0% found this document useful (0 votes)
20 views30 pages

Chapter 6

Uploaded by

Notes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views30 pages

Chapter 6

Uploaded by

Notes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

Cloud Computing

Concept, Technology &


Architecture
C HA P T E R 06
FUNDAMENTAL CLOUD SECURITY

12/9/2023
3
Contents

⚫ This chapter introduces terms and concepts that address basic


information security within clouds, and then concludes by defining a
set of threats and attacks common to public cloud environments.
 6.1 Basic Terms and Concepts

 6.2 Threat Agents

 6.3 Cloud Security Threats

 6.4 Additional Considerations

12/9/2023
4
6.1. Basic Terms and Concepts

 Information security is a complex ensemble of


 techniques,

 technologies, regulations, and

 Behaviors

 that collaboratively protect the integrity of and


access to computer systems and data.
 IT security measures aim to defend against threats
and interference that arise from both malicious intent
and unintentional user error.
12/9/2023
5
6.1. Basic Terms and Concepts(2)

I A
12/9/2023
6
Confidentiality

 The characteristic of something being made accessible only to


authorized parties.
Within cloud
environments,
confidentiality
primarily pertains
to restricting
access to data in
transit and storage

12/9/2023
7
Integrity

 The characteristic of not having been altered by an unauthorized


party.

12/9/2023
8
Authenticity

 The characteristic of something having been provided


by an authorized source. This also encompasses non-
repudiation.
 Non-repudiation?
 The inability ofa party to deny or challenge the
authentication of an interaction.

12/9/2023
Authenticity records proof
of sending a file or message,
by an authenticated person,
When the file is receiced at
receiver end, it creates a
record of access to that file
12/9/2023
9
Other Relevant Terms

 Availability - being accessible and usable during a specified


time period.
 Threat - a potential security violation that can challenge
defenses in an attempt to breach privacy and/or cause harm.
 Vulnerabilities - a weakness that can be exploited either
because it is protected by insufficient security controls.
 Risk - the possibility of loss or harm arising from performing an
activity.

12/9/2023
10
Other Relevant Terms(2)

 Security Controls - countermeasures used to prevent or


respond to security threats and to reduce or avoid risk.
 Security Mechanisms - components comprising a defensive
framework that protects IT resources, information, and
services.
 Security Policies - a set of security rules and regulations that
enforce security controls and mechanisms.

12/9/2023
Figure 6.3. How security policies and security mechanisms 11
are used to counter threats, vulnerabilities, and risks
caused by threat agents.

Compiled Lecture slides from text book Cloud Computing Concepts, Technology & Architecture by Thomas Erl

12/9/2023
12
The Ingredients of an Attack

Good security Security


controls can stop Controls and
Non- certain attacks Policies
malicious
Threats
Methods Poor security
and policies could
Tools let an attack
through
Motives Methods
Malicious
and and
Threats Assets
Goals Tools
Vulnerabilities
Methods
and
Tools
NO security policies or
Natural
Disasters

12/9/2023
13
6.2. Threat Agents
Common Threat Agents

 A treat agent?
 an entity that poses a threat because it is capable of carrying
out an attack.
 Originated from?
 either internally or externally, from humans or software
programs.

12/9/2023
14
Types of Threat Agents/Attackers

 Anonymous Attackers - a non-trusted cloud service consumer


without permissions in the cloud (typically external software
programs).
 Malicious Service Agent - a service agent (or a program pretending
to be a service agent) with compromised or malicious logic.
 Trusted Attacker - attacks from within a cloud’s trust boundaries by
abusing legitimate credentials.
 Malicious Insider - threat agents acting on behalf of or in relation
to the cloud provider. They are typically current or former
employees or third parties with access to the cloud provider’s
premises.
12/9/2023
15
Anonymous Attacker

 An anonymous attacker is a non-trusted cloud service consumer


without permissions in the cloud .
 It typically exists as an external software program that launches
network-level attacks through public networks. When
anonymous attackers have limited information on security
policies and defenses, it can inhibit their ability to formulate
effective attacks.
 Therefore, anonymous attackers often resort to committing acts
like bypassing user accounts or stealing user credentials, while
using methods that either ensure anonymity or require
substantial resources for prosecution.
12/9/2023
16
6.3. Cloud Security Threats

 Traffic Eavesdropping
– data is passively
intercepted by
malicious service
agents.
 Gather information to
directly compromise
confidentiality, e.g.,
username and
password.
12/9/2023
17
Malicious Intermediary

 This attack arises when messages are


intercepted and altered by a malicious service
agent.
12/9/2023
18
Denial of Service

 To overload ITresources to
the point where they
cannot function properly.
 Workload increased
(CPU, memory loads)
 Network traffic
increased
 Successful DoSattacks
produce server
degradation and/or
failure.

12/9/2023
19
Distributed DoS (DDoS)

 DoS is easy to detect (trace back) and mitigate.


12/9/2023
20
Insufficient Authorization

▶ Attackers gain direct access to IT resources through poorly


managed cloud API.
12/9/2023
Weak Authentication 21

 Cloud
consumer A
uses a weak
password
enabling an
attacker to
easily crack it.

12/9/2023
22
Virtualization Attack
to jeopardize its confidentiality, integrity, and/or availability.
 Accesses a virtual server to compromise its underlying physical server.
 This attack exploits vulnerabilities in the virtualization platform

12/9/2023
23
Overlapping Trusted Boundaries

▶ Physical IT resources
shared by multiple cloud
consumers, resulting in
overlapping trusted
boundaries.
▶ Malicious cloud
consumers target shared
IT resources with the
intention of
compromising cloud
consumers or other IT
resources that share the
same trust boundary.
12/9/2023
24
6.4. Additional Considerations

 Flawed Implementation
 Security Policy Disparity
 Contracts
 Risk Management

12/9/2023
25
Flawed Implementation

 Substandard design,
implementation, or
configuration of cloud
service deployments may
lead to undesirable
consequences.
 Attackers can exploit these
vulnerabilities to impair
the integrity,
confidentiality, and/or
availability of cloud
provider IT resources.

12/9/2023
26
Security Policy Disparity

 Our own implemented security mechanisms are different from


that provided by cloud providers.
 Assessments are needed to ensure our IT resources being
migrated to a cloud are sufficiently protected.
 Cloud consumers may not be granted sufficient administrative
control (of course we are not the owner of the cloud infra).
 Some public clouds, additional third parties, such as security
brokers and certificate authorities, may introduce their own
distinct set of security policies and practices (make things more
complicated).
12/9/2023
27
Contracts

 Examine contract and SLA.


 Use clear language that indicates the amount of liability
assumed by the cloud provider and/or the level of indemnity
the cloud provider may ask for.
 Contractual obligations is where the lines are drawn between
cloud consumer and cloud provider assets. In case of security
breach, who to be blamed (us or cloud provider).

12/9/2023
RiskManagement

12/9/2023
29
RiskManagement

 When assessing the potential impacts and challenges


pertaining to cloud adoption, cloud consumers are encouraged
to perform a formal risk assessment as part of a risk
management strategy. Process comprises
 Risk assessment – to identify potential vulnerabilities and
shortcomings.
 Risk treatment – mitigation policies and plans to treat risks.

 Risk control – risk monitoring

 Risk management is an on-going process.

12/9/2023
30

THANK YOU

12/9/2023

You might also like