云計算與安全cloud computing security_第1頁
云計算與安全cloud computing security_第2頁
云計算與安全cloud computing security_第3頁
云計算與安全cloud computing security_第4頁
云計算與安全cloud computing security_第5頁
已閱讀5頁,還剩38頁未讀 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)

文檔簡介

CloudComputingSecurityConsiderationsJoeStSauver,Ph.D.SecurityProgramsManager,Internet2@Internet2JointTechsSaltLakeCity,Utah4:10-4:30PM,Tuesday,2/2/2010Disclaimer:allopinionsstrictlymyown.2Introduction3SomeCautionsAboutToday'sTalk/TopicAsyoulikelyalreadyknow,there'saLOTofhypeassociatedwithcloudcomputing.I'msorryaboutthat(butIcan'tfixthat)Cloudcomputingisahugetopic.Itencompassesdiversemodelsandtechnologies,eventhoughusersandthetradepresstendtolumpthemunderacommonname.Coveringallpotentialsecurityissuesin20minutesissimplyimpossible.Forthatmatter,pleasenotethatwe'restilldiscoveringmanyofthesecurityissueswhichwillchallengecloudcomputing!Why?Inpart,that'sbecausecloudcomputingisstillawork-in-progress.Becauseitisrapidlyevolving,whatItelltodayyoumayquicklybecomeirrelevantorobsolete.Nonetheless,there'ssomuchthrustbehindcloudcomputingthatwesimplydon'thavetheoptionofsittingbackandwaitingtounderstandaddresscloudcomputingsecurityissues.4What'sDrivingCloudComputing?DriversInclude…Thoughtleaders:Amazon,Google,MicrosoftandmanyotherInternetthoughtleadershaveallalignedbehindthecloudTheeconomy:Becausecloudcomputingshouldtheoreticallyhelpsitesavoidmajornewcapitalexpenditures(capex)whilealsocontrollingsomeongoingoperationalexpenses(opex),cloudcomputingispotentiallya"lifesaver"forfinanciallystrappedbusinesses,includingmanymajoruniversities.TheFeds:CloudcomputinghassubstantialmomentuminWashingtonDC:itwasfeaturedinthejust-releasedfederalITbudget;VivekKundra,thefederalCIO,haschampionedcreationof,a“one-stopshop”forcloudcomputingservicesforfederalagencies;DISAhascreatedaverysuccessfulcloudcomputingprojectcalled"RACE;"andHowardSchmidt,thenewfederalcybersecuritycoordinator,hassaidthatsecuringcloudcomputingwillbeatoppriority.56Apps.Gov(CurrentlyaBitofAWorkInProgress)7DISA'sRACE8OurCommunityIsAlsoPressingAheadCloudcomputingseemtobeturninguponprettymucheverynetworkingandsecuritymailinglistI'monYou'veheard/willbehearinganumberofcloudcomputingtalksduringthisweek'smeeting,whichisprobablynotsurprisingsincecloudcomputingwasoneofJointTech'sexplicitfocusareas.ButI'mseeingcloudseverywhere,notjusthereatJointTechs.Heck,I'mevenseeing"clouds"(withfrequentreferencestosecurity!)appearinthingslikethelastInternet2MemberMeeting"IntroductiontoInternet2"talk9"CyberinfrastructureVisualized:"

ACloud,WithLotsof"Security"References10WhyIs"Security"EverywhereonThatSlide?Securityisgenerallyperceivedasahugeissueforthecloud:

DuringakeynotespeechtotheBrookingsInstitutionpolicyforum,“CloudComputingforBusinessandSociety,”[MicrosoftGeneralCounselBrad]SmithalsohighlighteddatafromasurveycommissionedbyMicrosoftmeasuringattitudesoncloudcomputingamongbusinessleadersandthegeneralpopulation.

Thesurveyfoundthatwhile58percentofthegeneralpopulationand86percentofseniorbusinessleadersareexcitedaboutthepotentialofcloudcomputing,morethan

90percentofthesesamepeopleareconcernedaboutthesecurity,accessandprivacyoftheirowndatain

thecloud.

11AnotherDataPointforCloudsandSecuritySource:

atslide1712CloudComputingIsManyDifferent

ThingstoManyDifferentPeopleAllofthefollowinghavebeenmentionedfromtimetotimeasexamplesof“cloudcomputing:”

--AmazonWebServicesincludingtheElasticCompute

Cloud(EC2),AmazonSimpleStorageService(S3),etc.)

--RackspaceCloud(formerlyMosso)

--Google’sAppEngine

--Windows’AzurePlatform(production/for-feeasoftoday!)

--theOGF(includingitsOpenCloudComputingInterface)

13--SETI@Home,Folding@Home,,etc.

--outsourcedcampusemailservice(toGmailorL),

oroutsourcedspamfiltering(e.g.,toPostiniorIronport)

--useofvirtualization(e.g.,VMware)tohostdepartmental

systemseitheronlocalservers,oronoutsourcedVPSInreality,someofthoseactivitiesarenot(strictlyspeaking)what'susuallydefinedas"cloudcomputing,"14SomeGenerallyAcceptedCharacteristicsMostpeoplewouldagreethattruecloudcomputing… --usuallyhasloworzeroupfrontcapitalcosts

--largelyeliminatesoperationalresponsibilities(e.g.,ifadisk

failsoraswitchlosesconnectivity,youdon’tneedtofixit)

--forthemostpart,cloudcomputingeliminatesknowledgeof

WHEREone’scomputationalworkisbeingdone;yourjob

isbeingrun“somewhere”outthereinthe“cloud”

15--offerssubstantialelasticityandscalability:ifyouinitially

needoneCPU,that’sfine,butifyousuddenlyneed999

more,youcangetthem,too(andwithverylittledelay!)

If/whendemanddrops,youcanscaleyourusageback,too

--cloudcomputingleverageseconomiesofscale(running

megadatacenterswithtensofthousandsofcomputersis

farlessexpensive(percomputer)thanrunningasmall

machineroomwithjustamodestclusterofsystems)16Some"Clouds"Won'tNecessarily

HaveAllofThoseCharacteristicsForinstance,ifyoursiteisrunningalocalprivatecloud:

--thereWILLbecapitalexpendituresupfront,

--you(orsomeoneatyoursite)WILLstillcareaboutthings

likehardwarefailures,and

--youlikelyWON'Thavetheillusionofaseeminglyinfinite

inventoryofprocessors(ormemoryordisk)

Nonetheless,alocalprivatecloudservicemayfunctionallyworkthesamewayasapubliccloudservice,andhybridcloudmodelsmayevencombineprivateandpubliccloudservicesinafairlyseamlessway.Ubuntu'senterprisecloudofferingisaniceexampleofthis.1718WillYourCampusOfferPrivateCloudServices?Ifyouhaven'tbeenthinkingaboutofferingprivatecloudservices,Iwouldsuggestthatyoumightwantto,includingthinkinghardaboutanypotentialsecurityissuesassociatedwithdoingso.19SoWhatAboutSecurityintheCloud?Fortheremainderofthistalk,we'lloutlinesomeofthesecurityissuesyoumightrunintowhenusingcloudcomputing20InSomeWays,"CloudComputingSecurity"

IsNoDifferentThan"RegularSecurity"Forexample,manyapplicationsinterfacewithendusersviatheweb.AllthenormalOWASPwebsecurityvulnerabilities

--thingslikeSQLinjection,crosssitescripting,crosssiterequestforgeries,etc.,--allofthosevulnerabilitiesarejust

asrelevanttoapplicationsrunningonthecloudastheyaretoapplicationsrunningonconventionalhosting.Similarly,considerphysicalsecurity.Adatacenterfullofserverssupportingcloudcomputingisinternallyandexternallyindistinguishablefromadatacenterfullof"regular"servers.Ineachcase,itwillbeimportantforthedatacentertobephysicallysecureagainstunauthorizedaccessorpotentialnaturaldisasters,buttherearenospecialnewphysicalsecurityrequirementswhichsuddenlyappearsimplybecauseoneofthosefacilitiesissupportingcloudcomputing21ThereAreSomeUniqueCloud-RelatedAreasWhichWe'reNOTGoingToWorryAboutTodayContractingforCloudServices:Eventhoughcontractualterms(includingthingslikeSLAs)canbeusedtomitigatesomerisks,I'mnotalawyer,andI'mnotgoingtopretendtobeone,sowe'renotgoingtocoverissuesrelatedtocontractingforcloudservices.Fortunately,NACUAdidagreatjobdiscussingthistopicinarecentseminar,see/meetings/VirtualSEminars/december2009/home.htmlCompliance,AuditingandeDiscovery:Becausethismeetingisprimarilyaboutresearchandeducation,notbusinessprocessesanduniversityadministration,wewillnotconsiderthepotentialneedforcloudcomputingtobecompliantwithPaymentCardIndustrysecuritystandards,FERPA,HIPAA,GLBA,orotherrelatedcompliancemandates.Sowhataresomecloud-relatedsecurityissues?22The"A"inTheSecurity"C-I-A"ObjectivesComputerandnetworksecurityisfundamentallyaboutthreegoals/objectives:

--confidentiality(C)

--integrity(I),and

--availability(A).Availabilityistheareawherecloudbasedinfrastructureappearstohavehaditslargest(oratleastmosthighlypublicized)challengestodate.Forexample,considersomeofthecloud-related

outageswhichhavebeenwidelyreported…23Bitbucket,DDoS'dOffTheAir24MaintenanceInducedCascadingFailures25It'sNotJustTheNetwork:StorageIsKey,TooSeeHowever,seealso:MicrosoftConfirmsDataRecoveryforSidekickUsers26AndLet'sNotForgetAboutPowerIssues27MitigatingCloudComputingAvailabilityIssuesRiskanalystswilltellyouthatwhenyouconfrontarisk,youcantrytoeliminatetherisk,youcanmitigate/minimizetheimpactoftherisk,oryoucansimplyaccepttherisk.Ifyoutrulyrequirenon-stopavailability,youcantryusingmultiplecloudproviders,oryoucouldusepublicandprivatecloudnodestoimproveredundancy.Somecloudcomputingservicesalsoofferservicedividedintomultiple"regions."Bydeployinginfrastructureinmultipleregions,isolationfrom"single-region-only"events(suchasthepoweroutagementionedpreviously)canbeobtained.Availabilityissuesmayalsobeabletobeatleastpartiallymitigatedattheapplicationlevelbythingslikelocalcaching.Sometimes,though,itmaysimplymakefinancialsenseforyoutojustaccepttheriskofarareandbriefoutage.(Remember,99.99availability==>52+minutesdowntime/yr)28MitigatingDataLossRisksTheriskofdataloss(asintheT-MobileSidekickcase)isanexceptiontotheavailabilitydiscussionontheprecedingslide.Usersmaybeabletotolerateanoccasionalserviceinterrup-tion,butnon-recoverabledatalossescankillabusiness.Mostcloudcomputingservicesusedistributedandreplicatedglobalfilesystemswhicharedesignedtoinsurethathardwarefailures(orevenlossofanentiredatacenter)willnotresultinanypermanentdataloss,butIbelievethereisstillvalueindoingatraditionaloffsitebackupofone'sdata,whetherthatdataisinusebytraditionalserversorcloudcomputingservers.Whenlookingforsolutions,makesureyoufindonesthatbacksupdataFROMthecloud(manybackupsolutionsaremeanttobackuplocaldataTOthecloud!)29CloudComputingAndPerimeterSecurityWhileI'mnotahugefanoffirewalls(asI'vepreviouslydiscussedattheSpring2008I2MMin"CyberinfrastructureArchitectures,SecurityandAdvancedApplications,"see),atleastsomesitesdofindvalueinshelteringatleastsomepartsoftheirinfrastructurebehindafirewall.Theremaybeamisconceptionthatcloudcomputingresourcescan'tbeshelteredbehindafirewall(seeforexample"HP'sHurd:Cloudcomputinghasitslimits(especiallywhenyouface1,000attacksaday),"Oct20th,2009,)Contrastthatwith"AmazonWebServices:OverviewofSecurityProcesses"(seetherefsattheback).AWShasamandatoryinboundfirewallconfiguredinadefaultdenymode,andcustomersmustexplicitlyopenportsinbound.30CloudComputing&Host-BasedIntrusionDetectionWhileI'mnotveryenthusiasticaboutfirewalls,Iamabigfanofwell-instrumented/well-monitoredsystemsandnetworks.Choosingcloudcomputingdoesnotnecessarilymeanforgoingyourabilitytomonitorsystemsforhostileactivity.

OneexampleofatoolthatcanhelpwiththistaskisOSSEC(theOpenSourceHost-BasedIntrusionDetectionSystem),anIDSwhichsupportsvirtualizedenvironments:31CloudComputingAlsoRelies

ontheSecurityofVirtualizationBecausecloudcomputingisbuiltontopofvirtualization,iftherearesecurityissueswithvirtualization,thentherewillalsosecurityissueswithcloudcomputing.Forexample,couldsomeoneescapefromaguestvirtualmachineinstancetothehostOS?Whilethecommunityhastraditionallybeensomewhatskepticalofthispossibility,thatchangedwithBlackhatUSA2009,whereKostyaKortchinskyofImmunityInc.presented"Cloudburst:AVMwareGuesttoHostEscapeStory",see

BHUSA09-Kortchinsky-Cloudburst-SLIDES.pdfKostyaopined:"VMwareisn'tanadditionalsecuritylayer,it'sjustanotherlayertofindbugsin"[putanotherway,runningavirtualizationproductincreasestheattacksurface]32ChoiceofCloudProviderCloudcomputingisaformofoutsourcing,andyouneedahighleveloftrustintheentitiesyou'llbepartneringwith.Itmayseemdauntingatfirsttorealizethatyourapplicationdepends(critically!)onthetrustworthinessofyourcloudproviders,butthisisnotreallyanythingnew--today,evenifyou'renotusingthecloud,youalreadyrelyonandtrust:

--networkserviceproviders,

--hardwarevendors,

--softwarevendors,

--serviceproviders,

--datasources,etc.

Yourcloudproviderwillbejustonemoreentityonthatlist.33CloudProviderLocationYouactuallywanttoknow(roughly)whereyourcloudlives.Forexample,oneofthewaysthatcloudcomputingcompanieskeeptheircostslowisbylocatingtheirmegadatacentersinlocationswherelabor,electricityandrealestatecostsarelow,andnetworkconnectivityisgood.Thus,yourcloudprovidercouldbeworkingsomeplaceyou

mayneverhaveheardof,suchasTheDalles,Oregon,

wherepowerischeapandfiberisplentiful,orjustaseasilysomeplaceoverseas.Ifyourapplicationanddatadoendupataninternationalsite,thosesystemswillbesubjecttothelawsandpoliciesofthatjurisdiction.Areyoucomfortablewiththatframework?Areyoualsoconfidentthatinternationalconnectivitywillremainupanduncongested?Canyoulivewiththelatenciesinvolved?34CloudProviderEmployeesIfyou'relikemostsites,you'reprobablyprettycarefulabouttheemployeesyouhireforcriticalroles(suchassysadminsandnetworkenginers).Butwhataboutyourcloudprovider?Ifyourcloudproviderhascarelessoruntrustworthysystemadministrators,theintegrity/privacyofyourdata'satrisk.Howcanyoutellifyourcloudproviderhascarefulandtrustworthyemployees?Askthem!

--Dobackgroundsgetcheckedbeforepeoplegethired?

--Doemployeesreceiveextensivein-housetraining?

--Doemployeesholdrelevantcertifications?

--Dochecklistsgetusedforcriticaloperations?

--Aresystemadministratoractionstrackedandauditableon

aposthocbasisifthere'sananomalousevent?

--Doadministrativeprivilegesgetpromptlyremovedwhen

employeesleaveorchangetheirresponsibilities?35CloudProviderTransparencyYouwillonlybeabletoassessthesufficiencyofcloudprovidersecuritypracticesifthecloudprovideriswillingtodiscloseitssecuritypracticestoyou.Ifyourprovidertreatssecuritypracticesasaconfidentialorbusinessproprietarything,andwon'tdisclosetheirsecuritypracticestoyou,you'llhaveahardtimeassessingthesufficiencyoftheirsecuritypractices.Unfortunately,youmayneedtoconsiderusingadifferentprovider.Remember:"Trust,butverify."[AproverbfrequentlyquotedbyPresidentReaganduringarmscontrolnegotiations]I'mnotknownforbeingabigMicrosoftcheerleader,butMicrosoftdeservesrecognitionforpromotingboththeirCloudComputingAdvancementActandpressingcloudvendorstopolicethemselveswhenitcomestotransparency.See/presspass/presskits/cloudpolicy/36AnExampleofTheWrongApproachSource:

cloudsecurityorg-interviews-guido-van-rossum-google-app-engine-python-and-security.html37ProviderFailuresAreAlsoARealPossibilityEvenforared-hottechnologylikecloudcomputing,thereisnoguaranteethatyourproviderswillfinanciallysurvive.Whatwillyoudoifyourproviderliquidates?

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

最新文檔

評論

0/150

提交評論