Click to edit Master title style Ontological Approach toward Cybersecurity in Cloud Computing Takeshi Takahashi, Youki Kadobayashi NICT Tokyo, Japan 2010/12/5 1 Focus of today’s discussion Click to edit Master title style This presentation discusses needed cybersecurity information for cloud computing based on an ontology 2010/12/5 2 Ontology of Cybersecurity Operational Information We built an ontology following the 3-step approach Three steps to build the ontology Click to edit Master title style 1 2 Design Operation Domain 3 Design Entity Design Cybersecurity Information KB DB KB Domain B DB DB Source : “Ontological Approach toward Cybersecurity in Cloud Computing,” ACM SIN, September 2010 Domain C Domain A Domain B Domain C Domain A Domain B Domain C Domain A DB KB 2010/12/5 3 Ontology of Cybersecurity Operational Information This ontology could be used as a basis of discussing cybersecurity issues IT Infrastructure Provider Product & Service KB Click Master title style Providerto edit refers Resource DB Version KB refers manipulates User Resource Configuration KB refers DB Product & Service Developer organizes provides information to refers Countermeasure KB Administrator refers Incident Handling domain manipulates refers Assessment KB Detection / Protection KB Registrar Incident DB refers Response Team refers provides information to Cyber Risk KB refers Vulnerability KB manipulates Coordinator organizes Warning DB refers organizes Knowledge Accumulation domain IT Asset Management domain manipulates Threat KB Researcher DB: Database KB: Knowledge base Source : “Ontological Approach toward Cybersecurity in Cloud Computing,” ACM SIN, September 2010 2010/12/5 4 CYBEX Ontology The ontology is referenced by X.1500 and is utilized as a basis of reviewing the orchestration of existing works Mapping of cybersecurity information standards Click to edit Master title style Provider Resource DB IT Asset Management Domain IT Infra. Prvdr Product & Service KB CPE CCE User Resource DB Researcher ARF Administrator Incident DB IODEF Incident Handling Domain Res. Team Countermeasure KB CEE Pfoc CWSS CVSS OVAL XCCDF Registrar Knowledge Accumulation Domain Warning DB Coordinator Evidence DB TS102232 TS102657 Forensics Domain Inspector RFC3924 TS23.271 X.dexf EDRM Cyber Risk KB CVE CWE CAPEC MAEC Product & Service Developer 2010/12/5 5 Scope of today’s presentation In this presentation, we would like to discuss some of the issues toward cybersecurity in cloud computing manipulates IT Infrastructure Provider 3 Click Master title style Providerto edit refers Product & Service KB Resource DB Version KB refers manipulates User Resource Configuration KB refers DB Product & Service Developer organizes provides information to refers Countermeasure KB Administrator refers refers Incident Handling domain Registrar Incident DB refers Response Team refers provides information to Cyber Risk KB refers Vulnerability KB manipulates Coordinator organizes Detection / Protection KB 2 manipulates Assessment KB Warning DB refers organizes Knowledge Accumulation domain IT Asset Management domain 1 Threat KB Researcher DB: Database KB: Knowledge base 2010/12/5 6 IT Asset Management domain Needed information in the User Resource DB Click to edit Master title style A Service subscription information E Resource dependency information D Security level information B Identity information Cloud Security Information C Data access control policy * this presentation omit discussing Provider Resource DB due to the interest of time Source : “Ontological Approach toward Cybersecurity in Cloud Computing,” ACM SIN, September 2010 2010/12/5 7 Incident Handling domain Needed information in the Incident Handling domain Incident DB Data provenance Click to edit Master title style Warning DB • Log of any data manipulation • Warnings need to be provided to Warning to indirect users indirect users of warned resources • Change log of the Data mapping between placement log logical and physical data location • Incident/event Data incident/event information on data apart from asset information Warning on data incident/event • Warning of incident/event on data apart from asset Source : “Ontological Approach toward Cybersecurity in Cloud Computing,” ACM SIN, September 2010 2010/12/5 8 Knowledge Accumulation domain Needed information in the Knowledge Accumulation domain Cyber Risk KB Click to edit Master title style Configuration vulnerability • Vulnerabilities caused by mis-configuration of resources and their combinations Human factors causing risks • Human vulnerabilities causing cyber risks (the weakest links are humans) Countermeasure KB Methodologies to evaluate cybersecurity • Existing methodologies such as CVSS need to be advanced further to cope with cloud computing Product&Service KB Cloud service enumeration /taxonomy • Naming of cloud services and the enumeration and taxonomy Service configuration enumeration /taxonomy • Naming of service configuration and the enumeration and taxonomy Source : “Ontological Approach toward Cybersecurity in Cloud Computing,” ACM SIN, September 2010 2010/12/5 9 Summary In order to maintain cybersecurity in cloud computing, further research and standardization activities are needed Click to edit Master title style • Based on the CYBEX ontology, we raised some cybersecurity issues to accommodate cloud computing – Resource dependency, identity, data provenance, data placement change log, data incident, human factors, service enumeration/taxonomy, etc. • In order to accommodate cloud computing, further research and standardization activities are needed, and CYBEX / CYBEX ontology is a good starting point for discussing them • Some more details are available at “Ontological Approach toward Cybersecurity in Cloud Computing” (ACM SIN, September 2010) 2010/12/5 10