clouds and security

64
Cloud Computing = .COM 2.0? Predrag Mitrovic, CISSP, CISM, Author [email protected]

Upload: predrag-mitrovic

Post on 14-Jun-2015

1.559 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Clouds And Security

Cloud Computing = .COM 2.0?

Predrag Mitrovic, CISSP, CISM, [email protected]

Page 2: Clouds And Security

2 minute bio

www.cloudadvisor.se

Page 3: Clouds And Security

www.cloudadvisor.se

Page 4: Clouds And Security

www.cloudadvisor.se

Page 5: Clouds And Security

1990 Botkyrka kommun

www.cloudadvisor.se

Page 6: Clouds And Security

www.cloudadvisor.se

1995 IDG Nätverk & Kommunikation

Page 7: Clouds And Security

1997 NetHouse Konsult & Media

www.cloudadvisor.se

Page 8: Clouds And Security

www.cloudadvisor.se

1999 Novell EMEA

Page 9: Clouds And Security

2000 Microsoft

www.cloudadvisor.se

Page 10: Clouds And Security

www.cloudadvisor.se

2007 LabCenter

Page 11: Clouds And Security

www.cloudadvisor.se

October 1st

MyNethouse

Page 12: Clouds And Security

www.cloudadvisor.se

Page 13: Clouds And Security

www.cloudadvisor.se

Page 14: Clouds And Security

•www.cloudadvisor.se

Page 15: Clouds And Security

www.cloudadvisor.se

Page 16: Clouds And Security

Secu

rity-a

s-a

-Serv

ice

Storage-as-a-Service

Inte

gra

tion

-as-a

-Serv

ice Database-as-a-Service

Information-as-a-Service

Process-as-a-Service

Application-as-a-Service

Pla

tform

-as-a

-Serv

ice

Management/Governance-as-a-Service

Testing-as-a-Service

Page 17: Clouds And Security

Trends behind the hype CPU Speed doubled

every 24 months Memory capacity

doubles every 18 months

Bandwidth explosion OSS The programmable

web Virtualization

Information explosion (+50% growth YoY)

70 % of ICT budgets for maintenance

Up to 85% of capacity idle

Unclear value perception from business side

www.cloudadvisor.se

Page 18: Clouds And Security

www.cloudadvisor.se

• Ge

eka

nd

po

ke.c

om

un

de

r e

n c

rea

tive

co

mm

on

s-lic

en

sG

ee

kan

dp

oke

.co

m u

nd

er

en

cre

ativ

e c

om

mo

ns-

lice

ns

Page 19: Clouds And Security

Definition

Clouds are hardware-based services offering compute, network and storage capacity where: Hardware management is highly abstracted from

the buyer Buyers incur infrastructure costs as variable OPEX Infrastructure capacity is highly elastic (up or

down)

McKinsey & Company

www.cloudadvisor.se

Page 20: Clouds And Security

The idea

Shared infrastructure

Server

OS

Database

App Server

Storage

Network

App 1

Server

OS

Database

App Server

Storage

Network

App 2

Server

OS

Database

App Server

Storage

Network

App 100

www.cloudadvisor.se

Page 21: Clouds And Security

CPU, RAM, Networking

Storage

SW Kernel (OS & VM)

Virtualized resources

Cloud applications

Virtuell

Image 1

Virtual

Image.. n

Virtual

Image 1

Security

Risk Governanc

e

Lifecyclemgmt

AAA

Auditing

Security in-

depth

Incident mgmt

Mgmt

Reporting

Use monitor

KapacityplanningNetwork

management

Automati-zation

Billing

www.cloudadvisor.se

•IaaS

Page 22: Clouds And Security

CPU, RAM, Networking

Storage

SW Kernel (OS & VM)

Virtualized resources

Cloud applications

Virtuell

Image 1

Virtual

Image.. n

Virtual

Image 1

Security

Risk Governanc

e

Lifecyclemgmt

AAA

Auditing

Security in-

depth

Incident mgmt

Mgmt

Reporting

Use monitor

KapacityplanningNetwork

management

Automati-zation

Billing

www.cloudadvisor.se

•PaaS

Page 23: Clouds And Security

CPU, RAM, Networking

Storage

SW Kernel (OS & VM)

Virtualized resources

Cloud applications

Virtuell

Image 1

Virtual

Image.. n

Virtual

Image 1

Security

Risk Governanc

e

Lifecyclemgmt

AAA

Auditing

Security in-

depth

Incident mgmt

Mgmt

Reporting

Use monitor

KapacityplanningNetwork

management

Automati-zation

Billing

www.cloudadvisor.se

•SaaS

Page 24: Clouds And Security

IaaS example

www.cloudadvisor.se

Page 25: Clouds And Security

PaaS examples

www.cloudadvisor.se

Page 26: Clouds And Security

SaaS examples

www.cloudadvisor.se

Page 27: Clouds And Security

www.cloudadvisor.se

Page 28: Clouds And Security

www.cloudadvisor.se

Page 29: Clouds And Security

www.cloudadvisor.se

Page 30: Clouds And Security

Security in the clouds

Page 31: Clouds And Security

CPU, RAM, Networking

Storage

SW Kernel (OS & VM)

Virtualized resources

Cloud applications

Virtuell

Image 1

Virtual

Image.. n

Virtual

Image 1

Security

Risk Governanc

e

Lifecyclemgmt

AAA

Auditing

Security in-

depth

Incident mgmt

www.cloudadvisor.se

Page 32: Clouds And Security

Security in depth - facility Physical perimeter

protected Guards CCTV Fire safety Location against

natural disasters Secure logistics

www.cloudadvisor.se

Page 33: Clouds And Security

CPU, RAM, Networking

www.cloudadvisor.se

Environment & climate secured Physical access control Redundancy Automated supervision – CPU, RAM, fans, disc

etc Enterprise FW NIDS/NIPS

Security in depth - hardware

Page 34: Clouds And Security

www.cloudadvisor.se

Patch management: Host OS & virtual hosts Hostbased FW HIDS/HIPS Filesystem encryption OS & VM hardening Routines for provisioning/de-provisioning of

VM´s

SW Kernel (OS & VM)

Security in depth – SW Kernel

Page 35: Clouds And Security

www.cloudadvisor.se

DLP Integrity auditing Filesystem encryption Personal FW Activity monitor DB Hardening Authorization & Auditing

Storage

Virtualized resourcesVirtual

Image

Security in depth – virtualized resources

Page 36: Clouds And Security

Security in depth – applications

www.cloudadvisor.se

Authentication & Authorization Code quality Least privilige SDL

Applications

Page 37: Clouds And Security

Soft side of security Security Practice

Statement? Control of compliance? How do I map my

demands? How about ”damage

control”? …

www.cloudadvisor.se

Security

Risk Governance

Lifecyclemgmt

AAA

Auditing

Security in-depth

Incident mgmt

Page 38: Clouds And Security

Enter due diligence Insiders? High ”administrator power”? Stress test of plans/abilities business

continuity and disaster recovery My penetration testing?

www.cloudadvisor.se

Page 39: Clouds And Security

Risk management

www.cloudadvisor.se

Page 40: Clouds And Security

Risk management Vendors KRI/KPI + my KRI/KPI = ? Regular audits on vendors security policy,

processes and procedures. Ownership and partnering?

www.cloudadvisor.se

Page 41: Clouds And Security

Governance

www.cloudadvisor.se

Page 42: Clouds And Security

Governance Recurring auditing by trusted third party to

validate SPS & SLA Declaration of partnerships with third party Who is financing the vendor?

www.cloudadvisor.se

Page 43: Clouds And Security

Legal

www.cloudadvisor.se

Page 44: Clouds And Security

Legal Plan for expected/unexpected exit: Assurance

of secure delivery and destruction of data. Clause for information not traversing

geographical boundaries. Rights to reuse my information?

www.cloudadvisor.se

Page 45: Clouds And Security

Compliance & Audit

www.cloudadvisor.se

Page 46: Clouds And Security

Compliance & audit Classification:

Which systems are handling regulated information?

What data is handled within the systems? SAS 70 type II audits? Demand ISO 27001 certification?

www.cloudadvisor.se

Page 47: Clouds And Security

ILM

www.cloudadvisor.se

Page 48: Clouds And Security

ILM Logical segregation of information – What

control mechanisms do we implement for parts outside of our control?

Verify backup & restore of segregated information & simulate how the information is assimilated ”in-house” in case of termination.

www.cloudadvisor.se

Page 49: Clouds And Security

Portability & Interoperability

www.cloudadvisor.se

Page 50: Clouds And Security

P & I SaaS

Process for continuous extraction in open formats IaaS

Develop ”binaries” not tied to Virtual Machine Images specific to the vendor

PaaS Developer platform in the cloud allows portability

with platform in-house

www.cloudadvisor.se

Page 51: Clouds And Security

Identity

www.cloudadvisor.se

Page 52: Clouds And Security

Identity Federation schema

SAML (version?) WS-Federation Liberty ID-FF

Multiple authentication factors? Authorization and governing of rights on

application/data?

www.cloudadvisor.se

Page 53: Clouds And Security

Datacenter operations

www.cloudadvisor.se

Page 54: Clouds And Security

Datacenter operations Maintenance schemas Process for misconfigurations (fallbacks) Versioning Helpdesk

www.cloudadvisor.se

Page 55: Clouds And Security

Incident handling

www.cloudadvisor.se

Page 56: Clouds And Security

Incident handling Common definition of an incident? Roles under an incident? When/how am I notified? Can I use my own CSIRT? Police? Dawn-raid on another tenant – consequence?

www.cloudadvisor.se

Page 57: Clouds And Security

Conclusions

www.cloudadvisor.se

Page 58: Clouds And Security

Cloud Computing is built on known technology – but the risks are definitively virgin territory!

www.cloudadvisor.se

Page 59: Clouds And Security

There are loads of exciting opportunities – open to all!

www.cloudadvisor.se

Page 60: Clouds And Security

Business demands results without ”whining and but´s” – handle it or be bypassed and marginalized!

www.cloudadvisor.se

Page 61: Clouds And Security

Why not implement the philosophy of the cloud in your IT?

www.cloudadvisor.se

Page 62: Clouds And Security

DISCUSSION

www.cloudadvisor.se

Page 63: Clouds And Security

Nice links http://cloudforum.org http://cloudsecurityalliance.org http://cloudcamp.org http://opencloudmanifesto.org http://opencrowd.com http://eucalyptus.com http://aws.amazon.com/ec2 http://www.ibm.com/ibm/cloud/labs/ http://www.hpl.hp.com/research/cloud.html

www.cloudadvisor.se

Page 64: Clouds And Security

Thank you!

Predrag Mitrovic, [email protected]+46 (0) 709 – 200 350 or on the net: http://mynethouse.se

Blogs (in Swedish only): http://blogg.idg.se/itperspektiv http://cloudadvisor.se

www.cloudadvisor.se