Unit 5
Unit 5
CLOUD COMPUTING
UNIT – 5
This unit identifies current security concerns about cloud computing environments
and describes the methodology for ensuring application and data security and
compliance integrity for those resources that are moving from on-premises to
public cloud environments.
It focuses on why and how these resources should be protected in the Software-as-
a-Service (SaaS), Platform- as-a-Service (PaaS), and Infrastructure-as-a-Service
(IaaS) environments and offers security “best practices” for service providers and
enterprises.
MAJOR CLOUD COMPUTING SERVICE PROVIDER MODELS.
1.Software-as-a-Service
It is a model of software deployment in which an application is licensed for use as a service
provided to customers on demand
2.Platform-as-a-Service
With the PaaS model, all of the facilities required to support the complete life cycle of building
and delivering web applications and services are available to developers, IT managers, and end
users entirely from the Internet, without software downloads or installation.
3.Infrastructure-as-a-Service
It is the delivery of computer infrastructure as a service. Rather than purchasing servers,
software, data centre space, or network equipment, clients buy these resources as a fully
outsourced service.
Cloud Security- IT-as-a-Service (ITaaS)
IT-as-a-Service (ITaaS) is being proposed to bring the service model right to the IT
infrastructure.
Many organizations are in the process of transforming their IT departments into self-
sustaining cost-center operations, treating internal users as if they were customers.
Many large IT organizations have adopted the Information Technology Infrastructure
Library (ITIL) framework to help with this transformation.
The adoption of IT-as-a-Service can help enterprise IT functions focus on strategic
alignment with business goals.
Benefits of IT-as-a-Service (ITaaS)
There are some key financial benefits in moving to an ITaaS model, such has not having
to incur capital costs; having a transparent, monthly pricing plan; scalability; and
reasonable costs of expansion.
Operational benefits of ITaaS include increased reliability because of a centralized
infrastructure, which can ensure that critical services and applications are monitored
continually; software flexibility, with centrally maintained products that allow for quick
rollout of new functionalities and updates; and data security.
Cloud Security Challenges
With the cloud model, the control over physical security is lost.
In a public cloud, computing resources are sharing with other companies.
In a shared pool outside the enterprise, the owner don’t have any knowledge or
control of where the resources run. Simply because of sharing the entire
environment in the cloud, may put the data at risk of seizure.
Storage services provided by one cloud vendor may be incompatible with another
vendor’s services.
For instance, Amazon’s “Simple Storage Service” [S3] is incompatible with IBM’s Blue
Cloud, or Google, or Dell.
Cloud Security Challenges…..
If information is encrypted while passing through the cloud, who controls the
encryption/decryption keys?
Is it the customer or the cloud vendor?
It should be ensured that the customer, control encryption/decryption keys, just as
if the data were still resident on the own servers.
Data integrity means ensuring that data is identically maintained during any operation
(such as transfer, storage, or retrieval).
Ensuring the integrity of the data really means that it changes only in response
to authorized transactions.
Choice of development tool should have a security model embedded in it to guide
developers during the development phase and restrict users only to their authorized
data when the system is deployed into production
Cloud Security Challenges…..
As more and more mission-critical processes are moved to the cloud, SaaS suppliers will
have to provide log data in a real-time, straightforward manner, probably for their
administrators as well as their customers’ personnel.
Cloud applications undergo constant feature additions, and users must keep up to date
with application improvements to be sure they are protected.
The speed at which applications will change in the cloud will affect both the SDLC and
security.
Security needs to move to the data level, so that enterprises can be sure their data is
protected wherever it goes.
Sensitive data is the domain of the enterprise, not the cloud computing provider.
One of the key challenges in cloud computing is data-level security.
Those who adopt cloud computing must remember that it is the responsibility of the data
owner, not the service provider, to secure valuable data.
Cloud Security Challenges…..
Some countries have strict limits on what data about its citizens can be stored and for
how long, and some banking regulators require that customers’ financial data remain in
their home country.
Government policy will need to change in response to both the opportunity and the
threats that cloud computing brings.
This will likely focus on the off-shoring of personal data and protection of privacy,
whether it is data being controlled by a third party or off-shored to another country.
Security managers will need to work with their company’s legal staff to ensure that
appropriate contract terms are in place to protect corporate data and provide for
acceptable service-level agreements.
The dynamic and fluid nature of virtual machines will make it difficult to maintain the
consistency of security and ensure the auditability of records.
Software-as-a-Service Security
Software as a Service (SaaS) is one of the most widely used cloud service
model that allows the enterprise customers to access applications and data
on demand.
In this model, enterprise data is stored at the SaaS provider's data center,
along with the data of other enterprises.
Customers have strong concerns about data breaches, application
vulnerabilities and availability that can lead to financial and legal liabilities.
There are seven security issues related with this model are most concern.
Software-as-a-Service Security….
There are seven security issues
Privileged user access :
Inquire about who has specialized access to data, and about the hiring and management
of such administrators.
Regulatory compliance :
Make sure that the vendor is willing to undergo external audits and/or security
certifications.
Data location :
Does the provider allow for any control over the location of data?
Data segregation:
Make sure that encryption is available at all stages, and that these encryption schemes
were designed and tested by experienced professionals.
Software-as-a-Service Security….
Recovery
Find out what will happen to data in the case of a disaster. Do they offer complete
restoration? If so, how long would that take?
Investigative support
Does the vendor have the ability to investigate any inappropriate or illegal activity?
Long-term viability
What will happen to data if the company goes out of business? How will data be
returned, and in what format?
Software-as-a-Service Security….
To address the security issues listed above, SaaS providers will need to
incorporate and enhance security practices used by the managed
service providers and develop new ones as the cloud computing
environment evolves.
Security components of the SaaS Model
Security Governance
Security governance is the mechanism through which organizations can ensure
effective management of security in the Cloud.
To address governance, the level of risk and complexity of each cloud deployment
must be taken into consideration.
Public Cloud has highest risk due to lack of security control, multi-tenancy, data
management, limited SLA and lack of common regulatory controls.
Private Cloud has least risk due to single ownership and strong shared mission goals
and legal/regulatory requirements.
Risks in hybrid cloud dependent upon combined models.
Combination of private/community is lowest risk, while combination of public is
greatest risk.
Security Governance….
Security Governance Framework can be established with standard quality
management cycle of continuous improvement.
The outcome of the effective framework would be strategic alignment, value
delivery, risk management and performance measurement.
A security steering committee should be developed whose objective is to focus on
providing guidance about security initiatives and alignment with business and IT
strategies.
A charter for the security team is typically one of the first deliverables from the
steering committee.
This charter must clearly define the roles and responsibilities of the security team
and other groups involved in performing information security functions
Security Governance Framework
By following guidelines, a security governance framework is expected to be
established in the cloud provider’s organization.
a. Start with your people: Awareness must be created among all employees about
significance of security, how it can affect the goodwill of organization and what
they can and must do.
b. Audit compliance: It is required to make a horizontal audit compliance framework
that provides a view across all business units and combines the respective
information streams.
c. Identity and access management (IAM): Insider threats can be overcome by a
strict Identity and Access Management solution that will allow IT managers to track
privileged access to sensitive data and also allow them to assign or revoke these
privileges.
Security Governance Framework
Since many connections between companies and their SaaS providers are through the
web, providers should secure their web applications by following Open Web
Application Security Project (OWASP) guidelines for secure application development
and locking down ports and unnecessary commands on Linux, Apache, MySQL, and
PHP (LAMP) stacks in the cloud, just as you would on- premises
LAMP is an open-source web development platform, also called a web stack that uses
Linux as the operating system, Apache as the web server, MySQL as the relational
database management system RDBMS, and PHP as the object-oriented scripting
language.
Perl or Python is often substituted for PHP.
Application Security Risks…
The following security risks within the application and business environment is critical for
addressing the full scope of security and privacy issues
Loss of governance :– Because the organization may not have direct control of the infrastructure,
trust in the provider and its own ability to provide proper security is paramount
Compliance risk :– The cloud provider impacts the organization's ability to comply with regulations,
privacy expectations and industry standards, because data and systems may exist outside the
organization's direct control.
Isolation failure :– Multi-tenancy and resource sharing are defining characteristics of the cloud. It is
entirely possible for competing companies to be using the same cloud services, in effect running
their workloads shoulder-to-shoulder. Keeping memory, storage and network access separate is
essential.
Data protection:– Because the organization relinquishes direct control over data, it relies on the
provider to keep that data secure, and when it is deleted, ensure that it is permanently destroyed.
Management interface and role-based access:– Cloud applications are accessed and managed
through the Internet, and involve deep and extensive control. The risk associated with a security
breach is therefore increased and proper access authorization must be carefully considered.
Virtual Machine Security
Firewalls, intrusion detection and prevention, integrity monitoring, and log inspection can all be
deployed as software on virtual machines to increase protection and maintain compliance integrity of
servers and applications as virtual resources move from on-premises to public cloud environments.
To facilitate the centralized management of a server firewall policy, the security software loaded onto
a virtual machine should include a bidirectional stateful firewall that enables virtual machine isolation
and location awareness, thereby enabling a tightened policy and the flexibility to move the virtual
machine from on-premises to cloud resources.
Integrity monitoring and log inspection software must be applied at the virtual machine level.
The security issues related with
managing images,
virtual machine monitoring,
networking,
integrity, confidentiality, privacy and availability
Virtual Machine Security : Managing images
VMs images contain information of files, processes and memory blocks of the guest OS.
Images are kept in offline at an image repository.
Even in offline, they are vulnerable to the theft and code injection.
The administrator of image repository risks hosting and distributing malicious images.
Images should converge to a steady state by performing scans for worms and other
virus.
Otherwise infected VMs can sporadically disseminate malware. Another issue is VM
sprawl, it is the possibility of having the number of VMs continuously growing while
most of them are idle or never back sleep in turn wasting resources.
A cloud user risks running vulnerable, malicious, out-of-date/unlicensed images stored
at insecure, un administrated repository.
Virtual Machine Security : Monitoring VMs
One of the VMM vulnerability is, VM escape refers to the case of gaining access of
VMM through a VM, which is capable of attacking VMs monitored by the same VMM.
In the virtualization environment, one could be capable of gaining access to VMMs or
VMs.
Hyper VM was once exploited without the knowledge of the provider, resulting in the
destruction of many websites.
The ease of cloning and distributing VMs throughout cloud servers can propagate
errors and make raise to other vulnerabilities.
Virtual Machine Security : Networking
Vulnerabilities in the DNS servers affect cloud.
Incorrect virtualization may allow the user to access the sensitive portions of the
underlying infrastructure, disclosing sensitive knowledge of the real network or
resources from other users.
Virtualization software may also have vulnerabilities that enable network based VM
attacks.
VMs are likely to be copied or moved to other servers via network links, enabling quick
deployments, but also quick spread of vulnerable configurations and images theft.
A template image may retain original owner information may leak sensitive information
like secret key cryptographic salt values.
Virtual Machine Security : Integrity, Confidentiality and
Privacy