0% found this document useful (0 votes)
8 views

05 Cloud Security

Uploaded by

Manjunath V
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

05 Cloud Security

Uploaded by

Manjunath V
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

Cloud Security

Barry Denby
Griffith College Dublin

January 17, 2019


Cloud Security
I All computing systems must be secured from
attack. Threats fall into a few broad categories
I Malware: Code designed to break into a system
and either destroy or control systems or
information in one of two means
I Email attachment: someone runs the attachment
and malware spreads
I Buffer overflow/SQL injection etc: take advantage
of software bugs to gain access (does not need user
intervention)
I Rogue insider: Person working in the facility
containing the computation devices who has
malicious intent and physical access to the
system
Cloud Security

I In this particular lecture we will discuss how the


traditional risks of computing apply to the
cloud
I We will also discuss new risks and threats that
are associated with the cloud
I Particularly in relation to its public nature and
virtualisation
I As before most of this material is based on
Cloud Computing: Theory and Practice
Security: Target rich environment

I The cloud is a target rich environment (i.e.


many targets for someone to attack)
I This is because there are many applications
running on a cloud
I And will also have a large number of users
associated with them
I Users may also have information/logins on one
or more applications
Security: Target rich environment

I This is a draw for malicious activity and


criminal organisations
I For example if there are 1,000 on a cloud and
99% are secure then that means at least 10
can be exploited
I 10,000 means 100
I 100,000 means 1,000 etc
Security: Threats that are the same

I Some threats carry over from other network


centric environments so any threats from these
categories also apply in cloud
I As cloud is built on these categories
I Network-centric computing
I Network-centric content
I Service Oriented Architectures
I Grids and Distributed systems
I Web based services
Security: Reasons for moving to the cloud

I The main motivation for moving to the cloud


was the reduction in technical concerns
I This is true but for the security the exact
opposite is true as the concerns are greater
I As infrastructure is now shared with many
others
I And there is no guarantee that the cloud
provider will implement security for you
Security: Threat classes
I Traditional security threats
I Standard threats that would appear in a traditional
non-cloud computing environment
I All infrastructure must be protected from attack
from outsiders
I If infrastructure can be broken into the cloud is
vulnerable to attack
I Authentication: everyone who has access to the
cloud application should be given the smallest
privilege set necessary for their task
I Attack vectors in non-cloud applications also apply:
DDoS attacks, phising, SQL injection, cross-site
scripting, buffer overflow etc
Security: Threat classes

I System availability threats: standard threats


that would be encountered in a datacentre
I Power outages, Fire, Flooding, Malicious
destruction etc
I When such an event occurs a user can be faced
with data lock-in, wherein the data is not
accessible and be consequence the cloud
application fails to function
I Detrimental to large enterprise applications
Security: Threat classes

I Third party control threats where there are


concerns about data storage from outsiders
I Arises from lack of transparency and the
limited control a user has over where the data
is stored in the cloud
I For example a cloud provider may outsource
some of their data storage to other providers
I May not be specified by the cloud provider
I Difficult to determine who they are and a level of
trust
Security: Threat classes
I Espionage is also an issue in that there may be
malicious employees in the cloud provider who
could access or destroy your application data or
sell it onto other companies
I Difficult for a user to prove a provider has
accessed/modified data without consent
I Abuse of the Cloud: using the cloud for
malicious purposes
I Building many VMs and coordinating them to
cause a DDoS attack
I Using VMs to distribute spam
I Using VMs to distribute or control malware
Security: Threat classes

I Shared technologies, threats due to


multi-tenancy
I VMMs if not secured properly can be accessed
and controlled by a VM
I This will directly affect the security of all other
VMs managed by the VMM
I Can also lead to the installation of VMBRs
Security: Threat classes

I Insecure APIs: where a cloud provider has


produced an API that may be exploited by
attackers
I The API should protect applications and users
from attack at all times
I Bugs in the API could expose routes to
privilege escalation and application control
I Malicious insiders cloud also build backdoors
into the API to give them full access to an
application through a hidden API/function call
Security: Threat classes
I Data loss and leakage: if the cloud provider
does not replicate data properly or prevents
unauthorised access
I Difficult to have a full copy of data outside of
cloud if datasets are large
I Ensuring consistency is another issue should be
other copies of data available
I If the cloud provider maintains one copy of
data and should replication fail as well as
hardware then all data is lost
I By consequence the application completely fails as
there is no data to work with
Security: Threat classes

I Value of data >>> Value of an application


I Data loss can be irreparable
I Data leakage may occur as a result of malicious
cloud insiders observing and copying data
I Or if an application or the API it is built on is
coded in an insecure way
Security: Threat classes

I Account/Service hijacking: significant threat


all web facing services must account for
I There are many methods of stealing credentials
and they must be guarded against in a cloud
application
I Bad passwords are one of the most common forms
of account hijacking
I Unknown risk profile: Where the developer has
been exposed to ignorance to the risks cloud
computing poses to their applications
Security: Attack vectors

I There are three actors that are present in the


cloud computing environment
I User: The end user who is interacting with the
application
I Service: The application the developer has
produced to run on the cloud and serve users
I Cloud infrastructure: the supporting machines
upon which the application runs
I The interaction between all these components
will be illustrated on the following slide
Security: Attack vectors
Security: Attack vectors

I As can be seen from the diagram there are six


potential vectors of attack in a cloud system
I All attack vectors must be secured against in a
cloud application
I You have zero idea where or when the next
attack will come
Security: Other concerns
I There are other concerns that must be taken
care of which affect the attack vectors seen
previously
I No system is completely secure
I Given enough time and resources any system
can be broken into
I You need to ensure that the cost to the
attacker to break into your system is far in
excess of the potential reward if they break in
I And that there are methods of tracking
intruders if they do break in
Security: Other concerns
I Data is more vulnerable in long term storage
than in transit
I Transit is short bursts of data over communication
links that can be affected by man in the middle
attacks
I Storage can be attacked for longer periods of time
and will require stronger security
I Both must be secured against
I Usually a method of encryption is used
I Life cycle of data
I In a cloud there is no guarantee as to when deleted
data will be rendered unusable and deleted.
I This poses a risk should the data not be destroyed
for a period of time it may be accessible to others
I Data may not be erased from backups thus there is
still potential for access
Security: Other concerns
I Processing
I Your application may be threatened by malicious
VMs or VMBRs
I It is also possible that employees of the cloud
provider can interfere with the processing of your
application.
I Standardisation: there is no standarisation
among cloud vendors
I Standarisation usually leads to increased
competition thus accelerating development and
security of APIs and platforms.
I Vendor lock in can expose you to bugs that are not
fixed or addressed by the provider
Security: Other concerns

I Auditing: Most systems need to know exactly


I Who accessed the system
I How and where they did it
I What actions they took
I When they happened
I This is necessary for determining attack origins
I Requires extensive reliable logging facilities
I Currently very difficult to do reliably in the
cloud
Security: Other concerns

I Multi-tenancy: A core reason for cost reduction


in the cloud
I Also a security concern particularly in SaaS
applications
I If one user of the service is broken into
potentially all users are exposed
I A nightmare if sensitive data is involved.
I Malicious tenant can try to interfere with your
processing
Security: Other concerns
I Legal frameworks: these don’t tend to evolve
as rapidly as technology
I May be difficult for users to defend their rights
with cloud technologies
I Large cloud vendors have sites in multiple
countries
I In cases like this it’s hard to determine which laws
should apply
I Particularly if a single action involves two or more
countries
I Outsourcing
I It may be possible that a cloud provider uses
another provider to enable some functionality
I Who’s liable if the functionality fails?
I Who’s responsible for implementing security?
Security: Privacy

I Privacy ensures that an individual, group, or


organisation has the right to prevent personal
information from being disclosed to others
I Major concern in any cloud system or web
facing system
I Privacy is also limited by law for reasonable
things like taxation and freedom of speech
I Socail networks and voluntary information
sharing has lead to information stockpiles that
when stolen can lead to identity theft
Security: Privacy
I The main privacy concerns with the cloud are
the following
I Lack of user control: Once data is submitted to
the provider the user loses control of the data
I No idea of location
I Could lose access to the data
I Data could be stored indefinitely on backup
I Unauthorised secondary use
I The provider may sell your data to other providers
to make alternate streams of revenue
I Users have no control over how and when this is
performed
I Often no idea as to what data is given or to whom
Security: Privacy

I Dynamic provisioning: Privacy concerns due to


outsourcing of data by the provider
I What data does the outsourced provider see?
I Are they secure and trustworthy?
Security: Virtual Machines

I Security issues and solutions arising from VM


use in the cloud
I VMs and VMMs are potential targets of
attacks in the cloud
I These are things that must be secured against
Security: VMM based threats
I Starvation of resources and denial of service
I badly configured resource limits
I rogue VM with capability of bypassing resource
limits
I VM side channel attacks: Malicious attack on
VMs by a rogue VM on the same VMM
I Lack of proper isolation of inter-VM traffic
I Limitation of packet inspection devices to handle
high speed traffic
I VM instances built from insecure VM images
I Buffer overflow attacks or other bugs in the
VMM
Security: VM based threats

I Deployment of rogue or insecure VMs


I Unauthorised users may start insecure instances or
perform admin actions on VMs
I Improper configuration of access controls on VM
administrative tasks
I Presence of insecure and tampers VM images
in repository
I Lack of access control to the VM image repository
I Lack of mechanisms to verify the integrity of the
images

You might also like