CCSP Chapter 4: Cloud Data Security Flashcards
Create
* Data Created Remotely
* What is PKI
* TLS vs SSL
* Data Created within the Cloud
Create
* Data Created Remotely - data should be encrypted (FIPS 140-2) before uploading to cloud and protect against attacks (i.e. MiTM, insider threat); Upload connection should also be secure (TLS 1.2 or higher or IPsec)
* PKI - deals with keys and managing them; enables secure communication
* TLS replaces SSL, however SSL is still used;
* Data Created within the Cloud - data should be encrypted during creation
Storing data in cloud
Store will happen as data is Created; Encyprtion at rest and encryption in transit to mitigate exposure to threats while data is being moved to cloud data center
Using Data in cloud
- Operations in the cloud will necessitate remote access, so connections need to be secure with an encrypted tunnel;
- The platforms users use to connect should be secure
- Users should be trained
- Data owners should limit access to users
*Enable Logging and audit trails
On the Provider Side:
* CSP must ensure data on virtualized host cannot be read or detected by other virtual hosts on the same device
* CSP will have to implement personnel and administrative controls so that data center personnel cannot access any raw customer data
Sharing Data in Cloud
- Sharing restrictions based on jurisdiction
- IRM solutions
- Encrypted files and communications
- limit or prevent data being sent based on regulatory mandates
- Egress monitoring
- Export and import restrictions
Export and Import Restrictions
Export Restrictions
* International Traffic in Arms Regulations (ITAR) (USA) - state department prohibitions on defense-related exports; can include cryptography systems
* Export Administration Regulations (EAR) (USA) - DoC prohibitions on dual-use items (technologies that could be used for both commercial and military purposes)
Import Restrictions
* Cryptography - many countries have restrictions on importing cryptosystems or material that has been encrypted;
* The Wassenaar Arrangement - a group of 41 countries have agreed to inform each other about military shipments to nonmember countries; not a treaty and therefore not legally binding, but may require your organization to notify your govt in order ot stay compliant
Archiving Data in the Cloud
- This is the phase for long term storage
- Cryptography and key management - keys need to be stored and managed correctly, if they are lost, data will be lost or exposed
*Also need to consider PHYSICAL SECURITY - Location, format, staff, procedure
Elliptical Curve Cryptography (ECC)
Uses smaller keys to provide same level of security as traditional cryptography; uses algbraic elliptical curves
Destroying data in the cloud
- Crypgraophic erasure (cryptoshredding) is the only feasible means to destroy data in the cloud
Types of Cloud Storage Architectures (4)
- Volume Storage
- Object-Based Storage
- DataBases
- Content Delivery Network (CDN)
- Volume Storage
* Define Volume Storage
* Two types of Volume Storage
* What Cloud Service Model is Volume Storage typically offered in?
- Volume Storage - the customer is allocated storage space within the cloud, this storage space is represented as an attached drive to the user’s virtual machine
- File Storage - data is stored and displayed juas as a file structure in the traditional environment, as files and folders; This is popular with big data analytical tools
- Block Storage - this is a blank volume that the customer can put anything into; it allows more flexibility and higher performance but requires more administration; might entail installation of OS or other app to store, sort, retrieve data; This is great for data of multiple types and kinds, such as enterprise backup services
- Volume Storage is typically offered in IaaS
- Object-Based Storage
* What cloud service model is object-based storage offered in?
- storing data as objects, not files or blocks
- include actual production content, metadata, object identifier, unique address identifier
- allow for significant level of description and indexing
- object-based storage offered in IaaS
- Databases
* What cloud service model are databases typically offered in?
- data is arranged according to characteristics and elements, including the specific trait required to file the data known as the primary key
- usually the backend storage and stores data in fields
- can be implemented on any cloud service model, but most often configured to work with PaaS and SaaS
- Content Delivery Network (CDN)
- it is a form of data caching, usually near geophysical locations of high use, for copies of data commonly requested by users
- i.e. online multimedia streaming services; instead of dragging data from data center to users at variable distances - the streaming service provider can place copiest of the most requested media near specific areas where those requests are likely to be made, therefore improving bandwidth delivery quality
Cloud Data Security Foundational Strategies - Encryption
- Encryption used to protect data at rest, in transit, and in use
- Includes Key management and Masking, Obfuscation, Anonymization, and Tokenization
Encryption
- Key Management (6)
- How and where keys are stored can affect the overall risk of data
- Things to note for Key management
1. Level of Protection - the key must be protected at the same or higher level as the data it is protecting.
2. Key Recovery - if a user is fired, passes away, or lost their key - there needs to be SOP to recover that key. Usually multiple people have portions of the key
3. Key Distribution - when creating keys, keys need to be distributed. Keys should never be distributed in the clear and should be passed along out of band, which is expensive. There needs to be procedures in place for how keys are distributed
4. Key Recovation - if a key is stolen, lost, etc. There needs to be a process on how to suspend that key or the user’s ability to use it
5. Key Escrow - it is highly deseriable that a trusted 3rd party holds copies in a secure environment;
6. Oursourcing Key Management - keys should not be stored in the data they are protecting, therefore they should be stored outside of the CSP’s data center. One solution is for the cloud customer to retain the keys which is cumbersome and expensive; the other is using a Cloud Access Security Broker (CASB); CASBs are 3rd party providers that handle IAM and key Management services for cloud customers; CASBs are much less expensive then self maintenance