CYB 610 Cloud Systems Security Course Introduction Chen Zhong CYB 610 Cloud Systems Security • First week: • User: Classroom120 • Password: Spartans+2121 CYB 610 Cloud Systems Security Overview • Make sure everything works! Check list: • • • • Question for me? Question about myself? Clear voice, screen and docs are accessible, Discussion methods (breakout room + zoom poll) Anything else? • What to learn and how to learn? • Cloud computing • What is it? • What does it comprised of? • Why is it so prevalent and key to business development? • Lab: Lab Setup CYB 610 Cloud Systems Security Cloud Systems Security • What, Why cloud computing • Why should we care about security CYB 610 Cloud Systems Security Cloud computing uses Internet technology to provide flexible and scalable services. CYB 610 Cloud Systems Security Cloud Computing • Cloud vendor provides managed computing resources for rent by customers • What do you want to rent? • (Virtualized) Hosts (Infrastructure as a Service) • Rent cycles: AWS EC2, Rackspace Cloud Servers, OpenStack • Environment (Platform as a Service) • Rent instances: AWS Lambda, Microsoft Azure, Google App Engine, Workday cloud platform • Programs (Software as a Service) • Rent services: Salesforce, Google Docs, AWS, Dropbox, Slack CYB 610 Cloud Systems Security From Data Center to Cloud -> Doubt or not? Credits: Systems and Internet Infrastructure Security (SIIS) Laboratory Page@PSU CYB 610 Cloud Systems Security Reasons to Doubt • History has shown they are vulnerable to attack • • • • Default and hardcoded passwords Passwords and other credentials stored in plain text files Unpatched software and firmware vulnerabilities Poorly configured BIOS, firewalls, ports, servers, switches, routers, or other parts of the infrastructure • Unencrypted network traffic or data at rest • Lack of privileged access • … • Insiders can subvert even hardened systems Credits: Systems and Internet Infrastructure Security (SIIS) Laboratory Page@PSU CYB 610 Cloud Systems Security Reasons to Doubt https://www.comparitech.com/blog/information-security/biggest-data-breaches-in-history/ CYB 610 Cloud Systems Security Co ty Data and services gri • My home is my castle, and I want a certain measure of privacy when I'm home (Confidentiality). • Protect the assets in my home from theft or from being tampered by unauthorized parties (Integrity). • I'd like my house and its contents to remain in full working order whenever I want them (Availability). e Int nfi den t ial ity Security Availability Figure 1.1 The Security Requirements Triad 10 CYB 610 Cloud Systems Security Cloud Security vs Security • New problem or new solution? • New challenges brought on by the cloud (plus old ones) • • • • • • • Data security concern Selection of cloud, private, public or hybrid. Real-time monitoring Dependency on cloud provider Lack of knowledge and expertise Recovery of lost data … CYB 610 Cloud Systems Security Security Domains Related to the Cloud • The CCSP certification covers material from the six topical domains. They are as follows: • Domain 1: Cloud Concepts, Architecture, and Design • Domain 2: Cloud Data Security • Domain 3: Cloud Platform and Infrastructure Security • Domain 4: Cloud Application Security • Domain 5: Cloud Security Operations • Domain 6: Legal, Risk, and Compliance Excerpt From: Ben Malisow. “CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide.” CYB 610 Cloud Systems Security Course Map CYB 610 Cloud Systems Security Course Highlights • Our targets: concepts, skills, tools … • Most important: learn how to learn • Technologies are evolving • How can we quickly understand emerging technologies/threats, estimate their impacts on business, and make the right response? • To achieve the goal of learning how to learn: • Understand the existing problems: why, what, and how • Practice logic thinking • Learn by doing CYB 610 Cloud Systems Security Cloud Computing What is it? What does it comprised of? Why is it so prevalent and key to business development? CYB 610 Cloud Systems Security Cloud Computing • What is cloud computing? • Cloud deployment model • Key cloud concepts • Cloud service models CYB 610 Cloud Systems Security Why Cloud? • Cloud vendor provides managed computing resources for rent by customers CCSP (ISC)2 Study Guide CYB 610 Cloud Systems Security What is Cloud Computing • The official NIST definition: • “Cloud Computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” CCSP (ISC)2 Study Guide CYB 610 Cloud Systems Security Technologies it is based on • Virtualization relies on software to simulate hardware functionality and create a virtual computer system. • Being used in data centers for a long time • Allows the possibility of having multiple virtual machines (VM) • Sometimes referred to as “instance” Guest VM Guest VM Guest VM Guest VM Hypervisor Host Operating System Physical Hardware CYB 610 Cloud Systems Security Technologies it is based on • Each VM runs a separate operating system and applications. • VMs run at the same time without being aware of each other's existence while sharing the underlying hardware resources. • A hypervisor is software that hosts these VMs who creates the shared pool of computing resources. Guest VM Guest VM Guest VM Guest VM Hypervisor Re qu est Host Operating System Physical Hardware CYB 610 Cloud Systems Security Benefits of Virtualization • Reduce capital costs • Less hardware is required as you have the ability to provision multiple VMs on one host • Reduce operating costs • Less hardware, less space, power, cooling required within data center • Optimization of resources CYB 610 Cloud Systems Security Resources for Rent • Compute • Storage • Database • Network • Artificial Intelligence CYB 610 Cloud Systems Security Resources for Rent Remote virtual pool of on-demand shared resources • Compute • Compared with classic environment: CPU, RAM • Storage • Classic: Hard disks or Network Attached Storage (NAS), High speed Storage Area Network (SAN) • Database • Classic: MS SQL server, Mysql • Network • Classic: Router, switch, firewall CYB 610 Cloud Systems Security Cloud Deployment Model • Public cloud • Private cloud • Hybrid cloud • Community cloud Described in Textbook Ch 5 and we will revisit them when talking about security issues. CYB 610 Cloud Systems Security Public Cloud • A vendor makes available the use of shared infrastructure, including: • • • • Compute Storage Database Network • It can be provisioned on demand and typically access over the internet for public usage. CYB 610 Cloud Systems Security Public Cloud • Consumer will never see the hardware used or know the exact physical location of their data • Consumer can specify the geographic region in which it resides to aid with data access latency based on where end users are located. • Cloud vendor provides all backend and physical maintenance of the physical location services such as power, cooling, hardware failure. • As a general rule, you can access your services on the Public Cloud from anywhere with an internet connection. CYB 610 Cloud Systems Security Private Cloud • Compared with public cloud: • Infrastructure is privately hosted, managed and owned by the individual company using it • It gives improved and more direct control of the company’s data • Enterprise can keep a tighter grasp of security control • Visualization: create a pool of shared compute, storage and network resources. • Additional costs will be needed for operations and maintains of the equipment. CYB 610 Cloud Systems Security Hybrid Cloud • Makes use of both public and private cloud • Established when a network link is configured between the Private Cloud to services within the Public Cloud • Combines the advantages and disadvantages of both network. • Normally for short-term configuration • May be used for seasonal burst traffic, or for Disaster Recovery CYB 610 Cloud Systems Security Key Characteristics of Cloud Computing • On-demand resourcing • Scalability • Economy of scale • Flexibility & elasticity • Growth • Utility based metering • Shared infrastructure • Highly available • Security CYB 610 Cloud Systems Security Cloud Service Models • Software as a Service (SaaS) • Allows the delivery of an application that can be widely distributed and accessed • No requirements to install software on local device • Platform as a Service (PaaS) • Makes for deployment service for developers • Vendor manages and maintains host hardware, network components, OS, etc • Infrastructure as a Service (IaaS) • Enables to architect your own portion of the cloud by configuring computer (virtual) and network (virtual) • You can configure VMs (instances) and their OS CYB 610 Cloud Systems Security Cloud Service Models CYB 610 Cloud Systems Security Other Cloud Services • Disaster Recovery as a Service (DRaaS) • Communication as a Service (CaaS) • Monitoring as a Service (MaaS) • Security as a Service (SaaS)? • https://technologyadvice.com/blog/information-technology/top-5-security-as-aservice-providers/