Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Security Overview – Cloud Security Challenges and Risks – Software-as-a-Service Security – Security
Governance – Risk Management – Security Monitoring – Security Architecture Design – Data Security –
Application Security – Virtual Machine Security - Identity Management and Access Control – Autonomic
Security.
1. SECURITY OVERVIEW
Cloud service provides are leveraging virtualization combined with self services capabilities
for computing resources via the internet
In these service provider environment ,virtual machines from multiple organizations have to
be colocated on the same physical server in order to organize the efficiencies of
virtualization
Cloud service providers must learn from the managed service provider(MSP) model and
ensure that their consumers applications and data are secure if they hope to retain their
customer base and competitiveness
IDC recently conducted a survey of 244 IT executives and their line of business (LOB)
colleagues to their opinions and understand their companies use of IT cloud services
[Chow 09ccsw ]
10
Software-as-a-service
Platform-as-a-service
Infrastructure-as-a-service
Other than these services the following services are used in IT infrastructures
AVCCE/CA/V/TVN Page 1 of 14
UNIT –V SECURITY IN THE CLOUD
IT-as-a-Service(ITaaS)
Anything-as-a-Services(XaaS)
AVCCE/CA/V/TVN Page 2 of 14
UNIT –V SECURITY IN THE CLOUD
AVCCE/CA/V/TVN Page 3 of 14
UNIT –V SECURITY IN THE CLOUD
3.SECURITY GOVERNANCE
AVCCE/CA/V/TVN Page 4 of 14
UNIT –V SECURITY IN THE CLOUD
These advantages include but are not limited to rapid information system deployment,
significantly reduced operating costs, massive economies of scale, processing speed, and
agility. However, subscription to these services often implies security and compliance
challenges for enterprises who are often unprepared to resolve them.
Data breaches, system vulnerabilities, insufficient identity, and credential and access
management are some of the typical security challenges in the cloud environment that
subscriber enterprises must address
Governance refers to the policies, processes, laws, and institutions that define the structure
by which companies are directed and managed
Lack of senior management participation and buy-in -The lack of a senior management
influenced and endorsed security policy is one of the common challenges facing cloud
customers.
Lack of embedded management operational controls-Another common cloud security
governance challenge is lack of embedded management controls into cloud security
operational processes and procedures.
Lack of operating model, roles, and responsibilities-Many enterprises moving into the
cloud environment tend to lack a formal operating model for security, or do not have
strategic and tactical roles and responsibilities properly defined and operationalized
Lack of metrics for measuring performance and risk-Another major challenge for cloud
customers is the lack of defined metrics to measure security performance and risks – a
problem that also stifles executive visibility into the real security risks in the cloud
Key Objectives for Cloud Security Governance
Building a cloud security governance model for an enterprise requires strategic-level security
management competencies in combination with the use of appropriate security standards
and frameworks (e.g., NIST, ISO, CSA) and the adoption of a governance framework (e.g.,
COBIT).
The first step is to visualize the overall governance structure, inherent components, and to
direct its effective design and implementation. The use of appropriate security standards and
frameworks allow for a minimum standard of security controls to be implemented in the
cloud, while also meeting customer and regulatory compliance obligations where applicable.
AVCCE/CA/V/TVN Page 5 of 14
UNIT –V SECURITY IN THE CLOUD
AVCCE/CA/V/TVN Page 6 of 14
UNIT –V SECURITY IN THE CLOUD
Security Benefits
VMs are rapidly gaining popularity due to their ability to emulate computing environments,
isolate users, restore previous states, and support remote initialization. All of these features
have positive security side effects.
The hardware abstraction and isolation of VM bounds the scope of attack and makes it much
more difficult for the attacker to access unauthorized data and resources on the physical
machine
VM state restore allows users to return to a state prior to attack or data loss, providing an
easy method of malware removal and data preservation.
Abstraction
VMs abstract the hardware layer and each VM is allocated its own strictly bounded resources.
This layer of abstraction provides additional security. When an attacker gains access to the
hardware layer, they have full control over the computer.
Isolation
The hypervisors segment physical resources into isolated entities and allow each guest OS to
run independently. An attack on the VM should not affect any of the other VMs on the server
or the host OS. This is unlike a multi-user OS, where all users can be affected by an attack
State Restore
VMs are touted for their ability to restore to a previous state
AVCCE/CA/V/TVN Page 7 of 14
UNIT –V SECURITY IN THE CLOUD
Transience
One often-overlooked security feature of VMs is their ability to be started remotely, which
allows them to be turned on and made available only when needed.
External Monitoring
VMs can be monitored by either the hypervisor, or an authorized dedicated VM that can view
software activity. The later is the preferred method since it limits the hypervisors role,
helping to keep the hypervisor as simple and secure as possible. The hypervisor simply gives
the dedicated VM permission to view resources allocated to the monitored VM. The single
dedicated VM that is only used to monitor other active VMs. These monitors are used in
intrusion detection systems (IDS)
Security Maintenance
Security Vulnerabilities
The virtual machine layer is more secure than any OS, due to its simplicity and strict access
control. Compromising the hypervisor could give attackers access to all virtual machines
controlled by it and possibly the host, which makes the hypervisor a compelling target.
• Mobility
• Hypervisor Intrusion
• Hypervisor Modification
• Communication
AVCCE/CA/V/TVN Page 8 of 14
UNIT –V SECURITY IN THE CLOUD
AVCCE/CA/V/TVN Page 9 of 14
UNIT –V SECURITY IN THE CLOUD
Shared technology’s vulnerabilities: This issue related to cloud computing that uses the
same infrastructures used in the internet shared among the cloud customers.
Sniffer attacks: For this type attack, attacker intends to read the content of the network
packet, although there are no encrypted methods have been applied during the sending of the
data.
Cloud Computing Challenges
Access controls: It is a concern for all service providers, in which it may cause a security
issue by revealing user’s data and giving hackers the ability to gain access to the
organization’s infrastructure
Accounting: It is one of the key aspects that have to be measured in deploying services in the
cloud computing solutions in order to maintain network management
Compliance: Cloud computing has a weak point for supporting the methods of compliance
management
Cross-Organizational Security Management: It is a big challenge in cloud computing to
achieve and maintain security requirements and compliance with SLAs
Extensibility and Shared Responsibilities: The service providers and users have to give
attention to the security concern in cloud computing.
Private Cloud: Since the term of a private cloud is on-premises, so it is expected that the
location that will be working is just like traditional computing
Heterogeneity: Heterogenous issue exists when various service providers deliver a massive
number of services using different technologies
Identity management (IdM): It is a key aspect in cloud computing security that has the goals
to perform verification and validation process among heterogeneous clouds services
Integration: When customers or organization need to implement multiple service providers
for several reasons
Performance: Cloud computing may reduce the cost, but the performance issues such as
communication time between the user and the cloud services has become a problem because
as the number of users increases, the amount of the information and the data to be
transferred to the users increases as well.
Bandwidth requirements: Before implementing a cloud service, organizations have to
evaluate the communication bandwidth requirements and assess the services with respect to
the large amount of data transmission
Monitoring: When cloud computing is based on service monitoring, there will be an
enormous demand on using monitoring throughout cloud services
Risk analysis and management: It is an important key aspect in the cloud security.
Service Level Agreement: It is an important component of the contractual relationship
between a cloud service customer and a cloud service provider
Virtualization: It is a way to deliver cloud services to the customers, especially when
applying IaaS services, but it is still suffering from security issues
AVCCE/CA/V/TVN Page 10 of 14
UNIT –V SECURITY IN THE CLOUD
Security in the web browser: The security requirements in the web browser is not enough
to handle the user’s needs in terms of complex and sophisticated banking and critical
environments for a shared solution
6.IDENTITY MANAGEMENT AND ACCESS CONTROL
Identity management and access control are fundamental functions required for secure cloud
computing
Identity Management
Identification and authentication are the keystones of most access control systems. Identifi
cation is the act of a user professing an identity to a system,usually in the form of a username
or user logon ID to the system.
Authentication is verification that the user’s claimed identity is valid, and it is usually
implemented through a user password at logon. Authentication is based on the following
three factor types:
Type 1 — Something you know, such as a personal identification number (PIN) or password
Type 2 — Something you have, such as an ATM card or smart card
Type 3 — Something you are (physically), such as a fingerprint
Passwords
Because passwords can be compromised, they must be protected. In the ideal case, a
password should be used only once. This “one-time password,” or OTP,provides maximum
security because a new password is required for each new logon.
A password that is the same for each logon is called a static password.
A password that changes with each logon is termed a dynamic password
Tokens
Tokens, in the form of small, hand-held devices, are used to provide passwords
Static password tokens
Synchronous dynamic password tokens, clock-based
Synchronous dynamic password tokens, counter-based
Asynchronous tokens, challenge-response
Memory Cards
Memory cards provide nonvolatile storage of information, but they do not have any
processing capability. A memory card stores encrypted passwords and other related
identifying information.
A telephone calling card and an ATM card are examples of memory cards
Smart Cards
Smart cards provide even more capability than memory cards by incorporating additional
processing power on the cards. These credit-card-size devices comprise microprocessor and
memory and are used to store digital signatures, private keys, passwords, and other personal
information.
Biometrics
AVCCE/CA/V/TVN Page 11 of 14
UNIT –V SECURITY IN THE CLOUD
AVCCE/CA/V/TVN Page 12 of 14
UNIT –V SECURITY IN THE CLOUD
Nondiscretionary Access Control-A central authority determines which subjects can have
access to certain objects based on the organizational security policy.
Single Sign-On (SSO)-Single sign-on (SSO) addresses the cumbersome situation of logging on
multiple times to access different resources
7.AUTONOMIC SECURITY
Autonomic computing refers to a self-managing computing model in which computer systems
reconfigure themselves in response to changing conditions and are self-healing
Autonomic Systems
Autonomic systems are based on the human autonomic nervous system, which is self-
managing, monitors changes that affect the body, and maintains internal balances.
Examples of events that would have to be handled autonomously include the following
Malicious attacks
Hardware or software faults
Excessive CPU utilization
Power failures
Organizational policies
Inadvertent operator errors
Interaction with other systems
Software updates
IBM introduced the concept of autonomic computing and its eight defining characteristics5 as
follows:
Self-awareness — An autonomic application/system “knows itself” and is aware of its state
and its behaviors.
Self-configuring — An autonomic application/system should be able configure and
reconfigure itself under varying and unpredictable conditions.
Self-optimizing — An autonomic application/system should be able to detect sub-optimal
behaviors and optimize itself to improve its execution.
Self-healing — An autonomic application/system should be able to detect and recover from
potential problems and continue to function smoothly.
Self-protecting — An autonomic application/system should be capable of detecting and
protecting its resources from both internal and external attack and maintaining overall
system security and integrity.
Context-aware — An autonomic application/system should be aware of its execution
environment and be able to react to changes in the environment.
Open — An autonomic application/system must function in a heterogeneous world and
should be portable across multiple hardware and software architectures. Consequently, it
must be built on standard and open protocols and interfaces.
AVCCE/CA/V/TVN Page 13 of 14
UNIT –V SECURITY IN THE CLOUD
AVCCE/CA/V/TVN Page 14 of 14