security in cloud ppt

Document Sample
security in cloud ppt Powered By Docstoc
					                           by
                SECURITY   Krishna Teja
                           Kesineni

            IN THE CLOUD   210cs2265
                           Information
                           security




3/22/2011        NIT-RKL              1
              WHAT IS CLOUD?

"Cloud computing is a model for enabling
 convenient, on-demand network access to a
 shared pool of configurable computing
 resources (e.g., networks, servers, storage,
 applications, and services) that can be rapidly
 provisioned and released with minimal
 management effort or service provider
 interaction.“
           by National Institute of Standards and
Technology (NIST)

3/22/2011              NIT-RKL                 2
            WHAT IS CLOUD?




3/22/2011         NIT-RKL    3
             HOW CLOUD WORKS?

    When a user accesses the cloud for a
popular website, many things can happen.
The user's IP for example can be used to establish
 where the user is located (geolocation).
DNS services can then direct the user to a cluster of
 servers that are close to the user.
so the site can be accessed rapidly and in their local
 language.
The user doesn't login to a server, but they login to
 the service they are using by obtaining a session id
 and/or a cookie which is stored in their browser.
3/22/2011                 NIT-RKL                    4
               WHY CLOUD?

Reduced cost
Increased storage
Flexibility
Greater mobility
Shift of IT focus
Scalability
Reliability


3/22/2011            NIT-RKL   5
                  T YPES OF CLOUD

Application and Information clouds
        Business Level
Development clouds
         Platform Level
Infrastructure clouds
         User Level(web Level)


3/22/2011                   NIT-RKL   6
               SECURIT Y ISSUES OF CLOUD

As for 2010 Cloud Security Alliance, Top
 security issues of cloud are
            Abuse and Nefarious Use of Cloud
            Insecure Application Programming Interfaces
            Malicious Insiders
            Shared Technology Vulnerabilities
            Data Loss/Leakage
            Account, Service & Traffic Hijacking
            Unknown Risk Profile



3/22/2011                           NIT-RKL                7
       ABUSE AND NEFARIOUS USE OF CLOUD

Impact
 Criminals continue to leverage new technologies to improve their
  reach, avoid detection, and improve the effectiveness of their
  activities.
 Cloud Computing providers are actively being targeted, partially
  because their relatively weak registration systems facilitate
  anonymity, and providers’ fraud detection capabilities are
  limited.
Remediation
   Stricter initial registration and validation processes.
   Enhanced credit card fraud monitoring and coordination.
   Comprehensive introspection of customer network traf fic.
   Monitoring public blacklists for one’s own network blocks.
    3/22/2011                      NIT-RKL                       8
      INSECURE APPLICATION PROGRAMMING
                 INTERFACES
Impact
 While most providers strive to ensure security is well integrated
  into their service models, it is critical for consumers of those
  services to understand the security implications associated with
  the usage, management, orchestration and monitoring of cloud
  services.
 Reliance on a weak set of interfaces and APIs exposes
  organizations to a variety of security issues related to
  confidentiality, integrity, availability and accountability.
Remediation
 Analyze the security model of cloud provider interfaces.
 Ensure strong authentication and access controls are
  implemented in concert with encrypted transmission.
 Understand the dependency chain associated with the API.
 3/22/2011                      NIT-RKL                        9
                  MALICIOUS INSIDERS

Impact
 The impact that malicious insiders can have on an organization is
  considerable, given their level of access and ability to infiltrate
  organizations and assets.
 Brand damage, financial impact, and productivity losses are just some
  of the ways a malicious insider can af fect an operation.
 As organizations adopt cloud ser vices, the human element takes on an
  even more profound importance.
 It is critical therefore that consumer s of cloud ser vices understand
  what provider s are doing to detect and defend against the malicious
  insider threat.
Remediation
 Enforce strict supply chain management and conduct a comprehensive
  supplier assessment.
 Specify human resource requirements as par t of legal contracts.
 3/22/2011                         NIT-RKL                          10
  SHARED TECHNOLOGY VULNERABILITIES

Impact
 Attacks have sur faced in recent years that target the shared technology
  inside Cloud Computing environments.
 Disk partitions, CPU caches and other shared elements were never
  designed for strong compar tmentalization .
 As a result, attackers focus on how to impact the operations of other
  cloud customer s, and how to gain unauthorized access to data.
Remediation
 Implement security best practices for installation/configuration .
 Monitor environment for unauthorized changes/activity.
 Promote strong authentication and access control for administrative
  access and operations.
 Enforce ser vice level agreements for patching and vulnerability
  remediation.
 Conduct vulnerability scanning and configuration audits.
 3/22/2011                          NIT-RKL                           11
                   DATA LOSS/LEAKAGE

Impact
 Data loss or leakage can have a devastating impact on a business.
 Beyond the damage to one’s brand and reputation, a loss could
  significantly impact employee, par tner, and customer morale and trust.
 Loss of core intellectual proper ty could have competitive and financial
  implications.
 Worse still, depending upon the data that is lost or leaked, there might
  be compliance violations and legal ramifications.
Remediation
   Implement strong API access control.
   Encr ypt and protect integrity of data in transit.
   Analyzes data protection at both design and run time.
   Implement strong key generation, storage and management, and
    destruction practices.
    3/22/2011                       NIT-RKL                           12
    ACCOUNT, SERVICE & TRAFFIC HIJACKING

Impact
 Account and ser vice hijacking, usually with stolen credentials, remains
  a top threat.
 With stolen credentials, attackers can of ten access critical areas of
  deployed cloud computing ser vices, allowing them to compromise the
  confidentiality, integrity and availability of those ser vices.
Remediation
   Prohibit the sharing of account credentials between users and ser vices.
   Leverage strong two-factor authentication techniques where possible.
   Employ proactive monitoring to detect unauthorized activity.
   Understand cloud provider security policies and SLAs.




    3/22/2011                         NIT-RKL                           13
                UNKNOWN RISK PROFILE

Impact
 When adopting a cloud ser vice , the features and functionality may be
  well adver tised , but what about details or compliance of the internal
  security procedures, configuration hardening, patching , auditing, and
  logging?
 How are your data and related logs stored and who has access to them?
 What information if any will the vendor disclose in the event of a
  security incident?
 Of ten such questions are not clearly answered or are overlooked,
  leaving customers with an unknown risk profile that may include
  serious threats .
Remediation
 Disclosure of applicable logs and data.
 Par tial/full disclosure of infrastructure details (patch levels, firewalls).
 Monitoring and aler ting on necessar y information.
 3/22/2011                             NIT-RKL                              14
            CONCLUSION


The CLOUD is the latest emerging
 field. The Security of a Cloud
 plays a major role in future time
 in modern Computing era.



3/22/2011       NIT-RKL          15
                  REFERENCES

 http://en.wikipedia.org/wiki/Cloud_computing
  retrieved on 20th March 2011

 A White paper on “Securing the Cloud”, VMware, Inc.
  3401 Hillview Ave Palo Alto CA 94304 USA.

 A review paper on “Top Threats to Cloud Computing
  V1.0”, Cloud Security Alliance March 2010.

 A White paper on “Security in the Cloud ”, Clavister
  AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, Sweden .
3/22/2011                  NIT-RKL                       16
      THANK Q ONE AND ALL


                            -teja
3/22/2011        NIT-RKL        17

				
DOCUMENT INFO
Shared By:
Tags:
Stats:
views:76
posted:11/19/2012
language:
pages:17