top threats to cloud computing: deep dive · 1 top threats to cloud computing: deep dive examining...

22
1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal: Security, Cloud, Privacy Cloud Security Research Fellow, CSA Top Threats Working Group Co-chair

Upload: others

Post on 17-Jul-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: TOP THREATS TO CLOUD COMPUTING: DEEP DIVE · 1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal:

1

TOP THREATS TO CLOUD COMPUTING:DEEP DIVE

Examining the Treacherous Twelve in the real world

Jon-Michael C. Brook, CISSP, CCSKPrincipal: Security, Cloud, Privacy

Cloud Security Research Fellow, CSATop Threats Working Group Co-chair

Page 2: TOP THREATS TO CLOUD COMPUTING: DEEP DIVE · 1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal:

2Copyright © 2018 – Cloud Security Alliance, LLC and Guide Holdings, LLC

Agenda

• Background on Top Threats & The Treacherous Twelve

• Case Study Coverage

• Using the Top Threats in guiding your cloud migration journey

• Deep Dive layout

• Case Studies• LinkedIn• MongoDB• Dirty COW• Zynga• Net Traveler• Yahoo!• Zepto• DynDNS• Cloudbleed

Enterprise Members:87,268

Page 3: TOP THREATS TO CLOUD COMPUTING: DEEP DIVE · 1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal:

3Copyright © 2018 – Cloud Security Alliance, LLC and Guide Holdings, LLC

Why the Deep Dive?• Top Threats – Survey of business leaders

• Marketing term

• Threat has a very specific meaning in the security space• Threat * Vulnerability = Risk

• CSA Volunteer Driven - Working Group neededto prove they know the difference

• Full TT coverage with nine case studies

• Attack chain

• Technical and business impacts

• Mitigating controls • Preventative, Detective, Corrective

Page 4: TOP THREATS TO CLOUD COMPUTING: DEEP DIVE · 1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal:

4Copyright © 2018 – Cloud Security Alliance, LLC and Guide Holdings, LLC

1. Data Breaches

2. Insufficient Identity, Credential and Access Management

3. Insecure Interfaces & APIs

4. System Vulnerabilities

5. Account Hijacking

6. Malicious Insiders

Top Threats: The Treacherous Twelve7. Adv Persistent Threats

8. Data Loss

9. Insufficient Due Diligence

10. Abuse & Nefarious Use of Cloud Services

11. Denial of Service

12. Shared Tech Vulnerabilities

Page 5: TOP THREATS TO CLOUD COMPUTING: DEEP DIVE · 1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal:

5Copyright © 2018 – Cloud Security Alliance, LLC and Guide Holdings, LLC

TT Coverage by Case Study1. Data Breaches

2. Insufficient Identity, Credential and Access Management

3. Insecure Interfaces & APIs

4. System Vulnerabilities

5. Account Hijacking

6. Malicious Insiders

7. Adv Persistent Threats

8. Data Loss

9. Insufficient Due Diligence

10. Abuse & Nefarious Use of Cloud Services

11. Denial of Service

12. Shared Tech Vulnerabilities

Page 6: TOP THREATS TO CLOUD COMPUTING: DEEP DIVE · 1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal:

6Copyright © 2018 – Cloud Security Alliance, LLC and Guide Holdings, LLC

Top Recommended CCM Controls1. AIS – Application & Interface Security

(2)2. AAC – Audit Assurance & Compliance

(3)3. BCR – Business Continuity Mgmt &

Resilience (4)4. CCC – Change Control & Config Mgmt

(2)5. DSI – Data Security & Info Lifecycle (1)6. DCS – Data Center Security (0)7. EKM – Encryption & Key Management

(2)8. GRM – Governance & Risk Mngmt (3)9. HRS – Human Resources (6)10. IAM – Identity and Access

Management (5)11. IVS – Infrastructure & Virtualization

Security (3)12. IPY – (0)13. MOS – Mobile Security (0)14. SEF – Sec Incident, eDiscovery &

Forensics (6)15. STA – Supply Chain (0)16. TVM – Threat & Vulnerability Mngmt

(7)

Page 7: TOP THREATS TO CLOUD COMPUTING: DEEP DIVE · 1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal:

7Copyright © 2018 – Cloud Security Alliance, LLC and Guide Holdings, LLC

Top Control Red Flags • TVM – Threat & Vulnerability Mngmt• AV Installed & Patch Management

• HRS – Human Resources• Training & Awareness

• SEF – Sec Incident, eDiscovery & Forensics• Legal Preparation & Metrics

• IAM – Identity and Access Management• Credentials & Segregation

• GRM – Governance & Risk Mngmt• Leadership Oversight & Involvement

• BCR – Business Continuity Mgmt & Resilience• Planning & Testing

• AAC – Audit Assurance & Compliance• Independent Audits

• IVS – Infrastructure & Virtualization Security• Network Security

• AIS – Application & Interface Security• Data Log Integrity

• CCC – Change Control & Config Mgmt• Quality Testing

• EKM – Encryption & Key Management• Sensitive Data Protection

• DSI – Data Security & Info Lifecycle• Data Inventory/Classification

Page 8: TOP THREATS TO CLOUD COMPUTING: DEEP DIVE · 1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal:

8Copyright © 2018 – Cloud Security Alliance, LLC and Guide Holdings, LLC

Attack

At a glance

Impacts

Deep Dive Layout

Controls

Takeaways

1 2

3

4

5

7

6

Page 9: TOP THREATS TO CLOUD COMPUTING: DEEP DIVE · 1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal:

9Copyright © 2018 – Cloud Security Alliance, LLC and Guide Holdings, LLC

LinkedIn

Page 10: TOP THREATS TO CLOUD COMPUTING: DEEP DIVE · 1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal:

10Copyright © 2018 – Cloud Security Alliance, LLC and Guide Holdings, LLC

LinkedIn

Page 11: TOP THREATS TO CLOUD COMPUTING: DEEP DIVE · 1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal:

11Copyright © 2018 – Cloud Security Alliance, LLC and Guide Holdings, LLC

LinkedIn

Page 12: TOP THREATS TO CLOUD COMPUTING: DEEP DIVE · 1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal:

12Copyright © 2018 – Cloud Security Alliance, LLC and Guide Holdings, LLC

LinkedIn

Page 13: TOP THREATS TO CLOUD COMPUTING: DEEP DIVE · 1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal:

13Copyright © 2018 – Cloud Security Alliance, LLC and Guide Holdings, LLC

LinkedIn

Page 14: TOP THREATS TO CLOUD COMPUTING: DEEP DIVE · 1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal:

14Copyright © 2018 – Cloud Security Alliance, LLC and Guide Holdings, LLC

DynDNS

Page 15: TOP THREATS TO CLOUD COMPUTING: DEEP DIVE · 1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal:

17Copyright © 2018 – Cloud Security Alliance, LLC and Guide Holdings, LLC

Yahoo!

Page 16: TOP THREATS TO CLOUD COMPUTING: DEEP DIVE · 1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal:

20Copyright © 2018 – Cloud Security Alliance, LLC and Guide Holdings, LLC

Zepto

Page 17: TOP THREATS TO CLOUD COMPUTING: DEEP DIVE · 1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal:

23Copyright © 2018 – Cloud Security Alliance, LLC and Guide Holdings, LLC

Net Traveler

Page 18: TOP THREATS TO CLOUD COMPUTING: DEEP DIVE · 1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal:

26Copyright © 2018 – Cloud Security Alliance, LLC and Guide Holdings, LLC

Zynga

Page 19: TOP THREATS TO CLOUD COMPUTING: DEEP DIVE · 1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal:

29Copyright © 2018 – Cloud Security Alliance, LLC and Guide Holdings, LLC

Cloudbleed

Page 20: TOP THREATS TO CLOUD COMPUTING: DEEP DIVE · 1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal:

32Copyright © 2018 – Cloud Security Alliance, LLC and Guide Holdings, LLC

MongoDB

Page 21: TOP THREATS TO CLOUD COMPUTING: DEEP DIVE · 1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal:

35Copyright © 2018 – Cloud Security Alliance, LLC and Guide Holdings, LLC

Dirty COW

Page 22: TOP THREATS TO CLOUD COMPUTING: DEEP DIVE · 1 TOP THREATS TO CLOUD COMPUTING: DEEP DIVE Examining the Treacherous Twelve in the real world Jon-Michael C. Brook, CISSP, CCSK Principal:

39Copyright © 2018 – Cloud Security Alliance, LLC and Guide Holdings, LLC

Jon-Michael C. Brook

CSA Research Fellow

Principal, Guide Holdings, LLC

[email protected]