What is the future of Cloud Security? February 1, 2012 Author: Jonathan J. Spindel, Ph.D. Executive Vice President of Engineering SafeMedia Corporation 1 What is the future of Cloud Security? February 1, 2012 Summary In order to control and remediate new emerging malicious actions, we must adopt intuitive security procedures, within these principles must be the incorporation of more intelligent forms of officiating these processes. This paper will delve into those concerns, address pinpointed benchmarks, within the realm of external networking, and Cloud security, capitalizing on the internal and external security concerns as well as the management, and remediation of such issues. Understanding the underlying problems, as they relate to information security, will help the reader to expose their concerns regarding internal security related issues, and propose solutions that will assist in the remediation. We will address anxieties revolving around the adoption of outdated information-security concepts, and the solution in regards to these concerns with a combination of innovative ideas surrounding “intelligent” protocol behavioral analysis and pattern “DNA” matching techniques, utilizing more advanced computational technologies. In tandem with protocol behavioral analysis, these techniques will assist the reader in understanding the value proposition in using more advanced intelligent technology, and how that will add, and level out their concerns. By the end of this paper, the reader should be able to understand emerging threats, as they are changing in rapid succession to adopt new attack patterns, targeting application based computing, and adopting more lucrative attack scenarios. 2 What is the future of Cloud Security? February 1, 2012 Overview Cloud Computing, as they say, is an old idea, officiated through new technology. The inclusions added over the years, give Cloud Computing new functionality, and have grown Cloud from an infantile rationality to what we view as a distributed model today. We have transgressed from the typical roaming profile to VDI (Virtual Desktop Infrastructure), from smartphones, to mobile computing platforms, from virtualization to full elastic computing. As we grow and feel the pains of adjusting to such growth, our security infrastructure must follow closely to account for changes. With this in mind, look at the jumps we have taken, through the mastery of innovation, and then visualize how security has followed. The threats have become more brazen, and have targeted objects, with which preparation was overlooked. We have moved beyond the typical DOS (Denial of Service) attacks, to targeting applications, their servers, at the application layer; these and other advanced persistent threats are distributed with the sole realizations being monetary gain. Gone are the days where hackers just wanted to say, “I did it”, ushering in a day of monetary gain, whether that be from the axis of evil up to the proverbial international identity theft rings. Information theft has become one of the number one issues surrounding monetary loss from a corporate and end-user standpoint. 1 Cloud computing is altering the direction of, not only how we accomplish business IT objectives, but in the way in which we enable our internal IT departments. There has been, and we keep seeing a gradual, definitive shift towards Cloud Computing as a whole. Within this direction we have been met with multiple conquerable issues, such as scalability, application elasticity, orchestration, automation, etc., but nonhave been as elusive and painstaking as Cloud security itself. Unlike local Data Center computing, which communicates primarily through layers 1-4, Cloud has been termed as being much more application based and communicates primarily over layers 4-7 of the OSI model. There are also concerns regarding user, and 1 http://www.riskandinsurancechalkboard.com/uploads/file/Ponemon Study(1).pdf 3 What is the future of Cloud Security? February 1, 2012 usability, such as remote user authentication, to a much higher degree. This has taken network security to a whole new paradigm, understanding application communication, how those processes, and protocols effectively communicate, and how to manage security for such fabrics. The underlying fact is that because of this shift, attacks have transitioned from the transitional signatures, to the more advanced attack scenarios, such as advanced persistent attacks (APT).2 Within the last few years, the security industry has been populated with news of information theft or dissemination of internal data, penetrations resulting in catastrophic loss, and attacks programmatically engineered targeting application based computing. These issues are far outweighed by security vendors themselves having issues with theft or loss of data, and the distribution of classified material, from government agencies. These concerns are mostly internal, and do not translate to Hybrid or Public Cloud Computing, not because it hasn’t happened, or could happen, but the under utilization of public resources, caused by fear of losing control over resources, and/or general mistrust of the Public Cloud, due to overall lack or security or concerns regarding security as a whole. 3 2 http://www.cio.com.au/article/406586/assessing_apt_threat/?fp=4&fpid=18 3 "Hype Cycle for Cloud Application Infrastructure Services (PaaS), 2011") – Gartner Review Cloud Application Infrastructure Services. Cloud application infrastructure services (also known as platform as a service, or PaaS) form the foundation of a cloud computing platform by enabling development, execution, management and life cycle control for cloud-based application solutions (see"Hype Cycle for Cloud Application Infrastructure Services (PaaS), 2011"). It is a less developed and less understood layer in the cloud computing architecture when compared with system infrastructure services (IaaS) and application services (SaaS), but is the fastest growing with innovation and new vendor investments. 4 What is the future of Cloud Security? February 1, 2012 Elastic computing itself could save organization millions in hardware costs, head count, and increase revenue, not only with savings the “on-demand” ability to scale up or down seamlessly. Hybrid Cloud usage combines Public and Private Cloud realms, allowing the ability to gain from Public Cloud resources, but utilizes Private Cloud resources internally. Although these models are best of breed, they again resemble and have the same concerns, regarding security, and maybe even more legitimate claims references security concerns overall. These concerns are mostly held internally, and do not translate to Hybrid or Public Cloud Computing, not because it hasn’t happened, or could happen, but the underlying fear of security, or the lack of capable product stacks to compete. As it stands today, Cloud overall, is an annual $37B enterprise, growing exponentially, to an estimated $121B by 20154, and only a portion is related to Public Cloud. Yet elastic computing itself could save organization millions in hardware costs, head count, and increase revenue, not only with savings the “on-demand” ability to scale up or down seamlessly. Hybrid Cloud usage combines Public and Private Cloud realms, allowing the ability to gain from Public Cloud resources, but utilizes Private Cloud resources internally. Although these models are best of breed, they again resemble and have the same concerns, regarding security, and maybe even more legitimate claims references security concerns overall.5 Proportionally the Public Cloud is utilized, under the auspices of an unsecured fabric, although the security itself, if you want to route requests through a physical portal, is rather robust. There are several organizations offering solutions stacks, surrounding the usage of Public Cloud without the necessity of rerouting information, mostly solutions based on agent architectures, or virtual appliances utilizing agents within the virtual instance itself. These solutions, although robust in nature, are somewhat diluted by the inability to manage multiple rule sets, and/or the ability to communicate with other virtual appliances within the fabric. The idea of managing a singular blade server, through one virtual appliance, has been brought up in many different fashions, from usability to the assumption of managing each blade server in a separate virtual container.6 Some issues surrounding these architecture genres’ stem from the idea of resource pools, and the presence of multiple virtual appliances within pools. From this we can discern that the possibilities of collisions between these appliances are a definite possibility, not to mention the multitude of manageability concerns within the management of the pools themselves, i.e. “what handles what and where?” 4 http://www.marketsandmarkets.com/Market-Reports/cloud-computing-234.html The global cloud computing market is expected to grow from $37.8 billion in 2010 to $121.1 billion in 2015 at a CAGR of 26.2% from 2010 to 2015. SaaS is the largest segment of the cloud computing services market, accounting for 73% of the market’s revenues 2010. The major SaaS-providers include Adobe Web Connect, Google Mail, Cisco WebEx, and Yahoo Mail. Content, communications, and collaboration (CCC) accounts for about 30% of the SaaS market revenues. 5 Cloud computing's fear factor: Acknowledge, reduce, move on http://radar.oreilly.com/2010/12/cloud-computing-the-fear-facto.html You also need to be aware and mitigate your security concerns. It's possible the security risk is over-stated. Most of us do personal online banking don't we? And aren't huge components of our infrastructure such as energy, financial markets, and the military already large consumers of the cloud? (Little consolation, I agree, when there is a breach -- but a fact on the ground you can't deny). I argue that in the short-term these issues are about deliberate and diligent organizational planning and in the long-term it's simply about normal business continuity design. When something innovative becomes widely adopted, it just becomes business as normal. 6 Hype Cycle for Privacy, 2011 http://www.gartner.com/DisplayDocument?doc_cd=214943&ref=g_fromdoc Privacy. The first "Hype Cycle for Privacy, 2011" is a tool for privacy officers and other IT professionals who have a responsibility for privacy in the organization. As attention to privacy as a whole reaches a peak, it justifies a closer look at which regulations are emerging and which have matured, and which technologies are deployed to deal with legal requirements and cultural expectations 5 What is the future of Cloud Security? February 1, 2012 In any Cloud scenario, the presence of a “Single Pane of Glass” management methodology should be commonplace to function as a “Manager of Managers”, offering the capability of “Cross Platform Management”, and a central point of configuration. Affording this structure allows the administrators to streamline operations across multiple machines, resources pools, and the ability to manage heterogeneous environments, which are so ever becoming more used in the Cloud industry, as our technology and the ability to host multiple operating systems, Cloud Management Platforms, and Hypervisor capabilities become more robust. We must keep up with these methodologies as the technological capabilities increase as time passes, as ever so often, we are faced with a new attack scenario that hampers our protection protocols. Intelligent systems, with the capability of learning the patterns within the protocols, “Protocol Behavior Analysis”, and “Packet Assembly and DeAssembly”, are becoming more prevalent, as these threats mature, some utilizing the same signatures, but altering protocol behavior. As our tool-sets mature, utilizing new technology to assess, interrogate, track, and assemble these transmissions are becoming more difficult, as the threats are focusing on applications, rather than hardware based communications. As of late, these types of attacks have certainly surfaced, as we hear more about theft of proprietary information, infiltration of financial institutions, up to cyber intrusion within the defense industry. These threats take on a mantra, one of singularity, the focus is to either obtain information through illegal means, funneling monetary value from an institution, or disseminating information over the wire to discredit an organization or cause harm to individuals. 7 All the scenarios focus on one subject, causing harm for monetary gain, unlike the hackers of old, and ones whom focused on the possibility of being able to accomplish a feat, not necessarily doing harm. Although there have always been those whom have 7 http://superconductor.voltage.com/2011/07/breaches-vs-european-countries.html 6 What is the future of Cloud Security? February 1, 2012 wished to gain from these acts, the ever growing presence of ones whom wish hard, have increased. With that increase, also have their technology, and attack methods become more sophisticated.8 The ability to forensically approach these issues, and dig deep into the behavior of either the protocol being assessed, the way in which the packets are being transmitting, or the destination of the transmission itself. All the concerns must be met, in order to secure a fabric such as Cloud. The way in which “we” attack these concerns will be key in stopping the intrusion, and/or the unlawful dissemination of proprietary material. Delving into the behavior of such transmissions, and the protocol itself is where technology is headed. The ability to assess the transmission, and the way in which the protocol is having is the essence in which we can discern its’ nature, or the proper use of the transmission. Focusing on the behavior is key, whether that is protocol, or transmission based, being able to interrogate that transmission assists in the ability of alerting or stopping the intrusion or transmission of proprietary information. By way of cohesively applying target based processors assigned to a varied number of protocols it is possible to determine the malicious nature of a transmission, in which it again is possible to alert or drop those packets, depending on the destination or the desire of dropping vs. alerting. This is accomplished by encapsulating the virtual instance, or instances, in which affords the capability of interrogating packets and transmission protocols through protocol analysis and/or behavior. In reality, the logical way of determining attack protocols are to measure what is normal vs. what isn’t. In kind that measurement should incorporate the “normal” behavior of a system, thereby being able to determine, or decode what isn’t. This realization elevates 8 Common Monitoring and Management Solutions http://www.infosecurity-magazine.com/blog/2011/5/3/who-moved-my-cloud/334.aspx A single pane of glass is often required to provide a unified look of the entire infrastructure. This will provide an auditor the ability to verify the provider is delivering the level of service guaranteed by the solution. Auditors often look for event handling and common management across all systems. By automating the deployment of such monitoring solutions, and relying on a common platform for the management (including patch management, software revision control, and system lockdown procedures) a level of assurance can be provided to the auditor that all systems are uniform and follow the controls of the monitoring and management criteria. 7 What is the future of Cloud Security? February 1, 2012 the need for determining the behavior of like application or system attacks. Attaching or capturing a “DNA” or “foot print” of normal activity within the actions of or behavior of such protocols or servers, one will be able to disseminate the actions of any malicious activity, being able to remediate such activity in an in-line, or on-tap scenario. The same concept holds true in reference to the Public Cloud. As currently usage is far under par, mainly because of these worries, and the inability to remain compliant. The same does not hold true in other locations, as use is increasing, especially in the European as the market expands. Some of the reasoning for the anomaly is compliancy restrictions, referred to above, as well as the loss of control, security concerns, and the ability to operate autonomously throughout the fabric. These concerns arise from the inability to control your own infrastructure, someone else having access to that technology, and/or the ability to access information remotely.9 Encapsulating Cloud environments, whether that be physical, virtual, or Hybrid/Public Cloud based, allows for dual vector protection from the ‘outside in’, and ‘inside out’, affords the organization to gain back some of the control. Increasing the ability to see what is transpiring, not only within the IaaS (Infrastructure-as-a-Service) layer, but also in the SaaS (Software-as-a-Service) layer. This allows the use to gain control, by protecting resources as if they were internal. This is accomplished via location parameters, and use of proprietary models that encompass the resources in a secured mesh, thereby allowing for protection of the resources from a holistic standpoint. This enables the deployment of high-value, high-risk Cloud applications, while mitigating the risks associated with such applications. Intrusion detection and Prevention must include attack recognition beyond simple signature matching, and the ability to drop malicious sessions as opposed to simple resetting of connections.10 We must become more intellectual in way we conduct security operations, and how we design systems to manage and remediate breaches. Intelligent systems capable of managing such traffic, analyzing traffic patterns and protocols, officiates processes, as they do not rely on application changes or structure. These tool-sets care about traffic, patterns, and protocol behavior, adopting a set of rules capable of matching like patterns to suspicious activity. There must be an ability to incorporate intelligence, and machine learning technology, to combat these changes, capitalizing on protocol behavior and DNA patterns of the transmission protocols themselves. These actions must be met with a robust, like minded, response to the malicious action, with the capability of forensic level capture, affording the capability to stay compliant, in a time where compliancy is so integral, and watchdogs are waiting to attack any offending organization. 9 http://wallstreetandtech.com/2012-outlook/the-cloud The move to the public cloud also will be dictated by the size of the institution. Small to mid-size firms that do not have their own proprietary data centers will be among the first to move to the low-cost capacity the public cloud offers, while larger banks will initially continue to utilize their large, private clouds. 10 Public sector cloud use on the rise http://www.thecloudcircle.com/article/public-sector-cloud-use-rise The number of public sector organizations using the cloud is rising steadily, if not spectacularly, the Cloud Industry Forum, with 11 per cent increased clouds usage over the last nine months. The independent study of the latest cloud adoption rates showed that of the 300 UK-based organizations surveyed, 53 per cent are utilizing cloud services in some form. The private sector continues to lead the public sector with 56 per cent and 49 per cent respectively. 8 What is the future of Cloud Security? February 1, 2012 SafeMedia helps organizations gain control of their resources, and creates a new paradigm in security. Through our patented non-IP-Centric solution, in tandem with protocol behavior analysis and behavioral recognition, we can stop penetrations, and/or dissemination of proprietary information, costing organization millions of dollars annually. SafeMedia, through a combination of intelligent, self-healing, solution sets (Neural Network Design, Artificial Intelligence, and Machine Learning Concepts) offers passive IDS monitoring systems as well as active in-line/in-band IPS choke points with unsurpassable power and granular controls to protect your network against the traditional intrusion vulnerabilities while mitigating the new generation of threats and threat vectors. SafeMedia's Network Security system safely enables high-value, high-risk Cloud applications deployment, while mitigating the risks associated with such applications. SafeMedia's Intrusion Detection and Prevention “Solution” offers features including attack recognition beyond simple signature matching, dropping of malicious sessions as opposed to simple resetting of connections, and the deployment of secure distributed architecture, consisting of dedicated hardware, embedded applications and non-IP centricity that operate at "wire speed". 9