1 Suronapee Phoomvuthisarn, Ph.D. / NETE4631:Cloud Privacy and Security - Lecture 12.

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
Security Controls – What Works
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Chapter 12 Network Security.
Unified Logs and Reporting for Hybrid Centralized Management
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Maintaining & Reviewing a Web Application’s Security By: Karen Baldacchino Date: 15 September 2012.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Cloud Computing Cloud Security– an overview Keke Chen.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Securing Information Systems
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Storage Security and Management: Security Framework
1 NETE4631 Mobile Cloud Computing Lecture Notes #10.
HIPAA COMPLIANCE WITH DELL
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Computer Science and Engineering 1 Cloud ComputingSecurity.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Module 14: Configuring Server Security Compliance
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Cloud Use Cases, Required Standards, and Roadmaps Excerpts From Cloud Computing Use Cases White Paper
1 NETE4631 Course Wrap-up and Benefits, Challenges, Risks Lecture Notes #15.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Alliance Key Manager for Windows Azure Puts Encryption Key Management and Data Breach Security at Your Fingertips COMPANY PROFILE: TOWNSEND SECURITY Townsend.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
IS3220 Information Technology Infrastructure Security
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Logging and Monitoring. Motivation Attacks are common (see David's talk) – Sophisticated – hard to reveal, (still) quite limited in our environment –
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
New cloud services demand new security solutions. The evolving cloud landscape is paving the way for modern and more sophisticated technology. Among the.
Chapter 6: Securing the Cloud
Stop Cyber Threats With Adaptive Micro-Segmentation
Understanding The Cloud
Working at a Small-to-Medium Business or ISP – Chapter 8
Cloud Security– an overview Keke Chen
VIRTUALIZATION & CLOUD COMPUTING
Secure Software Confidentiality Integrity Data Security Authentication
Hot Topics:Mobility in the Cloud
Infrastructure as a Service
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Computer Science and Engineering
PLANNING A SECURE BASELINE INSTALLATION
Cloud Computing for Wireless Networks
Presentation transcript:

1 Suronapee Phoomvuthisarn, Ph.D. / NETE4631:Cloud Privacy and Security - Lecture 12

Characteristics of Cloud (NIST) 2

Statistical Challenges in the Cloud 3

Security & Privacy Challenges 4  Outsourcing Data and Applications  Extensibility and Shared Responsibility  Service-Level Agreements (SLAs)  Virtualization and Hypervisors  Heterogeneity  Compliance and Regulations  Three kinds of issues in standards and regulations  “How” issues – how an application of specific type should operate in order to protect certain concerns specific to its problem domain  “Where” issues – where you can store certain information  “What“ issues – standards that prescribe specific components to your infrastructure

The Life Cycle of a Modern Attack 5

Functional Traits of Botnets 6

Key Components and Tools in the Modern Attack Strategy 7

Data Security 8  Physical security  Data control  Encryption (both in transit and storage)  Off-side backups regularly  Data segmentation  Minimize the impact of the compromise of specific nodes

Network security  Firewall  Firewall-like traffic rules to govern which traffic can reach which virtual servers, such as security groups in Amazon EC2  Network Intrusion Detection  monitor local traffic for anything that looks irregular 9

Firewall rules 10 A firewall rules in AmazonTraditional firewall

Brokered Cloud Storage Access 11

Network Intrusion Detection Systems (NIDS)  NIDS  to monitor local traffic for anything that looks irregular  scans/ Denial-of-service attacks/known vulnerability exploit attempts 12

Host Security  Host security describes how your server is set up for the following tasks  Preventing attacks  Minimizing the impact of a successful attack on the overall system  Responding to attacks when they occurs 13

Host Security (2)  Security patches  In cloud environments, rolling out a patch across the infrastructure takes three simple steps:  Patch you machine images with the new security fixes  Test the results  Re-launch your virtual servers  System hardening  The process of disabling or removing unnecessary services and eliminate unimportant user accounts  Antivirus protection  Selection criteria – (1) how wide the known exploits does it covers (2) time when a virus is released and recovered  Host Intrusion Detection Systems (HIDS) 14

Host Intrusion Detection Systems (HIDS) 15

Identity Management  What is the identity?  Things you are  Things you know  Things you have  Things you relate to  They can be used to authenticate client requests for services and preventing unauthorized uses  Maintain user roles  Use secure approach such as SSH and public private keys pair rather than password-based method (brute force attack) to access virtual servers  Encryption in transit  Only user that have an operational needs in certain time period 16

Defining Identity as a Service (IDaaS) 17  Store the information that associates with a digital entity used in electronic transactions  Core functions  Data store  Query engine  Policy engine

Core IDaaS applications 18

Authentication Protocol Standards 19  OpenID  OAuth

Auditing 20  Auditing is the ability to monitor the events to understand performance  Challenges  Proprietary log formats  Might not be co-located

Auditing (2) 21 Picture from Alexandra Institute

Security Mapping 22  Determine which resources you are planning to move to the cloud  Determine the sensitivity of the resources to risk  Determine the risk associated with the particular cloud deployment type (public, private, or hybrid models) of a resource  Take into account the particular cloud service model that you will be using  If you have selected a particular cloud provider, you need to evaluate its system to understand how data is transferred, where it is stored, and how to move data both in and out of the cloud

The AWS Security Center 23

Security Responsibilities 24  Cloud Deployment Models (NIST)  Public clouds  Private clouds  Hybrid clouds

Security Service Boundary 25 By Cloud Security Alliance (CSA)

Regulatory Compliance 26  All regulations were written without keeping Cloud Computing in mind.  Clients are held responsible for compliance under the laws that apply to the location where the processing or storage takes place.  Security laws that requires companies providing sensitive personal information have to encrypt data transmitted and stored on their systems (Massachusetts March, 2012).

Regulatory Compliance (2) 27  You have to ensure the followings:  Contracts reviewed by your legal staff  The right to audit in your SLA  Review cloud service providers their security and regulatory compliance  Understand the scope of the regulations that apply to your cloud-based applications  Consider what steps to take to comply with the demand of regulations that apply and/ or adjusting your procedures to this matter  Collect and maintain the evidence of your compliance with regulations

Defining Compliance as a Service (CaaS) 28  CaaS needs to  Serve as a trusted party  Be able to manage cloud relationships  Be able to understand security policies and procedures  Be able to know how to handle information and administer policy  Be aware of geographic location  Provide an incidence response, archive, and allow for the system to be queried, all to a level that can be captured in a SLA

Defining Compliance as a Service (CaaS) (2) 29  Examples of clouds that advertise CaaS capabilities include the following:  Athenahealth for the medical industry  Bankserv for the banking industry  ClearPoint PCI for mechant transactions  FedCloud for goverment

Techniques for securing resources 30 Picture from Alexandra Institute

Virtualized Data Center Network Security Challenges  The major network security challenges in the virtualized data center include  Hypervisor integrity.  A successful attack against a host’s hypervisor can compromise all of the workloads being delivered by the host.  Intra-host communications.  Communications traffic between different VMs on the same physical host is often not visible and therefore cannot be controlled by traditional physical firewalls and IPS.  VM migration.  When VMs migrate from one physical host to another or from one physical site to another, they tend to break network security tools that rely on physical and/or network-layer attributes. 31

Data center evolution and security requirements 32

Criteria for Network Security in the Virtualized Data Center  Safe Application Enablement of Data Center Applications  Identification Based on Users, Not IP Addresses  Comprehensive Threat Protection  Flexible, Adaptive Integration  High-Throughput, Low-Latency Performance  Secure Access for Mobile and Remote Users  One Comprehensive Policy, One Management Platform 33

References 34  Chapter 4, 12 of Course Book: Cloud Computing Bible, 2011, Wiley Publishing Inc.  Chapter 6, Cloud Application Architectures, building applications and infrastructure in the cloud, O’Reilly, Reese, G., 2009  Network Security in Virtualized Data Centers For DUMMIES, Lawrence C. Miller, John Wiley& Sons  Research paper - Security and Privacy Challenges in Cloud Computing Environments, Hassan Takabi and James B.D. Joshi, University of Pittsburgh