cloud security ("securing the cloud")

38
Booz | Allen | Hamilton NGI-4: Cloud The Technical Foundations of Security and Interoperability Vic Winkler July 2011 Washington, DC Overview

Upload: vic-winkler

Post on 15-Jan-2015

767 views

Category:

Technology


5 download

DESCRIPTION

Vic Winkler's 2011 FOSE presentation in Washington DC. The talk was based on the book: "Securing the Cloud" (Elsevier 2011).Highlights:--Top 10 Cloud Security Concerns;--Is organizational control good for cloud security?; --Architectural examples for cloud security

TRANSCRIPT

Page 1: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

NGI-4: CloudThe Technical Foundations of Security and Interoperability

Vic WinklerJuly 2011

Washington, DC

Overview

Page 2: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

The Technical Foundations of Security and Interoperability

This presentation is based on my book:

“Securing the Cloud: Cloud Computer Security Techniques and Tactics”

Vic Winkler (Elsevier/Syngress May 2011)

Graphics are Copywrited by Elsevier/Syngress 2011

My experiences in designing, implementing and operating the security for:

“SunGrid” (2004+), “Network.com” (2006+) and “The Sun Public Cloud” (2007+)

…And research into best practices in cloud security (2008-2011)

Previously, I:

Was a pioneer in network and systems based intrusion detection

Designed a B1 trusted Unix system

Graphics copyright Elsevier/Syngress 2011 2

Page 3: Cloud Security ("securing the cloud")

Booz | Allen | HamiltonGraphics copyright Elsevier/Syngress 2011 3

A Brief, Distorted View of History

Overview

ContinuingTechnologyEvolution

Page 4: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

More “Evolution” than “Revolution”

Graphics copyright Elsevier/Syngress 2011 4

So,what

is“cloud”?

Page 5: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

A Minor Problem With Words…

5

Most common question: Is “cloud” secure?

Page 6: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton 6

Booz Allen:Cloud Computing “Quick Look” Assessment

Business/Mission Technology Security

Governance &Change Management

IT Management Organization

Economics

Policy

The QLA approach analyzes the organization and its potential cloud candidate functions and applications across eight Cloud Computing Factors, providing an in-depth assessment and suitability rating for each.

Page 7: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Cloud: A Model for Computing,A Model for Service Delivery

Graphics copyright Elsevier/Syngress 2011 7

• “Cloud Services" – IT model for service delivery: Expressed, delivered and consumed over the Internet or private network– Infrastructure-as-a-Service (IaaS)– Platform-as-a-Service (PaaS)– Software-as-a-Service (SaaS)

• “Cloud Computing”– IT model for computing – Environment composed of IT components

necessary to develop & deliver "cloud services”

Page 8: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

The Services StackTwo Perspectives

Graphics copyright Elsevier/Syngress 2011 8

What about security?

…“Confidentiality”, “Integrity” and “Availability”?

Page 9: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

The NIST Cloud Model

Graphics copyright Elsevier/Syngress 2011 9

Page 10: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Security Concerns?

• 10. Unknown Risks: Concern that cloud computing brings new classes of risks and vulnerabilities

• 9. Control over Data: User data may be comingled with data belonging to others.  

• 8. Legal and Regulatory Compliance: It may be difficult (unrealistic?) to utilize public clouds when data is subject to legal restrictions or regulatory compliance

• 7. Disaster Recovery and Business Continuity: Cloud tenants and users require confidence that their operations and services will continue despite a disaster

• 6. Security Incidents: Tenants and users need to be informed and supported by a provider

• 5. Transparency: Trust in a cloud provider’s security claims entails provider transparency

• 4. Cloud Provider Viability: Since cloud providers are relatively new to the business, there are questions about provider viability and commitment

• 3. Privacy and Data concerns with public or community clouds: Data may not remain in the same system, raising multiple legal concerns

• 2. User Error: A user may inadvertently leak highly sensitive or classified information into a public cloud 

• 1. Network Availability: The cloud must be available whenever you need it

Graphics copyright Elsevier/Syngress 2011 10

Page 11: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Security ConcernsSensitive Data & Regulatory Compliance

Graphics copyright Elsevier/Syngress 2011 11

Page 12: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Security ConcernsTransparency

Graphics copyright Elsevier/Syngress 2011 12

Page 13: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Security ConcernsExample of Private Cloud Concerns

Graphics copyright Elsevier/Syngress 2011 13

Page 14: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Security ConcernsTrade Offs

Graphics copyright Elsevier/Syngress 2011 14

Page 15: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Cloud Services are Expressed From Cloud IT Infrastructure

Graphics copyright Elsevier/Syngress 2011 15

Page 16: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Virtualization and Elastic Service Expression

Graphics copyright Elsevier/Syngress 2011 16

Page 17: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Is Organizational Control Good for Security?

Graphics copyright Elsevier/Syngress 2011 17

Page 18: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Scope of Control

Graphics copyright Elsevier/Syngress 2011 18

Page 19: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

IaaS, PaaS and SaaS: Data Ownership

Graphics copyright Elsevier/Syngress 2011 19

Page 20: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Organizational Control with Private versus Public

Graphics copyright Elsevier/Syngress 2011 20

Page 21: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Cloud Demands Advanced Management Capabilities(This should benefit security)

Graphics copyright Elsevier/Syngress 2011 21

Page 22: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Planning for Competitive Pricing (…in other words, “cost-effective security”)

Graphics copyright Elsevier/Syngress 2011 22

Page 23: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Planning for Fundamental Changes

Graphics copyright Elsevier/Syngress 2011 23

Page 24: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Patterns are Key for Cloud Infrastructure

Graphics copyright Elsevier/Syngress 2011 24

Page 25: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

…Patterns are Key for Cloud Infrastructure

Graphics copyright Elsevier/Syngress 2011 25

Page 26: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

…Patterns are Key for Cloud Infrastructure

Graphics copyright Elsevier/Syngress 2011 26

Page 27: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

ExampleSeparate Paths, Separate Networks

Graphics copyright Elsevier/Syngress 2011 27

Page 28: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Example…Separate Paths, Separate Networks

Graphics copyright Elsevier/Syngress 2011 28

Page 29: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Assessment:Is it “Correct”, “Secure” and Does it Meet Requirements?

Graphics copyright Elsevier/Syngress 2011 29

Page 30: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

How Much Assurance?

Graphics copyright Elsevier/Syngress 2011 30

Page 31: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Operationally, How Will you Know?

Graphics copyright Elsevier/Syngress 2011 31

Page 32: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Security MonitoringA High-Volume Activity

Graphics copyright Elsevier/Syngress 2011 32

Page 33: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Monitoring Really Wants To BeA Near-Real-Time Feedback Loop

Graphics copyright Elsevier/Syngress 2011 33

Page 34: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Beyond Security MonitoringIntegrated Operational Security

Graphics copyright Elsevier/Syngress 2011 34

Page 35: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

ExampleSecurity Use for CMDB

Graphics copyright Elsevier/Syngress 2011 35

Page 36: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Defense-in-Depth in Infrastructure

Graphics copyright Elsevier/Syngress 2011 36

Page 37: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

What are the BIG Lessons?

• Provider– Model T approach: Any color the customer wants …as long as it’s “black”

• Special requests undercut profits– Plan ahead: Focus on eventual operations costs and on the certainty of change to the infrastructure– Seek to automate almost everything:

• Identify procedures/processes to drive down costs• Identify and refine patterns

– Segregate information• Don’t mix infrastructure management information • …with security information • …with customer data …etc.

– Architect for completely separate paths:• (Public) (Infrastructure control) (Network device control) (Security management)• Entails a differentiated set of networks• Isolate, Isolate, Isolate• Encrypt, Encrypt, Encrypt

• Consumer– Who is the provider?– What are you really buying? Transparency, independent verification, indemnification?

37

Page 38: Cloud Security ("securing the cloud")

Booz | Allen | Hamilton

Thank You

Business: [email protected]

Personal: [email protected]

Phone: 703.622.7111

“Securing the Cloud: Cloud Computer Security Techniques and Tactics”

Vic Winkler (Elsevier/Syngress 2011)

Graphics copyright Elsevier/Syngress 2011 38