Understanding Cloud Computing Vulnerabilities

advertisement
Understanding Cloud Computing Vulnerabilities
This paper appears in: Security & Privacy, IEEE
Issue Date : March-April 2011
Volume : 9 , Issue:2
On page(s): 50
ISSN : 1540-7993
INSPEC Accession Number: 11903410
Digital Object Identifier : 10.1109/MSP.2010.115
Date of Publication : 17 June 2010
Date of Current Version : 28 March 2011
Speaker : Siou
Overview
Abstract
Vulnerability: An Overview
Cloud Computing
Cloud-Specific Vulnerabilities
Architectural Components and Vulnerabilities
Conclusion
Abstract
Amazon
Gmail
News
Plurk
Cloud Computing
Google Map Facebook
Twitter
Blog
Vulnerability: An Overview
ISO 27005 defines risk as
“the potential that a given threat will exploit
vulnerabilities of an asset or group of assets
and thereby cause harm to the organization”
EX:DB Server SQL injection
EX:Sony PSN
Vulnerability: An Overview
Defining Vulnerability
According to the Open Group’s risk taxonomy,
Vulnerability is the probability that an asset will
be unable to resist the actions of a threat
agent.
EX: Intranet V.S. Extranet
Cloud Computing
Core Cloud Computing Technologies
Cloud Computing
Essential Characteristics of Cloud Computing
(NIST) description
On-demand self-service.
Ubiquitous network access.
Resource pooling.
Rapid elasticity.
Measured service.
Cloud-Specific Vulnerabilities
Core-Technology Vulnerabilities
virtual machine escape
EX:VM attack
session riding and hijacking
EX: Cross-site Request Forgery
insecure or obsolete cryptography.
EX:Password attack
Cloud-Specific Vulnerabilities
Essential Cloud Characteristic Vulnerabilities
Unauthorized access to management interface.
EX: Azure management
Internet protocol vulnerabilities.
EX: Scan Host Protocol
Data recovery vulnerability.
EX: Natural disasters
Metering and billing evasion.
EX: Pay Money
Cloud-Specific Vulnerabilities
Defects in Known Security Controls - IaaS
virtualized networks offer insufficient network-based controls.
EX: vulnerability scanning is invalid
poor key management procedures.
EX: many different kinds of keys
security metrics aren’t adapted to cloud infrastructures.
EX: cloud customers can’t monitor resources
Architectural Components and Vulnerabilities
Architectural Components and Vulnerabilities
Cloud Software Infrastructure and Environment -PaaS
 a development and runtime environment
EX: more supported languages;
 storage services
EX: database interface
 communication infrastructure
EX: Azure AppFabric Service Bus
Architectural Components and Vulnerabilities
Computational Resources
concerns how virtual machine images are handled
EX: VM is not a Free Resources
EX: image can be taken from an untrustworthy source
Architectural Components and Vulnerabilities
Storage
obsolete cryptography and poor key management
EX: physical disk destruction can’t be carried out
Architectural Components and Vulnerabilities
Communication
vulnerabilities of shared network infrastructure components
Architectural Components and Vulnerabilities
Cloud Web Applications
an application component operated somewhere in the cloud.
a browser component running within the user’s browser.
EX: session riding and hijacking vulnerabilities and injection
vulnerabilities.
Architectural Components and Vulnerabilities
Services and APIs
application URL would only give the user a
browser component
Architectural Components and Vulnerabilities
Management Access
management access is often realized using a
Web application or service
Architectural Components and Vulnerabilities
Identity, Authentication, Authorization,
and Auditing Mechanisms
Denial of service by account lockout.
EX: Lock Account
Weak credential-reset mechanisms.
EX: not using federated authentication
Insufficient or faulty authorization checks.
EX: root cause of URL-guessing attacks
Coarse authorization control.
EX: duty separation
Insufficient logging and monitoring possibilities.
EX: no standards to logging and monitoring
Architectural Components and Vulnerabilities
Provider
users’ inability to control cloud infrastructure
Conclusion
Cloud computing is in constant development
Any Question?
Download