Cloud and Mobile Security - Portal Rasmi Kerajaan Negeri Pulau

Transcription

Cloud and Mobile Security - Portal Rasmi Kerajaan Negeri Pulau
Cloud and Mobile Security: Cloud
and Mobile Security:
Risks and Challenges
Chong Sau Wei (CISM)
chong@scan‐associates.net
General Manager
Managed Security Services
SCAN Associates Berhad
Seminar e‐Kerajaan Negeri Pulau Pinang
14 N 2013
14 Nov 2013
Agenda
•
•
•
•
•
•
What is Cloud Computing?
Cloud Security – Risks and Challenges
Mobile Security – Risks and Challenges
Securing Mobile & Cloud Implementations
Conclusion
References
2
What is Cloud Computing?
What the H*LL
What the H
LL is the cloud?
is the cloud?
Are we dead by cloud computing? Is Intel dead? There'd be no microprocessors in the cloud? Is Samsung dead? There'd be no memory in the cloud? Is Cisco dead because there's no networking in the cloud? Are we dead because there's no databases in the cloud, no applications in the cloud, no middleware in the cloud? The answer is no. All a cloud is computers in a network.
“We
We come in peace. come in peace.
We’re the cloud people. We are the peaceful people.”
It’s the democratization of computing
3
What is Cloud Computing?
• The delivery of computing as a service rather than a product, whereby shared resources, software, and
product, whereby shared resources, software, and information are provided to computers and other devices as a utility over a network (Internet) [wikipedia]
• Cloud ‐
Cl d an old new concept…
ld
– Parallel, distributed and grid computing have been around for a while:
• Scientists, governments, international organizations, military • Urban planning, weather forecasts, economic modelling, etc. – Now, cloud computing is a commodity
Now cloud computing is a commodity
• Who does not use the cloud nowadays? – Ready‐to‐go services
What is Cloud Computing?
5
What is Cloud Computing?
6
Models of Cloud Services
• Software as a Service (SaaS): software – CRM, email, games, virtual desktops CRM email games irt al desktops
– Google Apps, Salesforce CRM, Dropbox
• Platform
Platform as a Service (PaaS): computing or solution as a Service (PaaS): computing or solution
platform – operating systems, databases, web servers operating systems, databases, web servers
– Microsoft’s Azure, Google’s AppEngine. • Infrastructure as a Service (IaaS): computers (
)
p
(physical/virtual), storage, firewalls or networks – Amazon EC2, Rackspace Cloud
Cloud Services Providers
Security: Top Cloud Adoption Concerns
Source: Oxford Economics Study: Protecting the Cloud
Cloud Security: Shared Responsibility
On‐Premise
On‐Premise
(hosted)
IaaS
PaaS
SaaS
Application
Application
Application
Application
Application
Services
Services
Services
Services
Services
OS
OS
OS
OS
OS
VM
VM
VM
VM
VM
Server
Server
Server
Server
Server
Storage
Storage
Storage
Storage
Storage
Network
Network
Network
Network
Network
Organization has Control
Organization Shares Control Organization
Shares Control
with Vendor
Vendor has Control
Cloud Security Advantages
• Shifting public data to a external cloud reduces the exposure of the internal sensitive data
f h i
l
ii d
• Cloud homogeneity makes security auditing/testing simpler
i l
• Clouds enable automated security management
• Redundancy / Disaster Recovery
R d d
/ Di t R
11
Cloud Security: Top Threats 2013
•
Based on survey results of industry experts by the Cl d S
Cloud Security Alliance i Alli
(CSA)
Data Breaches
Data Loss
Account Hijacking
Insecure APIs
Denial of Service
Malicious Insiders
Abuse of Cloud Services
Insufficient Due Diligence
Shared Technology Issues
Shared Technology Issues
Cloud Security: Breach Methods
Hackingg
Malware
Physical Attacks
Social Tactics
Priviledge Misuse
0
20
40
60
80
100
% of Breaches
Source: 2012 Data Breach Investigations Report (Verizon/USSS)
Threat Evolution
Source: 2012 Data Breach Investigations Report (Verizon/USSS)
Hacking Methods
Default/guessable credentials
Stolen login credentials
Brute force/dictionary attacks
Exploit backdoor
Exploit backdoor
Exploit insufficient authentication
SQL Injection
Remote file inclusion
Abuse of functionality
Unknown
0
10
20
30
40
50
60
% of Breaches
Source: 2012 Data Breach Investigations Report (Verizon/USSS)
Some Interesting Observations
97%
96%
94%
Avoidable through simple or intermediate through simple or intermediate
controls
Were not highly difficult
Were not highly difficult
Of all data compromised involved servers
92%
85%
79%
Were discovered by a third
Were
discovered by a third party
Took weeks or more to discover
Were targets of opportunity
g
pp
y
Source: 2012 Data Breach Investigations Report (Verizon/USSS)
Cloud Security Challenges
• Exposure of data to foreign governments and data subpoenas US PRISM program
subpoenas –
US PRISM program
• Trusting vendor’s security implementations
• Customer inability to respond to audit findings
Customer inability to respond to audit findings
• Obtaining support for investigations
• Indirect administrator accountability
I di t d i i t t
t bilit
• Proprietary implementations can’t be examined
• Loss of physical control
L
f h i l
t l
17
Mobile Security: Value & Risks
• The world is mobile and cloudy and will be getting more so…
• Mobile applications can create tremendous values:
M bil
li i
d
l
– New classes of applications utilizing mobile capabilities: GPS, camera, etc
– Innovating applications for employees and citizens
Innovating applications for employees and citizens
• Mobile devices and mobile applications can create tremendous risks as well:
– Sensitive
Sensitive data inevitably stored on the device (email, data inevitably stored on the device (email
contacts)
– Connect to a lot of untrusted networks (carrier, Wi‐Fi)
• Most developers are new to creating mobile p
g
applications and therefore not trained to develop secure mobile applications
Mobile Security: Top Threats
Type of Threats
Threat Level
1
Data loss from lost, stolen or decommissioned devices
High
2
Information‐stealing mobile malware
High
3
Unsecured Wi‐Fi, network access and rogue access Unsecured
Wi‐Fi network access and rogue access
points
High
4
Unsecured or rogue app marketplaces
High
5
Data loss and data leakage through vulnerable apps
Data loss and data leakage through vulnerable apps
Medium
6
Vulnerabilities within devices, OS, design and third‐
party apps
Medium
7
IInsufficient management tools, capabilities and access ffi i t
tt l
biliti
d
to APIs
M di
Medium
8
NFC and proximity‐based hacking
Low
Mobile Security Challenges
Explosion of mobile devices
Mobile Apps
• How to control over the usage of the devices?
• How to keep track and manage the installations?
Data Management
• How to protect the data and critical information from being leaked out?
leaked out?
Ownership
• Who should monitor the use of mobile devices?
What needs to be secured Device
Lock
Data
Application
pp
Encryption
Rogue Applications
File Protection
Wipe
Data leakages
Management policies
policies Profiling
Visibility on Applications
Authentication
Locate
User
Controls over Applications
Location of the User
Security Threats Landscape
Security Threats
Human
Malicious
Outsider
p
Hackers, Script Kiddies, Spy
Insider
Di
Disgruntled staff
l d ff
Non‐Human
Non‐malicious
Hardware
Poorly Design, Backdoor
Software
Malware Bugs
Malware, Bugs
Natural Disaster
Fire, Flood etc
Securing Cloud & Mobile Implementations
1
6
Pl
Planning for security
i f
it
2
7
S
Secure infrastructure
i f t t
5
Establish organizational policies and standards
Protect data
4
3
Identify risks and threats (as discussed)
Mitigate the risks and threats
Enable compliance monitoring
8
Choose the right cloud service provider/mobile management solutions
management solutions.
1. Security Planning
1
Planning for security
• Consider the followings during planning stage:
1.
2.
3.
4.
5.
6.
7.
What are the business priorities?
Which workloads do you want to move to the cloud?
How sensitive is the data?
What cloud delivery model works best?
p
What about compliance?
How will the data flow?
How will users access data and applications?
2. Establish Policies And Standards
2
Establish organizational Establish
organizational
policies and standards
• P
Policies and standards is important as li i
d
d d i i
guidance and ensuring compliance
• Adopt international security standards & guidelines such as ISO27001 (ISMS), and industry best practices
• Establish a Bring
Establish a Bring‐Your‐Own‐Device
Your Own Device (BYOD) (BYOD)
policies for mobile devices
4. Mitigate the Risks & Threats
4
Mitigate the risks and Mitigate
the risks and
threats
•
Examples of security controls:
1.
Encrypt data that rests or moves in and out of both clouds.
both clouds.
2.
Control access by managing identities and manage API control points at the network edge
3.
Establish trusted compute pools to secure datacentre infrastructure and protect clients.
4
4.
Build higher assurance into compliance to Build
higher assurance into compliance to
streamline auditing and increase visibility into the cloud.
5. Implement Data Protection
5
Protect data
• Safeguard data throughout the Cloud by:
– Accelerate and strengthen encryption usage –
pervasive encryption
i
i
– Establish secure connections for transferring encrypted data.
– Reduce data loss through data loss prevention (DLP) policies and implementations
6. Securing Infrastructure
6
Secure infrastructure
Secure infrastructure
• Protect client, edge, and datacentre systems:
– Secure
Secure the clients to ensure that only the clients to ensure that only
authorized users can access the cloud and to guard endpoint devices against rootkit and other low‐level
other low
level malware attacks.
malware attacks
– Protect edge systems at the API level where external software interacts with the cloud environment.
environment
– Create a secure datacentre infrastructure that establishes trust between servers and between servers and clients
servers and clients.
7. Enable Compliance Monitoring
7
Enable compliance monitoring
• Build higher assurance into compliance:
– Build a trusted pools of servers, which form the f
foundation for compliance in both public and d i f
li
i b h bli
d
private clouds.
– Ensure the continued trustworthy status of the server pools with routine security assessments.
l
h
– Support audit and security management by making assessment results available to policy management, security information and event manager (SIEM), governance, risk management, and compliance solutions.
8. Choosing the Provider/Solution
8
Choose the right cloud service provider/mobile
service provider/mobile management solutions
• Make security a key aspect of service provider/solution evaluation criteria:
– Ensure that data and platform security are built into any offering.
– Seek evidence of data and platform protections (i.e. compliance) for the services/solutions offered
– Establish measurable, enforceable service level agreements (SLAs) for verification.
Conclusion
• Understand the security advantages, threats and challenges of cloud and mobile technology adoption
challenges of cloud and mobile technology adoption
• Understand the legal ramifications
• Establish organizational security policies
Establish organizational security policies
• Implement security processes
• Monitoring for compliance
M it i f
li
• Train the System Administrators and Software Developers
• Choose the “right” strategy and solutions for the business objectives
business objectives
31
Conclusion
• It should take only 20% of your efforts to secure 80% of your infrastructure
80% f
i f t t
• Security is never just about technology (hardware/software) or solution deployment alone, but also involves:
– policies (compliance), – processes (assessment & monitoring), – awareness, skills and knowledge (people).
Recent High Profile Security Breaches
Cloud & Mobile Security Reality Check
In the era of cloud and mobile computing, prevention is crucial and we shouldn’tt lose prevention is crucial, and we shouldn
lose
sight of that goal… BUT we must accept the fact that no barrier is impenetrable, and detection/response
represents an extremely critical line of defence. t
t
l iti l li
fd f
Therefore we should stop treating it Th
f
h ld t t ti it
(detection/response) like a backup plan if things go wrong, and start making it a core part of the plan
of the plan.
TTerima
i
K ih
Kasih.
Questions?
SCAN Associates Bhd
http://www.scan‐associates.net
“Thefirststeptowardchangeisawareness.Thesecond
stepisacceptance.”
‐ Nathaniel Branden
N th i l B d
Useful References
•
https://cloudsecurityalliance.org/
•
http://www.nist.gov/itl/cloud/
p //
g / /
/
•
https://www.owasp.org/index.php/OWASP_Mobile_Security_Project
•
https://www.intel.com/cloudsecurity
•
http://www.verizonenterprise.com/resources/reports/rp_data‐breach‐
htt
//
i
t
i
/
/
t/ d t b
h
investigations‐report‐2012_en_xg.pdf