0% found this document useful (0 votes)
71 views23 pages

Cloud Security Essentials Guide

Uploaded by

keerthanakkdk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views23 pages

Cloud Security Essentials Guide

Uploaded by

keerthanakkdk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

CLOUD

SECURITY
By Manoj Kumar (CISSP,
CCSP, CISA, CISM)
Content
 Introduction to Cloud Computing (Definition, Deployment and Service
models)
 Cloud Logical Structure
 Shared Responsibility Model
 Cloud Governance, Compliance and Audit Management
 Information Governance in Cloud
 Management Plan Security and BC/ DR in Cloud
 Infrastructure security in Cloud
 Containers Security
 Application Security in Cloud
 Data Security in cloud
 Identity and Access Management
 Common Risks in Cloud
 Important Resources related to Cloud Security
Introduction to Cloud Computing
NIST definition - Model for enabling ubiquitous, convenient, on-demand
network access to a shared pool of configurable computing resources that can be
rapidly provisioned and released with minimal management effort or service
provider interaction.

Essential Characteristics
 Broad Network Access
 On demand self service
 Resource pooling
 Rapid elasticity
 Measured Services

ISO adds multi-tenancy as well in essential characteristics


Introduction to Cloud Computing
Service Models

 Software as a Service – Office 365


 Platform as a Service - development or application platforms
 Infrastructure as a Service (IaaS) – compute, network or storage

Deployment Models
 Public Cloud – shared by multiple tenants
 Private Cloud – dedicated to one organisation
 Community Cloud – specific community
 Hybrid Cloud- combination of two or more deployment models
Introduction to Cloud Computing
Cloud Roles and Logical Structure
 Cloud service provider – who offers cloud services
 Cloud Customers – consumers of the services

Refer ISO 17788 and 17789 for more information

Logical Structure

 Infrastructure: core components compute, network, and storage.


 Metastructure: interface between the layers
 Infostructure: The data and information
 Applistructure: The applications deployed in the cloud and the underlying
application services used to build them
Shared Responsibility Model
 Sharing of security responsibilities by provider and consumer
 Depends upon the service/ deployment models & contract
 Not prescriptive but a guide for contract negotiation
Cloud Governance
 Governance is policy, process, and internal controls to run an
organization

 Cloud affects governance as introduce third party into the


process

 Organization can never outsource responsibility for governance

Tools for Governance


 Contracts – guarantee of commitment

 Supplier (cloud provider) Assessments – financial viability,


feedback from peers etc.

 Compliance reporting – SOC reports, CSA STAR registry


Compliance and Audit Management
 Compliance Management – shared responsibility;
customer may have to rely on third-party attestations for
provider compliances

 Audit Management – on- premises audit are very rare in


cloud;

 It’s important to remember that attestations and


certifications are point-in-time activities
Information Governance in
Cloud
Phases
 Create - whenever data is considered new
 Store – near term storage
 Use – when in active use
 Share – sharing of data
 Archive – long term storage
 Destroy – permanent destruction

Know about controls in each phase


Information Governance in Cloud

Challenges
 Multitenancy: shared infrastructure; untrusted tenants

 Shared security responsibility: know about the difference between data


custodianship and data ownership

 Jurisdictional boundaries and data sovereignty: broad network access, so


data can be hosted in more locations (jurisdictions)

 Compliance, regulations, and privacy policies : customer agreement may


not allow to share/use data on a cloud provider

 Destruction and removal of data: Ensuring the destruction and removal


of data in accordance with policy
Management Plan Security
Management plane – a major difference between traditional infrastructure and
cloud computing.

Best Practices for security:

 Use strong authentication and MFA.

 Maintain tight control of primary account holder/root account credentials

 Establishing account granularity to limit blast radius

 Use separate super administrator and day-to-day administrator accounts


instead of root/ primary account

 Consistently implement least privilege accounts


BC/ DR Considerations
Architecture for Take a risk-based
failure approach

Prepare for graceful


Backup
failure in case of a
Metastructure and its
cloud provider
configuration as well
outage

For super-high-
Design for high availability
availability within applications, start
your cloud provider with cross-location
BC before attempting
Infrastructure security in Cloud
Network

Prefer Software Defined Networking (SDN) when available.

Separate accounts and virtual networks dramatically limit blast radius

Implement default deny with cloud firewalls.

Apply cloud firewalls on a per-workload basis as opposed to a per-network


basis.

Minimize dependency on virtual appliances that restrict elasticity or cause


performance bottlenecks.
Infrastructure security in
Cloud
Compute/workload
Leverage immutable workloads whenever possible.

Choose security agents that are cloud-aware

Store logs external to workloads.

Understand and comply with cloud provider limitations on


vulnerability assessments and penetration testing
Configure hypervisors to isolate virtual machines from each
other
Containers Security
Container - a virtual execution environment that features an
isolated user space, but uses a shared kernel
Secure them by:
 Group containers of the same security contexts on the same
physical and/or virtual hosts.
 Ensuring that only approved, known, and secure container
images or code can be deployed.
 Appropriately securing the container
orchestration/management
 By Implementing appropriate role-based access controls
and strong authentication
Application Security in Cloud
 Understand the security capabilities of cloud providers
 Build security into the initial design process
 Consider moving to continuous deployment and
automating security into the deployment pipeline.
 Threat modeling, SAST, and DAST to be integrated.
 Use software-defined security to automate security
controls.
 Use event-driven security, when available, to automate
detection and remediation of security issues.
Application Security in Cloud
DevOps and CI/ CD pipeline:
Deeper integration of development and operations teams
through better collaboration and communications
Continuous Integration and/or Continuous Delivery
(CI/CD) through automated deployment pipelines
Security Advantages:
Standardization: With DevOps, anything that goes into
production is created by the CI/CD pipeline on approved
code and configuration templates.
Automated testing: variety of security testing can be
integrated into the CI/ CD pipeline
Immutable: CI/CD pipelines can produce master images for
virtual machines, containers, and infrastructure stacks very
quickly and reliably.
Data Security in Cloud

Know about various cloud storages and applicable threats

data security tools such as Cloud Access and Security


Keep
Brokers (CASB) and DLP etc.

provider’s data migration mechanisms (through TLS) to


Prefer
secure Cloud Data transfers

FIPS 140-2 certified Hardware Security Module (HSM)


Ensure that
are used for key storage and management etc.
cloud provider data security. In many cases it is more
Aware of secure than building your own, and comes at a lower
cost.
appropriate encryption option based on the threat model
Use
for your data, business, and technical requirements.
Identity and Access Management (IAM)
IAM – Enabling right individuals to access the right resources at
the right times for the right reasons (Gartner)

 Develop a comprehensive and formalized plan and processes for managing


identities and authorizations with cloud services.

 When connecting to external cloud providers, use federation, if possible, to


extend existing identity management.

 Cloud users should prefer MFA for all external cloud

 Privileged identities should always use MFA.

 Develop an entitlement matrix for each cloud provider and project, with an
emphasis on access to the metastructure and/or management plane.

 Prefer ABAC over RBAC for cloud computing.


Common Risks in Cloud
 Vendor Lock-In – over dependency on provider
 Ensure favorable contract terms for portability; avoid
proprietary formats; ensure there are no physical or technical
limitations to moving

 Vendor Lock-Out - when the cloud provider goes out of


business, is acquired by another company, or ceases operation
for any reason
 Check provider longevity, Core Competency, Jurisdictional
Suitability and Supply Chain Dependencies

 Information Bleed – cause of concern in multi-tenant


environment; there is the possibility that data belonging to one
customer will be read or received by another;
 Ensure proper segregation among multiple tenants
Common Risks in Cloud
 Lack of Audit Access - Reliance on a third party
 Ensure favorable contract terms for portability; avoid
proprietary formats;

 Contractual Failure - Poorly crafted contract lead to vendor


lock-in, unfavorable terms, lack of necessary services, and other
risks
 Consider full offsite secured backups

 Legal Seizure - Results in unannounced or unexpected loss or


disclosure of the organization's data
 Consider using encryption or possibly employing data
dispersion
Important Resources
related to Cloud Security
 Cloud Security Alliance (CSA)
 Security Guidance for Critical Areas of Focus in Cloud Computing
4.0 – Cloud Security Best Practices
 Cloud Controls Matrix (CCM) - cybersecurity control framework
for cloud computing aligned to the CSA best practices
 Consensus Assessment Initiative Questionnaire (CAIQ) - provides
a set of “yes or no” questions based on the security controls in
the CCM
 CSA STAR (Security, Trust, Assurance, and Risk) Registry -
publicly accessible registry that documents the security and
privacy controls provided by popular cloud computing
offerings
 CSA Pandemic Eleven – documents top ‘11’ threats related to
cloud computing
 European Union Agency for Cybersecurity (ENISA) Risk
Assessment

You might also like