49
www.enisa.europa.eu Cloud Computing Security ENISA Daniele Catteddu, CISM, CISA Convegno Associazione Italiana Information Systems Auditors

Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Cloud Computing Security

ENISA Daniele Catteddu, CISM, CISA

Convegno Associazione Italiana Information Systems Auditors

Page 2: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Agenda

Introduction to ENISA

ENISA objectives in Cloud computing

Reaching the objectives

2009

Benefits, risks and recommendations for InfoSec

Cloud Information Assurance Framework

2010

Security and resilience in Gov clouds: achieving an informed decision

Conclusions

Page 3: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

ENISA: Who are we?

3

The European Network & Information Security Agency (ENISA) was formed in 2004.

The Agency is a Centre of Expertise that supports the Commission and the EU Member States in the area of information security.

We facilitate the exchange of information between EU institutions, the public sector and the private sector.

Page 4: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Focus

ENISA assists Member States and the Commission in global issues that affect the European Community as a whole.

ENISA contribute to the harmonization of appropriate technical and organizational security measures by providing expert advice.

This is an advisory role and the focus is on prevention and preparedness.

ENISA does NOT have any operational responsibilities either within the EU institutional framework or with respect to Member States.

ENISA has no special role in the security process protecting EU institutions.

Page 5: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

What is cloud computing – ENISA’s understanding

Highly abstracted hw sw resources

Near instant scalability and flexibility

Near instantaneous provisioning

Shared resources (hardware, database, memory, etc...)

‘Service On demand’, usually with a ‘pay as you go’ billing system

Programmatic management (e.g. through Web Services API)

Page 6: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Cloud computing is not a new technology

Cloud computing is a new business model

It is a way of delivering computing resources

What is cloud computing – ENISA’s understanding

Page 7: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

ENISA Cloud Computing Objectives

7

Help business and governments to reap the costand security benefits of cloud computing.

While maintaining service availability, dataconfidentiality, integrity and privacy.

Page 8: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu 8

Creating trust and trustworthiness throughpromoting best practice and assurance standards

ENISA Cloud Computing Objectives

Page 9: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu 9

Improving transparency

ENISA Cloud Computing Objectives

Page 10: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu 10

Recommending smart investment in R&D

ENISA Cloud Computing Objectives

Page 11: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Reaching the objectives

11

ENISA Deliverables and Ongoing Activities

Cloud Computing: Benefits, Risks and Recommendations for Information security 2009

Assurance framework 2009

Research Recommendations 2009

Gov-Cloud security and resilience analysis (2010)

Common Assurance Maturity Model(CAMM) consortium 2010

2011 (proposed) procurement and monitoring guidance for government cloud contracts.

Page 12: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Cloud Computing: Benefits, Risks and Recommendations for Information security

12

Page 13: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Highlights from the report

13

27 experts involved

Mainly based on an SMEs requirements

8 security benefits

53 vulnerabilities considered

24 cloud specific risks identified

Information Assurance (framework), Legal and Research recommendations

Page 14: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu 14

Security

Benefits

Page 15: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Economy of Scale

Page 16: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Economies of scale and Security

All kinds of security measures are cheaper when implemented on a larger scale

(e.g. filtering, patch management, hardening of virtual machine instances and hypervisors, etc)

The same amount of investment in security buys better protection.

Page 17: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Other benefits of scale

Multiple locations by default -> redundancy and failure independence

Edge networks: content delivered or processed closer to its destination

Staff specialization & experience

Cloud providers big enough to hire specialists in dealing with specific security threats.

Page 18: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Improved management of updates and defaults

Updates can be rolled out much more rapidly across a homogenous platform

Default VM images and software modules can be updated with the latest patches and security settings

Snapshots of virtual infrastructure (in IaaS) to be taken regularly and compared with a security baseline.

Page 19: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

The Risks

Page 20: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Very high value assets

Most risks are not new, but they are amplified by resource concentration

Trustworthiness of insiders.

Hypervisors - hypervisor layer attacks on virtual machines are very attractive.

More Data in transit (Without encryption?)

Management interfaces – big juicy targets

Page 21: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Loss of Governance

The client cedes control to the Provider on a number of issues effecting security:

External pen testing not permitted.

Very limited logs available.

Usually no forensics service offered

No information on location/jurisdiction of data.

Outsource or sub-contract services to third-parties (fourth parties?)

SLAs may not offer a commitment to provide the above services, thus leaving a gap in security defences.

Page 22: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Lock in

Few tools, procedures or standard formats for data and service portability.

Difficult to migrate from one provider to another, or to migrate data and services to or from an in-house IT environment.

Potential dependency of service provision on a particular CP.

Page 23: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Compliance Challenges

Cloud Provider cannot provide evidence of their own compliance to the relevant requirements

Cloud Provider does not permit audit by the Cloud Customer

In certain cases, using a cloud implies certain kind of compliance cannot be achieved

Page 24: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Legal and contractual risks

Data in multiple jurisdictions, some of which may be risky.

Lack of compliance with EU Data Protection Directive

Potentially difficult for the customer (data controller) to check the data handling practices of the provider

Multiple transfers of data exacerbated the problem

Subpoena and e-discovery

Confidentiality and Non-disclosure

Intellectual Property

Risk Allocation and limitation of liability

Page 25: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Isolation failure

Storage (e.g. Side channel attacks see http://bit.ly/12h5Yh)

Memory

Virtual machines

Entropy pools (http://bit.ly/41sIiN)

Resource use (e.g. Bandwidth)

Page 26: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

RESOURCE EXHAUSTION

Denial of Service Freak eventsResource allocation algos

Caused by:

Overbooking Underbooking

Page 27: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Key management

Key management is (currently) the responsibility of the cloud customer

Key provisioning and storage is usually off-cloud

One key-pair per machine – doesn’t scale to multiple account holders/RBAC

Credential recovery sometimes available through management interface (protected by UN/PWD by)

Copies of VM images may contain keys if not well-managed

Page 28: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Recommendations2009

28

Page 29: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Increasing transparency through

a minimum baseline for:

comparing cloud offers

assessing the risk to go Cloud

reducing audit burden for CP

and security risks

Cloud Information Assurance Framework

Page 30: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Cloud Information Assurance Framework

An example

• Network architecture controls

• Well-defined controls are in place to mitigate DDoS (distributed denial–of-service)attacks e.g.

o Defence in depth (traffic throttling, packet black-holing, etc..)

o Defences are in place against ‘internal’ (originating from the cloud providersnetworks) attacks as well as external (originating from the Internet or customernetworks) attacks.

• Measures are specified to isolate resource usage between accounts for virtualmachines, physical machines, network, storage (e.g., storage area networks),management networks and management support systems, etc.

• The architecture supports continued operation from the cloud when the customer isseparated from the service provider and vice versa (e.g., there is no criticaldependency on the customer LDAP system).

Page 31: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Research recommendations -2009

BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds

Return on security investments (ROSI) the measures cloud computing can enable to improve the accuracy of ROI for security

Techniques for increasing transparency while maintaining appropriate levels of security

Tagging, e.g., location tagging, data type tagging, policy tagging

Privacy preserving data provenance systems, e.g., tracing data end-to-end through systems

End-to-end data confidentiality in the cloud and beyond:

Encrypted search (long term)

Encrypted processing schemes (long term)

Encryption and confidentiality tools for social applications in the cloud

Higher assurance clouds, virtual private clouds, etc

Page 32: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Research recommendations - 2009

DATA PROTECTION IN LARGE-SCALE CROSS-ORGANIZATIONAL SYSTEMS The following areas require further research with respect to cloud computing:

Data destruction and lifecycle management

Integrity verification - of backups and archives in the cloud and their version management

Incident handling - monitoring and traceability

Dispute resolution and rules of evidence

International differences in relevant regulations, including data protection and privacy

Legal means to facilitate the smooth functioning of multi-national cloud infrastructures

Automated means to mitigate problems with different jurisdictions.

Page 33: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Governments recommendations 2009

Public clouds are (usually) not suitable for critical government applications.

Clearly define international differences in DP legislation.

Should there be breach notification requirements on cloud providers.

...

Page 34: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu 34

2010 - Government towards the Cloud

Page 35: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Governments and the Cloud

35

UK

DK

USA

Singapore

Japan

Australia

Gov Agencies and Public Organizations around the globe are moving non-critical applications towards a "cloud approach".

In Europe we have some fast adopters, i.e. Denmark and UK, announcing/planning to move into the cloud.

In the short-medium term (1 to 3 years) an increasing number of Public Organizations, in EU Member States, will consider/adopt cloud computing.

...

Page 36: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

2010 – Security and resilience in Gov clouds: achieving an informed decision

Page 37: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Objectives and scope

to support MSs in elaborating their cloud strategy

to guide Public Bodies in defining their risk profile

to evaluate S.W.O.T. of cloud computing

to provide good practices

The main focus is the impact on resilience and security of services.

Page 38: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu 38

3 scenarios considered:

a local healthcare authority implementing the electronic healthcare records and other e-services,

a local public administration rolling out new services for the citizens and rationalizing internal IT services, and finally,

a Ministry planning the creation of governmental cloud as a business incubator

Security and resilience in Gov clouds: achieving an informed decision

Page 39: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Business/Operational,

Legal and Regulatory

requirements

Security and Resilience

requirements

IT services – architectural

options and delivery

models

COMPARATIVE RISK

ASSESSMENT

(SWOT or RISK ANALYSIS &

ASSESSMENT)

Select

IT solution

Identify threats,

weaknesses

Select

Partner-Provider

Prepare Request for

Proposal (RpF)

Risk treatment

Page 40: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Security and Resilience parameters

PreparednessRisk Analysis and Assessment

Prevention and Detection

Patch Management

Access Control and Accountability

Supply Chain

Business continuity

Service DeliveryAvailability and Reliability

Scalability and Elasticity

Cloud Access

Recovery and response

Legal and regulatory compliance

Page 41: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Strengths Community Cloud

Common requirements and constraints and risks

More bargaining power as a group (with the cloud provider)

Ability to be a walled garden

Membership vetting according to the trustworthiness of the candidate

If based on federation -> edge networks

Private Cloud

Full transparency and control over legal requirements (e.g. Geography)

Ability to implement your own practices (e.g. risk analysis and assessment)

Possibility to fully monitor all security events,

BCP testing

Auditablilty

Priority in service resumption

Public Cloud

Strong security and resilience capabilities (e.g. prevention and detection, patch management, availability and reliability, tolerance and elasticity, performance, response and recovery, business continuity and physical security

CAVEAT: these strength are directly related with the scale of the provider

Page 42: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Weaknesses

Community Cloud

difficult to agree on security baselines, the client-based common logging formats, etc

compared to a private cloud, you are a bigger target.

access control and authentication are weakened

Private Cloud

no advantage of economies of scale

potentially less tolerance to malicious attacks

less comprehensive redundancy regime,

no geo-redundancy

less flexibility

Public Cloud

lack of control on the access control systems,

the lack accountability (audits are not allowed).

you need negotiations power to be able to ask the right info the provider.

external forensics very difficult

geo location constrains as a weakness: data cannot leave the country

Page 43: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

OpportunitiesCommunity Cloud

common ToR and security policies, standards etc...

Potential flexibility of security policies

closedness – e.g. more strict security

Public Cloud

Risk Analysis and Assessment, Penetration testing, Real time security monitoring

In order for a public cloud to take advantage of these opportunities a the following measure should be in place: 1) full control on asset inventory, 2) detailed physical assets, information and services classification, 3) integration between risk analysis/assessment and real time security monitoring processes, 4) effective screening of employees

Public Cloud

In a private cloud, users and applications oriented monitoring mechanisms can be implemented making possible a quick adjustment of resources to meet peaks in the demand. Furthermore, security events of interest can be fully monitored.

Page 44: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

ThreatsCommunity Cloud

Lack of exit criteria

Community might grow too quickly

Harder to predict resource usage (than private cloud)

Failure of isolation mechanisms (not compared to public)

Difficulty of identifying the legal entity

Public Cloud

Lack of legal and regulatory compliance (data retention, forensics, reporting).

Attractive target for criminals and Insiders

Isolation failure, information leakage, illegal monitoring

Lack of linkability and accountability in case illegal activities

poor requirements definition and asset classification.

You might incur in supplementary – multiple jurisdiction

Change of control (Risk of provider acquisition)

Private Cloud

politically motivated attacks

damages to reputation

Big brother effect

Poor requirements definition and asset classification may results in loss of security and integrity when scaling from a private cloud to an hybrid one.

Inadequate definition of the contracts with business partner(s) and lack of monitoring of the contract execution may be critical in relation with the size of the provider.

Page 45: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Key messages

Private and community clouds appear to be the solution that best fits the needs of public bodies

they offer the highest level of governance, control and visibility.

Baer in mind that if a private/community cloud does not reach the necessary infrastructural critical mass, most of the resilience and security benefits of the cloud model will not be realised.

Public cloud is the option that offers potentially the highest level of service availability at lowest cost

but currently its adoption should be limited to non sensitive applications and in the context of a defined strategy for cloud adoption which should include a clear exit strategy.

Page 46: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Conclusions

Cloud computing can represent an improvement in security and resilience

Transparency is crucial: users must be given a means to assess and compare provider security practices

In the current state of the art, migrating critical and sensitive applications and data to the cloud is still very risky

Much more effort is required to achieve security levels required for higher assurance applications in the cloud

For once we can build security in by design, let’s not miss the chance

Page 47: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

The Penultimate Slide

Watch out for the results of ENISA’s cloudsecurity study – out end of November(http://www.enisa.europa.eu)

Page 48: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

The Final Slide

Contact:Daniele Catteddu [email protected]

Page 49: Cloud Computing Security - AIEA · BUILDING TRUST IN THE CLOUD Certification processes and standards for clouds Return on security investments (ROSI) the measures cloud computing

www.enisa.europa.eu

Daniele Catteddu [email protected]

European Network and Information Security AgencyScience and Technology Park of Crete (ITE)P.O. Box 130971001 Heraklion - Crete – Greece

www.enisa.europa.eu

Contact