cloud assurance mike chung kpmg

83
Cloud Assurance Challenges, Developments and Practices March 2013, Utrecht drs. Mike Chung RE Part 1

Upload: kpmg-internet-protection-services

Post on 18-Nov-2014

669 views

Category:

Technology


3 download

DESCRIPTION

Presentation march 2013 Mike Chung KPMG about cloud assurance

TRANSCRIPT

Page 1: Cloud assurance Mike Chung KPMG

Cloud Assurance Challenges, Developments and Practices

March 2013, Utrecht

drs. Mike Chung RE

Part 1

Page 2: Cloud assurance Mike Chung KPMG

• Understanding the context of cloud computing from an

assurance point of view

• Addressing the perceived and real risks cloud computing

• Sharing good practices and control frameworks

• Any other expectations?

Objectives

Page 3: Cloud assurance Mike Chung KPMG

Context

Page 4: Cloud assurance Mike Chung KPMG

• We are re-imagining every part of our software empire to run

on and through the cloud

Steve Ballmer

• Cloud Computing is going to be one of things that enables

Hewlett Packard to recover its leadership role in the ICT

industry

Meg Whitman

‘Tectonic plate shifts in the industry’

Page 5: Cloud assurance Mike Chung KPMG

• Gmail

• Dropbox

• Facebook

Volume and magnitude

Page 6: Cloud assurance Mike Chung KPMG

• Gmail: 450 million users on more than 150,000 machines

• Dropbox: 100 million users; services worth 5 billion EUR

• Facebook: 1 billion users; 3 billion EUR turnover

Volume and magnitude

Page 7: Cloud assurance Mike Chung KPMG

• Salesforce.com: 2012 turnover approaching 1.7 billion EUR

• Amazon EC2: 30% of profit from cloud services

• Office 365: Lowe, Shell, Nutreco, American Red Cross

• Google Apps: 66 of 100 largest universities in the US are

using Google Apps

Cloud as enterprise solution

Page 8: Cloud assurance Mike Chung KPMG
Page 9: Cloud assurance Mike Chung KPMG

• Zero

• One

• Infinity

• 1 to N

Mnemonic

Page 10: Cloud assurance Mike Chung KPMG

• Virtualisation

• Web services

• Broadband internet

• Big data centres

• Services

Drivers to the cloud

Page 11: Cloud assurance Mike Chung KPMG
Page 12: Cloud assurance Mike Chung KPMG
Page 13: Cloud assurance Mike Chung KPMG
Page 14: Cloud assurance Mike Chung KPMG

Cloud market evolution

• Non-business critical • Commodity • Limited integration

2009 - 2010

• Storage • CRM • Additional computing

power

• Replacement of legacy • Flexibility • Moderate-level integration

2011 - 2012

• Datacentre • ‘Office’ • PaaS • HR

• Business critical • Strategic • High-level integration

2013 - 2014

• Cloud sourcing • Corporate mobile apps • ERP

• SME • Telcos • Universities

• Traditional production • Retail • Entertainment & media

• Government • Financial services • Healthcare

Page 15: Cloud assurance Mike Chung KPMG

• Google launches new IaaS: Google Compute Engine

• Google Apps for small businesses no longer free

• Oracle increases its presence in the cloud market (Oracle

HCM)

• Major CSPs lower their prices up to 30%

• Cisco acquires Maraki (mobile device mgmt from the cloud)

• OpenStack foundation includes IBM, Dell, Cisco, HP

• PCI guidelines for the cloud

Recent developments

Page 16: Cloud assurance Mike Chung KPMG

Profile of the cloud

Page 17: Cloud assurance Mike Chung KPMG

Cloud computing vendors told me that my data at their

locations was just as safe as my money in the bank. Since

the credit crunch we all know how reliable the banks are.

CISO of a firm in the public services sector

Page 18: Cloud assurance Mike Chung KPMG

Key differences

On-premisee Cloud

Internal data processing and storage

External data processing and storage

Dedicated IT environment Multi-tenancy

LAN, leased lines (Public) internet

Page 19: Cloud assurance Mike Chung KPMG

On-premise versus cloud

Enterprise IT

Business user

External IT

Business user

Enterprise IT

Business user

External IT

Mobile user

On-premise Cloud Reality

Page 20: Cloud assurance Mike Chung KPMG

• Key attribute/principle of cloud computing

• Single instance of software (single code-base on a common

infrastructure) serving multiple clients

• Different from virtualisation, yet using virtualisation

• Per tenant metadata

• Standardised instances and releases

Multi-tenancy

Page 21: Cloud assurance Mike Chung KPMG

• Network of several millions of networks

• Based on TCP/IP protocol suite

• ICANN: IP addresses and DNS

• IETF: TCP/IP, standards

• Different layers: application, transport, internet, link

• Internet exchanges: AMS-IX, DE-CIX

• Heterogeneous

Internet

Page 22: Cloud assurance Mike Chung KPMG

Internet

Own network Internet

providers network

‘Random’ networks

Internet providers network

CSP’s network

Page 23: Cloud assurance Mike Chung KPMG

Internet

Page 24: Cloud assurance Mike Chung KPMG

• Security risks

• Privacy/legal risks

• Operational risks

• Financial risks

• Vendor risks

• Assurance risks

Assignment

Page 25: Cloud assurance Mike Chung KPMG

• Risk = probability * impact

Risk

Page 26: Cloud assurance Mike Chung KPMG

• Per risk category

• Per dimension

• Threat/vulnerability-driven

Approach

Page 27: Cloud assurance Mike Chung KPMG

Cloud computing risks: security

• Data may be stored in cloud without proper customer segregation allowing

possible accidental or malicious disclosure to third parties

• Loss of governance of critical areas, e.g., vulnerability management,

infrastructure hardening, or physical security

• Weak logical access controls due to cloud vendor’s IAM immaturity

• Cloud adoption opens the four Data Center walls to external IT Services

providers, creating new risks

Page 28: Cloud assurance Mike Chung KPMG

Cloud computing risks: privacy/legal

• Data may be stored in cloud in a legal jurisdiction where the rights of data

subject are not protected

• Outdated laws and regulations create uncertainty when characterizing the

various cloud transactions

Page 29: Cloud assurance Mike Chung KPMG

Cloud computing risks: operational

• Cloud adoption introduces rapid change in the organisation

• Cloud sourcing may impact existing organisational roles and could require

new skills or make others redundant

• Business resiliency/disaster recovery needs and plans will change and

require updating

• Risk of creating independent silos of information perpetuate the problem of

data integrity, quality, and insight

• Business can bypass the IT function to implement technology solutions,

posing challenges for IT governance

Page 30: Cloud assurance Mike Chung KPMG

Cloud computing risks: financial

• Movement from CapEx to OpEx model impacts existing budgeting,

forecasting, and reporting processes

• CapEx to OpEx model and changes in the character and source of service

impacts tax considerations

• Cloud ROI and cost/benefit analysis are complicated by need for knowledge

of existing cost of delivery and future use of service

Page 31: Cloud assurance Mike Chung KPMG

Cloud computing risks: vendor

• Lack of clarity of ownership responsibilities between cloud vendor and user

company

• No prevalent standards for vendor interoperability

• Extensive reliance on CSPs

• Cloud delivery models dramatically change how IT delivers technology

services to support business requirements

Page 32: Cloud assurance Mike Chung KPMG

Cloud computing risks: assurance

• Lack of visibility into the Cloud Service Providers (CSPs) operations inhibits

analysis of its compliance with pertinent laws and regulations

• Complexity of records management/records retention creates challenges

• Lack of industry standards and certifications for cloud providers creates

risks

Page 33: Cloud assurance Mike Chung KPMG

Risk dimensions: external IT operations

• Inadequate and/or insufficient data security measures at provider’s

location(s) compromising data integrity and confidentiality

• Issues with retracting data after termination of service

• Discontinuation of business critical services due to failing disaster recovery

at cloud service provider

• Unclearly defined SLAs leading to unsatisfactory services

• Compliance issues due to lack of assurance concerning the physical location

of data

• Location of data in different jurisdictions conflicting with local legislations

applicable to the customer

Page 34: Cloud assurance Mike Chung KPMG

Risk dimensions: multi-tenancy

• Inadequate data segregation and process isolation leading to data

contamination and/or breach of confidentiality

• Inadequate Identity & Access controls causing illegitimate access to sensitive

data such as intellectual property

• Restricted/limited services due to insufficient allocation of resources and/or

capacity

• Standardized functionalities not meeting business requirements

• Complexity to ensure compliance due to ‘black box’ nature of shared

resources (monitoring & logging)

Page 35: Cloud assurance Mike Chung KPMG

Risk dimensions: (public) internet

• Unencrypted data getting lost of stolen in transfer

• Clogged parts of the network causing unavailability of data

• Dependency on internet access and availability for all cloud services

• Uncontrolled access from unsecured/malware-infected client devices

affecting services

• Public internet is exceptionally hard to audit and to monitor

• Accountability and responsibilities on internet traffic are difficult to assign

and even more difficult to enforce

• Lack of possibilities to influence technology on the internet

• Governments can shut down parts of the internet (Egypt, China)

Page 36: Cloud assurance Mike Chung KPMG

• Thousands of customers lost their data in the cloud due to the ‘Sidekick

disaster’ of Microsoft/T-Mobile (2009)

• Botnet incident at Amazon EC2 infected customer’s computers and

compromised their privacy (2009)

• Gmail was unavailable for several hours due to unspecified reasons (2010)

• Hyves was unavailable for an hour due to UPS failure at Evoswitch (2010)

• Linkup lost half of its customer data (2010)

• GoGrid’s network problems had major impact on service availability (2011)

• Salesforce.com was partly unavailable for 30 minutes (2011)

Incidents in the cloud: overview

Page 37: Cloud assurance Mike Chung KPMG

• November/December 2010 – publicised during January 2010

• Vulnerabilities in IE, Adobe software exploited to get access

to Gmail accounts

• ‘Elderwood’ (Chinese government?) – Operation Aurora

• A number of Gmail accounts hacked

• Vulnerabilities fixed

Incidents in the cloud: Google

Page 38: Cloud assurance Mike Chung KPMG

• December 2010

• WikiLeaks ‘kicked out’ by Amazon

• Cablegate data protected from DDOS attacks

• Pressure from Homeland Security

• Back to Bahnhof (Sweden)

• Data safely transferred

Incidents in the cloud: Amazon EC2

Page 39: Cloud assurance Mike Chung KPMG

• April 2011 – users notified 7 days later

• Unpatched servers as entry point – database exploited via

SQL injection – passwords not hashed

• Anonymous or disgruntled former employee(s)?

• Exposed personal information of 77 million Playstation

network users – over 5 million USD direct damage

• Security technology updated, servers patched, increased

levels of encryption

Incidents in the cloud: Sony Playstation

Page 40: Cloud assurance Mike Chung KPMG

• December 2012

• Maintenance error by developers in production environment

• Configuration error in access control system

• Elastic Load Balancing Service affected for US-East region

for almost 24 hours – performance degradation

• No permanent loss or corruption of data

• Amazon updated their procedures and access settings

Incidents in the cloud: Amazon WS

Page 41: Cloud assurance Mike Chung KPMG

• December 2012

• Software bug

• Human error: node protection not turned on

• Failure of monitoring, alerts and escalation

• No failover in place

• 1.8% of Azure storage accounts impacted for 32 hours

• No permanent loss of data

Incidents in the cloud: Windows Azure I

Page 42: Cloud assurance Mike Chung KPMG

• February 2013 – users notified 4 days later

• Evernote detected breaches in their infrastructure

themselves and suspicious activities on their network

• Suspects unknown

• 50 million password changes requested

• No evidence user content was accessed, changed or lost

• Two-factor authentication will be implemented (status Mar

2013)

Incidents in the cloud: Evernote

Page 43: Cloud assurance Mike Chung KPMG

• February 2013

• Certificates for SSL expired

• Untimely renewal of certificates due to human error

• Failure of monitoring and alerts

• Azure Storage Blobs, Tables and Queues using HTTPS

impacted for 12 hours – worldwide

• No permanent loss of data

Incidents in the cloud: Windows Azure II

Page 44: Cloud assurance Mike Chung KPMG

• February 2013

• Information on root cause as well as suspects not disclosed

by Zendesk

• Limited number of user data accessed by hackers

• Procedures improved and vulnerable systems patched

Incidents in the cloud: Zendesk

Page 45: Cloud assurance Mike Chung KPMG

• Low number of incidents compared with on-premises IT

• Far better execution of security measures and architecture

• Security as key factor for cloud service providers

• Incidents are high impact and magnitude events

• Blurring demarcation of responsibilities between cloud

service providers, network providers and customers

• Importance of browsers

Incidents into perspective

Page 46: Cloud assurance Mike Chung KPMG

• 10% of laptops with locally stored data gets stolen every year

• 99% of data is unencrypted

• 50% of business critical company data is unencrypted

• Almost all big CSP are ISO27001 certified – only 15% of

enterprises are able to match that

Also notice that..

Page 47: Cloud assurance Mike Chung KPMG

Cloud versus on-premise

Source: AlertLogic

Page 48: Cloud assurance Mike Chung KPMG

• FUD

• Security: cloud is far less secure than on-premise IT

• Privacy: everybody can access my data

• Maturity: cloud is for kids only

• Practice

• Integration: cloud-on-premise integration is complex and often

incompatible

• Performance: cloud services obey the laws of physics too

• Vendor lock-in: (open) standards are emerging, but it is a long road ahead

FUD and practice

Page 49: Cloud assurance Mike Chung KPMG

• (Distributed) Denial of Service leading to obstruction of

communication

• Flood services: resource consumption, disruption of

configuration (e-mail bombs)

• Crash services: triggering errors in components

• Twitter, August 2009

• Better firewall/switch/routers configuration; application front-

end (data package analysis)

DDOS

Page 50: Cloud assurance Mike Chung KPMG

• SQL query via the input data

• Meta character into an input query; the query placed in SQL

commands in the control plane

• SQL databases on websites common

• Sony PlayStation

• Input/output validation; static code analysis

SQL injection

Page 51: Cloud assurance Mike Chung KPMG

• Exploiting vulnerabilities in hypervisors (VM separations)

• Hack VM A to attack VM B via VM A

• Some minor cases on AWS

• Segmentation, VM hardening

Guest-hopping

Page 52: Cloud assurance Mike Chung KPMG

• Taking control of the hypervisor

• Directly obtaining control or running a rogue hypervisor

• Theoretical scenario, but potentially extremely damaging

• Cyclic redundancy check (CRC) – state value assigned by the

underlying hardware

Hyper-jacking

Page 53: Cloud assurance Mike Chung KPMG

• Independent connections with the victims and relaying

messages between them

• Session hijacking; hostname lookup; web proxy

• Several internet banking applications

• Strong mutual authentication, latency examination, second

(secure) channel verification

Man-in-the-middle

Page 54: Cloud assurance Mike Chung KPMG

• Stealing legitimate user’s session ID

• Often session IDs as cookies, form field or URL

• Not often with public cloud services

Session replay

Page 55: Cloud assurance Mike Chung KPMG

• Sniffing networks; capturing network packages

• Easy when hubs are used

• Not often with public cloud services

• Encryption, network segmentation, network access

Eavesdropping

Page 56: Cloud assurance Mike Chung KPMG

• Like guest-hopping – extracting information from the target

VM from the ‘rogue’ VM

• Amazon EC2, 2009 (Case study by MIT)

• Virtual firewall appliance

Side-channel

Page 57: Cloud assurance Mike Chung KPMG

• IP, DNS, ARP spoofing attacks

• IP spoofing often used for DDOS; DNS spoofing often used to

spread viruses

• Vulnerable with trusts/federations

• Package filtering, spoofing detection software, secure

communication protocols (HTTPS, SSH, TLS)

Spoofing

Page 58: Cloud assurance Mike Chung KPMG

• US Army is investing heavily in three areas: Special Forces,

drones and cyber security

• Physical systems can be attacked from cyberspace (Stuxnet)

• Transparency on cyber incidents and unintended

consequences (widespread vulnerabilities)

• The good guys are being outspent

• Predominance of two mobile systems (iOS and Android)

• Secure or prepare?

Cybercrime

Page 59: Cloud assurance Mike Chung KPMG

• Organised cybercrime

• Online espionage

• Hactivism

• State-backed cyber attacks

• Internal computer fraud

Cybercrime types

Page 60: Cloud assurance Mike Chung KPMG

• Lack of information and obscurity (suspects, alliances,

developments)

• Much more professional (phishing e-mails, sophisticated

attacks)

• Non-technical and technical (harvesting of social data for

targeted attacks)

• Jurisdictional barriers

Cybercrime challenges

Page 61: Cloud assurance Mike Chung KPMG

• Cloud as partner in crime (botnets on Amazon)

• Collateral damage of attacks (attacks are being copied,

refined and used again: Stuxnet, FinFisher)

Cybercrime challenges

Page 62: Cloud assurance Mike Chung KPMG
Page 63: Cloud assurance Mike Chung KPMG

• Ecosystem and architecture

• Technology

• Frameworks and standards

• ‘Right-to-audit’

• IT auditors

Challenges

Page 64: Cloud assurance Mike Chung KPMG

Sliding scale

Data processing and storage

On-premise

Resource use Single-tenant Multi-tenant

Primary network infrastructure

LAN (Public) internet

On-premise IT SSC Hosting Outsourcing Cloud computing

Off-premise

Page 65: Cloud assurance Mike Chung KPMG

Layers of services

Business software

Middleware

OS

HW + network

Facilities

IT managem

ent IaaS PaaS

SaaS

Page 66: Cloud assurance Mike Chung KPMG

Cloud ecosystem: enablers to integrators Cloud service vendors Cloud service integratorsCloud enablers

Examples

H/W and S/W vendors IT & Services players (HW & SW vendors / IT distributors)

Pure Cloud players (e-commerce, Internet giants, Hosting companies)

Telcos

Integrators

Telcos

Value added

Provide the actual cloud services, spanning SaaS, PaaS and IaaS, to customers

Provide cloud focused technology services such as system integration, cloud migration and maintenance

Provide the technology, infrastructure, platforms and Middleware to enable provision of cloud services

Page 67: Cloud assurance Mike Chung KPMG

Cloud ecosystem: niches and providers

Hardware

Operating System

Virtualization Software

Application Development Platform

Applications

Infrastructure Platform Software

System Integrators

Different niches and service providers

Page 68: Cloud assurance Mike Chung KPMG

• Increasing number of third party providers

• Service providers

• Co-operators and partners

• Aggregators and brokers

• Examples:

• Twitter, DropBox and many mobile apps on Amazon

• Salesforce on Equinix

• Cloud services via Capgemini

Third party providers

Page 69: Cloud assurance Mike Chung KPMG

• Acquisitions

• Google acquires Writely

• Salesforce acquires Heroku

• Wolters Kluwer acquires Twinfield

• Bankruptcy (Cassatt)

• Change of Strategy (Iron Mountain, Google Wave, Google

Notebook)

Dynamic market place

Page 70: Cloud assurance Mike Chung KPMG

• Essential element of cloud computing

• VMware (market leader: VM Server, vSphere), MS Hyper-V,

Cirtrix Xen)

• Already on mainframes since 1960s

Virtualisation 1/3

OS

Hardware

OS OS OS

Virtualisation

OS

Hardware

Virtualisation

Page 71: Cloud assurance Mike Chung KPMG

Virtualisation 2/3

Large shared storage Large shared database Shared network

Res

ourc

e vi

rtua

lisat

ion

Software

This layer provides many virtual resources but on itself also consist of many components, potentially spread around the World or for example obtained from other Cloud vendors

Software This layer provides many virtual servers or software services but on itself also runs on an intelligent balanced pool of real (physical) servers, utilising the virtualised resources

Virt

ualiz

atio

n la

yer

Page 72: Cloud assurance Mike Chung KPMG

• More systems ‘virtually’ on one physical machine

• Managed via the Hypervisor

Virtualisation 3/3

Page 73: Cloud assurance Mike Chung KPMG

• Single point of failure

• Performance degradation (HW, network)

• Licence conditions

• Some applications’s performance degrade significantly

• Unsecure deployment and configuration of VMs

• No firewall between VMs (VM-to-VM undetected by network

protection mechanisms)

Virtualisation risks

Page 74: Cloud assurance Mike Chung KPMG

• Desktop virtualisation (e.g.. via Citrix and Hyper-V): Shell GID

• Storage virtualisation

• Application virtualisation for legacy apps: de-coupling of OS

and HW – not always possible

Other types of virtualisation

Page 75: Cloud assurance Mike Chung KPMG

• Based on access from external/third parties, not on access to

cloud services

• Based on management of internally stored data (eventually

managed by externals), not on externally stored data

• Irrelevant and insufficient

Off-premise nature

Page 76: Cloud assurance Mike Chung KPMG

• Marginal attention on (technical) architecture

• Multi-tenancy virtually unobserved/unexposed

• Mere focus on segregation of duties, facilities and networks

Multi-tenancy

Page 77: Cloud assurance Mike Chung KPMG

• Financial and legal issues (accountability, ownership) outside

the domain of IT audits

• Exceptionally difficult to audit

• Only few existing principles and practices for e-mail usage

and internet security applicable

(Public) internet

Page 78: Cloud assurance Mike Chung KPMG

• Given the position of cloud computing, the future mode will be

a hybrid environment

• At large corporations, this hybrid environment will consist of

on-premise IT, outsourced parts, parts on hosting providers,

and parts in the cloud

• The key risk resides in the organization’s inability to

orchestrate the new paradigm of automation

Hybrid environment

Page 79: Cloud assurance Mike Chung KPMG

• Define scope of services

• Define scope of CSP and other (third) party providers

• Identify components (physical, network, HW, SW, services)

• Agree demarcation of responsibilities/accountabilities

Practices: cloud ecosystem

Page 80: Cloud assurance Mike Chung KPMG

Conceptual architecture of the cloud

Customer organisation

Cloud service provider

Third party (cloud) provider Data centre

Mobile use Online identities

Network

Page 81: Cloud assurance Mike Chung KPMG

• Identify data

• Assign ownership

• Classify data (value, legal, sensitivity, importance)

• Devise and implement procedures for data processing

Practices: data classification

Page 82: Cloud assurance Mike Chung KPMG

• http://www.youtube.com/watch?v=ZwLJ4x7rhzU

• http://www.economist.com/topics/cloud-computing

• http://ec.europa.eu/information_society/activities/cloudcomputing/docs/com/c

om_cloud.pdf

• http://www.alertlogic.com/wp-content/uploads/alert-logic-fall2012-cloud-

security-DIGITAL.pdf

• http://www.dataliberation.org

Links

Page 83: Cloud assurance Mike Chung KPMG

[email protected]

• 06 – 1455 9916

• Laan van Langerhuize 1, KPMG Amstelveen

• Follow me on Twitter @MikeChung_KPMG

Contact