Old Man Yells at Cloud Computing Presented by: Terry Labach Information Security Services, IST December 4, 2019
Old Man Yells at Cloud Computing Old Man Yells at Cloud Computing PAGE 2
The plan for today What’s all this cloud computing stuff? Security, isn’t that what we’re paying for? What could possibly go wrong? What is to be done? What is to be done? Old Man Yells at Cloud Computing PAGE 3
What is cloud computing? “A distributed system is a system where I can’t get my work done because a computer has failed because a computer has failed that I’ve never even heard of.” Leslie Lamport, c. 1990 Old Man Yells at Cloud Computing PAGE 4
What is cloud computing? “A distributed system cloud is a system where I can’t get my work done because a computer has done because a computer has failed that I’ve never even heard of.” Leslie Lamport , c. 1990 Me, today Old Man Yells at Cloud Computing PAGE 5
No, really, what is cloud computing? Cloud computing can be viewed in many ways… a collection of technologies an operational model an operational model a business model provision of computing resources from a shared infrastructure Old Man Yells at Cloud Computing PAGE 6
Cloud computing infrastructure models Public cloud Using resources wholly hosted and operated off your premises by a 3 rd party cloud service provider Resources provided by infrastructure that is also used by other clients Private cloud Private cloud Using resources provided by infrastructure only used by your organization, whether hosted on-site or elsewhere Hybrid cloud Using both of the above models Old Man Yells at Cloud Computing PAGE 7
Cloud computing service models Infrastructure as a service (IaaS) computing infrastructure, provisioned and managed over the internet Software as a service (SaaS) allows users to connect to and use apps over the Internet allows users to connect to and use apps over the Internet Platform as a service (PaaS) complete development and deployment environment in the cloud Old Man Yells at Cloud Computing PAGE 8
Cloud computing operation models Mimic traditional data centre concepts of servers, platforms, networking, etc. This can result in users misconfiguring or inefficiently using cloud resources because they are thinking about traditional architectures. architectures. Old Man Yells at Cloud Computing PAGE 9
So cloud computing is? Using someone else's computers! Old Man Yells at Cloud Computing PAGE 10
Where can I get some sweet, sweet cloud? Microsoft Azure Amazon Web Service (AWS), Amazon Elastic Compute Cloud (EC2) Google Cloud Platform Google Cloud Platform And many others… Old Man Yells at Cloud Computing PAGE 11
Clouds with benefits can save money faster to provision can be more secure can reduce downtime Old Man Yells at Cloud Computing PAGE 12
Clouds with benefits? can save money (or not) faster to provision can be more secure (or not) can reduce downtime (or not) Old Man Yells at Cloud Computing PAGE 13
Why are you scared of clouds? Have you ever really looked at them? Old Man Yells at Cloud Computing PAGE 14
Why are you scared of clouds? Misconceptions about the cloud mean that organizations do not manage cloud resources as they should. Let’s look at a recent, well-publicized example. Old Man Yells at Cloud Computing PAGE 15
The Capital One breach Capital One is one of the largest banks in the United States In 2019, a lone hacker managed to obtain the sensitive personal information of more than 100 million people, despite security measures Capital One didn’t become aware of the breach until more than Capital One didn’t become aware of the breach until more than three months after the fact Old Man Yells at Cloud Computing PAGE 16
What happened? Hacker exploited a flaw in a firewall on an Amazon Web Services cloud server Firewall had been misconfigured, allowing it access to all resources belonging to the client The attacker crafted web requests that were passed through the firewall and resulted in data being returned from the underlying databases because they appeared to in data being returned from the underlying databases because they appeared to coming from the misconfigured firewall Server Side Request Forgery (SSRF) "AWS was not compromised in any way and functioned as designed," Amazon said in a statement Old Man Yells at Cloud Computing PAGE 17
The Capital One breach revealed What We Can Learn from the Capital One Hack https://krebsonsecurity.com/2019/08/what-we-can-learn-from-the-capital-one-hack/ Preventing The Capital One Breach https://ejj.io/blog/capital-one https://ejj.io/blog/capital-one Information on the Capital One Cyber Incident https://www.capitalone.com/facts2019/ Old Man Yells at Cloud Computing PAGE 18
But I thought that the cloud was more secure? You’re expecting this level of security… Old Man Yells at Cloud Computing PAGE 19
Nope! …but this is what you get. Old Man Yells at Cloud Computing PAGE 20
Security is not a commodity Cloud vendors don’t understand: your business processes the sensitivity of your data your legal and other requirements Old Man Yells at Cloud Computing PAGE 21
What do cloud vendors think about security? "The AWS Cloud has a shared responsibility model. AWS manages security of the cloud. You are responsible for security in the cloud.“ https://d1.awsstatic.com/whitepapers/aws_security_incident_response.pdf Old Man Yells at Cloud Computing PAGE 22
So, what can go wrong with cloud security? In general: errors to configure services as desired to protect data and operations refusal to follow security policy due to ignorance or hubris, leading to breaches and problems failure to monitor operations and flag anomalies for investigation, preventing detection of flaws Old Man Yells at Cloud Computing PAGE 23
Data breaches Hackers stole the personal data of 57 million customers and drivers from Uber in October 2016 Company concealed the hack for more than a yearand paid hackers $100,000 to delete info. Loss included names, email addresses and phone numbers of 50 million Uber riders Loss included names, email addresses and phone numbers of 50 million Uber riders and personal information of about 7 million drivers Attackers accessed a private GitHub coding site used by Uber software engineers Used login credentials they obtained there to access data stored on Amazon Web Services Old Man Yells at Cloud Computing PAGE 24
Misconfiguration Information on over 120 million American households was found in a massive database left exposed on the web in 2017 by marketing analytics company Alteryx Included addresses, ethnicity, interests and hobbies, income, right down to what kind of mortgage the house was under and how many children lived at the property. 248 different data fields for each household 248 different data fields for each household Data was sitting in Amazon Web Services storage Open to anyone with an AWS account Old Man Yells at Cloud Computing PAGE 25
Architecture design failure Accenture left private data across four unsecured cloud servers, exposing highly sensitive passwords and secret decryption keys that could be used to decrypt traffic between Accenture and its customers Data could be downloaded without a password Some passwords were stored in plaintext Some passwords were stored in plaintext Credentials also found that appear to relate to Accenture's access to Google's Cloud Platform and Microsoft's Azure Old Man Yells at Cloud Computing PAGE 26
Account hijacking In 2014, attacker gained access to the AWS control panel of company Code Spaces and demanded money in exchange for relinquishing control Company refused, and attacker began deleting data and virtual machines There were replicated services and backups, but those were all controllable from the same control panel same control panel This destroyed the company Old Man Yells at Cloud Computing PAGE 27
Insecure interfaces Facebook data breach affecting over 50 million accounts Vulnerability introduced into code in July 2017 and only discovered in September 2018 Attackers used “View As,” a feature that lets people see what their own profile looks like to another Facebook user. The vulnerability resulted in the generation of an access token that had the permissions of the Facebook mobile app, not for the access token that had the permissions of the Facebook mobile app, not for the viewer, but for the other Facebook user, which could be used to take over their account Old Man Yells at Cloud Computing PAGE 28
Recommend
More recommend