Unit5 Part 1
Unit5 Part 1
Existing Security
CHAPTER 6 Solutions
Learning Objectives
be able to:
Ater reading this chapter, you will
cloud
I, Provide realistic picture of the current " Know about VM security challenges.
securityscenario.
Understand cloud computing security
. Understand the detailed analysis of cloud architecture.
security concerns and various categories of " Understand open source security solution
cloud risks.
products in cloud.
Learn about the popular vulnerability assess
ment tool for cloud.
5 4.
lo
3.
it
L lowing Risks32
Curiykuogly cat-
notstores
t
e me Nment
eS
ni nste aue dhain time down
financal
rzN he s
orsoe
sone their
all of
129
result data urityspeci- iting n
5
zd a
130
3. 2. Following1. Legal
Risks
6.3.3 9. 8. 7 6.
this API Is in
risk.
that
exponentially toinstances Licensing
checks Poice
local lack of
Risk with
to customer engines.
tor Compromise
requests
element availability
or Malicious
indirect
context customer or Loss they
clearly servers fromConflictsstandard
such orrityproviders effective
true
efficiently Data which them, and the theirI group
Nquired CHAPTER
the authorities the from are the ar e
of traditional wiping
protection states, service encryption understand
using
data may rule causing
application adapt Hacking can at of
threats
unauthorized
basis may some environments different private follow
risks: changes
be hacking of probes
a and between and
6
check is become states of service
engine service for as al);(or of CLOUD
so law be legal the th e to the special
andled risks:
Licensing if and high information
a
denial hypervisor, the the or keys) hardening. Linux LAMserver different at the
the our that and ofrisks: inside levels scams: keys: the customer data SECURITY
unusable datajurisdiction: service engine:
that andeffort.assets use or
data
cloud-based It have
do risk. (jailbreak) hardening hardeningrole therefore,
procedures
of for This
of is data.Malicious
in can or passwords server (as
ocessinga not service the placed A
being Windows
conditions, systems an If engine All authentication for
awful be in datacenters
respect customerinside abstraction. for cloud probable includes hardening
with
AND
tough unpredictable
a securing or
cloud (DoS and
platform just considered. procedures procedures. an most
Customer follow instances
way. instance subject them gain may providers impact probes to must EXISTING
thatenvironment;
for international
such environment),
attacks). above malicious
disclosure
be For and operating
here the are access
ina be
the increases, to usefulservice and traditional procedures
as legal data infrastructure th e could They or authentication hardening followed SECURITY
cloud enforced located of For encryption
mnaycloud per-seat transparent
to physical relynon-repudiation
scanning, parties, cloud
agreemments), Iramework may providers,the to either becan of example, systems),
customer
ovider
rity
data beoutpr
brings fo r in escape secret
thedisclosure
high-risk kept
be or data e loss a be the providers methods
mechanisms and
that
SOLUTIONS
example,
software
agreemnents
cost to hardware on as
used mechanism
decreasecontainedway theservice
it an of well
losskeys ofAWs cloud may For
(in of and in could confidentiality, to instances,
(without isolation extremely (digital or for
its the sites
or
countries
several collect as (e-g.
corruption and EC2 notdata
this,
true
enforcement, providers, and hardening. that
rolesoftware se1zure. the inside network
online
licensing
and could be ile which environment: service is be
ches and of jurisdictions, resources between
direct
hosted managesspecific
information signature).
encryption, whereas
required
are supported
data incralesaseso is be (e.g them,
integrity, best follows little
thhence mapping,are those of
charged this
al ate
monocraliand interaction application Users spreadin
to
control er
are be
ntsur atper it
somte
assigned different
moni :
to customer4
softwae platfom
and the
in keys, SSL,
practices physical different
must Cloud reduCe
the
by
Netskope. |
641O1
152
152
In and
Data Use
Discover This AND
encrypts
250
And&And is
million EXISTING
plonce why
Assesses
Precíse
data (From
CipherCloud
customer
directly
www.netskope.com) SECURITY
Visibillty
Criteria.Their
Count
User
Risk
Into
records at 60
gotyour SOLUTIONS
Based Devices
Top
21.Seo
A tremendous
over
business OAuyus,
the
last
gateway. --nnl.ll.Ju
growth Druobcr
few 1.4x
150
years.
and It
acquired one
is Inin
plat:
Skyhigh
Networks
WithSkyhigh
6..Provides
6.3
rollowin6.g 6.3.1
2. .
Skyhigh,
business
Provi
Following A2.1
2 1.
doudapP.Encr
des ypts
withOkta6.6.4
Okta 3. (Fig. Featuare res
compliance
sVPNs Uses Features
g, ementProvides
Google, (EiImpl 6.4) data
security data the
reverse are
or
6.5) any the cloud loss during key of
Microsoft, consistent ofcan
common
is
a data
specific proxy keyof yoursecuritypreventions solution
effectively Cipfeatures
herCloud
loss features
Skyhigh Figure |1,471° uploading8
Salesforce.csolomution protection tdevipolicies
echnol
ce o gy understand organization's
ldentify
for of
of 6.4 service CipherCloud:
Netwghorks
s. Skyhi
agentacross |
Skyhigh
secunty
Analyze
demand
manage and each
process
6.6
for
to Skyhigh. 121 breaches
enables also type VULNERABILITY
and all techniques cloudsallow
far
intemal TOOL
o servicesadopt database
and clouds FOR
also poiies. the
It whilecoud CLOUD
encryptswithout
is or
pre-integrated ensuring
services.
any
kind
data.
having 137
of
moreform 6.6.2
CipherCloud
CipherCloud 136
AnalyticsApp
which
than Applatorsop
Ceeah Ceut
43
Aopliestions
Dscovmed
netskope
2.5 CHAPTER
can
million (Fig.
Applications.
Cloud r protect
Delívers
Figure 6.3) 6
amazon business
On security
all CLOUD
Business your Figure
6.3
Comprehenslve Applieation
Lstency
(ma)
| users SECURITY
Cloud. software
cdouds. 6.2
in
Dota and
Discoyer
Use Netskope. | Users
Based at
gotyour 9. Count
User
A Seg
60
tremendous
over DevicesTop
Seo
2.
SOLUTIONS
business
the Leenlen.
last
gateway.
growth
few
--nnl..1ll.
Orugtcr
Oresbou
years. 1.4K offersand hraron
tDromop ooenes
colaand
isdou
and It th
is DuracoAvg.
acquired one 7min
2s0
plat
WisttuhSkyhigh
high 6.6.3
business Networks
ProvidEnescryptfsol owingFeatare sou21res
, 2 1
with Okta6.6.4
Okta 2. 6.6.3.1
rollowing 1
Provides cloudapp.
3. Skyhigh,
ProvidesOses
VPNs compliance (Fig.
Google,(Fig.Implements Features
6.5) or reverse are you 6.4) data security data the
Microsoft, any the
consistentproxy key cancloud losS during key of
FCipherCloud
is
scan of
solution of access authentication SECURITY
the your cycle; Figure This
security, access. of
details
very uses all of
Okta: servicesingle
automation
quickly. WeQualys:
b network
covers administration organizations
policies 6.5 eoiove
sign AND
of apps threat eliminates
all and all from factor
Okta. VicES phets on
EXISTING
urity keeping security
uttaert
(SSO)
cloud aspects (From Customer
AON
to one can and the
test through
centralized
Fata
for SECURITY
data services. and deploy ad
Following6.6.6.1 wiatnVaultive
complies hdcloud 6.6.6
Vaultive
workson 4
SeAJeI
Asset
Vaultive 3. 2. 1.
keys.
tion Vaultive
Vaultive moment
-Dynamicallyseletases
Fatures
for idenuiy,
devicesweb
Management
agand Discover
togue
asseapplcations
scariningreAutomaticaly
pororganlze andQualys
Features
are
data
the compliancale ways
encryption
follows helps the principle security
leave
the
in
key
Vaultive
features
of
the of
many verifies
certificates
directly is
cloud engine regulations
transparency one Figure system
ensure
network
encrypting of of like
sevurity
supporsVaultive: the 6.6
and like most | FeaturesSeeAll SEM, Feed
Interactively
posturesecurity
nework yourvicwattacks
throughout Predict -ldentify
needed
patchesSystems
-Report
&time h- Fnd Security 6.6 process
PCI,
network
reach
Qualys. Prioritize&manage
rermediation instances
Amazon E2 Web
Perimeter
Corporate
networks
HIPAA,trusted acionable
GRC, & VULNERABILTYASsESSMENT
sttes al impact security apps tracdk HIPAA, to
ty out (From ERM,
d'iaihs proNV
PCI,
to. solutions security
WAF Zero-Day
of
trens
servers&
vutnerblities
wcbsites FISMA
whe
anvwhNh GLBA www.qualvs and the
aos &
cku more cata devices
in andproper
customerwithout an. It to
NS
anv yùn iis N
others.
enablement
NTpaon -Caae
lecion of
-CredLand "Tetandst
cerification P
Tetssnongrations eytssensCompliance
implemernt
modialwaysication. lauliveurity
Wnsmnove
TOOL
holds ot maepremplaresor
oocedur
yees
a police
of FOR
the
data passwordCLOUD139
encryp- takes on filesce
solution nttaianndnsfo
place cloud policies
140
Following
There (www.boxcryptor.com)
(www.centrify.com) Boxcryptor
(www.Zscaler.com)
Zscaler
Certify
4. 3. 2. 1.
2.
products:
solution
1. be
those cial 6.7 (www.hytrust.com)
(www.prevoty.com)
(www.bitium.com) HyTrust
Prevoty
Bitium 7. 6. 5.
downloaded (www.silversky.com)
SilverSky
inspections.
ItSNORT:
It communication
AWSOSSEC Multiple
machine cloud-basedmachinesOSSEC active
Windows."
Solaris
and
Windows"OSSEC OSSEC-HIDS
Website:
(www.ossec.net)
It their to solutions
security Open are CHAPTER
work
can has has are
three
intrusion nstances response. a various
be works powerful some
works installation or registry is solution
developed
used SNORT multi-host instances
and a and Source 6
main clients on scalable, security evolving CLOUD
It (Open used
withdetection is and between well monitoring,
a correlation
runs is
products.
modes an
a can with optionsserver-client (also multi-platform, open by Security
solutionsby SECURITY
AWS fully scenario, as on source anyone. some cloud
of monitor cloud the called
well. most
EC2 system open
working OSSEC are centralized and source Here security
operating security other for AND
instances instances. where
available agents) model. analysis Following
(NIDS).source file host-based
open third-party Solution
we all
- integrity server discuss types and EXISTING
sniffer,network policy
one
can The systems, engine,sourcehost-based vulnerability
also. It The
instilation and with are of
can OSSECbe enforcement, intrusion some cloud SECURITY
some Products
SNORTpacketintrusion checking,OSSEC theOSSEC.installed including integrating Host companies.
perform open
agent server based intrusion prominentcomputing
logger is assessment SOLUTIONS
server It on rootkit detection
host-based is coulda Intrusion source
prevention real-time alwaysserver
real-time any must Linux, log Users in
and and
operating
be analysis,
detection, detection opern
solution services, Cloud
OpenBSD,
be system or tool:
intrusion
network encrypted.
and
installed Detection
supports IDSanalytics
tracking agents
file installed clients
file source
Systemmonitoring others real-time (HIDS). Most
can system. FreeBSD,integrity system): products need
(NIPS)
on are on on System cloud are
be aLinux/Unix alerting Accordine to
IP installed stand-alone
agents.
couid
It checking, 0ssEC seruit Pay
detectineton.works. andet- aiu o MacOS, (HIDS). for
i be and
of on
3. It abnormal
behavior.
bestcurityPPOVidedSummary
Poducts data Crypton: CryptSync
ofapplications
aand JavaScript Crypton iles. analyzes
ingCryptSync:
analy zi ng SNORT ruanniny ng
processes,
Questions
Multiple
Choice 1.
practices erabilitySCnapter,
ICe SuPports IrueCrypt:
Amazon
real Crypton files
CryptSync
works
traffic
(d) (c) (b)Identify
(a) providers transparent encrypted is
Encryption challenges,of a disk. that
Crypton provides The
the prasovides
andproxypasses
Encryption
Encryption
tion/decryption cloud detailed S3.
deviceTrueCrypt library a are outbound to
the assessment
of we It built is library to
trafficin-flitght
configuration
,detection of
uses best
principle cloud
computing.cloud and have supports
encryption. for on
unencrypted
encrypt
is decidethrough
explanationcloud encryption with two wayan
ofof of Web thdeveloped
e that packet for
files iles files computng learned is additional
on computingtools service compatibility
Linux, an client
data folders towhether the data
beforeafterbeforewhich applications allows protect backend
In and encryption
according
the about usingopen-source It in and Elastic
moving
of moving of creates
Mac side by that to
reaching next users developers a the layer logs
data CryptSync security cloud the itself Web the work riles reject IDS Load
chapter, to first TrueCrypt OS of other of the
during to
security most virtual
andPostgreSQL,
that browser
SpiderOak is instances
HTTP.as for
to to
network current before synchronously.
disk offer security results.
to Balancer,or
other otherworks. architecture important take folder cloudforchanges,
uploading we
care
Windows
encrypted
encryption to encrypt accept
for
servers servers willindustry
fundamerntals,
import
moving
anwrite itselfcontains that
and
example, i
instances;
leam and
of object
Redis secure the which tracking
MULTIPLE
this
concerm platforms disk licensed makes th em
and trends, tobefore packet
aboutsome foremost application
to storage
and cloud encrypted Ome before is
dwndding of Amazon within
Nodejs. cloud
movingunder folder diffcult
it SNORT used of CHOICE
cdoudopenvanoscloud doud also. APL
storage Afte r as
file
conen a appicatios,
moving
suwri fles.
Contains transmission,
SNORT is an access
miewe conuing S3ANS fe I Data tothe for used QUESTIONS
pocesses s ni provides
and Crypton AGPL attackers to HTTPS in
agns, Ihe storage doud curent and
Inpot/ other here AWS,
port mounts terminator. detection
hapter where It for all
and ed Al al-time backend supportslocations.
enables work to servers.
solution
internal packet incom-
some doud doud
has
romExport it view 141
as al of
142
3. 2.
9. 8. 7. 6. many
How 5. 4..
Which
(a)
b) riskWhich (d) (c) (b) Which (d) 5(c) 4(b) 3(a) 2 SaaSWhere
(d) (c) PaaS(b) In (a)In (d) (c) (b) (a) How (d) (c) (b)
yservice
ectory
on (C) (b) (a)What Technical
Other
risks (b) riskWhich
(d) (c) riskLegal (a) Other
risks
(d) (c) risk(Legal
Technical (a) (a)
CHAPTER
In In ByByByBy Network
can
Host-based
Client
Server
tification Policy Policy Network
Client
Host-based
Server one
ated is type one SaaS, laaS does using network
operating
limiting
the type the
side side side of
purpose and of and of side of security PaaS and lock-in denial
intrusion the 6
intrusion the intrusion data data CLOUD
are organizational cloud
organizational cloud
data data PaaS thfirewall
e following intrusion
intrusion following and system
and layers problem access of
encryption
encryption
of risk(s) encryption
encryption
risk service
laaS detection detection SECURITY
agement AWS detection
is detection firewall
of detection
vice isolation categories are exist? VM categories
are be
CloudHSM risks there
risks data resources avoided?system
system AND
system system
hich
protection failure? system in does EXISTING
service does cloud
ores service?
OSSEC
SNORT
computing
risks? SECURITY
security security
security SOLUTIONS
tool tool
belong belone
architecture?
n
to?
and
ryption
ke
15. 14, 13. 12. 1.
Questions
Review
5. 4. 3. Z. 1. (d) (c) (b) (On
accessible
protection
(c) (b) (a)tools? Anytime
VM a)Which )On-demand
d) (c) (bldentify
demand(On (a) (d) (c) (b) (a) Which
(c) (b) ldentify
(a) (d) (c) (b) Dat(a) Which
prevention (d)
(d) SilverSky
SNORTOSSEC
nHowd ListWhatWhich
CloudHSM Which
Reverse Network Data EncryptNet
Principle Encryption/decryption
Transparency Open work
SNORT.aExplain
OSSEC Single Reverse
Single Single one ion/ One one
do
out do
policy one demand one the
signtechnology
the loss source
of policy of
open thsome
e you sign sign principle proxy and the and the
security key and
of the
of proxy
of on
monitoring can
sourceunderstand
the on on
transparency network VMfollowingservice decryption control
following
VM
followingtechnology
(SSO) (SSO)
technology
organizational
legal following
concerns
products which
on monitoring
on monitoring
riskS proxywhich all
by of options options
of your
options
decompromi
ateu se risks
assOCiassociated options network
Vaultive data data
pOVi Skyhigh during
is is during apps
cloud the is
is the
are the proxy
Seunty With wiservie
th evolving
key
security
securityuploading key key
assoatd
ethckoud
uploading
feature
un
feature feature
aver
a engie cloud solution
cud with works.
mutig.t secuiir Okta
of of and
and of
works. CipherCloud? Netskope
enario? oud securitr
downicading downloading
serrity N QUESTIONS
REVIEW
Explain mputing? Vhebity oin? cloud
architecture. processes processes security
with
the assessment service?
help
of 143