Yury Chemerkin I-society 2013

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

Limitations of Security Standards against Public Clouds

YURY CHEMERKIN
International Conference on Information Society (i-Society 2013)
[ Yury Chemerkin ]
www.linkedin.com/in/yurychemerkin http://sto-strategy.com yury.chemerkin@gmail.com

 Experienced in :
 Reverse Engineering & AV
 Software Programming & Documentation
 Mobile Security and MDM
 Cyber Security & Cloud Security
 Compliance & Transparency
 and Security Writing
 Hakin9 Magazine, PenTest Magazine, eForensics Magazine,
 Groteck Business Media
 Participation at conferences
 InfoSecurityRussia, NullCon, AthCon, CONFidence, PHDAYS
 CYBERCRIME FORUM, Cyber Intelligence Europe/Intelligence-Sec
 ICITST, CyberTimes, ITA
Cloud Issues
Known Issues Known Solutions
 Threats  Customization and best practices
 Privacy  Crypto anarchism
 Compliance  CSA, ISO, PCI, SAS 70
 Legal  Typically US Location
 Vendor lock-in  Platform, Data, Tools Lock-In
 Open source / Open standards  Top clouds are not open-source
 Security  Physical clouds more secured than Public
 Abuse  Botnets and Malware Infections
 IT governance  Depends on organization needs
 Ambiguity of terminology  Reference to wide services, solutions, etc.
Common Security Recommendations for clouds
Object What to do
Data Ownership Full rights and access to data
Data Segmentation An isolation data from other customers’ data
Data Encryption A data encryption in transit/memory/storage, at rest
Backup/Recovery An availability for recovery
Data Destruction An Ability to securely destroy when no longer needed
Access Control Who has access to data?
Log Management A data access that logged and monitored regularly
Incident Response Are there processes and notifications in place for incidents
(including breaches) that affect data?
Security Controls An appropriate security and configuration control to data
protection
Patch Management Patching for the latest vulnerabilities and exploits?
What is about Public Clouds
Some known facts about AWS & Azure in order to issues mentioned above
 Top clouds are not OpenSource  Tools Lock-in
 OpenStack is APIs compatible with Amazon EC2  Longing for an inter-cloud managing tools that are
and Amazon S3 and thus client applications written industrial and built with compliance
for AWS can be used with OpenStack with minimal  APIs Lock-In
porting effort, while Azure is not  Longing for inter-cloud APIs, however there were
 Platform lock-in known inter-OS APIs for PC, MDM, Mobiles, etc.
 Beside of OpenStack, there are Import/Export tools  No Transparency
to migrate from/to VMware, while Azure is not  Weak compliance and transparency due to SAS 70
 Data Lock-in and NDA relationships between cloud vendor and
 Native AWS solutions linked with Cisco routers to third party auditors and experts
upload, download and tunneling as well as 3rd party  Abuse
storage like SMEStorage (AWS, Azure, Dropbox,  Abusing is not a new issue and is everywhere
Google, etc.) , while Azure is not
 AWS Vulnerability Bulletins as a kind of quick
response and stay tuned
Clouds: Public against Private
Known security issues of Public Clouds and significant researches on it as a POC
 "All Your Clouds are Belong to us – Security Analysis of  “The most dangerous code in the world: validating SSL
Cloud Management Interfaces", 3rd CCSW, October 2011 certificates in non-browser software”, 19th ACM
 A black box analysis methodology of AWS control Conference on Computer and Communications Security,
interfaces compromised via the XSS techniques, October 2012
HTML injections, MITM  Incorrect behavior in the SSL certificate validation
 [AWS] :: “Reported SOAP Request Parsing Vulnerabilities” mechanisms of AWS SDK for EC2, ELB, and FPS
 Utilizing the SSL/HTTPS only with certificate  [AWS] :: “Reported SSL Certificate Validation Errors in API
validation and utilizing API access mechanisms Tools and SDKs”
like REST/Query instead of SOAP  Despite of that, AWS has updated all SDK (for all
 Activating access via MFA and creating IAM services) to redress it
accounts limited in access, AWS credentials
rotation enhanced with Key pairs and X.509
 Limiting IP access enhanced with API/SDK & IAM
Clouds: Public against Private
Longing for managing CPU, Memory and other closed resources
[Intel] :: “The Essential Intelligent Client” [Elcomsoft] :: “Cracking Passwords in the Cloud:
Breaking PGP on EC2 with EDPR”
 Applied are known for VMware
 Serious performance problems regardless
 Ability to control clouds due the Intel of where the trusted/untrusted control
AMT commands or else is applied for agents are
VMware
 Overloading the virtual OS with analyzing
 There were not known successful CPU commands and system calls
implementations for AWS, Azure, GAE or
other clouds.  Overloading is multiplied by known issues
the best of all demonstrated in case of
GPU (Elcomsoft, GPU Cracking)
Clouds: Public against Private
It is generally known, that private clouds are most secure There is no a POC to prove a statement on public clouds

 [AWS] :: “Xen Security Advisories”  “7.0. Threat: Abuse of Cloud Services // Cross-VM
 There are known XEN attacks (Blue Pills, etc.) Side Channels and Their Use to Extract private
Keys”
 No one XEN vulnerability was not applied to the
AWS services  “4.0. Threat: Insecurity Interfaces and APIs”
 Besides of Reality of CSA Threats
 Very customized clouds
 [CSA] :: “CSA The Notorious Nine Cloud Computing Top  1.0 & 7.0 cases highlight how the public clouds
Threats in 2013” e.g. AWS EC2 are vulnerable
 Replaced a document published in 2009  1.0 & 7.0 cases are totally focused on a private
cloud case (VMware and XEN), while there is no a
 Such best practices provides a least security
known way to adopt it to AWS.
 No significant changes since 2009, even examples
 4.0 case presents issues raised by a SSO access
 Top Threats Examples
not related to public clouds (except Dropbox,
 “1.0. Threat: Data Breaches // Cross-VM Side SkyDrive) and addressed to insecurity of APIs.
Channels and Their Use to Extract private Keys”,
Compliance: from CSA’s viewpoint
On CSA side On vendors and customers side

 The Goal is bringing a transparency of cloud controls and  Top known cloud vendors announced they are in
features, especially security controls and features compliance with it
 Such documents have a claim to be up-to-date with  Some of reports are getting old by now
expert-level understanding of significant threats and  Customers have to control their environment by their
vulnerabilities needs
 Unifying recommendations for all clouds  Customers want to know whether it is in compliance in,
 Up to now, it is a third revision especially local regulations and how far
 All recommendations are linked with other standards  Customers want to know whether it makes clouds quite
 PCI DSS transparency to let to build an appropriate
 ISO
 NIST
 COBIT
 FEDRAMP
Compliance: from Cloud Vendor’s viewpoint
Compliance, Transparency, Elaboration

 CAIQ/CCM provides equivalent of recommendations over  Vendors general explanations multiplied by general
several standards, CAIQ provides more details on security standards recommendations are extremely far away from
and privacy but NIST more specific transparency
 Clouds call for specific levels of audit logging, activity
 CSA recommendations are pure with technical details reporting, security controlling and data retention
 It helps vendors to pass a compliance easier  It is often not a part of SLA offered by providers
 It helps not to have their solutions worked out in  It is outside recommendations
details and/or badly documented  AWS often falls in details with their architecture documents
 It helps to makes a lot of references on 3rd party  AWS solutions are very well to be in compliance with old
reviewers under NDA (SOC 1 or SAS 70) standards and specific local regulations such as Russian Law
 Bad idea to let vendors fills such documents  It additionally need to use CLI, API/SDK to reduce
 They provide fewer public details third party solutions and implement national crypto
 They take it to NDA reports  It offers a PenTest opportunity
Description DIFF (AWS vs. AZURE)
Third Party Audits As opposed to AWS, Azure does not have a clearly defined statement whether their customers able to perform their own

Information
Mapping
SystemCompliance: from Cloud Vendor’s viewpoint
vulnerability test
Regulatory AWS falls in details to comply it that results of differences between CAIQ and CMM

Handling / Labeling / Security Policy AWS falls in details what customers are allowed to do and how exactly while Azure does not

Retention Policy AWS points to the customers’ responsibility to manage data, exclude moving between Availability Zones inside one region; Azure
Compliance, Transparency, Elaboration
ensures on validation and processing with it, and indicate about data historical auto-backup

Secure Disposal No serious, AWS relies on DoD 5220.22 additionally while Azure does NIST 800-88 only

Information Leakage AWS relies on AMI and EBS services, while Azure does on Integrity data
Policy, User Access, MFA No both have
Baseline Requirements AWS provides more high detailed how-to docs than Azure, allows to import trusted VM from VMware, Azure
Encryption, Encryption Key AWS offers encryption features for VM, storage, DB, networks while Azure does for XStore (Azure Storage)
Management
Vulnerability / Patch Management AWS provides their customers to ask for their own pentest while Azure does not
Nondisclosure Agreements, Third AWS highlights that they does not leverage any 3rd party cloud providers to deliver AWS services to the customers. Azure points to
Party Agreements the procedures, NDA undergone with ISO
User ID Credentials Besides the AD (Active Directory) AWS IAM solution are alignment with both CAIQ, CMM requirements while Azure addresses to
the AD to perform these actions
(Non)Production environments, AWS provides more details how-to documents to having a compliance
Network Security
Segmentation Besides vendor features, AWS provides quite similar mechanism in alignment CAIQ & CMM, while Azure points to features built in
infrastructure on a vendor side
Mobile Code AWS points their clients to be responsible to meet such requirements, while Azure points to build solutions tracked for mobile code
w/o CE w CE
NAME

Compliance: from Cloud Vendor’s viewpoint


AWS Azure AWS Azure
Access Control Policy and Procedures Y Y None None
Account Management Y Y exc. g Y: 1, 4, 6, 7; prebuilt: 2, 5a-b; poss.3,5c,5d Y: 1-4, 5a, 6, 7; N/A: 5b-d
Access Enforcement Y Y Y: 1,2;prebuilt: 3-6 Y exc. 3 (partially)
Information Flow Enforcement Y Y prebuilt:1-8,10-17;N/A:9 Y exc. N/A: 12-15
Least Privilege
Security Attributes
Compliance, Y Y
prebuilt exc.
Transparency,
Y
Elaboration
Y
prebuilt None None
N/A:5
Use of External Information Systems Y Y Y Y
Auditable Events Y Y None None
Audit Review, Analysis, and Reporting Y Y p.internal t.internal
Protection of Audit Information Y Y poss. poss.
Security Function Isolation t.internal t.internal t.internal t.internal
Denial of Service Protection p.internal p.internal p.internal p.internal
Boundary Protection prebuilt: 1-6, 11;
prebuilt:1-6,11 exc. poss. 4c; prebuilt:7,8,9,
N/A: 3-4, 8, 10, 17;
prebuilt prebuilt 12,15,16; prebuilt:10 exc. N/A: iii,
poss. 7, 9, 12, 15;
t.internal:v;p.internal:13,14,17
p.internal: 13, 14, 17
Architecture & Provisioning for
prebuilt t.internal prebuilt t.internal
Name/Address Resolution Service
Honeypots poss. poss. None None
OS Independent Applications poss. poss. None None
Protection of data at Rest poss. poss. None None
Out of paper example (MDM) : Efficiency of activities
250,00
250,00 250,00
200,00

150,00 3,45 66,67


16,67 12,50 66,67 88,89
8,70 8,00
100,00 5,08 4,26 9,09 5,26
3,37 6,25 4,17 3,70
66,67 66,67 2,17
60,00 14,29 50,00 50,00 50,00
50,00 25,00 33,33
16,67 19,05 25,00 25,00
14,29 16,67 11,76
5,88 5,56 7,14
0,00

% m+a activity vs perm % m+a derived activity vs perm


Out of paper example (MDM) : Efficiency of activities
100 1200
90 1100
80,00 1000
80
70
800
60 55

50 38,46 10,26 600


31,82
40 16
16 400
30 20 49
5 7 7 4 4
20
200
10 80

0 0
BlackBerry Old iOS BlackBerry QNX Android
Quantity of Groups 55 16 7 4
Average perm per group 20 5 7 4
Efficiency 80,00 38,46 31,82 10,26
Totall permissions 1100 80 49 16
Quantity of Groups Average perm per group Efficiency Totall permissions
CONCLUSION
THE VENDOR SECURITY VISION HAS NOTHING WITH REALITY AGGRAVATEDBY SIMPLICITY

 The best Security & Permissions ruled by AWS among other clouds
 Most cases are not clear in according to the roles and responsibilities of cloud vendors and their customers
 Some of such cases are not clear on background type: technical or non-technical
 Swapping responsibilities and shifting the vendor job on to customer shoulders
 Referring to independent audits reports under NDA as many times as they can
 All recommendations should be enhanced by independent analysis expert in certain areas

 CSA put the cross references to other standards that impact on complexity & lack of clarity like NIST SP800-53
 NIST is more details and well documented with cross references and AWS matches to the NIST more
Q&A THANK YOU

You might also like