版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
CloudComputingSecurityConsiderationsJoeStSauver,Ph.D.SecurityProgramsManager,Internet2@Internet2JointTechsSaltLakeCity,Utah4:10-4:30PM,Tuesday,2/2/2010Disclaimer:allopinionsstrictlymyown.2Introduction3SomeCautionsAboutToday'sTalk/TopicAsyoulikelyalreadyknow,there'saLOTofhypeassociatedwithcloudcomputing.I'msorryaboutthat(butIcan'tfixthat)Cloudcomputingisahugetopic.Itencompassesdiversemodelsandtechnologies,eventhoughusersandthetradepresstendtolumpthemunderacommonname.Coveringallpotentialsecurityissuesin20minutesissimplyimpossible.Forthatmatter,pleasenotethatwe'restilldiscoveringmanyofthesecurityissueswhichwillchallengecloudcomputing!Why?Inpart,that'sbecausecloudcomputingisstillawork-in-progress.Becauseitisrapidlyevolving,whatItelltodayyoumayquicklybecomeirrelevantorobsolete.Nonetheless,there'ssomuchthrustbehindcloudcomputingthatwesimplydon'thavetheoptionofsittingbackandwaitingtounderstandaddresscloudcomputingsecurityissues.4What'sDrivingCloudComputing?DriversInclude…Thoughtleaders:Amazon,Google,MicrosoftandmanyotherInternetthoughtleadershaveallalignedbehindthecloudTheeconomy:Becausecloudcomputingshouldtheoreticallyhelpsitesavoidmajornewcapitalexpenditures(capex)whilealsocontrollingsomeongoingoperationalexpenses(opex),cloudcomputingispotentiallya"lifesaver"forfinanciallystrappedbusinesses,includingmanymajoruniversities.TheFeds:CloudcomputinghassubstantialmomentuminWashingtonDC:itwasfeaturedinthejust-releasedfederalITbudget;VivekKundra,thefederalCIO,haschampionedcreationof,a“one-stopshop”forcloudcomputingservicesforfederalagencies;DISAhascreatedaverysuccessfulcloudcomputingprojectcalled"RACE;"andHowardSchmidt,thenewfederalcybersecuritycoordinator,hassaidthatsecuringcloudcomputingwillbeatoppriority.56Apps.Gov(CurrentlyaBitofAWorkInProgress)7DISA'sRACE8OurCommunityIsAlsoPressingAheadCloudcomputingseemtobeturninguponprettymucheverynetworkingandsecuritymailinglistI'monYou'veheard/willbehearinganumberofcloudcomputingtalksduringthisweek'smeeting,whichisprobablynotsurprisingsincecloudcomputingwasoneofJointTech'sexplicitfocusareas.ButI'mseeingcloudseverywhere,notjusthereatJointTechs.Heck,I'mevenseeing"clouds"(withfrequentreferencestosecurity!)appearinthingslikethelastInternet2MemberMeeting"IntroductiontoInternet2"talk9"CyberinfrastructureVisualized:"
ACloud,WithLotsof"Security"References10WhyIs"Security"EverywhereonThatSlide?Securityisgenerallyperceivedasahugeissueforthecloud:
DuringakeynotespeechtotheBrookingsInstitutionpolicyforum,“CloudComputingforBusinessandSociety,”[MicrosoftGeneralCounselBrad]SmithalsohighlighteddatafromasurveycommissionedbyMicrosoftmeasuringattitudesoncloudcomputingamongbusinessleadersandthegeneralpopulation.
Thesurveyfoundthatwhile58percentofthegeneralpopulationand86percentofseniorbusinessleadersareexcitedaboutthepotentialofcloudcomputing,morethan
90percentofthesesamepeopleareconcernedaboutthesecurity,accessandprivacyoftheirowndatain
thecloud.
11AnotherDataPointforCloudsandSecuritySource:
atslide1712CloudComputingIsManyDifferent
ThingstoManyDifferentPeopleAllofthefollowinghavebeenmentionedfromtimetotimeasexamplesof“cloudcomputing:”
--AmazonWebServicesincludingtheElasticCompute
Cloud(EC2),AmazonSimpleStorageService(S3),etc.)
--RackspaceCloud(formerlyMosso)
--Google’sAppEngine
--Windows’AzurePlatform(production/for-feeasoftoday!)
--theOGF(includingitsOpenCloudComputingInterface)
13--SETI@Home,Folding@Home,,etc.
--outsourcedcampusemailservice(toGmailorL),
oroutsourcedspamfiltering(e.g.,toPostiniorIronport)
--useofvirtualization(e.g.,VMware)tohostdepartmental
systemseitheronlocalservers,oronoutsourcedVPSInreality,someofthoseactivitiesarenot(strictlyspeaking)what'susuallydefinedas"cloudcomputing,"14SomeGenerallyAcceptedCharacteristicsMostpeoplewouldagreethattruecloudcomputing… --usuallyhasloworzeroupfrontcapitalcosts
--largelyeliminatesoperationalresponsibilities(e.g.,ifadisk
failsoraswitchlosesconnectivity,youdon’tneedtofixit)
--forthemostpart,cloudcomputingeliminatesknowledgeof
WHEREone’scomputationalworkisbeingdone;yourjob
isbeingrun“somewhere”outthereinthe“cloud”
15--offerssubstantialelasticityandscalability:ifyouinitially
needoneCPU,that’sfine,butifyousuddenlyneed999
more,youcangetthem,too(andwithverylittledelay!)
If/whendemanddrops,youcanscaleyourusageback,too
--cloudcomputingleverageseconomiesofscale(running
megadatacenterswithtensofthousandsofcomputersis
farlessexpensive(percomputer)thanrunningasmall
machineroomwithjustamodestclusterofsystems)16Some"Clouds"Won'tNecessarily
HaveAllofThoseCharacteristicsForinstance,ifyoursiteisrunningalocalprivatecloud:
--thereWILLbecapitalexpendituresupfront,
--you(orsomeoneatyoursite)WILLstillcareaboutthings
likehardwarefailures,and
--youlikelyWON'Thavetheillusionofaseeminglyinfinite
inventoryofprocessors(ormemoryordisk)
Nonetheless,alocalprivatecloudservicemayfunctionallyworkthesamewayasapubliccloudservice,andhybridcloudmodelsmayevencombineprivateandpubliccloudservicesinafairlyseamlessway.Ubuntu'senterprisecloudofferingisaniceexampleofthis.1718WillYourCampusOfferPrivateCloudServices?Ifyouhaven'tbeenthinkingaboutofferingprivatecloudservices,Iwouldsuggestthatyoumightwantto,includingthinkinghardaboutanypotentialsecurityissuesassociatedwithdoingso.19SoWhatAboutSecurityintheCloud?Fortheremainderofthistalk,we'lloutlinesomeofthesecurityissuesyoumightrunintowhenusingcloudcomputing20InSomeWays,"CloudComputingSecurity"
IsNoDifferentThan"RegularSecurity"Forexample,manyapplicationsinterfacewithendusersviatheweb.AllthenormalOWASPwebsecurityvulnerabilities
--thingslikeSQLinjection,crosssitescripting,crosssiterequestforgeries,etc.,--allofthosevulnerabilitiesarejust
asrelevanttoapplicationsrunningonthecloudastheyaretoapplicationsrunningonconventionalhosting.Similarly,considerphysicalsecurity.Adatacenterfullofserverssupportingcloudcomputingisinternallyandexternallyindistinguishablefromadatacenterfullof"regular"servers.Ineachcase,itwillbeimportantforthedatacentertobephysicallysecureagainstunauthorizedaccessorpotentialnaturaldisasters,buttherearenospecialnewphysicalsecurityrequirementswhichsuddenlyappearsimplybecauseoneofthosefacilitiesissupportingcloudcomputing21ThereAreSomeUniqueCloud-RelatedAreasWhichWe'reNOTGoingToWorryAboutTodayContractingforCloudServices:Eventhoughcontractualterms(includingthingslikeSLAs)canbeusedtomitigatesomerisks,I'mnotalawyer,andI'mnotgoingtopretendtobeone,sowe'renotgoingtocoverissuesrelatedtocontractingforcloudservices.Fortunately,NACUAdidagreatjobdiscussingthistopicinarecentseminar,see/meetings/VirtualSEminars/december2009/home.htmlCompliance,AuditingandeDiscovery:Becausethismeetingisprimarilyaboutresearchandeducation,notbusinessprocessesanduniversityadministration,wewillnotconsiderthepotentialneedforcloudcomputingtobecompliantwithPaymentCardIndustrysecuritystandards,FERPA,HIPAA,GLBA,orotherrelatedcompliancemandates.Sowhataresomecloud-relatedsecurityissues?22The"A"inTheSecurity"C-I-A"ObjectivesComputerandnetworksecurityisfundamentallyaboutthreegoals/objectives:
--confidentiality(C)
--integrity(I),and
--availability(A).Availabilityistheareawherecloudbasedinfrastructureappearstohavehaditslargest(oratleastmosthighlypublicized)challengestodate.Forexample,considersomeofthecloud-related
outageswhichhavebeenwidelyreported…23Bitbucket,DDoS'dOffTheAir24MaintenanceInducedCascadingFailures25It'sNotJustTheNetwork:StorageIsKey,TooSeeHowever,seealso:MicrosoftConfirmsDataRecoveryforSidekickUsers26AndLet'sNotForgetAboutPowerIssues27MitigatingCloudComputingAvailabilityIssuesRiskanalystswilltellyouthatwhenyouconfrontarisk,youcantrytoeliminatetherisk,youcanmitigate/minimizetheimpactoftherisk,oryoucansimplyaccepttherisk.Ifyoutrulyrequirenon-stopavailability,youcantryusingmultiplecloudproviders,oryoucouldusepublicandprivatecloudnodestoimproveredundancy.Somecloudcomputingservicesalsoofferservicedividedintomultiple"regions."Bydeployinginfrastructureinmultipleregions,isolationfrom"single-region-only"events(suchasthepoweroutagementionedpreviously)canbeobtained.Availabilityissuesmayalsobeabletobeatleastpartiallymitigatedattheapplicationlevelbythingslikelocalcaching.Sometimes,though,itmaysimplymakefinancialsenseforyoutojustaccepttheriskofarareandbriefoutage.(Remember,99.99availability==>52+minutesdowntime/yr)28MitigatingDataLossRisksTheriskofdataloss(asintheT-MobileSidekickcase)isanexceptiontotheavailabilitydiscussionontheprecedingslide.Usersmaybeabletotolerateanoccasionalserviceinterrup-tion,butnon-recoverabledatalossescankillabusiness.Mostcloudcomputingservicesusedistributedandreplicatedglobalfilesystemswhicharedesignedtoinsurethathardwarefailures(orevenlossofanentiredatacenter)willnotresultinanypermanentdataloss,butIbelievethereisstillvalueindoingatraditionaloffsitebackupofone'sdata,whetherthatdataisinusebytraditionalserversorcloudcomputingservers.Whenlookingforsolutions,makesureyoufindonesthatbacksupdataFROMthecloud(manybackupsolutionsaremeanttobackuplocaldataTOthecloud!)29CloudComputingAndPerimeterSecurityWhileI'mnotahugefanoffirewalls(asI'vepreviouslydiscussedattheSpring2008I2MMin"CyberinfrastructureArchitectures,SecurityandAdvancedApplications,"see),atleastsomesitesdofindvalueinshelteringatleastsomepartsoftheirinfrastructurebehindafirewall.Theremaybeamisconceptionthatcloudcomputingresourcescan'tbeshelteredbehindafirewall(seeforexample"HP'sHurd:Cloudcomputinghasitslimits(especiallywhenyouface1,000attacksaday),"Oct20th,2009,)Contrastthatwith"AmazonWebServices:OverviewofSecurityProcesses"(seetherefsattheback).AWShasamandatoryinboundfirewallconfiguredinadefaultdenymode,andcustomersmustexplicitlyopenportsinbound.30CloudComputing&Host-BasedIntrusionDetectionWhileI'mnotveryenthusiasticaboutfirewalls,Iamabigfanofwell-instrumented/well-monitoredsystemsandnetworks.Choosingcloudcomputingdoesnotnecessarilymeanforgoingyourabilitytomonitorsystemsforhostileactivity.
OneexampleofatoolthatcanhelpwiththistaskisOSSEC(theOpenSourceHost-BasedIntrusionDetectionSystem),anIDSwhichsupportsvirtualizedenvironments:31CloudComputingAlsoRelies
ontheSecurityofVirtualizationBecausecloudcomputingisbuiltontopofvirtualization,iftherearesecurityissueswithvirtualization,thentherewillalsosecurityissueswithcloudcomputing.Forexample,couldsomeoneescapefromaguestvirtualmachineinstancetothehostOS?Whilethecommunityhastraditionallybeensomewhatskepticalofthispossibility,thatchangedwithBlackhatUSA2009,whereKostyaKortchinskyofImmunityInc.presented"Cloudburst:AVMwareGuesttoHostEscapeStory",see
BHUSA09-Kortchinsky-Cloudburst-SLIDES.pdfKostyaopined:"VMwareisn'tanadditionalsecuritylayer,it'sjustanotherlayertofindbugsin"[putanotherway,runningavirtualizationproductincreasestheattacksurface]32ChoiceofCloudProviderCloudcomputingisaformofoutsourcing,andyouneedahighleveloftrustintheentitiesyou'llbepartneringwith.Itmayseemdauntingatfirsttorealizethatyourapplicationdepends(critically!)onthetrustworthinessofyourcloudproviders,butthisisnotreallyanythingnew--today,evenifyou'renotusingthecloud,youalreadyrelyonandtrust:
--networkserviceproviders,
--hardwarevendors,
--softwarevendors,
--serviceproviders,
--datasources,etc.
Yourcloudproviderwillbejustonemoreentityonthatlist.33CloudProviderLocationYouactuallywanttoknow(roughly)whereyourcloudlives.Forexample,oneofthewaysthatcloudcomputingcompanieskeeptheircostslowisbylocatingtheirmegadatacentersinlocationswherelabor,electricityandrealestatecostsarelow,andnetworkconnectivityisgood.Thus,yourcloudprovidercouldbeworkingsomeplaceyou
mayneverhaveheardof,suchasTheDalles,Oregon,
wherepowerischeapandfiberisplentiful,orjustaseasilysomeplaceoverseas.Ifyourapplicationanddatadoendupataninternationalsite,thosesystemswillbesubjecttothelawsandpoliciesofthatjurisdiction.Areyoucomfortablewiththatframework?Areyoualsoconfidentthatinternationalconnectivitywillremainupanduncongested?Canyoulivewiththelatenciesinvolved?34CloudProviderEmployeesIfyou'relikemostsites,you'reprobablyprettycarefulabouttheemployeesyouhireforcriticalroles(suchassysadminsandnetworkenginers).Butwhataboutyourcloudprovider?Ifyourcloudproviderhascarelessoruntrustworthysystemadministrators,theintegrity/privacyofyourdata'satrisk.Howcanyoutellifyourcloudproviderhascarefulandtrustworthyemployees?Askthem!
--Dobackgroundsgetcheckedbeforepeoplegethired?
--Doemployeesreceiveextensivein-housetraining?
--Doemployeesholdrelevantcertifications?
--Dochecklistsgetusedforcriticaloperations?
--Aresystemadministratoractionstrackedandauditableon
aposthocbasisifthere'sananomalousevent?
--Doadministrativeprivilegesgetpromptlyremovedwhen
employeesleaveorchangetheirresponsibilities?35CloudProviderTransparencyYouwillonlybeabletoassessthesufficiencyofcloudprovidersecuritypracticesifthecloudprovideriswillingtodiscloseitssecuritypracticestoyou.Ifyourprovidertreatssecuritypracticesasaconfidentialorbusinessproprietarything,andwon'tdisclosetheirsecuritypracticestoyou,you'llhaveahardtimeassessingthesufficiencyoftheirsecuritypractices.Unfortunately,youmayneedtoconsiderusingadifferentprovider.Remember:"Trust,butverify."[AproverbfrequentlyquotedbyPresidentReaganduringarmscontrolnegotiations]I'mnotknownforbeingabigMicrosoftcheerleader,butMicrosoftdeservesrecognitionforpromotingboththeirCloudComputingAdvancementActandpressingcloudvendorstopolicethemselveswhenitcomestotransparency.See/presspass/presskits/cloudpolicy/36AnExampleofTheWrongApproachSource:
cloudsecurityorg-interviews-guido-van-rossum-google-app-engine-python-and-security.html37ProviderFailuresAreAlsoARealPossibilityEvenforared-hottechnologylikecloudcomputing,thereisnoguaranteethatyourproviderswillfinanciallysurvive.Whatwillyoudoifyourproviderliquidates?
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 上海市高新技術(shù)產(chǎn)品進口合同
- 個人借款合同及相關(guān)條款
- 京東商城售后服務(wù)勞動合同
- 個人貸款合同范本:擔(dān)保借款全解析
- 專利申請代理合同標(biāo)準(zhǔn)版
- 中學(xué)教師聘用合同范本
- 親友合資建房合同
- 個人對公司財務(wù)借款合同
- XX村道路改建工程集資合同協(xié)議
- 個人與企業(yè)汽車抵押借款合同范本
- 2024-2025學(xué)年成都市金牛區(qū)九年級上期末(一診)英語試題(含答案)
- 2024-2025學(xué)年廣東省深圳市南山區(qū)監(jiān)測數(shù)學(xué)三年級第一學(xué)期期末學(xué)業(yè)水平測試試題含解析
- 廣東2024年廣東金融學(xué)院招聘專職輔導(dǎo)員9人筆試歷年典型考點(頻考版試卷)附帶答案詳解
- 2025年研究生考試考研英語(二204)試卷與參考答案
- DB31∕731-2020 船舶修正總噸單位產(chǎn)品能源消耗限額
- 2024-年全國醫(yī)學(xué)博士外語統(tǒng)一入學(xué)考試英語試題
- 2024年衛(wèi)生專業(yè)技術(shù)資格考試衛(wèi)生檢驗技術(shù)(初級(師)211)相關(guān)專業(yè)知識試題及答案指導(dǎo)
- 《手衛(wèi)生知識培訓(xùn)》培訓(xùn)課件
- 《祛痘產(chǎn)品祛痘產(chǎn)品》課件
- 江蘇省南京鼓樓區(qū)2024年中考聯(lián)考英語試題含答案
- 兒科護理學(xué)試題及答案解析-神經(jīng)系統(tǒng)疾病患兒的護理(二)
評論
0/150
提交評論