Cloud security From Infrastructure to People-ware

Tzar Umang
Tzar UmangIT Director um HIVE - Highly Innovative and Valuable Evolution, Inc.
Cloud security From Infrastructure to People-ware
What is cloud?
involves computing over a network, where a program or application
may run on many connected computers at the same time. It specifically
refers to a computing hardware machine or group of computing
hardware machines commonly referred as a server connected through
a communication network such as the Internet, an intranet, a local area
network (LAN) or wide area network (WAN)
-Wikipedia
Cloud security From Infrastructure to People-ware
The Cloud Pyramid
Infrastructure as a Service
Platform as a Service
Software as a Service
Business Process as a Service
IBM Xforce Report
2012 Sampling of Security Incidents by Attack Type, Time and Impact
Conjecture of relative breach impact is based on publicly disclosed information regarding leaked records and financial losses
Coverage
20,000+ devices
under contract
3,700+ managed
clients worldwide
13B+ events
managed per day
133 monitored
countries (MSS)
1,000+ security
related patents
Depth
14B analyzed
web pages & images
40M spam &
phishing attacks
64K documented
vulnerabilities
Billions of intrusion
attempts daily
Millions of unique
malware samples
Security Challenges
• Virtual and Infrastructure
o NCloud Mapping
o Co-residence
o Side Channeling
• Data Management Issues
o Data Integrity
o Data Provenance
o Data Remanence
o Data Availability
• Users / People-ware
o Identity
o Policy Development
Applications
Web
Applications
Systems
Applications
Web 2.0 Mobile
Applications
Infrastructure
Datacenters PCs Laptops Mobile Cloud Non-traditional
Data At rest In motionUnstructuredStructured
People
Hackers Suppliers
Consultants Terrorists
Employees Outsourcers
Customers
Employees
Unstructured
Web 2.0Systems
Applications
Outsourcers
Structured In motion
Customers
Mobile
Applications
4 Dimensions of Security Challenge
Infrastructure
• Typical Datacenter
Virtualization
Typical Architecture Virtual Architecture
Virtual Machine Security Challenge
• Cloud Mapping
A plot of the internal IP
addresses assigned to
instances launched during the
initial mapping experiment
using Account A
A plot of the internal IP
address of instances launched
in Zone 3 by Account A, and
39 hours later, by Account B.
55 of the Account B IPs were
repeats of those assigned to
instances for Account A
Cloud Mapping Mitigation
• Mapping:
o Use a randomized scheme to allocate IP addresses
o Block some scanning tools/activities (nmap,traceroute)
• Co-residence checks:
o Prevent identification of dom0/hypervisor
Virtual Machine Security Challenge
• Co-residence
# of victims v # of probes p coverage
Zone 1
1 20 1/1
10 20 5/10
20 20 7/20
Zone 2
1 20 0/1
10 18 3/10
20 19 8/20
Zone 3
1 20 1/1
10 20 2/10
20 20 8/20
Results of launching p probes 5 minutes after the launch of v victims. The
rightmost column specifies success coverage: the number of victims for
which a probe instance was co-resident over the total number of victims.
Trial
Account
TotalA B
Midday 2/5 2/5 4/10
Afternoon 1/5 3/5 4/10
Night 2/5 2/5 4/10
The number of victims for which a probe achieved co-residence for three
separate runs of 10 repetitions of launching 1 victim instance and, 5
minutes later, 20 probe instances. Odd numbered repetition used Account
A; even-numbered repetitions used Account B
What can co-residence do?
• Co-Residency affords the ability to:
o Denial of Service
o Estimate victim's work load
• Cache
• Network Traffic
• Extract cryptographic keys via cache-based side
channels.
• Other cross-VM attacks
Co – residence Mitigation
• Not allow co-residence at all:
o Beneficial for cloud users
o Not efficient for cloud providers
o N-tier trust model?
• Information leakage:
o Prevent cache load attacks?
Virtual Machine Security Challenge
Results of executing 100 Prime+Trigger+Probe cache timing measurements for three pairs of m1.small instances, both when concurrently
making HTTP get requests and when not. Instances in Trial 1 and Trial 2 were co-resident on distinct physical machines. Instances in Trial 3
were not co-resident
• Side Channeling
Best Example of Side Channel Attack
Heart bleed
Side Channel Attack Mitigation
• Create better Encryption Technology
o Oblivious
• Work on large chunks
• Partition the encryption process into:
• A slow but short part: implemented securely
o Non – Colliding
Data Concerns in the Cloud
• Data Integrity
o Cloud Service Provider (CSP) Concerns
o Third Party Auditing (TPA)
o Encryption and Multitenancy
• Data Provenance
• Data Remanence
• Data Availability
o Elasticity
o CSP Related Downtime
o Malicious Attacks
Data Integrity
• Cloud Service Provider (CSP) Concerns
o CSP Security
• Data Transfer
• Data-at-Rest
o CSP Data Loss
• Unintentional
• Intentional
o Third Party Auditing
• The Auditor
• Support for Dynamic Data
Data Integrity
• Encryption & Multitenancy
o Multitenancy – Storage of data from multiple clients in a single repository
o Inability to use encryption in order to support indexing
o Encryption largely irrelevant if data is analyzed on the cloud, as analysis requires
decryption.
Data Provenance & Remanence
• Data Provenance – Calculation Accuracy
o Shared resources mean shared responsibility
o Difficulty / Impossibility in tracking involved machines
• Data Remanence – Data Cleansing
o “Ghost Data” – Left behind after deletion
o No remanence security plan for any major CSP
Availability
• Cloud Service Provider Concern
Total Downtime (HH:MM:SS)
Availability Per Day Per Month Per Year
99.999% 00:00:00.4 00:00:26 00:05:15
99.99% 00:00:08 00:04:22 00:52:35
99.9% 00:01:26 00:43:49 08:45:56
99% 00:14:23 07:18:17 87:39:29
Availability + Elasticity
• Distributed Denial of Service
(DDoS) Uses Port Flooding to Slow
Systems or Force Server Resets.
o External Attack Models
o Similar to Traditional Strikes
o Cloud Usage as Attacker
o Internal Attack Models
o Protection Responsibility Lies on the User
o CSP Would Need to Detect
An Example of DDOS Mitigation
• As used on Smarter Philippines Website
(smarterph.com)
Detect
Get
Request
Detect
Packet
Activity as
to Size
Detect
Activity
Pattern
Flag
Activities
1. Abnormal Packet Size
2. Abnormal Login
Request (Brute force)
3. Abnormal Get Request
Route Request to
127.0.0.1
Reverse Attacker’s IP
Track Attacker’s IP
Routing Scheme
Add Attacker’s IP to
Deny host
Solution
Key Themes
Security for
Mobile Devices
Provide security for and manage traditional endpoints
alongside mobile devices such as Apple iOS, Google
Android, Symbian, and Microsoft Windows Phone -
using a single platform
Expansion of
Security Content
Continued expansion of security configuration and
vulnerability content to increase coverage for
applications, operating systems, and industry best
practices
Security Intelligence Integration
Improved usage of analytics - providing valuable
insights to meet compliance and IT security objectives,
as well as further integration with SiteProtector and the
QRadar Security Intelligence Platform
Infrastructure Protection – Endpoint Vision
Knowing the User
Policy Development
• Challenges
o Define security policies and standards
o Measure actual security against policy
o Report violations to policy
o Correct violations to conform with policy
o Summarize policy compliance for the organization
Layers of Information Security - Revisited
Policies
• Purpose
Provide a framework for the
management of security
across the enterprise
Definitions
• Policies
o High level statements that provide guidance to workers
who must make present and future decision
• Standards
o Requirement statements that provide specific technical
specifications
• Guidelines
o Optional but recommended specifications
Security Policy
Access to
network resource
will be granted
through a unique
user ID and
passwordPasswords
should include
one non-alpha
and not found
in dictionary
Passwords
will be 8
characters
long
Elements of Policies
• Set the tone of Management
• Establish roles and responsibility
• Define asset classifications
• Provide direction for decisions
• Establish the scope of authority
• Provide a basis for guidelines and procedures
• Establish accountability
• Describe appropriate use of assets
• Establish relationships to legal requirements
Policies Should…
Clearly identify and define
the information
security goals and the goals
of the group, company or
the whole country
Policy Lifecycle
Actions
Cabinet
Goals
Policy
Standards Procedures Guidelines
Awareness
IS Goals
Info Security
Ten Step Approach
Collect Background Information
• Obtain existing policies
o Creighton's
o Others
• Identify what levels of control are needed
• Identify who should write the policies
Perform Risk Assessment
• Justify the Policies with Risk Assessment
o Identify the critical functions
o Identify the critical processes
o Identify the critical data
o Assess the vulnerabilities
Create a Policy Review Board
• The Policy Development Process
o Write the initial “Draft”
o Send to the Review Board for Comments
o Incorporate Comments
o Resolve Issues Face-to-Face
o Submit “Draft” Policy to Cabinet for Approval
Develop Information Security Plan
• Establish goals
• Define roles
• Define responsibilities
• Notify the User community as to the direction
• Establish a basis for compliance, risk assessment, and
audit of information security
Develop Security Policies, Standards, and Guidelines
• Policies
o High level statements that provide guidance to workers
who must make present and future decision
• Standards
o Requirement statements that provide specific technical
specifications
• Guidelines
o Optional but recommended specifications
Implement Policies and Standards
• Distribute Policies.
• Obtain agreement with policies before accessing
Creighton Systems.
• Implement controls to meet or enforce policies.
Awareness and Training
• Makes users aware of the expected behavior
• Teaches users How & When to secure information
• Reduces losses & theft
• Reduces the need for enforcement
• On the Government, they publish it on leading
newspaper
Monitor Compliance
• Management is responsible for establishing controls
• Management should REGULARLY review the status of
controls
• Enforce “User Contracts” (Code of Conduct)
• Establish effective authorization approval
• Establish an internal review process
• Internal Audit Reviews
Evaluate Policy Effectiveness
• Evaluate
• Document
• Report
Modify Policies
Policies must be modified due to:
o New Technology
o New Threats
o New or changed goals
o Organizational changes
o Changes in the Law
o Ineffectiveness of the existing Policy
Policy Hierarchy
Governance
Policy
Access
Control
Policy
User ID
Policy
Access
Control
Authentication
Standard
Password
Construction
Standard
User ID
Naming
Standard
Strong
Password
Construction
Guidelines
Solution
IBM Identity and Access Management Vision
Key Themes
Standardized IAM
and Compliance Management
Expand IAM vertically to provide identity and
access intelligence to the business; Integrate
horizontally to enforce user access to data,
app, and infrastructure
Secure Cloud, Mobile, Social
Interaction
Enhance context-based access control for
cloud, mobile and SaaS access, as well as
integration with proofing, validation and
authentication solutions
Insider Threat
and IAM Governance
Continue to develop Privileged Identity
Management (PIM) capabilities and enhanced
Identity and Role management
Solution
Key Themes
Coverage for Mobile applications and
new threats
Continue to identify and reduce risk by
expanding scanning capabilities to new platforms
such as mobile, as well as introducing next
generation dynamic analysis scanning and glass
box testing
Simplified interface and accelerated
ROI
New capabilities to improve customer time to
value and consumability with out-of-the-box
scanning, static analysis templates and ease of
use features
Security Intelligence
Integration
Automatically adjust threat levels based on
knowledge of application vulnerabilities by
integrating and analyzing scan results with
SiteProtector and the QRadar Security
Intelligence Platform
Application Security Vision
Solution
Endpoint Management
vulnerabilities enrich QRadar’s
vulnerability database
AppScan Enterprise
AppScan vulnerability results feed
QRadar SIEM for improved
asset risk assessment
Tivoli Endpoint Manager
Guardium Identity and Access Management
IBM Security Network
Intrusion Prevention System
Flow data into QRadar turns NIPS
devices into activity sensors
Identity context for all security
domains w/ QRadar as the dashboard
Database assets, rule logic and
database activity information
Correlate new threats based on
X-Force IP reputation feeds
Hundreds of 3rd party
information sources
Thank you for listening
Tzar C. Umang
President
Tzar Enterprises
email: tzarumang@gmail.com
fb.com/tzarumang
twitter.com/definitelytzar
1 von 51

Recomendados

Cloud computing security infrastructure von
Cloud computing security   infrastructureCloud computing security   infrastructure
Cloud computing security infrastructureIntel IT Center
383 views10 Folien
Cloud Security - Made simple von
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simpleSameer Paradia
1.5K views18 Folien
Cloud Security: Limitations of Cloud Security Groups and Flow Logs von
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
1.8K views49 Folien
Secure Access – Anywhere by Prisma, PaloAlto von
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
738 views28 Folien
cloud security ppt von
cloud security ppt cloud security ppt
cloud security ppt Devyani Vaidya
2.8K views25 Folien
CSO CXO Series Breakfast von
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series BreakfastCSO_Presentations
510 views52 Folien

Más contenido relacionado

Was ist angesagt?

Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014 von
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Andris Soroka
3.1K views41 Folien
Symantec Cyber Security Services: Security Simulation von
Symantec Cyber Security Services: Security SimulationSymantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec
3.2K views4 Folien
Industrial IOT Data Connectivity Standard von
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardGerardo Pardo-Castellote
545 views55 Folien
7 Ways to Stay 7 Years Ahead of the Threat von
7 Ways to Stay 7 Years Ahead of the Threat7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the ThreatIBM Security
1.3K views22 Folien
IBM Security QRadar von
 IBM Security QRadar IBM Security QRadar
IBM Security QRadarVirginia Fernandez
7.5K views23 Folien
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection von
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectioninfoLock Technologies
4.7K views15 Folien

Was ist angesagt?(20)

Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014 von Andris Soroka
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Andris Soroka3.1K views
Symantec Cyber Security Services: Security Simulation von Symantec
Symantec Cyber Security Services: Security SimulationSymantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security Simulation
Symantec3.2K views
7 Ways to Stay 7 Years Ahead of the Threat von IBM Security
7 Ways to Stay 7 Years Ahead of the Threat7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the Threat
IBM Security1.3K views
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection von infoLock Technologies
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Talos threat-intelligence von xband
Talos threat-intelligenceTalos threat-intelligence
Talos threat-intelligence
xband562 views
Ransomware webinar may 2016 final version external von Zscaler
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
Zscaler1.9K views
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk... von Cam Fulton
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
Cam Fulton299 views
Cyber Security Services & Solutions - Zymr von ZYMR, INC.
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
ZYMR, INC.218 views
Where to Store the Cloud Encryption Keys - InterOp 2012 von Trend Micro
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
Trend Micro1.2K views
Practical Enterprise Security Architecture von Priyanka Aash
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
Priyanka Aash2.4K views
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a... von Shah Sheikh
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
Shah Sheikh2.5K views
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S... von Ingram Micro Cloud
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018) von Shah Sheikh
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Shah Sheikh597 views
Infrastructure security von Adhar kashyap
Infrastructure security Infrastructure security
Infrastructure security
Adhar kashyap1.5K views
Vulnerability Management – Opportunities and Challenges! von Outpost24
Vulnerability Management – Opportunities and Challenges!Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!
Outpost24871 views
Managed Security Operations Centre Alternative - Managed Security Service von Netpluz Asia Pte Ltd
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service

Destacado

Cloud Security Secure Your Infrastructure von
Cloud Security Secure Your InfrastructureCloud Security Secure Your Infrastructure
Cloud Security Secure Your Infrastructurexband
433 views10 Folien
Cloud computing-Practical Example von
Cloud computing-Practical ExampleCloud computing-Practical Example
Cloud computing-Practical ExampleTasawar Gulzar
7.5K views17 Folien
Infrastructure Security by Sivamurthy Hiremath von
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
3.7K views49 Folien
Cloud computing lab experiments von
Cloud computing lab experimentsCloud computing lab experiments
Cloud computing lab experimentsrichendraravi
5K views1 Folie
Smart ICT extended von
Smart ICT extendedSmart ICT extended
Smart ICT extendedTzar Umang
1.9K views33 Folien
rgpv 7th sem for it & cs Cloud computing lab record von
rgpv 7th sem for it & cs Cloud computing lab recordrgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab recordnaaaaz
6.2K views15 Folien

Destacado(20)

Cloud Security Secure Your Infrastructure von xband
Cloud Security Secure Your InfrastructureCloud Security Secure Your Infrastructure
Cloud Security Secure Your Infrastructure
xband433 views
Cloud computing-Practical Example von Tasawar Gulzar
Cloud computing-Practical ExampleCloud computing-Practical Example
Cloud computing-Practical Example
Tasawar Gulzar7.5K views
Infrastructure Security by Sivamurthy Hiremath von ClubHack
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
ClubHack3.7K views
Cloud computing lab experiments von richendraravi
Cloud computing lab experimentsCloud computing lab experiments
Cloud computing lab experiments
richendraravi5K views
Smart ICT extended von Tzar Umang
Smart ICT extendedSmart ICT extended
Smart ICT extended
Tzar Umang1.9K views
rgpv 7th sem for it & cs Cloud computing lab record von naaaaz
rgpv 7th sem for it & cs Cloud computing lab recordrgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab record
naaaaz6.2K views
Don't Be a Target! von Eric Selje
Don't Be a Target! Don't Be a Target!
Don't Be a Target!
Eric Selje1.6K views
The Future of CASBs - A Cloud Security Force Awakens von Bitglass
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
Bitglass413 views
VMware vCloud Air: Security Infrastructure and Process Overview von VMware
VMware vCloud Air: Security Infrastructure and Process OverviewVMware vCloud Air: Security Infrastructure and Process Overview
VMware vCloud Air: Security Infrastructure and Process Overview
VMware1.6K views
Key Findings from Arbor's Tenth World-Wide Infrastructure Security Report von APNIC
Key Findings from Arbor's Tenth World-Wide Infrastructure Security ReportKey Findings from Arbor's Tenth World-Wide Infrastructure Security Report
Key Findings from Arbor's Tenth World-Wide Infrastructure Security Report
APNIC887 views
AWS & Infrastructure Hardening - Cloud Infrastructure Security von Nutanix Beam
AWS & Infrastructure Hardening - Cloud Infrastructure SecurityAWS & Infrastructure Hardening - Cloud Infrastructure Security
AWS & Infrastructure Hardening - Cloud Infrastructure Security
Nutanix Beam1.5K views
IPv4 Transfers, Taiwan Internet Forum von APNIC
IPv4 Transfers, Taiwan Internet ForumIPv4 Transfers, Taiwan Internet Forum
IPv4 Transfers, Taiwan Internet Forum
APNIC908 views
From Sensing to Decision von Tzar Umang
From Sensing to DecisionFrom Sensing to Decision
From Sensing to Decision
Tzar Umang416 views
Intelligent Storage Enables Next Generation Surveillance & Security Infrastru... von Personal Interactor
Intelligent Storage Enables Next Generation Surveillance & Security Infrastru...Intelligent Storage Enables Next Generation Surveillance & Security Infrastru...
Intelligent Storage Enables Next Generation Surveillance & Security Infrastru...
Introduction to Tensorflow von Tzar Umang
Introduction to TensorflowIntroduction to Tensorflow
Introduction to Tensorflow
Tzar Umang465 views
Cloud computing in practice von Andrzej Osmak
Cloud computing in practiceCloud computing in practice
Cloud computing in practice
Andrzej Osmak1.3K views
Cloud Native Data Pipelines (QCon Shanghai & Tokyo 2016) von Sid Anand
Cloud Native Data Pipelines (QCon Shanghai & Tokyo 2016)Cloud Native Data Pipelines (QCon Shanghai & Tokyo 2016)
Cloud Native Data Pipelines (QCon Shanghai & Tokyo 2016)
Sid Anand1.6K views

Similar a Cloud security From Infrastructure to People-ware

Vapt life cycle von
Vapt life cycleVapt life cycle
Vapt life cyclepenetration Tester
632 views20 Folien
Karunia Wijaya - Proactive Incident Handling von
Karunia Wijaya - Proactive Incident HandlingKarunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident HandlingIndonesia Honeynet Chapter
1.1K views28 Folien
Identifier Systems Security, Stability and Resiliency by Champika Wijayatunga von
Identifier Systems Security, Stability and Resiliency by Champika WijayatungaIdentifier Systems Security, Stability and Resiliency by Champika Wijayatunga
Identifier Systems Security, Stability and Resiliency by Champika WijayatungaMyNOG
762 views16 Folien
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective... von
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Cloudera, Inc.
3.4K views38 Folien
GDPR & Forensics Readiness -English von
GDPR & Forensics Readiness -EnglishGDPR & Forensics Readiness -English
GDPR & Forensics Readiness -EnglishStudio Fiorenzi Security & Forensics
1.8K views28 Folien
CyberCrime in the Cloud and How to defend Yourself von
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself Alert Logic
763 views36 Folien

Similar a Cloud security From Infrastructure to People-ware(20)

Identifier Systems Security, Stability and Resiliency by Champika Wijayatunga von MyNOG
Identifier Systems Security, Stability and Resiliency by Champika WijayatungaIdentifier Systems Security, Stability and Resiliency by Champika Wijayatunga
Identifier Systems Security, Stability and Resiliency by Champika Wijayatunga
MyNOG762 views
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective... von Cloudera, Inc.
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Cloudera, Inc.3.4K views
CyberCrime in the Cloud and How to defend Yourself von Alert Logic
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
Alert Logic 763 views
Solnet dev secops meetup von pbink
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
pbink82 views
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec... von APNIC
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
APNIC325 views
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ... von James Anderson
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
James Anderson218 views
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training von APNIC
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
APNIC280 views
WHOIS Database for Incident Response & Handling von APNIC
WHOIS Database for Incident Response & HandlingWHOIS Database for Incident Response & Handling
WHOIS Database for Incident Response & Handling
APNIC1.6K views
Security Breakout Session von Splunk
Security Breakout Session Security Breakout Session
Security Breakout Session
Splunk1.4K views
Security Delivery Platform: Best practices von Mihajlo Prerad
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
Mihajlo Prerad923 views
HITRUST CSF in the Cloud von OnRamp
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the Cloud
OnRamp338 views
CNIT 50: 9. NSM Operations von Sam Bowne
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM Operations
Sam Bowne571 views
Software Defined Networking in the ATMOSPHERE project von ATMOSPHERE .
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
ATMOSPHERE .183 views

Más de Tzar Umang

Tzar-Resume-2018.pdf von
Tzar-Resume-2018.pdfTzar-Resume-2018.pdf
Tzar-Resume-2018.pdfTzar Umang
13 views3 Folien
Social engineering The Good and Bad von
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and BadTzar Umang
1.4K views15 Folien
A Different Perspective on Business with Social Data von
A Different Perspective on Business with Social DataA Different Perspective on Business with Social Data
A Different Perspective on Business with Social DataTzar Umang
381 views20 Folien
Social Media Analytics for the 3rd and Final Presidential Debate von
Social Media Analytics for the 3rd and Final Presidential DebateSocial Media Analytics for the 3rd and Final Presidential Debate
Social Media Analytics for the 3rd and Final Presidential DebateTzar Umang
394 views17 Folien
Smart Cities von
Smart CitiesSmart Cities
Smart CitiesTzar Umang
369 views14 Folien
Introduction to Go language von
Introduction to Go languageIntroduction to Go language
Introduction to Go languageTzar Umang
1.1K views24 Folien

Más de Tzar Umang(11)

Tzar-Resume-2018.pdf von Tzar Umang
Tzar-Resume-2018.pdfTzar-Resume-2018.pdf
Tzar-Resume-2018.pdf
Tzar Umang13 views
Social engineering The Good and Bad von Tzar Umang
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and Bad
Tzar Umang1.4K views
A Different Perspective on Business with Social Data von Tzar Umang
A Different Perspective on Business with Social DataA Different Perspective on Business with Social Data
A Different Perspective on Business with Social Data
Tzar Umang381 views
Social Media Analytics for the 3rd and Final Presidential Debate von Tzar Umang
Social Media Analytics for the 3rd and Final Presidential DebateSocial Media Analytics for the 3rd and Final Presidential Debate
Social Media Analytics for the 3rd and Final Presidential Debate
Tzar Umang394 views
Introduction to Go language von Tzar Umang
Introduction to Go languageIntroduction to Go language
Introduction to Go language
Tzar Umang1.1K views
Smart ICT Lingayen Presentation von Tzar Umang
Smart ICT Lingayen PresentationSmart ICT Lingayen Presentation
Smart ICT Lingayen Presentation
Tzar Umang1.1K views
Formal Concept Analysis von Tzar Umang
Formal Concept AnalysisFormal Concept Analysis
Formal Concept Analysis
Tzar Umang2.1K views
Cloud computing Disambiguation using Kite Model von Tzar Umang
Cloud computing Disambiguation using Kite ModelCloud computing Disambiguation using Kite Model
Cloud computing Disambiguation using Kite Model
Tzar Umang649 views
Business intelligence for SMEs with Data Analytics von Tzar Umang
Business intelligence for SMEs with Data AnalyticsBusiness intelligence for SMEs with Data Analytics
Business intelligence for SMEs with Data Analytics
Tzar Umang943 views

Último

Is Entireweb better than Google von
Is Entireweb better than GoogleIs Entireweb better than Google
Is Entireweb better than Googlesebastianthomasbejan
12 views1 Folie
PORTFOLIO 1 (Bret Michael Pepito).pdf von
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdfbrejess0410
8 views6 Folien
IETF 118: Starlink Protocol Performance von
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol PerformanceAPNIC
354 views22 Folien
How to think like a threat actor for Kubernetes.pptx von
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptxLibbySchulze1
5 views33 Folien
Marketing and Community Building in Web3 von
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3Federico Ast
12 views64 Folien
Building trust in our information ecosystem: who do we trust in an emergency von
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergencyTina Purnat
106 views18 Folien

Último(9)

PORTFOLIO 1 (Bret Michael Pepito).pdf von brejess0410
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdf
brejess04108 views
IETF 118: Starlink Protocol Performance von APNIC
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol Performance
APNIC354 views
How to think like a threat actor for Kubernetes.pptx von LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze15 views
Marketing and Community Building in Web3 von Federico Ast
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3
Federico Ast12 views
Building trust in our information ecosystem: who do we trust in an emergency von Tina Purnat
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergency
Tina Purnat106 views

Cloud security From Infrastructure to People-ware

  • 2. What is cloud? involves computing over a network, where a program or application may run on many connected computers at the same time. It specifically refers to a computing hardware machine or group of computing hardware machines commonly referred as a server connected through a communication network such as the Internet, an intranet, a local area network (LAN) or wide area network (WAN) -Wikipedia
  • 4. The Cloud Pyramid Infrastructure as a Service Platform as a Service Software as a Service Business Process as a Service
  • 5. IBM Xforce Report 2012 Sampling of Security Incidents by Attack Type, Time and Impact Conjecture of relative breach impact is based on publicly disclosed information regarding leaked records and financial losses
  • 6. Coverage 20,000+ devices under contract 3,700+ managed clients worldwide 13B+ events managed per day 133 monitored countries (MSS) 1,000+ security related patents Depth 14B analyzed web pages & images 40M spam & phishing attacks 64K documented vulnerabilities Billions of intrusion attempts daily Millions of unique malware samples
  • 7. Security Challenges • Virtual and Infrastructure o NCloud Mapping o Co-residence o Side Channeling • Data Management Issues o Data Integrity o Data Provenance o Data Remanence o Data Availability • Users / People-ware o Identity o Policy Development
  • 8. Applications Web Applications Systems Applications Web 2.0 Mobile Applications Infrastructure Datacenters PCs Laptops Mobile Cloud Non-traditional Data At rest In motionUnstructuredStructured People Hackers Suppliers Consultants Terrorists Employees Outsourcers Customers Employees Unstructured Web 2.0Systems Applications Outsourcers Structured In motion Customers Mobile Applications 4 Dimensions of Security Challenge
  • 11. Virtual Machine Security Challenge • Cloud Mapping A plot of the internal IP addresses assigned to instances launched during the initial mapping experiment using Account A A plot of the internal IP address of instances launched in Zone 3 by Account A, and 39 hours later, by Account B. 55 of the Account B IPs were repeats of those assigned to instances for Account A
  • 12. Cloud Mapping Mitigation • Mapping: o Use a randomized scheme to allocate IP addresses o Block some scanning tools/activities (nmap,traceroute) • Co-residence checks: o Prevent identification of dom0/hypervisor
  • 13. Virtual Machine Security Challenge • Co-residence # of victims v # of probes p coverage Zone 1 1 20 1/1 10 20 5/10 20 20 7/20 Zone 2 1 20 0/1 10 18 3/10 20 19 8/20 Zone 3 1 20 1/1 10 20 2/10 20 20 8/20 Results of launching p probes 5 minutes after the launch of v victims. The rightmost column specifies success coverage: the number of victims for which a probe instance was co-resident over the total number of victims. Trial Account TotalA B Midday 2/5 2/5 4/10 Afternoon 1/5 3/5 4/10 Night 2/5 2/5 4/10 The number of victims for which a probe achieved co-residence for three separate runs of 10 repetitions of launching 1 victim instance and, 5 minutes later, 20 probe instances. Odd numbered repetition used Account A; even-numbered repetitions used Account B
  • 14. What can co-residence do? • Co-Residency affords the ability to: o Denial of Service o Estimate victim's work load • Cache • Network Traffic • Extract cryptographic keys via cache-based side channels. • Other cross-VM attacks
  • 15. Co – residence Mitigation • Not allow co-residence at all: o Beneficial for cloud users o Not efficient for cloud providers o N-tier trust model? • Information leakage: o Prevent cache load attacks?
  • 16. Virtual Machine Security Challenge Results of executing 100 Prime+Trigger+Probe cache timing measurements for three pairs of m1.small instances, both when concurrently making HTTP get requests and when not. Instances in Trial 1 and Trial 2 were co-resident on distinct physical machines. Instances in Trial 3 were not co-resident • Side Channeling
  • 17. Best Example of Side Channel Attack Heart bleed
  • 18. Side Channel Attack Mitigation • Create better Encryption Technology o Oblivious • Work on large chunks • Partition the encryption process into: • A slow but short part: implemented securely o Non – Colliding
  • 19. Data Concerns in the Cloud • Data Integrity o Cloud Service Provider (CSP) Concerns o Third Party Auditing (TPA) o Encryption and Multitenancy • Data Provenance • Data Remanence • Data Availability o Elasticity o CSP Related Downtime o Malicious Attacks
  • 20. Data Integrity • Cloud Service Provider (CSP) Concerns o CSP Security • Data Transfer • Data-at-Rest o CSP Data Loss • Unintentional • Intentional o Third Party Auditing • The Auditor • Support for Dynamic Data
  • 21. Data Integrity • Encryption & Multitenancy o Multitenancy – Storage of data from multiple clients in a single repository o Inability to use encryption in order to support indexing o Encryption largely irrelevant if data is analyzed on the cloud, as analysis requires decryption.
  • 22. Data Provenance & Remanence • Data Provenance – Calculation Accuracy o Shared resources mean shared responsibility o Difficulty / Impossibility in tracking involved machines • Data Remanence – Data Cleansing o “Ghost Data” – Left behind after deletion o No remanence security plan for any major CSP
  • 23. Availability • Cloud Service Provider Concern Total Downtime (HH:MM:SS) Availability Per Day Per Month Per Year 99.999% 00:00:00.4 00:00:26 00:05:15 99.99% 00:00:08 00:04:22 00:52:35 99.9% 00:01:26 00:43:49 08:45:56 99% 00:14:23 07:18:17 87:39:29
  • 24. Availability + Elasticity • Distributed Denial of Service (DDoS) Uses Port Flooding to Slow Systems or Force Server Resets. o External Attack Models o Similar to Traditional Strikes o Cloud Usage as Attacker o Internal Attack Models o Protection Responsibility Lies on the User o CSP Would Need to Detect
  • 25. An Example of DDOS Mitigation • As used on Smarter Philippines Website (smarterph.com) Detect Get Request Detect Packet Activity as to Size Detect Activity Pattern Flag Activities 1. Abnormal Packet Size 2. Abnormal Login Request (Brute force) 3. Abnormal Get Request Route Request to 127.0.0.1 Reverse Attacker’s IP Track Attacker’s IP Routing Scheme Add Attacker’s IP to Deny host
  • 26. Solution Key Themes Security for Mobile Devices Provide security for and manage traditional endpoints alongside mobile devices such as Apple iOS, Google Android, Symbian, and Microsoft Windows Phone - using a single platform Expansion of Security Content Continued expansion of security configuration and vulnerability content to increase coverage for applications, operating systems, and industry best practices Security Intelligence Integration Improved usage of analytics - providing valuable insights to meet compliance and IT security objectives, as well as further integration with SiteProtector and the QRadar Security Intelligence Platform Infrastructure Protection – Endpoint Vision
  • 28. Policy Development • Challenges o Define security policies and standards o Measure actual security against policy o Report violations to policy o Correct violations to conform with policy o Summarize policy compliance for the organization
  • 29. Layers of Information Security - Revisited
  • 30. Policies • Purpose Provide a framework for the management of security across the enterprise
  • 31. Definitions • Policies o High level statements that provide guidance to workers who must make present and future decision • Standards o Requirement statements that provide specific technical specifications • Guidelines o Optional but recommended specifications
  • 32. Security Policy Access to network resource will be granted through a unique user ID and passwordPasswords should include one non-alpha and not found in dictionary Passwords will be 8 characters long
  • 33. Elements of Policies • Set the tone of Management • Establish roles and responsibility • Define asset classifications • Provide direction for decisions • Establish the scope of authority • Provide a basis for guidelines and procedures • Establish accountability • Describe appropriate use of assets • Establish relationships to legal requirements
  • 34. Policies Should… Clearly identify and define the information security goals and the goals of the group, company or the whole country
  • 35. Policy Lifecycle Actions Cabinet Goals Policy Standards Procedures Guidelines Awareness IS Goals Info Security
  • 37. Collect Background Information • Obtain existing policies o Creighton's o Others • Identify what levels of control are needed • Identify who should write the policies
  • 38. Perform Risk Assessment • Justify the Policies with Risk Assessment o Identify the critical functions o Identify the critical processes o Identify the critical data o Assess the vulnerabilities
  • 39. Create a Policy Review Board • The Policy Development Process o Write the initial “Draft” o Send to the Review Board for Comments o Incorporate Comments o Resolve Issues Face-to-Face o Submit “Draft” Policy to Cabinet for Approval
  • 40. Develop Information Security Plan • Establish goals • Define roles • Define responsibilities • Notify the User community as to the direction • Establish a basis for compliance, risk assessment, and audit of information security
  • 41. Develop Security Policies, Standards, and Guidelines • Policies o High level statements that provide guidance to workers who must make present and future decision • Standards o Requirement statements that provide specific technical specifications • Guidelines o Optional but recommended specifications
  • 42. Implement Policies and Standards • Distribute Policies. • Obtain agreement with policies before accessing Creighton Systems. • Implement controls to meet or enforce policies.
  • 43. Awareness and Training • Makes users aware of the expected behavior • Teaches users How & When to secure information • Reduces losses & theft • Reduces the need for enforcement • On the Government, they publish it on leading newspaper
  • 44. Monitor Compliance • Management is responsible for establishing controls • Management should REGULARLY review the status of controls • Enforce “User Contracts” (Code of Conduct) • Establish effective authorization approval • Establish an internal review process • Internal Audit Reviews
  • 45. Evaluate Policy Effectiveness • Evaluate • Document • Report
  • 46. Modify Policies Policies must be modified due to: o New Technology o New Threats o New or changed goals o Organizational changes o Changes in the Law o Ineffectiveness of the existing Policy
  • 48. Solution IBM Identity and Access Management Vision Key Themes Standardized IAM and Compliance Management Expand IAM vertically to provide identity and access intelligence to the business; Integrate horizontally to enforce user access to data, app, and infrastructure Secure Cloud, Mobile, Social Interaction Enhance context-based access control for cloud, mobile and SaaS access, as well as integration with proofing, validation and authentication solutions Insider Threat and IAM Governance Continue to develop Privileged Identity Management (PIM) capabilities and enhanced Identity and Role management
  • 49. Solution Key Themes Coverage for Mobile applications and new threats Continue to identify and reduce risk by expanding scanning capabilities to new platforms such as mobile, as well as introducing next generation dynamic analysis scanning and glass box testing Simplified interface and accelerated ROI New capabilities to improve customer time to value and consumability with out-of-the-box scanning, static analysis templates and ease of use features Security Intelligence Integration Automatically adjust threat levels based on knowledge of application vulnerabilities by integrating and analyzing scan results with SiteProtector and the QRadar Security Intelligence Platform Application Security Vision
  • 50. Solution Endpoint Management vulnerabilities enrich QRadar’s vulnerability database AppScan Enterprise AppScan vulnerability results feed QRadar SIEM for improved asset risk assessment Tivoli Endpoint Manager Guardium Identity and Access Management IBM Security Network Intrusion Prevention System Flow data into QRadar turns NIPS devices into activity sensors Identity context for all security domains w/ QRadar as the dashboard Database assets, rule logic and database activity information Correlate new threats based on X-Force IP reputation feeds Hundreds of 3rd party information sources
  • 51. Thank you for listening Tzar C. Umang President Tzar Enterprises email: tzarumang@gmail.com fb.com/tzarumang twitter.com/definitelytzar

Hinweis der Redaktion

  1. Attacker model – Cloud infrastructure provider is trustworthy – Cloud insiders are trustworthy – Attacker is a malicious third party who can legitimately the cloud provider as a client Assets – Confidentiality aware services run on cloud – Availability of services run on cloud Nmap, hping, wget for network probing • Amazon EC2’s own DNS to map dns names to IPs
  2. Co-residence: Check to determine if a given VM is placed in the same physical machine as another VM • Network based check: – Match Dom0 IP addresses, check packet RTT, close IP addresses (within 7, since each machine has 8 VMs at most) – Traceroute provides Dom0 of target – No false positives found during experiments Brute force scheme – Idea: figure out target’s availability zone and type – Launch many probe instances in the same area – Success rate: 8.4% Smarter strategy: utilize locality – Idea: VM instances launched right after target are likely to be co-resident with the target – Paper claims 40% success rate
  3. Side channel: Any information not captured by the abstract “standard” model a side channel attack is any attack based on information gained from the physical implementation of a cryptosystem, rather than brute force or theoretical weaknesses in the algorithms (compare cryptanalysis). For example, timing information, power consumption, electromagnetic leaks or even sound can provide an extra source of information which can be exploited to break the system. Some side-channel attacks require technical knowledge of the internal operation of the system on which the cryptography is implemented, although others such as differential power analysis are effective as black-box attacks. Many powerful side channel attacks are based on statistical methods pioneered by Paul Kocher.