background threat classification

27
Kia Manoochehri

Upload: others

Post on 13-Jan-2022

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Background Threat Classification

Kia Manoochehri

Page 2: Background Threat Classification

Background

Threat Classification ◦ Traditional Threats

◦ Availability of cloud services

◦ Third-Party Control

The “Notorious Nine”

Contractual Obligations

Page 3: Background Threat Classification

Security: “freedom from risk and danger”

In Computer Science we define security as… ◦ “the ability of a system to protect information and

system resources with respect to confidentiality and integrity”

Page 4: Background Threat Classification

Three core areas ◦ Confidentiality

◦ Integrity

◦ Authentication

Page 5: Background Threat Classification

Some other security concepts ◦ Access Control

◦ Nonrepudiation

◦ Availability

◦ Privacy

Page 6: Background Threat Classification
Page 7: Background Threat Classification

Cloud Service Providers (CSP) provide a “target rich environment”

Consolidation of information draws potential attackers

Potential problematic areas in the field of Cloud Computing aren’t transparent.

Page 8: Background Threat Classification

Three broad classifications

◦ Traditional Threats

◦ Availability Threats

◦ Third-Party Control Threats

Page 9: Background Threat Classification

Anytime a computer is connected to the internet they are at risk… ◦ When we are dealing with Cloud based applications

we are amplifying these threats

Question of responsibility ◦ User vs Provider

Page 10: Background Threat Classification

Authorization and Authentication ◦ Individual access vs enterprise access

One solution would be to have tiered access ◦ Not every user is created equal!

Page 11: Background Threat Classification

Distributed Denial of Service attacks (DDoS)

SQL Injection

Phishing

Cross-Site Scripting

Page 12: Background Threat Classification

Digital forensics cannot be applied to the cloud ◦ Difficult to trace where an attack is from

Virtual Machine vulnerabilities extend to the cloud as well

Page 13: Background Threat Classification

System failures ◦ http://www.forbes.com/sites/anthonykosner/2012

/06/30/amazon-cloud-goes-down-friday-night-taking-netflix-instagram-and-pinterest-with-it/

◦ Amazon’s Elastic Compute Cloud (EC2) in North Virginia goes down due to lightning.

Netflix, Instagram, and Pintrest were down for at least a few hours.

Page 14: Background Threat Classification

Problem stems from CSP outsourcing certain aspects of their operation ◦ How does this affect

Introduces more points of entry and vulnerability to the Cloud

Page 15: Background Threat Classification

In 2010 the Cloud Security Alliance (CSA) had defined 7 major threats to Cloud Computing

February 2013 yielded their “Notorious Nine” list ◦ 9 major threats in Cloud Computing

Page 16: Background Threat Classification

Data Breaches ◦ Currently the biggest threat

◦ The solution is encryption… but

What if you lose the key?

◦ Backing up the data is not viable either

Example: Epsilon

Page 17: Background Threat Classification

Data Loss ◦ Malicious deletion ◦ Accidental deletion by CSP ◦ Physical catastrophe ◦ Loss of the encryption key

Compliance policies require audit audit records

Example: Mat Honan

Page 18: Background Threat Classification

Account/Service Hijacking ◦ Phishing, fraud, software exploits

◦ Organizations should be proactive

◦ Two-Factor authentication

Example: XSS attack on Amazon

Page 19: Background Threat Classification

Insecure Interfaces and APIs ◦ Any vulnerability in an API bleeds over

◦ Can effect security and availability

◦ Partially falls on the consumer

Page 20: Background Threat Classification

Denial of Service ◦ From the user end… most frustrating

◦ Can cost cloud users $$$

◦ Makes the user doubt the cloud

Page 21: Background Threat Classification

Malicious Insiders ◦ Straightforward

◦ Systems that only depends on the

CSP for security are at greatest risk

◦ If data-usage encryption is used the data is still vulnerable during storage

Page 22: Background Threat Classification

Abuse of Cloud Services ◦ Using CSP for malicious purpose

◦ Hacking encryption keys via cloud

◦ DDoS attacks via cloud

◦ Problems of detection arise

Page 23: Background Threat Classification

Insufficient Due Diligence ◦ Insufficient user experience

◦ Unknown levels of risk when using CSP

◦ Design and architecture issues for devs

◦ Countered by:

Capable resources

Extensive internal understanding of risks

Page 24: Background Threat Classification

Shared Technology Vulnerabilities ◦ CPU caches, GPUs are not designed to

be isolated

◦ A single vulnerability can lead to an entire environment being compromised

Page 25: Background Threat Classification

Buffer Overflow SQL Injection Privilege escalation

SSL Certificate spoofing Attacks on browser caches Phishing attacks

Limiting resources Privilege-related attacks Data Distortion Injecting additional operations

DDoS attacks

Page 26: Background Threat Classification

Goal is to minimize the security risks

Contract between the CSP and user should: ◦ State CSP obligations to handle securely sensitive

information and it’s compliance to privacy laws

◦ Spell out CSP liability for mishandling information

◦ Spell out CSP liability for data loss

◦ Spell out rules governing ownership of data

◦ Specify the geographical regions where information and backups can be stored.

Page 27: Background Threat Classification

Kia Manoochehri