Kia Manoochehri Background Threat Classification ◦ Traditional Threats ◦ Availability of cloud services ◦ Third-Party Control The “Notorious Nine” Contractual Obligations Security: “freedom from risk and danger” In Computer Science we define security as… ◦ “the ability of a system to protect information and system resources with respect to confidentiality and integrity” Three core areas ◦ Confidentiality ◦ Integrity ◦ Authentication Some other security concepts ◦ Access Control ◦ Nonrepudiation ◦ Availability ◦ Privacy Cloud Service Providers (CSP) provide a “target rich environment” Consolidation of information draws potential attackers Potential problematic areas in the field of Cloud Computing aren’t transparent. Three broad classifications ◦ Traditional Threats ◦ Availability Threats ◦ Third-Party Control Threats Anytime a computer is connected to the internet they are at risk… ◦ When we are dealing with Cloud based applications we are amplifying these threats Question of responsibility ◦ User vs Provider Authorization and Authentication ◦ Individual access vs enterprise access One solution would be to have tiered access ◦ Not every user is created equal! Distributed Denial of Service attacks (DDoS) SQL Injection Phishing Cross-Site Scripting Digital forensics cannot be applied to the cloud ◦ Difficult to trace where an attack is from Virtual Machine vulnerabilities extend to the cloud as well System failures ◦ http://www.forbes.com/sites/anthonykosner/2012 /06/30/amazon-cloud-goes-down-friday-nighttaking-netflix-instagram-and-pinterest-with-it/ ◦ Amazon’s Elastic Compute Cloud (EC2) in North Virginia goes down due to lightning. Netflix, Instagram, and Pintrest were down for at least a few hours. Problem stems from CSP outsourcing certain aspects of their operation ◦ How does this affect Introduces more points of entry and vulnerability to the Cloud In 2010 the Cloud Security Alliance (CSA) had defined 7 major threats to Cloud Computing February 2013 yielded their “Notorious Nine” list ◦ 9 major threats in Cloud Computing Data Breaches ◦ Currently the biggest threat ◦ The solution is encryption… but What if you lose the key? ◦ Backing up the data is not viable either Example: Epsilon Data Loss ◦ ◦ ◦ ◦ Malicious deletion Accidental deletion by CSP Physical catastrophe Loss of the encryption key Compliance policies require audit audit records Example: Mat Honan Account/Service Hijacking ◦ Phishing, fraud, software exploits ◦ Organizations should be proactive ◦ Two-Factor authentication Example: XSS attack on Amazon Insecure Interfaces and APIs ◦ Any vulnerability in an API bleeds over ◦ Can effect security and availability ◦ Partially falls on the consumer Denial of Service ◦ From the user end… most frustrating ◦ Can cost cloud users $$$ ◦ Makes the user doubt the cloud Malicious Insiders ◦ Straightforward ◦ Systems that only depends on the CSP for security are at greatest risk ◦ If data-usage encryption is used the data is still vulnerable during storage Abuse of Cloud Services ◦ Using CSP for malicious purpose ◦ Hacking encryption keys via cloud ◦ DDoS attacks via cloud ◦ Problems of detection arise Insufficient Due Diligence ◦ Insufficient user experience ◦ Unknown levels of risk when using CSP ◦ Design and architecture issues for devs ◦ Countered by: Capable resources Extensive internal understanding of risks Shared Technology Vulnerabilities ◦ CPU caches, GPUs are not designed to be isolated ◦ A single vulnerability can lead to an entire environment being compromised Buffer Overflow SQL Injection Privilege escalation SSL Certificate spoofing Attacks on browser caches Phishing attacks DDoS attacks Limiting resources Privilege-related attacks Data Distortion Injecting additional operations Goal is to minimize the security risks Contract between the CSP and user should: ◦ State CSP obligations to handle securely sensitive information and it’s compliance to privacy laws ◦ Spell out CSP liability for mishandling information ◦ Spell out CSP liability for data loss ◦ Spell out rules governing ownership of data ◦ Specify the geographical regions where information and backups can be stored. Kia Manoochehri