Security in the Clouds

18
Security in the Clouds 1 Professor Sadie Creese London Hopper 2010 May 2010

description

Security in the Clouds. Professor Sadie Creese London Hopper 2010 May 2010. What is cloud computing?. Service Model. Gmail, Google Docs. Google App Engine. Amazon S3/SimpleDB. VMWare/XEN. Amazon EC2. 3. Cloud Market Drivers. Enterprise Drivers Compression of deployment cycles - PowerPoint PPT Presentation

Transcript of Security in the Clouds

Page 1: Security in the Clouds

Security in the Clouds

1

Professor Sadie CreeseLondon Hopper 2010May 2010

Page 2: Security in the Clouds

What is cloud computing?

2

Page 3: Security in the Clouds

Service Model

3

Gmail, Google Docs

Google App Engine

Amazon EC2

Amazon S3/SimpleDB

VMWare/XEN

Page 4: Security in the Clouds

Cloud Market Drivers• Enterprise Drivers

• Compression of deployment cycles• Instant upgrade and try-it-out• Elasticity• Cost alignment• Reduction of IT team costs• Accessibility and sharing• Dependability• Waste reduction and carbon footprint

• Consumer drivers• Up to speed with latest apps• Pay-as-you-use• Accessibility and sharing• Dependability

4

Page 5: Security in the Clouds

Cloud Ecosystems

5

VM VMVM

Broker

VM VMVM

VM VMVM

User

Page 6: Security in the Clouds

Why are we concerned?

6

Page 7: Security in the Clouds

Significant investment

7

$$$Hosted apps market currently at $6.4b, $14.8b in 2012 (Gartner Dec 08)

Services market currently at $56b, $150b in 2013 (Gartner March 09)

Services market currently worth $16.2b, $42b in 2012 (IDC Dec 08)

Services market to be worth $160b in 2011 (Merril Lynch May 08)

Page 8: Security in the Clouds

Large Cloud Application Service Provider Space

8

Extract from slides : “Prophet a Path out of the cloud”, Best Practical, Presented at O’Reilly Open Source Conf, 2008

Page 9: Security in the Clouds

People Are WorriedKey barriers to uptake, as recognised in the community:• Data security concerns• Privacy compromise/ practice• Service dependability and QoS• Loss of control over IT and data• Management difficulties around performance, support and

maintenance• Service integration• Lock-in• Usability• Lack of market maturity

9

Page 10: Security in the Clouds

What’s different about the Cloud?

10

Page 11: Security in the Clouds

Scale and Business Models

11

• Length and depth of relationships• Mobility of data• Volumes of data• Nature of data (more sensitive)• Lack of perimeter• Global nature• Location of control

Page 12: Security in the Clouds

Futures – Scenarios

12

High Cost/Low Payback for an attacker.Most successful threat agents, likely to be insider’s within the silo

High Cost/High Payback for an attacker.Most successful threat agent, likely to be insider managing resource distribution or a malicious service provider.

Low Cost/Low Payback for an attacker.Threat agents will include external attackers utilising mixture of technology and social engineering.

Low Cost/High Payback for an attacker.External attackers using the distributed scale to attack multiple systems and users simultaneously. E.G Bot and application framework based attacks.

Page 13: Security in the Clouds

Thinking Like an Attacker

13

Page 14: Security in the Clouds

(A few) potential future attack scenarios

14

• Denial of service• resource consumption, traffic redirection, inter-cloud and user to cloud

• Trojan Clouds• Imitate providers, infiltrate supply chains, sympathetic cloud

• Inference Attacks• Due to privileged (~admin) roles, cohabiting risks (via hypervisor)

• Application Framework attacks• Repeatable, pervasive

• Sticky Clouds• Lack of responsiveness, complex portability

• Onion storage• Moving global location, fragmenting, encrypting

• Covert channels within the cloud network across services

Page 15: Security in the Clouds

And?

15

Page 16: Security in the Clouds

16

(A few) Implications for Security • Regulatory/Legislation

• Nothing is transparent about data handling in cloud, privacy protection• Investigations

• Technical forensics and legal, across borders• Monitoring/Auditing

• Mechanisms• Encryption

• At some point decryption happens for anything other than storage...• Recent IBM breakthrough indicates potential for processing encrypted

data but not practical yet..• Contracting/Due Diligence

• Service Level Agreements

Page 17: Security in the Clouds

17

Our current research directions... • Digital Forensics• Vulnerability Models / Threat Models and Cascade Effects• Service Level Agreements• Enterprise Capability Maturity Model• Designing in Privacy -> via patterns and architectures• Insider Threat Detection

Page 18: Security in the Clouds

Thank-youQuestions?

18