15. ENISA Cloud Computing: Benefits, Risks, and Recommendations for Information Security Flashcards

1
Q

“Security and the Benefits of Scale”

“Security measures are cheaper when they’re implemented on a larger scale. This means that, from a provider’s perspective, economies of scale apply to security. Following are some benefits of scale:”

A

*Multiple locations = Providers have the economic resources to replicate content and services in multiple locations. This enables customers to benefit from increased levels of disaster recovery (if architected for in advance, of course).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A

*Edge networks = Gartner defines edge computing as “a part of a distributed computing topology in which information processing is located close to the edge—where things and people produce or consume that information. With multiple locations available, you have the potential to minimize the physical distance between your branch offices and your processing. This is particularly true when you consider content delivery networks (CDNs) and additional points of presence that may be available with a cloud provider’s offerings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A

*Improved timeliness of response = In Chapter 9, you learned how incident response can be dramatically improved by using infrastructure as code, by quarantining workloads through virtual firewalls (security groups), and by using other offerings possible in the cloud. These options need to be well architected and tested often.”

*Threat management = Given the economies of scale surrounding security, as well as the potential reputational damages from security incidents, CSPs will often hire specialists in security threats to provide advanced security threat detection. This ultimately leads to customers benefitting from an increased security baseline in which they operate their workloads.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

“Security as a Market Differentiator”

A

For many cloud providers, security is a selling point for marketing. You will often see this through the number of compliance standards that providers obtain. Not only do increased security certifications and capabilities enable providers to sell to companies in various industries, but it helps them market their products as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

“Standardized Interfaces for Managed Security Services”

A

“Cloud providers can offer standardized open interfaces to managed security service (MSS) providers. This enables these service providers to resell services to their own customers.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

“Rapid, Smart Scaling of Resources”

A

“Providers have a vast amount of scalable compute resources available. These resources can be reallocated to address threats by filtering incoming traffic and performing other defensive measures to protect customers (such as shielding customers from distributed denial of service attacks).

The ENISA documentation also points out that providers can respond in a granular fashion, without scaling all types of system resources (for example, increasing CPU, but not memory or storage). This can reduce the costs of responding to sudden (nonmalicious) peaks in demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

“Audit and Evidence Gathering”

A

“The ENISA document does point to log storage in a cloud environment as being a cost-effective location to store log data to support audits.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

“Timely, Effective, and Efficient Updates and Defaults”

A

“Immutable (Chapter 7), snapshots (Chapter 9), and infrastructure as code (Chapter 10) technologies can be used to standardize and maintain security controls across all virtual machines in an Infrastructure as a Service (IaaS) environment.

Of note from the ENISA document is the following statement: “Updates can be rolled out many times more rapidly across a homogeneous platform than in traditional client-based systems that rely on the patching model.” A homogeneous platform is owned and supplied by a single vendor. This means that using the tools mentioned earlier can deliver quicker update capability than the standard patching done in your data center today.

With Platform as a Service (PaaS) and Security as a Service (SaaS), updates to the platform will likely be performed in a centralized fashion, which minimizes the time window of the vulnerability.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

“Audit and SLAs Force Better Risk Management”

A

Given the volume of security certifications faced by providers, it is highly likely that any new risks will be quickly identified during the multiple assessments and audits that will probably be performed throughout the year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

“Benefits of Resource Concentration”

A

This ties in with the economies of scale previously mentioned as a benefit associated with cloud providers. The cost of controls on a per-unit basis is likely much lower than a customer faces with a traditional data centre. For example, spending $1 million on physical security for 1000 servers in a traditional data centre equals a cost per unit of $1000 per server. In a cloud data centre with 100,000 servers, the cost per unit is $10.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Loss of Governance

A

You know there is a shared responsibility in the cloud. When the client cedes control to the provider, there may be a gap in security defences if there is no commitment from the provider in a service level agreement (SLA). Contractual clauses (such as Terms of Use) may restrict customers from performing compliance activities that support governance.

If a provider uses their third parties (such as a SaaS provider using an IaaS provider), you may have no governance capabilities whatsoever. If a provider is acquired by a different company, contractual clauses of the service may be changed by the new company. Such loss of control and governance may lead to an organization being unable to meet security requirements; they may suffer from a loss of performance or deterioration of quality of service, or they may experience significant compliance challenges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Lock-in

A

“The lack of portability leads to vendor lock-in. There are rarely tools available from vendors or other sources (such as open source) to facilitate the movement of systems and/or data from one provider to another.

The causes of lock-in can be numerous. It can happen from annual SaaS contracts with very painful cancellation clauses, and it can happen because of technology issues, such as the inability to export data in a format that can be used in a different provider’s environment. Even when the core technology is standardized (such as containers and VMs), there may be significant differences in the providers’ management plane interfaces.

The ENISA documentation focuses on the lock-in associated with each service model. The following sections list the various types of lock-ins that customers may face when using the various cloud service models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SaaS Lock-in

A

“Much of the lock-in potential associated with SaaS has to do with the ability to export data in a format that can be used in another location. Providers will often store tenant data in a custom database schema. There is generally no agreement regarding how data is structured, but there are common formats in which data may be exported (such as XML).

Of course, when dealing with SaaS, you are dealing with a custom application. Migrating from one SaaS provider to another will likely impact end users. This will likely require retraining and can result in significant costs in a large enterprise. Additionally, any integration (such as APIs) with internal systems, and your existing SaaS solution will need to be re-created.”

“Migrating from one SaaS application to another is not much different from application migration in your data center. Both will likely be the source of much effort.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PaaS Lock-in

A

“Although your organization’s use of PaaS solutions may consist of application development, you need to be aware of some portability aspects. The primary issue with PaaS lock-in has to do with the use of provider services, which are often accessed by an API and used to build complete application functionality. This is referred to as API lock-in in the ENISA documentation.

Application code itself may require customization if a provider does not allow particular functions that they may consider “dangerous” (such as functions that may access the underlying shared operating system layer). This may require that your developers understand these potential limitations and work around them by customizing code to work in a particular environment. ENISA refers to this as runtime lock-in.

Aside from application development, any data generated by PaaS systems may not be exportable in a format that can be easily consumed. The ENISA documentation refers to this as data lock-in.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IaaS Lock-in

A

“When considering IaaS lock-in, you need to consider both workloads and data stored in the provider’s environment. The biggest issue to be aware of in either scenario is what the ENISA document refers to as a “run on the banks” scenario. In the event of a major issue with a provider, numerous customers may begin exporting systems and data simultaneously, leading to poor network performance that could drastically increase the time required to export data.

From a virtual machine lock-in perspective, although software and virtual machine metadata is bundled for portability, this is limited for use within the provider’s environment. Open Virtualization Format (OVF) is identified as the means to address virtual machine lock-in.

IaaS storage providers’ functionality and features can range widely. The main lock-in issue comes down to potential application-level dependence on specific policy features such as access controls. Such dependence may limit the customer’s choice of potential provider.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Isolation Failure

A

“Multitenancy is a defining characteristic of the cloud. It requires a robust isolation capability wherever resources are shared, such as memory, storage, and networking.

This isolation requirement is not necessarily just hardware-related. An SaaS offering that uses a multitenant database could also be the source of isolation failure. If this isolation fails, security fails. The impact of such a failure could lead to customers losing valuable or sensitive data and/or service interruption if the CSP shuts down access to address the failure.

From a provider’s perspective, isolation failure could lead to business failure because of potentially devastating reputational failure and a resulting loss of customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Compliance Risks

A

“Compliance with the regulations and industry certifications required for your organization may be challenged by procuring cloud services. Compliance risks may include the following:

*A cloud provider cannot provide evidence of their compliance to regulations and/or industry standards your organization must meet.

*A cloud provider does not allow audits and does not otherwise demonstrate compliance with regulations and/or industry standards your organization must meet.”

18
Q

Management Interface Compromise

A

Because accessing the provider’s management interface (aka management plane) is generally performed across the Internet, it can be accessed by anyone, including malicious users. Remember that access controls are your primary controls for securing the management plane and that multifactor authentication (MFA) should always be used for privileged accounts that access the management plane.”

19
Q

Data Protection

A

“Checking how a provider handles data and ensuring that it is done in a lawful manner on behalf of customers may be difficult. This poses a data protection risk to your organi“organization as a result, especially in the case of multiple providers storing information as part of a solution (such as federated clouds). This risk can be mitigated by reviewing any provider’s certifications and supplied security documentation.”

20
Q

“Insecure or Incomplete Data Deletion”

A

“Deletion of data in a shared cloud environment presents a risk to customers. This is because of the nature of shared storage and the inability to confirm that data has been completely deleted from the provider’s environment. Additionally, as covered in Chapter 11, data dispersion is often used by providers. This type of storage will make multiple copies of data and spread them across multiple servers and multiple drives. This, along with the previously mentioned issues, leads to a higher risk for customers than they face with dedicated on-premises hardware.”

21
Q

Malicious Insider

A

“Cloud service provider employees and contractors pose a significant risk to your organization when you use cloud services. Although the likelihood of realizing such risks is low, the impacts of doing so can be very high.”

“Keep in mind that malicious insiders aren’t limited to administrators. A similar risk is posed by auditors, because they may have intimate knowledge of the inside architecture, processes, and weaknesses of a provider.”

22
Q

“Five key legal issues have been identified as common across all the scenarios. This information is found in “Annex 1” of the ENISA documentation. The information in the following sections is not specific to the cloud and is applicable to all forms of computing.

Data Protection

A

“The data protection referred to in the ENISA document is about processing integrity and availability. Much of this section focuses on Directive 95/46/EC (Data Protection Directive), which has since been replaced by the GDPR.
For your general understanding of this section, just remember that data that contains personally identifiable information (PII) needs to be strongly protected, because this type of data, if compromised, will lead to legal issues for your organization.”

23
Q

“Five Key Legal Issues Common Across All Scenarios”

Confidentiality

A

“You know that confidentiality is a main security principle, and you know that data should be accessed only by authorized individuals. This section of the annex contains a term that has not been previously covered: “know-how.” The ENISA defines know-how as something similar to documented trade secrets—how the customer does what it does, such as a manufacturing process.”

24
Q

“Five Key Legal Issues Common Across All Scenarios”

Intellectual Property

A

“Some cloud providers may contractually take ownership of any data that is uploaded to their systems. As a result, customers should ensure that intellectual property rights are regulated through dedicated contractual clauses in the Intellectual Property Clause and Confidentiality/Non-Disclosure Clause. These clauses should include penalties in case a provider does not properly protect such data and the ability for the consumer to terminate the agreement unilaterally.”

25
Q

“Five Key Legal Issues Common Across All Scenarios”

Professional Negligence

A

“The easiest way to think of lawsuits is to think about who has contracts with whom. The end user has a contract with the data controller, and the data controller has a contract with the provider (or data processor). If the end user’s data is compromised, they are suing the data controller, because that is the party to which they are contractually bound.
Limitation of liability and indemnity clauses may help the company directly using the processor to shift liability to the provider; however, the data controller is always legally responsible and accountable for the loss of any end-user data.”

26
Q

“Five Key Legal Issues Common Across All Scenarios”

“Outsourcing Service and Changes in Control”

A

“This part of the ENISA document is all about using a provider that outsources some (or all) functionality to another provider. This leaves you, the customer, with third and fourth parties that you need to be aware of.
ENISA recommends that any outsourcing carried out by the provider be clearly understood as part of your due diligence. Providers should offer guarantees or warranties regarding the performance of outsourced services. The ENISA also recommends that you request contractual clauses that state that your organization must approve of any changes the provider makes in their outsourcing agreements, or you have the ability to terminate or renegotiate terms.

27
Q

Open Virtualization Format

A

“Migrating between providers is non-trivial until open standards, such as OVF, are adopted.” Now what, exactly, is this OVF they’re talking about? The OVF is an open standard by the Distributed Management Task Force (DMTF) that is intended to assist with portability of virtual machines by easing the ability to migrate server images from one environment to another.”

“Of note, you may also see open virtualization archive (OVA), which is essentially a ZIP file (actually a TAR file) that contains all of the files associated with OVF.”

“If you’re presented with any questions on OVF on the CCSK exam, remember that portability is the most important element of OVF.”

28
Q

VM Hopping

A

“VM hopping is an isolation failure in which an attacker moves from one virtual machine (VM) to another, which they are not intended to access. This would likely be related to a failure or compromise of the underlying hypervisor that should be providing VM isolation.

“Spectre and Meltdown are two fairly recent examples of vulnerabilities that could have impacted isolation and therefore allowed VM hopping.”

29
Q

“Economic Denial of Service”

A

“With the incredible scalability of cloud services, particularly IaaS, you have the ability to increase computing power automatically to meet increased demand (generally performed in IaaS through auto-scaling groups). However, when planning such elasticity, you need to consider the following question: What if you’re spending vast sums of compute power to respond to a denial of service attack?”

30
Q

Licensing Risks

A

“Licenses still need to be addressed when used in a cloud environment, especially IaaS. Any server instance running commercial software should report back to a centralized license management system to protect against illegal usage of the software.”

31
Q

“Risk Concerns of a Cloud Provider Being Acquired”

A

“The acquisition of your CSP can have a significant impact on your organization. The ENISA documentation states that this may cause nonbinding agreements with a provider (for example, things the provider is not contractually required to supply) to be at risk.

There have been real-life examples of CSPs having been acquired, when, in some cases, the new owner has decided to pivot the cloud services to serve only particular industries. In other cases, new ownership decided to terminate the offering a few years after acquiring the provider.

A provider being purchased is an example of your needing to monitor relationships continuously with all providers your organization is using. Failure to do this may introduce risk to your organization if a new owner makes substantial changes and/or changes business plans.”

32
Q

“Data Controller vs. Data Processor Definitions”

A

“Recall from Chapter 3 that the data controller is the entity that determines the purposes and means of the processing of personal data in accordance with laws and regulations in an organization’s jurisdiction. The data processor is the entity that processes personal data on behalf of the controller.

33
Q

“Guest System Monitoring in IaaS Responsibilities”

A

“Guest system monitoring is the responsibility of the customer. In a nutshell, the ENISA document states that the customer must take full responsibility for their cloud-deployed“applications. This, of course, includes monitoring of everything the customer is responsible for.”

34
Q

User Provisioning Vulnerability

Multiple vulnerabilities are associated with user provisioning in the ENISA document. So that we’re on the same page regarding the vulnerabilities listed in the document, there are several potential weaknesses regarding processes. This, of course, is not to say that all the vulnerabilities listed here exist; it means these are potential areas that need to be considered and protected from being exploited:”

A

“*The customer cannot control the provider’s provisioning process.
*The identity of the customer may not be adequately verified upon registration.
*There may be delays between cloud system components having identities and profile content synchronized.
*Multiple copies of an identity may be made, and these may not be synchronized.
*Credentials may be vulnerable to interception and replay.

35
Q

“The ENISA document references this vulnerability as being applicable to the following risks:”

A

“*Economic denial of service
*Modifying network traffic
*Privilege escalation
*Social-engineering attacks
*Loss or compromise of operational logs
*Loss or compromise of security logs
*Backups lost or stolen

36
Q

“I addressed the risk of loss of governance in the “Top Security Risks” section earlier in this chapter. The ENISA document lists the following vulnerabilities and quick descriptions associated with a loss of governance:”

A

“*Unclear roles and responsibilities = This refers to inadequate attribution of roles and responsibilities in the cloud provider organization.
*Poor enforcement of role definitions = A failure to segregate roles may lead to excessively privileged roles, which can make extremely large systems vulnerable.
*Synchronizing responsibilities or contractual obligations external to cloud = Cloud customers may be unaware of their responsibilities.
*SLA clauses with conflicting promises to different stakeholders = SLA clauses may also be in conflict with promises made by other clauses or clauses from other providers.
*Audit or certification not available to customers = The CSP cannot provide any assurance to the customer via audit certification.
*Cross-cloud applications creating hidden dependencies = Hidden dependencies exist in the services supply chain. Cloud provider architecture does not support continued operation from the cloud when the third parties involved, subcontractors, or the customer’s company, have been separated (for example, disconnected) from the service provider.
*Lack of standard technologies and solutions = A lack of standards means that data may be locked in to a provider. This is a big risk if the provider ceases operation.
*Storage of data in multiple jurisdictions and lack of transparency = Mirroring data for delivery by edge networks and redundant storage without real “information available to the customer of where data is stored introduces a level of vulnerability.”

37
Q

“I addressed the risk of loss of governance in the “Top Security Risks” section earlier in this chapter. The ENISA document lists the following vulnerabilities and quick descriptions associated with a loss of governance:”

A

“*No source escrow agreement = Lack of source escrow means that if a PaaS or an SaaS provider goes into bankruptcy, its customers are not protected. A software escrow agreement may enable the customer to re-create a similar service with another provider.
*No control on vulnerability assessment process = Restrictions on port scanning and vulnerability testing are an important vulnerability, which, combined with a Terms of Use that places responsibility on the customer for securing elements of the infrastructure, is a serious security problem.
*Certification schemes not adapted to cloud infrastructures = Not all certifications contain cloud-specific controls, which means that cloud-specific security vulnerabilities are likely to be missed.
*Lack of information on jurisdictions = Data may be stored and/or processed in high-risk jurisdictions where it is vulnerable to confiscation by forced entry. If this information is not available to the cloud customer, they cannot take steps to avoid it.
*Lack of completeness and transparency in terms of use = This occurs when the provider’s usage policy is unclear or lacks detail.
*Unclear asset ownership = A customer failing to understand asset ownership could result in inadequate application of security baseline and hardening procedures, human error, and untrained administrators.”

38
Q
A

“The administrator has created an economic denial of service scenario if there is ever a denial of service attack against the company. This is because of the measured service characteristic of cloud computing, where companies pay for the resources they use. Load balancing will distribute traffic across only an established amount of servers, so B and C do not address what the administrator has established. Finally, although auto-scaling groups are common, there needs to be a set limit to the amount of servers that will be created.

39
Q

“Which of the following is listed by ENISA as a way for SaaS or PaaS providers to protect their customers?”

A

“To ensure that SaaS or PaaS software is not orphaned or abandoned in the event of a provider’s failure, customers should seek to ensure that providers have a code escrow agreement in place with a third-party escrow agent. Although the other answers are good ideas for protecting customers, only code escrow agreements are listed in the ENISA documentation.”

40
Q

“Which of the following is not an example of vendor lock-in?

A

“All SaaS products are customized applications. This fact is not the source of vendor lock-in. What creates a lock-in situation with SaaS is the lack of ability to move data easily from one SaaS provider to another. If tools exist (generally they are limited) to move from one SaaS provider to another, vendor lock-in can be fairly easily dealt with. All the other answers are lock-in scenarios.

41
Q

“Which of the following could be considered a malicious insider as per ENISA “Top Security Risks”?”

A

“The ENISA document lists provider employees and contractors as potential malicious insiders. As such, the only possible correct answer is the provider’s auditor.