd.org
runcyoomme
Amazon Linux 2
Google Cloud Shell
Get the scripts - https://tinyurl.com/sshupdate runcyoomme
Hardening #2 – SSH Settings:
Default SSH settings (Ciphers & Key Exchange algorithms)
in Google Cloud Shell & Amazon Linux are deprecated and
weak
Confirming the presence of weak/deprecated Ciphers & Key
Exchanges
Amazon Linux 2
Google Cloud Shell
Amazon Linux
Search for ‘Ciphers’ & ‘KexAlgorithms’ in the man
page
Solution:
Check for new ciphers and kex after OpenSSH
upgrade
runcyoomme
 Edit the /etc/ssh/sshd_config file
 Add default Ciphers and KexAlgorithms in preferred
order
Restart the sshd service
runcyoomme
Check the Ciphers and Key Exchange Algorithms
now

YAYYY!!!
Hardening #3 – Load Balancer:
TLS 1.0 and TLS 1.1 that have weak cipher suites
are set as the default when provisioning Elastic
Load Balancers
Confirming the presence of weak cipher
suites
 Select a stricter and recent security policy for the ELB
Solution:
 Force the latest ‘security policy’ on the Elastic Load
Balancer, instead of the default lenient one
 Navigate to Load Balancer (EC2)  Listeners (tab)
 Edit
runcyoomme
Reference chart
of security
policies with
SSL Options
and Ciphers
Reference:
https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/elb-security-policy-
Changes are reflected
immediately on re-running a
vulnerability scan
Hardening #4 – DNS Security:
Certificates generated by ACM or Google Trust
Services and managed by Route53 or Cloud DNS
does not force create a ‘CAA’ record to prevent re-
issuance
Solution:
Create an entry in Route 53 for CAA when
certificates are issued by Amazon Certificate
Manager (ACM)
Equivalent entry to be created in Cloud DNS for CAA
record when certificates are issued by Google Trust
Services
Re-run a SSL scan (Qualys online SSL should be
sufficient)
runcyoomme
Hardening #5 – API Gateway:
AWS API Gateway by default, provides
support for TLS 1.0 and TLS 1.1 with weak
cipher suites
 Pick and choose the minimum required SSL for CloudFront
 Select the appropriate security policy for strong cipher
selection
 Create a CloudFront distribution with the ‘Origin Domain
Name’ as the API Gateway stage
Solution:
 Don’t serve the traffic directly from the API Gateway URL
runcyoomme
Hardening #6 – Platform (PaaS):
AWS BeanStalk and Google AppEngine supports
TLS 1.0/1.1 and TLS 1.2 with weak cipher suites
by default to ensure backward compatibility with
older clients
Solution:
 For AWS BeanStalk, solution would be place it behind a
ELB and attach stricter/recent TLS policy as discussed
previously
 For Google AppEngine, create a
custom policy that supports just
TLS 1.2 and strong cipher suites
 Now attach these with the Cloud
LB which will server traffic for
AppEngine runcyoomme
Hardening #7 – Serverless
(FaaS):
Incorrect or non-existent input validations, might
lead to elevated privileges in FaaS configuration
 Sub-process invocation at will from the execution context
 Access function handler of serverless function
 Access to /tmp to manipulate contents during execution time
 Full internet access from within FaaS environment
 Execution of os.system() commands at will
 Resources provisioned in cloud reside inside a Virtual
Private Cloud (VPC)
 FaaS should also be provisioned within this SDN
wrapper dictated by network routes/configs/firewall rules
Functionality
CV filtering app that accepts
PDF file to perform text
analysis
Assumption
Users will provide legitimate
PDF filenames for processing
Weakness
Filename embedded into shell
for direct shell command
invocations
https://tinyurl.com/infoleaksample runcyoomme
Exploit Example
(Sub-process invocation at will from the execution context)
AWS
Lambda
Google Cloud
Function
https://tinyurl.com/faasexploits runcyoomme
(Access function handler of serverless function)
AWS
Lambda
(Access to /tmp to manipulate contents during execution time)
Google Cloud
Function
https://tinyurl.com/faasexploits
Let’s do some “Monkey Patching”
What?
Technique to dynamically
update the behavior of a piece
of code
Why?
Extend the behavior of modules,
classes or methods without
actual modification of source
code
When?
‱ Extend or modify behavior at
runtime of libraries/methods
‱ During testing to mock
behavior of libs, modules,
objs
‱ Quickly fix issues, if we don’t
have resources to roll proper
fix
runcyoomme
https://tinyurl.com/faasexploits
 Eclipsed the original
definition of os.system()
with a custom one
 Created a new safe
os.system() which is
known only by us
 Repeat this for other
definitions that are not
required to be
supported for your FaaS
runcyoomme
Questions | Comments |
Discussions
runcyoomme
n
https://runcy.
me
roommen

Weitere Àhnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

AWS Webinar Using AWS OpsWorks and Amazon VPC
AWS Webinar Using AWS OpsWorks and Amazon VPC  AWS Webinar Using AWS OpsWorks and Amazon VPC
AWS Webinar Using AWS OpsWorks and Amazon VPC
 
Containers on AWS
Containers on AWSContainers on AWS
Containers on AWS
 
(SDD422) Amazon VPC Deep Dive | AWS re:Invent 2014
(SDD422) Amazon VPC Deep Dive | AWS re:Invent 2014(SDD422) Amazon VPC Deep Dive | AWS re:Invent 2014
(SDD422) Amazon VPC Deep Dive | AWS re:Invent 2014
 
(NET405) Build a Remote Access VPN Solution on AWS
(NET405) Build a Remote Access VPN Solution on AWS(NET405) Build a Remote Access VPN Solution on AWS
(NET405) Build a Remote Access VPN Solution on AWS
 
AWS VPC best practices 2016 by Bogdan Naydenov
AWS VPC best practices 2016 by Bogdan NaydenovAWS VPC best practices 2016 by Bogdan Naydenov
AWS VPC best practices 2016 by Bogdan Naydenov
 
Moving to Containers: Building with Docker and Amazon ECS - CON310 - re:Inven...
Moving to Containers: Building with Docker and Amazon ECS - CON310 - re:Inven...Moving to Containers: Building with Docker and Amazon ECS - CON310 - re:Inven...
Moving to Containers: Building with Docker and Amazon ECS - CON310 - re:Inven...
 
Aws Architecture Fundamentals
Aws Architecture FundamentalsAws Architecture Fundamentals
Aws Architecture Fundamentals
 
Day 4 - Securing Your Business on the AWS Cloud
Day 4 - Securing Your Business on the AWS CloudDay 4 - Securing Your Business on the AWS Cloud
Day 4 - Securing Your Business on the AWS Cloud
 
VPC Fundamentals & Connectivity - Pop-up Loft Tel Aviv
VPC Fundamentals & Connectivity - Pop-up Loft Tel AvivVPC Fundamentals & Connectivity - Pop-up Loft Tel Aviv
VPC Fundamentals & Connectivity - Pop-up Loft Tel Aviv
 
AWS re:Invent 2016: Chalk Talk: Succeeding at Infrastructure-as-Code (GPSCT312)
AWS re:Invent 2016: Chalk Talk: Succeeding at Infrastructure-as-Code (GPSCT312)AWS re:Invent 2016: Chalk Talk: Succeeding at Infrastructure-as-Code (GPSCT312)
AWS re:Invent 2016: Chalk Talk: Succeeding at Infrastructure-as-Code (GPSCT312)
 
Don't think about the difficulty Let's try to connect easy to IPv6 network w...
 Don't think about the difficulty Let's try to connect easy to IPv6 network w... Don't think about the difficulty Let's try to connect easy to IPv6 network w...
Don't think about the difficulty Let's try to connect easy to IPv6 network w...
 
Cloud-Native DevOps: Simplifying application lifecycle management with AWS | ...
Cloud-Native DevOps: Simplifying application lifecycle management with AWS | ...Cloud-Native DevOps: Simplifying application lifecycle management with AWS | ...
Cloud-Native DevOps: Simplifying application lifecycle management with AWS | ...
 
AWS Webcast - Getting Started with Amazon Web Services
AWS Webcast - Getting Started with Amazon Web ServicesAWS Webcast - Getting Started with Amazon Web Services
AWS Webcast - Getting Started with Amazon Web Services
 
Deep Dive on Elastic Load Balancing
Deep Dive on Elastic Load BalancingDeep Dive on Elastic Load Balancing
Deep Dive on Elastic Load Balancing
 
Amazon EC2 and Amazon VPC Hands-On Workshop
Amazon EC2 and Amazon VPC Hands-On WorkshopAmazon EC2 and Amazon VPC Hands-On Workshop
Amazon EC2 and Amazon VPC Hands-On Workshop
 
AWS re:Invent 2016: Mitigating DDoS Attacks on AWS: Five Vectors and Four Use...
AWS re:Invent 2016: Mitigating DDoS Attacks on AWS: Five Vectors and Four Use...AWS re:Invent 2016: Mitigating DDoS Attacks on AWS: Five Vectors and Four Use...
AWS re:Invent 2016: Mitigating DDoS Attacks on AWS: Five Vectors and Four Use...
 
AWS re:Invent 2016: Moving Mountains: Netflix's Migration into VPC (NET304)
AWS re:Invent 2016: Moving Mountains: Netflix's Migration into VPC (NET304)AWS re:Invent 2016: Moving Mountains: Netflix's Migration into VPC (NET304)
AWS re:Invent 2016: Moving Mountains: Netflix's Migration into VPC (NET304)
 
Cloud Security with Amazon Web Services
Cloud Security with Amazon Web ServicesCloud Security with Amazon Web Services
Cloud Security with Amazon Web Services
 
Advanced Approaches to Amazon VPC and Amazon Route 53 | AWS Public Sector Sum...
Advanced Approaches to Amazon VPC and Amazon Route 53 | AWS Public Sector Sum...Advanced Approaches to Amazon VPC and Amazon Route 53 | AWS Public Sector Sum...
Advanced Approaches to Amazon VPC and Amazon Route 53 | AWS Public Sector Sum...
 
AWS re:Invent 2016| GAM401 | Riot Games: Standardizing Application Deployment...
AWS re:Invent 2016| GAM401 | Riot Games: Standardizing Application Deployment...AWS re:Invent 2016| GAM401 | Riot Games: Standardizing Application Deployment...
AWS re:Invent 2016| GAM401 | Riot Games: Standardizing Application Deployment...
 

Ähnlich wie Europe Cloud Summit - Security hardening of public cloud services

Building a Hyper-Secure VPC on AWS with Puppet - PuppetConf 2013
Building a Hyper-Secure VPC on AWS with Puppet - PuppetConf 2013Building a Hyper-Secure VPC on AWS with Puppet - PuppetConf 2013
Building a Hyper-Secure VPC on AWS with Puppet - PuppetConf 2013
Puppet
 

Ähnlich wie Europe Cloud Summit - Security hardening of public cloud services (20)

Serverless security for multi cloud workloads
Serverless security for multi cloud workloadsServerless security for multi cloud workloads
Serverless security for multi cloud workloads
 
Security enhancements for popular GCP services
Security enhancements for popular GCP servicesSecurity enhancements for popular GCP services
Security enhancements for popular GCP services
 
(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014
(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014
(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014
 
Hybridní cloud s F5 v prostƙedí kontejnerƯ
Hybridní cloud s F5 v prostƙedí kontejnerƯHybridní cloud s F5 v prostƙedí kontejnerƯ
Hybridní cloud s F5 v prostƙedí kontejnerƯ
 
Delivering High-Availability Web Services with NGINX Plus on AWS
Delivering High-Availability Web Services with NGINX Plus on AWSDelivering High-Availability Web Services with NGINX Plus on AWS
Delivering High-Availability Web Services with NGINX Plus on AWS
 
Deploying, Scaling, and Running Grails on AWS and VPC
Deploying, Scaling, and Running Grails on AWS and VPCDeploying, Scaling, and Running Grails on AWS and VPC
Deploying, Scaling, and Running Grails on AWS and VPC
 
AWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design Patterns
 
Advanced Container Security
Advanced Container Security Advanced Container Security
Advanced Container Security
 
Securing serverless and container services - SDD306 - AWS re:Inforce 2019
Securing serverless and container services - SDD306 - AWS re:Inforce 2019 Securing serverless and container services - SDD306 - AWS re:Inforce 2019
Securing serverless and container services - SDD306 - AWS re:Inforce 2019
 
GigaSpaces CCF 4 Xap
GigaSpaces CCF 4 XapGigaSpaces CCF 4 Xap
GigaSpaces CCF 4 Xap
 
Dallas Breakfast Seminar
Dallas Breakfast SeminarDallas Breakfast Seminar
Dallas Breakfast Seminar
 
SoftNAS Cloud NAS Architecture on AWS whitepaper
SoftNAS Cloud NAS Architecture on AWS whitepaperSoftNAS Cloud NAS Architecture on AWS whitepaper
SoftNAS Cloud NAS Architecture on AWS whitepaper
 
SoftNAS Architecture on AWS
SoftNAS Architecture on AWSSoftNAS Architecture on AWS
SoftNAS Architecture on AWS
 
Building Cross-Cloud Platform Cognitive Microservices Using Serverless Archit...
Building Cross-Cloud Platform Cognitive Microservices Using Serverless Archit...Building Cross-Cloud Platform Cognitive Microservices Using Serverless Archit...
Building Cross-Cloud Platform Cognitive Microservices Using Serverless Archit...
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
 
Building a Hyper Secure VPC on AWS with Puppet
Building a Hyper Secure VPC on AWS with PuppetBuilding a Hyper Secure VPC on AWS with Puppet
Building a Hyper Secure VPC on AWS with Puppet
 
Building a Hyper-Secure VPC on AWS with Puppet - PuppetConf 2013
Building a Hyper-Secure VPC on AWS with Puppet - PuppetConf 2013Building a Hyper-Secure VPC on AWS with Puppet - PuppetConf 2013
Building a Hyper-Secure VPC on AWS with Puppet - PuppetConf 2013
 
Aws container webinar day 2
Aws container webinar day 2Aws container webinar day 2
Aws container webinar day 2
 
Secure Configuration and Automation Overview
Secure Configuration and Automation OverviewSecure Configuration and Automation Overview
Secure Configuration and Automation Overview
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 

Mehr von Runcy Oommen

Mehr von Runcy Oommen (20)

Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Designing A Platform Agnostic HA System
Designing A Platform Agnostic HA SystemDesigning A Platform Agnostic HA System
Designing A Platform Agnostic HA System
 
Security for cloud native workloads
Security for cloud native workloadsSecurity for cloud native workloads
Security for cloud native workloads
 
Serverless solution architecture in AWS
Serverless solution architecture in AWSServerless solution architecture in AWS
Serverless solution architecture in AWS
 
Cloud & GCP 101
Cloud & GCP 101Cloud & GCP 101
Cloud & GCP 101
 
Building AWS native serverless website
Building AWS native serverless websiteBuilding AWS native serverless website
Building AWS native serverless website
 
Security hardening of core AWS services
Security hardening of core AWS servicesSecurity hardening of core AWS services
Security hardening of core AWS services
 
Get to know Git
Get to know GitGet to know Git
Get to know Git
 
GCDC Bengaluru - Community Growth Hacking
GCDC Bengaluru - Community Growth HackingGCDC Bengaluru - Community Growth Hacking
GCDC Bengaluru - Community Growth Hacking
 
Earth Engine on Google Cloud Platform (GCP)
Earth Engine on Google Cloud Platform (GCP)Earth Engine on Google Cloud Platform (GCP)
Earth Engine on Google Cloud Platform (GCP)
 
Get your Git on GitHub
Get your Git on GitHubGet your Git on GitHub
Get your Git on GitHub
 
Run C++ as serverless with GCP Cloud Functions
Run C++ as serverless with GCP Cloud FunctionsRun C++ as serverless with GCP Cloud Functions
Run C++ as serverless with GCP Cloud Functions
 
Effective Tech Community Engagement - Best Practices
Effective Tech Community Engagement - Best PracticesEffective Tech Community Engagement - Best Practices
Effective Tech Community Engagement - Best Practices
 
Rajasthan IT Day Hackathon Finals
Rajasthan IT Day Hackathon FinalsRajasthan IT Day Hackathon Finals
Rajasthan IT Day Hackathon Finals
 
Arvind Brands - Hackathon - Solution Idea
Arvind Brands - Hackathon - Solution IdeaArvind Brands - Hackathon - Solution Idea
Arvind Brands - Hackathon - Solution Idea
 
Intro to Virtualization - 10000 feet view
Intro to Virtualization - 10000 feet viewIntro to Virtualization - 10000 feet view
Intro to Virtualization - 10000 feet view
 
Docker Introductory workshop
Docker Introductory workshopDocker Introductory workshop
Docker Introductory workshop
 
Accenture Hack Forward - Finals
Accenture Hack Forward - FinalsAccenture Hack Forward - Finals
Accenture Hack Forward - Finals
 
Unilever Hackathon
Unilever HackathonUnilever Hackathon
Unilever Hackathon
 
Hybrid (Windows + Linux) Apps with Docker Swarm
Hybrid (Windows + Linux) Apps with Docker SwarmHybrid (Windows + Linux) Apps with Docker Swarm
Hybrid (Windows + Linux) Apps with Docker Swarm
 

KĂŒrzlich hochgeladen

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
Christopher Logan Kennedy
 

KĂŒrzlich hochgeladen (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Europe Cloud Summit - Security hardening of public cloud services

  • 1. Security Hardening – Public Cloud Services 22-OCT-2020 | EUROPE CLOUDS SUMMIT Runcy Oommen
  • 2. |Today’s Agenda| Generic cloud security overview Security services from GCP, AWS & Azure Shared Responsibility Model Categories of services for hardening Cloud OS Load Balancer DNS Security API Gateway Platform (PaaS) Serverless (FaaS)
  • 3. Career  Principal SDE, SONICWALL, 17+ yrs. industry experience primarily in systems, cloud (private/public), security, networking  10x multi-cloud certified (GCP, AWS, Azure, CNCF)  Patent (India) in cloud security around distributed data storage  Interested in serverless, containers and cloud native offerings. Firm believer of a multi-hybrid cloud future Community  Organizer of GDG Cloud, AWS user Group and Cloud Native meetup groups in Bangalore  Regular speaker at domestic and international cloud, tech & security conferences  Multiple hackathon wins in cloud/security topics.  Recognized by Google as a community influencer [~]$ whoami runcyoomme n https://runcy. me roommen
  • 4. Let’s define “Cloud security” Cloud Security refers to a broad set of policies, technologies, applications and controls utilized to protect virtualized IP, data, applications, services and the associated infrastructure of cloud computing Reference: https://en.wikipedia.org/wiki/Cloud_computing_secur
  • 5. IT infrastructure & landscape has undergone a paradigm shift

  • 8. So, how exactly should cloud security differ from traditional network security?
  • 9. Ubiquitous The cloud is always reachable from anywhere, any time, any device Scalable You can add new features and thousands of users without breaking a sweat Integrated Security and other services talk to each other for full visibility Comprehensive The Cloud scans every byte – ingress and egress – including SSL & CDN Intelligent The cloud learns from every user and connection; any new threat is blocked for all Important facets of cloud
  • 10. Early days of cloud Move Fast O R Stay SecureModern day cloud Move Fast AN D Stay Secure
  • 11. Cloud Features v/s Security Balances  Agility  Self-service  Scale  Automation  Gate Keeper  Standards  Control  Centralized
  • 12.
  • 13. AWS Security, Identity & Compliance Services
  • 14. GCP Security Products & Capabilities
  • 17. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 18. Hardening #1 – Cloud OS: Amazon Linux 2, Google Container Optimized OS & Cloud Shell is shipped with OpenSSH v7.4/v7.5 which is outdated and vulnerable to multiple attacks
  • 19. Solution: Upgrade to OpenSSH 7.8 or later!
  • 21. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. SITUATION RIGHT NOW!
  • 22. What to do now? Here’s the elaborate way
 Default package managers from AWS & GCP does not even have a higher version of SSH!!!  Extract the contents  Install the compiled package to upgrade  Install all the relevant dependencies  Compile package from source  Download the latest package from openbsd.org runcyoomme
  • 23. Amazon Linux 2 Google Cloud Shell Get the scripts - https://tinyurl.com/sshupdate runcyoomme
  • 24.
  • 25. Hardening #2 – SSH Settings: Default SSH settings (Ciphers & Key Exchange algorithms) in Google Cloud Shell & Amazon Linux are deprecated and weak
  • 26. Confirming the presence of weak/deprecated Ciphers & Key Exchanges Amazon Linux 2 Google Cloud Shell Amazon Linux
  • 27. Search for ‘Ciphers’ & ‘KexAlgorithms’ in the man page Solution: Check for new ciphers and kex after OpenSSH upgrade runcyoomme
  • 28.  Edit the /etc/ssh/sshd_config file  Add default Ciphers and KexAlgorithms in preferred order Restart the sshd service runcyoomme
  • 29. Check the Ciphers and Key Exchange Algorithms now

  • 31. Hardening #3 – Load Balancer: TLS 1.0 and TLS 1.1 that have weak cipher suites are set as the default when provisioning Elastic Load Balancers
  • 32. Confirming the presence of weak cipher suites
  • 33.  Select a stricter and recent security policy for the ELB Solution:  Force the latest ‘security policy’ on the Elastic Load Balancer, instead of the default lenient one  Navigate to Load Balancer (EC2)  Listeners (tab)  Edit runcyoomme
  • 34. Reference chart of security policies with SSL Options and Ciphers Reference: https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/elb-security-policy-
  • 35. Changes are reflected immediately on re-running a vulnerability scan
  • 36.
  • 37. Hardening #4 – DNS Security: Certificates generated by ACM or Google Trust Services and managed by Route53 or Cloud DNS does not force create a ‘CAA’ record to prevent re- issuance
  • 38. Solution: Create an entry in Route 53 for CAA when certificates are issued by Amazon Certificate Manager (ACM) Equivalent entry to be created in Cloud DNS for CAA record when certificates are issued by Google Trust Services Re-run a SSL scan (Qualys online SSL should be sufficient) runcyoomme
  • 39.
  • 40. Hardening #5 – API Gateway: AWS API Gateway by default, provides support for TLS 1.0 and TLS 1.1 with weak cipher suites
  • 41.  Pick and choose the minimum required SSL for CloudFront  Select the appropriate security policy for strong cipher selection  Create a CloudFront distribution with the ‘Origin Domain Name’ as the API Gateway stage Solution:  Don’t serve the traffic directly from the API Gateway URL runcyoomme
  • 42.
  • 43. Hardening #6 – Platform (PaaS): AWS BeanStalk and Google AppEngine supports TLS 1.0/1.1 and TLS 1.2 with weak cipher suites by default to ensure backward compatibility with older clients
  • 44. Solution:  For AWS BeanStalk, solution would be place it behind a ELB and attach stricter/recent TLS policy as discussed previously  For Google AppEngine, create a custom policy that supports just TLS 1.2 and strong cipher suites  Now attach these with the Cloud LB which will server traffic for AppEngine runcyoomme
  • 45.
  • 46. Hardening #7 – Serverless (FaaS): Incorrect or non-existent input validations, might lead to elevated privileges in FaaS configuration  Sub-process invocation at will from the execution context  Access function handler of serverless function  Access to /tmp to manipulate contents during execution time  Full internet access from within FaaS environment  Execution of os.system() commands at will
  • 47.  Resources provisioned in cloud reside inside a Virtual Private Cloud (VPC)  FaaS should also be provisioned within this SDN wrapper dictated by network routes/configs/firewall rules
  • 48.
  • 49. Functionality CV filtering app that accepts PDF file to perform text analysis Assumption Users will provide legitimate PDF filenames for processing Weakness Filename embedded into shell for direct shell command invocations https://tinyurl.com/infoleaksample runcyoomme Exploit Example
  • 50. (Sub-process invocation at will from the execution context) AWS Lambda Google Cloud Function https://tinyurl.com/faasexploits runcyoomme
  • 51. (Access function handler of serverless function) AWS Lambda (Access to /tmp to manipulate contents during execution time) Google Cloud Function https://tinyurl.com/faasexploits
  • 52. Let’s do some “Monkey Patching” What? Technique to dynamically update the behavior of a piece of code Why? Extend the behavior of modules, classes or methods without actual modification of source code When? ‱ Extend or modify behavior at runtime of libraries/methods ‱ During testing to mock behavior of libs, modules, objs ‱ Quickly fix issues, if we don’t have resources to roll proper fix runcyoomme
  • 53. https://tinyurl.com/faasexploits  Eclipsed the original definition of os.system() with a custom one  Created a new safe os.system() which is known only by us  Repeat this for other definitions that are not required to be supported for your FaaS runcyoomme
  • 54.
  • 55. Questions | Comments | Discussions runcyoomme n https://runcy. me roommen