21
Possibilities and Security Challenges of Cloud Computing InfoSec Conference 2010 Hotel Intercontinental Makati City, Philippines 25 August 2010 Pierre U. Tagle, Ph.D., CISA [email protected] 2 Introduction What is Cloud Computing? Possibilities and Security Challenges Critical Areas for Cloud Implementations 1 2 3 4 Outline

Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Handout)

Embed Size (px)

DESCRIPTION

Handout of a presentation given at the InfoSec 2010 Conference in Manila, Philippines last 25 August 2010.

Citation preview

Page 1: Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Handout)

Possibilities and Security

Challenges of Cloud Computing

InfoSec Conference 2010

Hotel Intercontinental

Makati City, Philippines

25 August 2010

Pierre U. Tagle, Ph.D., [email protected]

2

Introduction

What is Cloud Computing?

Possibilities and Security Challenges

Critical Areas for Cloud Implementations

1

2

3

4

Outline

Page 2: Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Handout)

3

IntroductionWe offer services to:

• EVALUATE and understand

your business needs;

• Recommend ways to

ENHANCE how technology,

people and processes fits

into your business;

• INTEGRATE new and

existing technology to better

suit your business;

• MAINTAIN your technology

investments; and

• Help you PRESERVE your

investment to carry your

business into the future.

Mobiliance Incorporated is an

INDEPENDENT technology

consulting and software services

firm which partners with

commercial and government

establishments/organisations to

solve their toughest Information

Technology problems and issues.

4

Our Services• Security Assessment and

Design

– Security Architecture

Assessment / Design

– Vulnerability

Assessment

• Network Assessment and

Design

– Alignment with

business

requirements

– Performance,

reliability and

availability analysis

• Technology Assessment and Design

• IT Governance / Risk Management

– Disaster Recovery / Business Continuity

– IT Governance

– IT Risk Assessments

• Technology Management Advice (Virtual CIO/CTO)

• Software Development

– From complete SDLC or to assist in specific phases

Page 3: Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Handout)

5

What is Cloud Computing?

• Virtually every vendor or provider has jumped on the cloud

computing bandwagon and has slapped the “cloud” label on it,

e.g. hosting, outsourcing, ASP, on-demand computing, grid

computing, utility computing, etc.

– Some reports indicate that there were at least 22 different

definitions of the cloud in use.

• Cloud computing is NOT a technology revolution, but

rather a process and business evolution – on how many

technologies and services are used in enabling what is referred

to as Cloud Computing.

• A simplified definition can be that cloud computing allows

businesses to increase IT capacity on the fly without investing

in new infrastructure, training new personnel and/or licensing

new software, and are able to use it as a pay-per-use service.

6

NIST Cloud Definition Framework

“Cloud computing is a

model for enabling

convenient, on-

demand network

access to a shared

pool of configurable

computing resources

that can be rapidly

provisioned and

released with minimal

management effort or

service provider

interaction.”The NIST cloud model promotes availability

and is composed of 5 essential

characteristics, 3 service models and 4

deployment models.

Page 4: Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Handout)

7

5 Essential Characteristics

• On-demand self-service

• Broad network access

• Resource pooling

– Location

independence

• Rapid elasticity

• Measure serviceSource: Techmixer.com

8

3 Cloud Service / Delivery Models

• Cloud Software as a Service

(SaaS)

– Use provider’s apps

over a network

• Cloud Platform as a Service

(PaaS)

– Deploy customer-

created applications to

a cloud

• Cloud Infrastructure as a

Service (IaaS)

– Rent processing,

storage, network

capacity, etc.Note: To be considered “cloud” these must be

deployed on top of a cloud infrastructure

with the key characteristics.

Source: NIST Presentations

Page 5: Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Handout)

9

Cloud Services Examples• SaaS

– Salesforce.com

– Google Apps

• PaaS

– Google AppsEngine, Force.com, IBM IT Factory

• IaaS

– Amazon Elastic Compute Cloud (Amazon EC2), IBM Blue Cloud, Sun Grid

– Amazon Simple Storage Service (Amazon S3)

10

Cloud Deployment Models

• Private cloud

– Enterprise owned or leased

• Community cloud

– Shared infrastructure for specific communitiy

• Public cloud

– Available to the public, typically mega-scale

infrastructure

• Hybrid cloud

– Composition of 2 or more clouds

Page 6: Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Handout)

11

Possibilities and Benefits

12

Adoption Areas

Page 7: Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Handout)

13

Cloud Computing Challenges & Risks• Data Protection

– Where is my data?

– How does my data securely enter/exit the cloud? (and how is it protected during transit?)

– Who has access to my data?

• Risk / Incident Management

– Who is accountable if something goes wrong?

– What’s the disaster recovery plan?

– What happens if my cloud provider disappears?

– How is the environment monitored? How are we notified in the event of failures/outages?

• Integration and Cost

– How easy is it to integrate with in-house IT?

– Are there customization options to suit my needs?

– Will on-demand cost more?

– How difficult to migrate back to an in-house system? (if possible)

• Compliance

– Are there any regulatory requirements?

14

Challenges and Risks

Security remains the top concern and was raised by 87.5% of

respondents in IDC 2009 survey (up from 74.6% in 2008)

Page 8: Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Handout)

15

Service Provider Requirements• Pricing is

key area

BUTC

• C security

and related

concerns

can be

“seen” in

user wish-list

of the

service

features

SLAs, option to move back on-premise, allow

managing on-premiseC, offer both on-premise and

public cloud services, have local presenceC

16

Security in the Cloud• Security controls in cloud

computing are no different than security controls in an IT environment BUT...

– the various cloud service models, operational models, and technologies used to enable cloud services may present different risks to the organisation.

• Understanding the differences between service models and their implementation is critical to the management of risk to the organisation.

“Cloud computing is about gracefully losing control while maintaining accountability even if the operational responsibility falls upon one or more third parties.”

– Cloud Security Alliance

Source: Cloud Security Alliance

Page 9: Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Handout)

17

Security Advantages

• Reduction of exposure of internal sensitive data with

move to external cloud

– Data fragmentation and dispersal are

managed by unbiased party (cloud vendor

assertion)

– Various studies show that a large amount of

abuse are done by internal IT professionals

• Cloud homogeneity makes security auditing / testing

simpler

• Clouds enable automated security management

• Redundancy / Disaster Recovery

18

Security Challenges

• Trusting vendor’s security model

• Customer inability to respond to audit findings

• Indirect administrator accountability

• Obtaining support for investigations

• Indirect administrator accountability

• Proprietary implementations cannot be examined

• Loss of physical control

• Data dispersal and international privacy laws

• Logging challenges

• Quality of service guarantees

Page 10: Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Handout)

19

Ensuring Compliance in the Cloud

• The use of cloud computing by itself does not provide for or prevent achieving compliance.

• Cloud services must be mapped against compensating controls to determine which exists and which do not – either by the end user, service provider or a third party.

• Gaps analysis results are fed into the risk assessment framework – accept, transfer or mitigate.

Source: Cloud Security Alliance

20

Cloud Implementation Use Case Taxonomy• Service Consumer

– SaaS is consumed

by end users, e.g.

employees, clients,

partners

– PaaS is consumed

by software

developers

– IaaS is consumed by

IT managers

• The various components

must be managed by the

company or a third party

solution provider.

Source: Cloud Computing Use Case Discussion Group

Page 11: Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Handout)

21

Determining Candidates for the Cloud• Review applications and IT

resources / systems

• Categorise into:

– Mission-critical, i.e.

business will not

survive without it

– Non-mission critical

• Sub-categorise into:

– Core business

practices, i.e. provides

service differentiation

– Non-core, i.e. internal

activities

• Typical Rules of Thumb:

– If mission-critical and

non-core then possibly

good candidate for the

cloud

– If mission-critical and

core, possibly keep

internal or in private

cloud

– If non-mission critical

and non-core then okay

for public clouds

– If non-mission critical

and core, possibly keep

internal or in private

cloud

22

Candidates for the Public CloudGOOD

• Applications used by mobile workers, particularly those used to manage time, activities, etc.

• Software development environments

• Applications that require hardware/software not normally available within the company

• Applications that run infrequently but require considerable resources, e.g. test and pre-production systems

• Backup for critical applications

• Distributed server and data centre locations

BAD

• Applications with very sensitive data (with possible regulatory or legal risk)

• Applications that require very intensive data workloads or very performance sensitive applications

– Possible cost issue

• Applications that require extensive or high customization

Page 12: Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Handout)

23

Cloud Adoption Model Example• Prepare IT portfolio

– Virtualization not necessary but can simplify migration, updates, etc.

• Cloud experimentation

– Usage, experimentation and laying of groundwork

• Cloud foundations

– Finalize application architecture and platform

• Cloud exploitation

– Deployment (either private or public) in the cloud

– Get apps into production, along with processes, policies and procedures

• Cloud actualization / HyperCloud

– Fully dynamic and autonomic compute environment

Source: eWeek.com

24

Cloud Usage Examples• Nasdaq – uses Amazon S3 to deliver historical

stock and mutual fund information, rather than add load to its database/computing infra

• Animoto – start-up used Amazon’s cloud services was able to keep up with soaring demand and scale up from 50 to 3,500 instances over a three-day period

• Times – wanted to place 60-year period worth of images (i.e. 15-million news stories) moved 4-TB into Amazon S3, ran the software on EC2 then launched the product

• Mogulus – streams 120,000 live TV channels over the Internet but owns no hardware except for its laptops.

Page 13: Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Handout)

25

Recommended Areas of Critical Focus

GOVERNANCE DOMAINS

• Governance & Enterprise

Risk Management

• Legal

• Compliance and Audit

• Information Life Cycle

Management

• Portability and

Interoperability

OPERATIONAL DOMAINS

• Security, Business

Continuity & Disaster

Recovery

• Data Centre Operations

• Incident Management

• Application Security

• Encryption & Key

Management

• Identity & Access

Management

• Virtualisation

Governance Domains

Page 14: Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Handout)

27

Governance & Enterprise Risk

Management• Ability of an organisation to govern and measure enterprise risk

introduced with the use of Cloud Computing

– Legal precedence for agreements

– Assess risk of a cloud provider

– Responsibility to protect data

– How international boundaries affects issues

• Risk management approaches

– Include provider’s security governance, risk management and compliance structures and processes

– Consistency between provider and end user risk assessment approaches

• provider’s design of the cloud service vs. user’s assessment of the cloud service risk.

– Adjust DRP/BCP to include new scenarios, e.g. loss of provider services

RECOMMENDATIONS

28

Legal AspectsPotential legal issues with the use of Cloud Computing

– Protection requirements for information & computer systems

– Security disclosure laws

– Regulatory requirements

– Privacy requirements

– International laws

RECOMMENDATIONS

Page 15: Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Handout)

29

Compliance and Audit• Ensuring and proving compliance when using Cloud

Computing

– Company security policies

– Industry standards and/or certifications

– Regulatory, legislative and other compliance requirements

• The end user must understand:

– Regulatory application for the use of a cloud service

– Division of compliance responsibilities (vs. provider)

– Provider’s ability to produce evidence needed for compliance

– End user’s role in bridging the gap between provider and audit requirements RECOMMENDATIONS

30

Information Lifecycle Management• Management of data that

is placed within the Cloud.

– Identification and

control of data

– Compensating

controls to deal with

loss of physical

control

– Data confidentiality,

integrity and

availability

• The Data Security Lifecycle

• Maps to the more general Information

Lifecycle Management (ILM)

Source: Cloud Security Alliance

RECOMMENDATIONS

Page 16: Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Handout)

31

Portability and Interoperability• Ability to move data and/or services from one

cloud provider to another, or move it back in-house

– Portability

– Interoperability

• Companies may need to switch providers due to:

– Unacceptable increase in cost

– Provider ceases operation

– Provider ceases one or more services

– Unacceptable decrease in service quality

– Business disputes

RECOMMENDATIONS

Operational Domains

Page 17: Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Handout)

33

Security, Business Continuity and

Disaster Recovery

• How does cloud computing

affect the current operational

processes and procedures in

relation to security, business

continuity and disaster recovery

• How does cloud computing

assist in diminishing risks in

certain areas? While possibly

increasing in others?

RECOMMENDATIONS

34

Data Centre Operations

• Identifying common data centre characteristics that

are:

– Disadvantageous to on-going services and/or

– Fundamental to long-term stability.

• Technology architectures will differ across providers

but they all must support compartmentalization with

controls segregating each layer of the infrastructure

– Note that some cloud providers may be users

of other cloud services, e.g. a SaaS vendor

uses PaaS or IaaS vendor(s).

RECOMMENDATIONS

Page 18: Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Handout)

35

Incident Management• Proper and adequate incident

detection, response, notification and remediation.

– Includes processes and procedures at both provider and end user levels

• Does the cloud bring about complexities to current incident management procedures?

RECOMMENDATIONS

36

SDLC

Application

Security

Architecture

Compliance

Tools

&

Services

Cloud

Apps

Vulnerabilities

Application Security

• What type of

cloud platform to

use? SaaS,

PaaS, or IaaS?

• Cloud

applications will

both impact and

be impacted by

various factors

• Migrate existing

app or design a

new app for cloud

deployment?

RECOMMENDATIONS

Page 19: Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Handout)

37

Encrypt data

in transit

Encrypt data

at rest

Encrypt data

on backup

media

Differences in implementation from

IaaS to PaaS to SaaS

Protect against misuse of

lost/stolen media.

Secure sensitive information even

within provider’s environment.

Encryptio

n

for C

onfid

entia

lity

and In

tegrity

Encryption and Key Management

• Cloud environments are shared, and providers generally have privileged access

• Encryption offers benefits of less reliance on provider

• Identifying proper encryption usage and key management

RECOMMENDATIONS

38

Identity Provisioning

Authorization and User

Profile Management

Authentication

Federation

Authenticate users of

cloud services using the

organisation’s chosen

identity provider.

• Secure and time

management of provisioning

and deprovisioning of users

in the cloud.

• Extension of current user

management processes to

the cloud.

Address authentication related

challenges, e.g. strong authentication

(multi-factor), delegated

authentication, and trust management

across cloud services.

Establishment of trusted user

profile and policy information,

using it to control access within

the cloud, and using this in an

auditable way.

Identity and Access Management• Even without the cloud, the management of identities and access control

remains one of the key challenges facing IT in any organisation.

• Management of identities to provide access control when extending the

organisation into the cloud.

RECOMMENDATIONS

Page 20: Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Handout)

39

IDaaS• Identity as a Service (IDaaS) should follow the same best

practices used for internal IAM implementations

• For internal users:

– Review provider’s options to provide secure access to the cloud

– Review cost reduction vs. risk mitigation measures to address risks of having employee information with IDaaS.

• For external users (e.g. partners) the information owners need to incorporate interactions with IAM providers into the SDLC and in threat assessments

• PaaS users should review use of industry standards by IDaaSvendors

• Proprietary solutions represent a significant risk, the use of open standards is recommended.

40

Virtualisation

• Use of virtualisation technology in cloud computing, particularly the security issues related to the system/hardware virtualisation.

RECOMMENDATIONS

Page 21: Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Handout)

41

Conclusion

• In any move towards an emerging technology and business

model, you need in-depth understanding of:

– Your IT team (whether in-house or 3rd party including

consultants / partners) and capabilities

– The Solutions, and

– The Service Providers and/or Vendors

• No difference with cloud computingC any decision to move to

the cloud should involve at least the enterprise architects,

developers, product/service owners and stakeholders, IT

management and if needed, outsourcing partners.

• Concerns with cloud computing are valid but not

insurmountable. Credible solutions do exist and continuously

being improved / fine-tuned to meet the perceived challenges

and user requirements.