Looking beyond the silver lining

34
Looking Beyond the Silver Lining Rafe Pilling Dell SecureWorks, Senior Security Researcher

Transcript of Looking beyond the silver lining

Page 1: Looking beyond the silver lining

Looking Beyond the Silver Lining

Rafe Pilling

Dell SecureWorks, Senior Security Researcher

Page 2: Looking beyond the silver lining

Todays Agenda

• Changing the way we think about protecting our assets?

• Becoming an informed consumer of Cloud Services?

• Impact of Cloud on our security controls, testing and response capabilities?

• What does the “Dark-Side” of Cloud look like?

Page 3: Looking beyond the silver lining

Cloud Growth

Source: http://www.forbes.com/sites/louiscolumbus/2013/02/19/gartner-predicts-infrastructure-services-will-accelerate-cloud-computing-growth/

Approx 18% Annual Growth Rate $155 Billion dollars spent next year (projected)

Page 4: Looking beyond the silver lining

Fixed Perimeter

Page 5: Looking beyond the silver lining

What Perimeter?

Page 6: Looking beyond the silver lining

Transparency

• On-Premises Thinking – Full visibility into all levels of the stack – Full visibility of security controls – Data location is relatively static – Management and maintenance overhead is high

• Cloud Thinking

– Limited visibility of the stack depending on the cloud service – API’s and management interfaces abstract away the underlying

technology – Data location can be very fluid – Management and maintenance overhead is lower – Limited or no visibility into security controls

Page 7: Looking beyond the silver lining

Defensive Paradigm Shift

• On-Premises Thinking – Focus on securing the network – Build a secure perimeter and let the business operate within it – Don’t have focus on data security because network is “trusted” – Hard shell / soft center model (like an Armadillo) – There aren’t generally “neighbors” to contend with

• Cloud Thinking – Focus should be on securing the data – Don’t know who the neighbors are

› You could be collateral damage in an attack › Your neighbor could be attacked to get to you

– Assume the environment is hostile unless proven otherwise – Soft shell / hard center model (like an Avocado)

Page 8: Looking beyond the silver lining

Cloud Risk?

Page 9: Looking beyond the silver lining

Amazon 24hr outage 24th December 2012

Source: http://gigaom.com/2011/04/22/heres-what-amazon-outage-looked-like/

Source: http://www.businessinsider.com/amazon-apologizes-for-netflix-outage-2012-12

"We want to apologize. We know how critical our services are to our customers’ businesses, and we know this disruption came at an inopportune time for some of our customers. We will do everything we can to learn from this event and use it to drive further improvement in the ELB service."

Page 11: Looking beyond the silver lining

Cloud Security

Page 12: Looking beyond the silver lining

Separation of responsibilities

Source: http://mschnlnine.vo.llnwd.net/d1/inetpub/kevinremde/Images/679669067395_DBE9/image_3.png

Page 13: Looking beyond the silver lining

13 03/10/2013

Page 14: Looking beyond the silver lining

14 03/10/2013 Neighbours…

Page 15: Looking beyond the silver lining

Security Testing

• Amazons Approach: –Collects information on test source and

times –Allows use of any tools –Does NOT allow DDoS –Allows most anything else –Provides a few caveats to protect low-end

resources

• Amazon sets a good example in their approach

Page 16: Looking beyond the silver lining
Page 17: Looking beyond the silver lining
Page 18: Looking beyond the silver lining

Compliance & Control

Page 19: Looking beyond the silver lining

Simplifying compliance

Page 20: Looking beyond the silver lining

CSA STAR Portal

“allows them to submit self assessment reports that

document compliance to CSA published best

practices”

Page 21: Looking beyond the silver lining

Cloud Controls Matrix

”designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider.”

Page 22: Looking beyond the silver lining

Incident Response

Page 23: Looking beyond the silver lining

Logging in the Cloud

• Logging is crucial for understanding an incident

• These are basic recommendations but rarely implemented until after a major incident.

• MUST retain at least 6months with 12 months being the recommended minimum.

• Focus on authentication and connectivity related log sources as well as any security alerts

• Know – what is being logged? – where it is being logged? – how to get the logs?

• Analyze the logs and act on the findings

Page 24: Looking beyond the silver lining

Cloud Forensics Challenges

• Live forensics may not be possible

• Storage is logical and focused on allocated space; acquisition images may not include data remnants or unallocated disk space

• Failed or obsolete hardware

• Multi-tenant storage devices may contaminate the acquisition

• Acquisition may require large amounts of bandwidth

• Data fragmentation and dispersal

• Data ownership issues—what happens when the contract is terminated?

Page 25: Looking beyond the silver lining

25 Confidential 10/3/2013

Credit: http://sinussister.com/blog/wp-content/uploads/2011/08/Storm-cloud.jpg

Page 26: Looking beyond the silver lining

An Evolving Threat

• Security Services Providers have historically played catch-up • The Threat evolved faster than the available defensive technologies • Threat Intelligence was ad-hoc at best • Challenges are:

– New actors – Moving perimeter – Increased complexity & loss of transparency – Speed of attack – Bad guys operating with impunity

Page 27: Looking beyond the silver lining

The Threat Actor Stack Keeps Growing S

oph

istication

Script Kiddies

Graffiti Artists

Fraudsters

Botmasters

Hacktivists

Intellectual Property Thieves

Nation State Threats

Cyber Terrorism

Prevalence

Page 28: Looking beyond the silver lining

Expansion – extending reach

Page 29: Looking beyond the silver lining

Password Reset on Cloud Services ?

Page 30: Looking beyond the silver lining

Exfiltration…

Page 31: Looking beyond the silver lining

• Dirt Jumper

Page 32: Looking beyond the silver lining

Prevention

Page 33: Looking beyond the silver lining

Prevention

• Due diligence – Risk assessments – Audits – Security requirements built into procurement

› If you don’t ask for it, it will never happen

• Focus on vulnerabilities in all aspects of the system. – People, process, technology – Vulnerability scanning, penetration testing, secure code development

• Threat Intelligence

– Know the risks – Know the threat actors – Know the exploits – Learn from the mistakes of others

• Monitor and respond

– Maintain visibility and know what to do when incidents are detected

Page 34: Looking beyond the silver lining

Thank you