SlideShare une entreprise Scribd logo
1  sur  25
Cloud and security,
the mys(t)ery revealed
Raf Cox – Managing Partner
Overview
Introduction
Types of cloud
Control versus security responsibility
Threats in the cloud
Some best practices securing your cloud
Industry Cloud Models
Infrastructure as a service
host
IaaS
Platform as a service
build
PaaS
Software as a service
consume
SaaS
Directory
Access control
Multi-factor authN
Rights mgmt
Cloud Security Concerns
 Where is my data located?
 Is the Microsoft cloud “secure”?
 Who can see my data?
 How do you make sure my company data follows “the rules”?
 What happens if…
“Cloudy with a chance of Rain”, The Economist
Cloud Security Model
 Less customer control, more trust on the provider
Physical
Network
Host
Application
Data
On-Premises
Customer
Microsoft
Physical
Network
Data
PaaS
Physical
Network
Host
Application
Data
SaaS
Host
Application
Physical
Application
Data
IaaS
Network
Host
Threats in the cloud: physical
Physical
Network
Hypervisor
Tenant 2Tenant 1
Internal
Azure
Management
Azure
Management
Azure
Management
Tenant 1
(corporate
network)
Azure
Mgmt
Tenant 1
(customers;
external employees)
vm stora
ge
site AD
vm stora
ge
site AD
Responsibilty?
Threats in the cloud: network
Physical
Network
Hypervisor
Tenant 2Tenant 1
Internal
Azure
Management
Azure
Management
Azure
Management
Tenant 1
(corporate
network)
Azure
Mgmt
Tenant 1
(customers;
external employees)
vm stora
ge
site AD
vm stora
ge
site AD
Examples:
• DNS Attack (spoofing)
• Network flooding
Responsibilty?
Threats in the cloud: management
Physical
Network
Hypervisor
Tenant 2Tenant 1
Internal
Azure
Management
Azure
Management
Azure
Management
Tenant 1
(corporate
network)
Azure
Mgmt
Tenant 1
(customers;
external employees)
vm stora
ge
site AD
vm stora
ge
site AD
Examples:
• Management workstations
compromised
• Admin account/certificate
compromised
Responsibilty?
Threats in the cloud: privacy
Physical
Network
Hypervisor
Tenant 2Tenant 1
Internal
Azure
Management
Azure
Management
Azure
Management
Tenant 1
(corporate
network)
Azure
Mgmt
Tenant 1
(customers;
external employees)
vm stora
ge
site AD
vm stora
ge
site AD
Examples:
• Local authorities at
datacenter-location
accessing your data
Responsibilty?
Threats in the cloud: admin misuse
Physical
Network
Hypervisor
Tenant 2Tenant 1
Internal
Azure
Management
Azure
Management
Azure
Management
Tenant 1
(corporate
network)
Azure
Mgmt
Tenant 1
(customers;
external employees)
vm stora
ge
site AD
vm stora
ge
site AD
Responsibilty?
Threats in the cloud: VM-escape
Physical
Network
Hypervisor
Tenant 2Tenant 1
Internal
Azure
Management
Azure
Management
Azure
Management
Tenant 1
(corporate
network)
Azure
Mgmt
Tenant 1
(customers;
external employees)
vm stora
ge
site AD
vm stora
ge
site AD
Responsibilty?
Threats in the cloud: exploiting unpatched
vulnerabities
Physical
Network
Hypervisor
Tenant 2Tenant 1
Internal
Azure
Management
Azure
Management
Azure
Management
Tenant 1
(corporate
network)
Azure
Mgmt
Tenant 1
(customers;
external employees)
vm stora
ge
site AD
vm stora
ge
site AD
Responsibilty?
Threats in the cloud: outgoing attacks
Physical
Network
Hypervisor
Tenant 2Tenant 1
Internal
Azure
Management
Azure
Management
Azure
Management
Tenant 1
(corporate
network)
Azure
Mgmt
Tenant 1
(customers;
external employees)
vm stora
ge
site AD
vm stora
ge
site AD
Responsibilty?
DataDefense in Depth
Approach
Physical
Application
Host
Network
 Strong storage keys for access control
 SSL support for data transfers between all parties
 Front-end .NET framework code running under partial
trust
 Windows account with least privileges
 Stripped down version of Windows Server 2008 OS
 Host boundaries enforced by external hypervisor
 Host firewall limiting traffic to VMs
 VLANs and packet filters in routers
 World-class physical security
 ISO 27001 and SAS 70 Type II certifications for datacenter
processes
Layer Defenses
Windows Azure Security Layers
Physical Security
 Physical Data Center SSAE 16/ISAE 3402 Attestation and ISO 27001
Certified
 Motion Sensors
 24x7 protected Access
 Biometric controlled access systems
 Video Camera surveillance
 Security breach alarms
Defenses Inherited by
Windows Azure Platform Applications
Spoofing
Tampering/
Disclosure
Elevation of
Privilege
Configurable
scale-out
Denial of
Service
VM switch
hardening
Certificate
Services
Shared-
Access
Signatures
HTTPS
Side
channel
protections
VLANs
Top of Rack
Switches
Custom
packet
filtering
Partial Trust
Runtime
Hypervisor
custom
sandboxing
Virtual
Service
Accounts
Repudiation
Monitoring
Diagnostics
Service
Information
Disclosure
HTTPS
Shared
Access
Signatures
Your responsibilities in the cloud
PaaS
SaaS
IaaS
Secure
Authentication
(multifactor authN)
Secure
Management
(limit nr of admins!)
Access
control Data
encryption
Application
Security
SDL Least
privilege
Pen-testing
Secure Configuration
(framework level)
Network access
Control (<ipsecurity>)
Patching!
Network access
Control (endpoint ACLs)
OS hardening
Site-to-site or
Point-to-site VPNs
Certs & storage keys
OS level authentication
Azure/O365 multifactor authentication
 Microsoft provides a multi-factor authentication solution (phonefactor.net)
 Multiple authentication solutions
 SMS (OTP or notification (push))
 Automated Call
 Multifactor authentication App (Windows Phone, Android & iOS)
 Cost: per user or per authentication
http://technet.microsoft.com/library/en-us/dn249471
Azure/O365 multifactor authentication
Azure/O365 network security
• Setup site-to-site VPN
• Setup point-to-site VPN
• Configure endpoints
• Set ACL on end-points
• Configure Access through
<ipsecurity> element in
web.config
(no config possible)
1 NIC
ONLY!
PaaS
SaaS
IaaS
Application Security threats
Application mitigations
 .Net framework provides numerous
mitigating functionality
 Request validation
 Header checking
 Anti XSS encoders
 Anti forgery tokens
 Strong session management
 …
 Some features are not enabled by default or require
some configuration
 One has to use them correctly and at the proper
moment
 Know the impact of certain settings
 Not every vulnerability can be covered by the .Net
framework
 Rely on 3rd party libraries
 Rely on own development
 Test your applications!
Call to action
Is the Microsoft Cloud a good choice ?
Review:
http://azure.microsoft.com/en-us/support/trust-center/
http://office.microsoft.com/en-001/business/office-365-trust-center-
cloud-computing-security-FX103030390.aspx
Check Certifications
Microsoft will not solve everything for you!
Make the right choice: IAAS – PAAS – SAAS
How can The Security Factory help?
 Development Security
 Secure development (SDLC) and training
 Application security testing
 Environment Security
 Security, authentication & authorization for cloud applications (Assessments, architecture,
design, testing)
 Protect you internal network
 Leverage existing investments
 Infrastructure security testing
 People Security
 Security awareness
 Social engineering testing
www.theSecurityFactory.be
Contact us
Raf Cox
The Security Factory
Veldkant – 2550 Kontich
raf.cox@cronos.be
www.theSecurityFactory.be

Contenu connexe

Plus de InspireX

Plus de InspireX (10)

Bringing critical applications to the cloud - Luc Bos
Bringing critical applications to the cloud - Luc BosBringing critical applications to the cloud - Luc Bos
Bringing critical applications to the cloud - Luc Bos
 
Fit for purpose and CTO - Jos Van Thillo
Fit for purpose and CTO - Jos Van ThilloFit for purpose and CTO - Jos Van Thillo
Fit for purpose and CTO - Jos Van Thillo
 
Release it! - Koen Maton
Release it! - Koen MatonRelease it! - Koen Maton
Release it! - Koen Maton
 
The social (r)evolution introduced by Generation y - Alexander Vanwynsberghe
The social (r)evolution introduced by Generation y - Alexander VanwynsbergheThe social (r)evolution introduced by Generation y - Alexander Vanwynsberghe
The social (r)evolution introduced by Generation y - Alexander Vanwynsberghe
 
Crm in a mobile world - Roeland Goossen
Crm in a mobile world - Roeland GoossenCrm in a mobile world - Roeland Goossen
Crm in a mobile world - Roeland Goossen
 
Identity is key - Robin Gorris
Identity is key - Robin GorrisIdentity is key - Robin Gorris
Identity is key - Robin Gorris
 
Big data, your data, all data - Frederik Vandeputte
Big data, your data, all data - Frederik VandeputteBig data, your data, all data - Frederik Vandeputte
Big data, your data, all data - Frederik Vandeputte
 
How v!go embraces windows 8 tables - Stefan Van de Poel
How v!go embraces windows 8 tables - Stefan Van de PoelHow v!go embraces windows 8 tables - Stefan Van de Poel
How v!go embraces windows 8 tables - Stefan Van de Poel
 
How to ‘embrace’ the cloud and become a hybrid organisation - Koen Van Oost
How to ‘embrace’ the cloud and become a hybrid organisation - Koen Van OostHow to ‘embrace’ the cloud and become a hybrid organisation - Koen Van Oost
How to ‘embrace’ the cloud and become a hybrid organisation - Koen Van Oost
 
25000 soccer players go digital - Erik Lenaerts
25000 soccer players go digital - Erik Lenaerts25000 soccer players go digital - Erik Lenaerts
25000 soccer players go digital - Erik Lenaerts
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Cloud and security, the mys(t)ery revealed! - Raf Cox

  • 1. Cloud and security, the mys(t)ery revealed Raf Cox – Managing Partner
  • 2. Overview Introduction Types of cloud Control versus security responsibility Threats in the cloud Some best practices securing your cloud
  • 3. Industry Cloud Models Infrastructure as a service host IaaS Platform as a service build PaaS Software as a service consume SaaS Directory Access control Multi-factor authN Rights mgmt
  • 4. Cloud Security Concerns  Where is my data located?  Is the Microsoft cloud “secure”?  Who can see my data?  How do you make sure my company data follows “the rules”?  What happens if… “Cloudy with a chance of Rain”, The Economist
  • 5. Cloud Security Model  Less customer control, more trust on the provider Physical Network Host Application Data On-Premises Customer Microsoft Physical Network Data PaaS Physical Network Host Application Data SaaS Host Application Physical Application Data IaaS Network Host
  • 6. Threats in the cloud: physical Physical Network Hypervisor Tenant 2Tenant 1 Internal Azure Management Azure Management Azure Management Tenant 1 (corporate network) Azure Mgmt Tenant 1 (customers; external employees) vm stora ge site AD vm stora ge site AD Responsibilty?
  • 7. Threats in the cloud: network Physical Network Hypervisor Tenant 2Tenant 1 Internal Azure Management Azure Management Azure Management Tenant 1 (corporate network) Azure Mgmt Tenant 1 (customers; external employees) vm stora ge site AD vm stora ge site AD Examples: • DNS Attack (spoofing) • Network flooding Responsibilty?
  • 8. Threats in the cloud: management Physical Network Hypervisor Tenant 2Tenant 1 Internal Azure Management Azure Management Azure Management Tenant 1 (corporate network) Azure Mgmt Tenant 1 (customers; external employees) vm stora ge site AD vm stora ge site AD Examples: • Management workstations compromised • Admin account/certificate compromised Responsibilty?
  • 9. Threats in the cloud: privacy Physical Network Hypervisor Tenant 2Tenant 1 Internal Azure Management Azure Management Azure Management Tenant 1 (corporate network) Azure Mgmt Tenant 1 (customers; external employees) vm stora ge site AD vm stora ge site AD Examples: • Local authorities at datacenter-location accessing your data Responsibilty?
  • 10. Threats in the cloud: admin misuse Physical Network Hypervisor Tenant 2Tenant 1 Internal Azure Management Azure Management Azure Management Tenant 1 (corporate network) Azure Mgmt Tenant 1 (customers; external employees) vm stora ge site AD vm stora ge site AD Responsibilty?
  • 11. Threats in the cloud: VM-escape Physical Network Hypervisor Tenant 2Tenant 1 Internal Azure Management Azure Management Azure Management Tenant 1 (corporate network) Azure Mgmt Tenant 1 (customers; external employees) vm stora ge site AD vm stora ge site AD Responsibilty?
  • 12. Threats in the cloud: exploiting unpatched vulnerabities Physical Network Hypervisor Tenant 2Tenant 1 Internal Azure Management Azure Management Azure Management Tenant 1 (corporate network) Azure Mgmt Tenant 1 (customers; external employees) vm stora ge site AD vm stora ge site AD Responsibilty?
  • 13. Threats in the cloud: outgoing attacks Physical Network Hypervisor Tenant 2Tenant 1 Internal Azure Management Azure Management Azure Management Tenant 1 (corporate network) Azure Mgmt Tenant 1 (customers; external employees) vm stora ge site AD vm stora ge site AD Responsibilty?
  • 14. DataDefense in Depth Approach Physical Application Host Network  Strong storage keys for access control  SSL support for data transfers between all parties  Front-end .NET framework code running under partial trust  Windows account with least privileges  Stripped down version of Windows Server 2008 OS  Host boundaries enforced by external hypervisor  Host firewall limiting traffic to VMs  VLANs and packet filters in routers  World-class physical security  ISO 27001 and SAS 70 Type II certifications for datacenter processes Layer Defenses Windows Azure Security Layers
  • 15. Physical Security  Physical Data Center SSAE 16/ISAE 3402 Attestation and ISO 27001 Certified  Motion Sensors  24x7 protected Access  Biometric controlled access systems  Video Camera surveillance  Security breach alarms
  • 16. Defenses Inherited by Windows Azure Platform Applications Spoofing Tampering/ Disclosure Elevation of Privilege Configurable scale-out Denial of Service VM switch hardening Certificate Services Shared- Access Signatures HTTPS Side channel protections VLANs Top of Rack Switches Custom packet filtering Partial Trust Runtime Hypervisor custom sandboxing Virtual Service Accounts Repudiation Monitoring Diagnostics Service Information Disclosure HTTPS Shared Access Signatures
  • 17. Your responsibilities in the cloud PaaS SaaS IaaS Secure Authentication (multifactor authN) Secure Management (limit nr of admins!) Access control Data encryption Application Security SDL Least privilege Pen-testing Secure Configuration (framework level) Network access Control (<ipsecurity>) Patching! Network access Control (endpoint ACLs) OS hardening Site-to-site or Point-to-site VPNs Certs & storage keys OS level authentication
  • 18. Azure/O365 multifactor authentication  Microsoft provides a multi-factor authentication solution (phonefactor.net)  Multiple authentication solutions  SMS (OTP or notification (push))  Automated Call  Multifactor authentication App (Windows Phone, Android & iOS)  Cost: per user or per authentication http://technet.microsoft.com/library/en-us/dn249471
  • 20. Azure/O365 network security • Setup site-to-site VPN • Setup point-to-site VPN • Configure endpoints • Set ACL on end-points • Configure Access through <ipsecurity> element in web.config (no config possible) 1 NIC ONLY! PaaS SaaS IaaS
  • 22. Application mitigations  .Net framework provides numerous mitigating functionality  Request validation  Header checking  Anti XSS encoders  Anti forgery tokens  Strong session management  …  Some features are not enabled by default or require some configuration  One has to use them correctly and at the proper moment  Know the impact of certain settings  Not every vulnerability can be covered by the .Net framework  Rely on 3rd party libraries  Rely on own development  Test your applications!
  • 23. Call to action Is the Microsoft Cloud a good choice ? Review: http://azure.microsoft.com/en-us/support/trust-center/ http://office.microsoft.com/en-001/business/office-365-trust-center- cloud-computing-security-FX103030390.aspx Check Certifications Microsoft will not solve everything for you! Make the right choice: IAAS – PAAS – SAAS
  • 24. How can The Security Factory help?  Development Security  Secure development (SDLC) and training  Application security testing  Environment Security  Security, authentication & authorization for cloud applications (Assessments, architecture, design, testing)  Protect you internal network  Leverage existing investments  Infrastructure security testing  People Security  Security awareness  Social engineering testing www.theSecurityFactory.be
  • 25. Contact us Raf Cox The Security Factory Veldkant – 2550 Kontich raf.cox@cronos.be www.theSecurityFactory.be