Security in Cloud Computing Flashcards
Infrastructure as a Service (IAAS)
Provides virtualized computing resources over the Internet. A third party provider hosts infrastructure components, applications and services on behalf of its subscribers with a hypervisor (VMware, Virtualbox, Xen or KVM) running the virtual machines as guests.
Platform as a Service (PAAS)
Geared toward software development hosted in the cloud.
Software as a Service
A software distribution model providing on-demand applications to subscribers over the Internet. SAAS provides easier administration, automated patch management, compatibility and version control.
Cloud Deployment Models
- Public - over the Internet
- Private - private to a company
- Community - shared by several organizations
- Hybrid - composed of two or more deployment models
NIST Cloud Computing Reference Architecture 500-292 - Major Cloud Roles
- Cloud Carrier - data transfer between subscriber and provider
- Cloud Consumer - uses cloud services
3, Cloud Provider - purveyor of cloud services - Cloud Broker - manages relationships between providers and subscribers
- Cloud Auditor - independent assessor of cloud services
Cloud regulatory
FEDRAMP: Government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.
PCI
FIPS
Cloud Security Alliance (CSA)
Trusted Computing Model
An attempt to resolve computer security problems through hardware enhancements and associated software modifications.
Trusted Computing Group - made up of hardware and software providers who cooperate to come up with specific plans
Roots of Trust (RoT) - set of functions with the Trusted Computing model that are always trusted by the Computer’s operating system
Cloud Control Layers
- Applications: Web app firewalls, SDLC, binary analysis, application scanners
- Information: Database monitoring, encryption, data loss prevention, content management framework
- Management: Patch and configuration management, governance and compliance, virtual machine administration, identity and access management
- Network: Firewalls, network intrusion detection/prevention, quality of service, DNS, security
- Trusted Computing: Hardware and software roots of trust and APIs
- Compute and Storage: Host based intrusion detection, and firewalls, log management, file integrity efforts, encryption, etc
- Physical: physical security measures, video monitoring, guards, etc.
Cloud Security Tools
CloudInspect - penetration testing CloudPassage Halo Dell Cloud Manager Qualsys CLoud Suite Trend Micros Instant-On Cloud Security Panda Cloud Office Protection
Cloud Attacks
Data Breach of Loss
Abuse of cloud resources - leveraging the cloud for crypto key cracking for example
Insecure Interfaces and APIs
Insufficient Due Diligence
Shared technology issues in multitenant environments not providing proper isolation
Unknown risk profiles - users don’t know what security providers are using in the background
Malicious Insiders
Inadequate Design
DDOS
Wrapping attack - SOAP message is intercepted and the data in the envelope is changed and then sent/replayed
Session Riding - CSFR under a different name
Side Channel attack - Cross-guest VM breach deals with virtualization itself
Shadow IT
IT systems and solutions that are developed to handle an issue but aren’t necessarily taken through proper organizational approval chains.