SlideShare a Scribd company logo
1 of 22
REBUILDING FOR
THE CLOUD

HOW CLOUD ARCHITECTURE CAN IMPROVE
APPLICATION SECURITY
INTRO
AGENDA
Definitions (brief, I promise)
Cloud Benefits
Cloud Security Concepts
Moving applications to the cloud, wrong way
Moving applications to the cloud, right way
Please do ask questions!
CLOUD [kloud]
noun
NIST Definition (AKA SP800-145)
  •   On demand, self-service
  •   Broad network access
  •   Resource pooling
  •   Rapid elasticity
  •   Measured (read: billable) service
INFORMATION SECURITY
[in-fer-mey-shuhn si-kyoor-i-tee]
noun
Protecting information and information systems from
unauthorized access, use, disclosure, disruption,
modification, perusal, inspection, recording or destruction.


See Also: Job Security
Artist: Tyler, 11. Dortmund, Germany
CLOUD BENEFITS
Main benefit: Flexibility


Possible benefit: Cost savings
CLOUD SECURITY
CLIFF NOTES


• Trust nobody
• Encrypt everything
• Expect service issues
WHAT’S WRONG WITH FORKLIFTING?
FORKLIFTING…
“Datacenter” application to the cloud:
• Can’t trust what you used to
• Datacenter apps usually not flexible
• Confidentiality, Integrity, Availability all handled differently
ENTERPRISE vs CLOUD
HOW ABOUT PAAS?
LEVERAGING CLOUD
ARCHITECTURE
How can we (gently) re-architect to take advantage of the
cloud?
• Network
• Web server
• Application Server
• Database server
• Don’t forget audit/forensics!
NETWORK
Good: Limit by IP


Better: Allow administration via
VPN only


Best: Admin interface on separate
host, VPN only




                                    Artist: Jonathan, Age 7 Heidelberg, Germany
WEB/APP SERVER
Good: Load balancing, “Basic” hardening (IP ACLs, only
accept GET/POST, server tuned for large loads). SSL’s cheap
nowadays


Better: Build Web Application Firewalls and reverse caches
into your IaaS (mod_security’s free)


Best: Use 3rd party services to handle load and minimize
security issues (CDNs like Akamai, Cloudflare)


Required: Input filtering, output encoding.
DATASTORE
Good: Place DBs on separate host from application.


Better: Place DBs in separate datacenters, and replicate


Best: Migrate to a “NOSQL” datastore (Cassandra, MongoDB,
ElasticSearch)


Required: Encrypt data-at-rest
NOSQL SECURITY?
• Many NOSQL systems turn off
  even authentication
• Data labeling or granular access
  needs to be handled in
  application.




                                     Artist: Luca, Italy
INTER-PROCESS
COMMUNICATION
                  Good: Whatever you’ve dreamt up,
                  (cloud bullhorn?) at least encrypt it.


                  Better: Use open protocols for
                  communication between nodes.
                  Make sure encryption is enabled!


                  Best: Consider using message
                  queues.


   Required, in case you missed it: encryption.
LOGGING & FORENSICS
What happens to logs when our scalable architecture…
scales down?


Cloud really really requires centralized logging, monitoring,
and management.


Also, consider erase vs. overwrite
WHAT HAVE WE
BUILT?
• Scalable solution
• No single point of failure
• Healthy caution of all those around us (filtering/encoding)
• Data stored and transmitted safely
• And a nice set of audit logs for when Bad Things happen
LEARN MORE
Cloud Security Alliance
OWASP Cloud top 10
THANKS AND
CONTACT INFO

“Bad People” drawings from http://badpeopleproject.org


Follow me on twitter: @johnlkinsella

More Related Content

Viewers also liked

Recent advances in arch wires
Recent advances in arch wiresRecent advances in arch wires
Recent advances in arch wires
Ajinkya Patel
 

Viewers also liked (8)

How to Perform A/B Testing?
How to Perform A/B Testing?How to Perform A/B Testing?
How to Perform A/B Testing?
 
Recent advances in arch wires
Recent advances in arch wiresRecent advances in arch wires
Recent advances in arch wires
 
Aortic arch final.ppt
Aortic arch final.pptAortic arch final.ppt
Aortic arch final.ppt
 
Arch expansion with fixed appliance technique
Arch expansion with fixed appliance techniqueArch expansion with fixed appliance technique
Arch expansion with fixed appliance technique
 
An introduction to arches
An introduction to archesAn introduction to arches
An introduction to arches
 
Lintels and arches in construction
Lintels and arches in constructionLintels and arches in construction
Lintels and arches in construction
 
Netflix JavaScript Talks - Scaling A/B Testing on Netflix.com with Node.js
Netflix JavaScript Talks - Scaling A/B Testing on Netflix.com with Node.jsNetflix JavaScript Talks - Scaling A/B Testing on Netflix.com with Node.js
Netflix JavaScript Talks - Scaling A/B Testing on Netflix.com with Node.js
 
Architecture Governance in Brief
Architecture Governance in BriefArchitecture Governance in Brief
Architecture Governance in Brief
 

More from John Kinsella

More from John Kinsella (11)

Removing the Burden of Securing Microservices Through Automation and Visibility
Removing the Burden of Securing Microservices Through Automation and VisibilityRemoving the Burden of Securing Microservices Through Automation and Visibility
Removing the Burden of Securing Microservices Through Automation and Visibility
 
2019 Infosec World Keynote
2019 Infosec World Keynote2019 Infosec World Keynote
2019 Infosec World Keynote
 
An In-depth look at application containers
An In-depth look at application containersAn In-depth look at application containers
An In-depth look at application containers
 
Understanding container security
Understanding container securityUnderstanding container security
Understanding container security
 
Docker security configuration
Docker security configurationDocker security configuration
Docker security configuration
 
A (fun!) Comparison of Docker Vulnerability Scanners
A (fun!) Comparison of Docker Vulnerability ScannersA (fun!) Comparison of Docker Vulnerability Scanners
A (fun!) Comparison of Docker Vulnerability Scanners
 
CloudStack and the HeartBleed vulnerability
CloudStack and the HeartBleed vulnerabilityCloudStack and the HeartBleed vulnerability
CloudStack and the HeartBleed vulnerability
 
Dont break the glass
Dont break the glassDont break the glass
Dont break the glass
 
CloudStack Secured
CloudStack SecuredCloudStack Secured
CloudStack Secured
 
Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...
Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...
Truly Secure: The Steps a Security Practitioner Took to Build a Secure Public...
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Rebuilding for the cloud - How Cloud Architeture Can Improve Application Security

  • 1. REBUILDING FOR THE CLOUD HOW CLOUD ARCHITECTURE CAN IMPROVE APPLICATION SECURITY
  • 3. AGENDA Definitions (brief, I promise) Cloud Benefits Cloud Security Concepts Moving applications to the cloud, wrong way Moving applications to the cloud, right way Please do ask questions!
  • 4. CLOUD [kloud] noun NIST Definition (AKA SP800-145) • On demand, self-service • Broad network access • Resource pooling • Rapid elasticity • Measured (read: billable) service
  • 5. INFORMATION SECURITY [in-fer-mey-shuhn si-kyoor-i-tee] noun Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. See Also: Job Security
  • 6. Artist: Tyler, 11. Dortmund, Germany
  • 7. CLOUD BENEFITS Main benefit: Flexibility Possible benefit: Cost savings
  • 8. CLOUD SECURITY CLIFF NOTES • Trust nobody • Encrypt everything • Expect service issues
  • 9. WHAT’S WRONG WITH FORKLIFTING?
  • 10. FORKLIFTING… “Datacenter” application to the cloud: • Can’t trust what you used to • Datacenter apps usually not flexible • Confidentiality, Integrity, Availability all handled differently
  • 13. LEVERAGING CLOUD ARCHITECTURE How can we (gently) re-architect to take advantage of the cloud? • Network • Web server • Application Server • Database server • Don’t forget audit/forensics!
  • 14. NETWORK Good: Limit by IP Better: Allow administration via VPN only Best: Admin interface on separate host, VPN only Artist: Jonathan, Age 7 Heidelberg, Germany
  • 15. WEB/APP SERVER Good: Load balancing, “Basic” hardening (IP ACLs, only accept GET/POST, server tuned for large loads). SSL’s cheap nowadays Better: Build Web Application Firewalls and reverse caches into your IaaS (mod_security’s free) Best: Use 3rd party services to handle load and minimize security issues (CDNs like Akamai, Cloudflare) Required: Input filtering, output encoding.
  • 16. DATASTORE Good: Place DBs on separate host from application. Better: Place DBs in separate datacenters, and replicate Best: Migrate to a “NOSQL” datastore (Cassandra, MongoDB, ElasticSearch) Required: Encrypt data-at-rest
  • 17. NOSQL SECURITY? • Many NOSQL systems turn off even authentication • Data labeling or granular access needs to be handled in application. Artist: Luca, Italy
  • 18. INTER-PROCESS COMMUNICATION Good: Whatever you’ve dreamt up, (cloud bullhorn?) at least encrypt it. Better: Use open protocols for communication between nodes. Make sure encryption is enabled! Best: Consider using message queues. Required, in case you missed it: encryption.
  • 19. LOGGING & FORENSICS What happens to logs when our scalable architecture… scales down? Cloud really really requires centralized logging, monitoring, and management. Also, consider erase vs. overwrite
  • 20. WHAT HAVE WE BUILT? • Scalable solution • No single point of failure • Healthy caution of all those around us (filtering/encoding) • Data stored and transmitted safely • And a nice set of audit logs for when Bad Things happen
  • 21. LEARN MORE Cloud Security Alliance OWASP Cloud top 10
  • 22. THANKS AND CONTACT INFO “Bad People” drawings from http://badpeopleproject.org Follow me on twitter: @johnlkinsella

Editor's Notes

  1. Service: Infrastructure, Platform, Software as a serviceDeployment: Private, community, public, hybrid
  2. So for each one of these things I’ll try to break it down into GOOD – BETTER – BEST.
  3. Some of these points fit better for IaaS, this is one of them
  4. Load balancing – linux virtual server“best” – I’m expecting/wanting resistance to some of these points – I believe CDN/NoSQL/Message Queues have security value from a scalability POV, but they’re not slam-dunk arguments.
  5. RabbitMQ or ActiveMQ