Slide 1

Slide 1 text

Cloud Security: There's a Storm Coming May 19th, 2015 11:00AM Mark Stanislav Sr. Security Consultant Rapid7

Slide 2

Slide 2 text

Presentation will be available at: www.misti.com/download Download password is available in your Show Guide

Slide 3

Slide 3 text

…and their APIs, SDKs, services, networks, storage, employees, customers, data centers…

Slide 4

Slide 4 text

Slide 4 ■  The first ~10 years of Cloud Computing were mostly spent understanding what the ecosystem could, and should, look like to for everyone from end users to large enterprises ■  A lot of details had to be sorted out: ◆  What hypervisors do we use? What should APIs look like? ◆  How do you scale regions, but prevent cascading failures? ◆  Which types of compliance audits can we still pass? ◆  How do we segment data stores and encrypt properly? ◆  Who are the industry leaders and who are the followers? ◆  What cloud-based companies will be darlings or deadbeats? ◆  Which cloud breaches and stories will define those years? Security Maturity is More Than Breach Stats

Slide 5

Slide 5 text

Slide 5 Published in 2009 covering EC2 instance mapping, side-channel attacks, and co-residency attacks. An “Early” Paper That I Still Love

Slide 6

Slide 6 text

Slide 6 ■  There are absolutely vulnerabilities being found and research being cultivated around attacks against hypervisors and other low-level technology powering cloud deployments ■  Much like all computing, one big deal is having a cloud provider who has the technical capabilities and dedication to security to efficiently patch their underlying architecture Highly Complex Attacks? Eh, Not So Much…

Slide 7

Slide 7 text

Slide 7 So What’s Really Going Wrong Then?

Slide 8

Slide 8 text

Slide 8 Authentication Security ■  Using an Internet-facing service, with all of your “eggs in one basket,” only being protected by a password? Hmm… ■  Cloud computing is, in my opinion, the biggest reason two-factor authentication adoption has accelerated so dramatically ■  AWS, Azure, Linode, Rackspace, Heroku, GCE, Joyent, and more have some form of auth security beyond only a password #shameless Check out https://twofactorauth.org

Slide 9

Slide 9 text

Slide 9 Two-Factor is Not Just a “Nice to Have” 2FA Deployments for Web Services * Through June, 2014

Slide 10

Slide 10 text

Slide 10 Password Reuse, Anyone?

Slide 11

Slide 11 text

Slide 11 Access Control Security ■  How much access does a given user or API key have? ◆  Create sub accounts that have limited console access ◆  API keys should be per application, only needed privileges ◆  Leverage standards like SAML and XACML ◆  Define roles and implement RBAC either natively or custom ■  Auditability is often forgotten about ◆  When did they login? Where from? What did they do? ■  Oh, and, don’t LEAK YOUR KEYS AND CREDENTIALS! J

Slide 12

Slide 12 text

Slide 12 An All-Too-Common Story Sanitize your code repositories and your machine images before posting publicly! Scanning for sensitive data is trivial with a script or manually

Slide 13

Slide 13 text

Slide 13 It’s Not All For “Hacking” Either DoS, Piracy, Spam, Proxies, & Malware Hosting

Slide 14

Slide 14 text

Slide 14 Don’t Worry, Providers Screw it Up, too! Think about how easy it would be to backdoor a community image…

Slide 15

Slide 15 text

Slide 15 There’s Always the Front Door ■  Cloud security is still predicated on the software (web apps, underlying services, custom middleware, APIs, etc.) ◆  A single vulnerability could provide access to all user data and instances if the provider doesn’t segment properly ■  Ever wonder if your cloud provider’s administrative interfaces are Internet-facing or able to be accessed via client networks?

Slide 16

Slide 16 text

Slide 16 Defense in Depth is the ONLY Plan ■  Remember that part about being able to patch efficiently? ◆  “Released less than a week ago,” is not an inspiring excuse ■  There will always be 0-day, how are you preparing for it?

Slide 17

Slide 17 text

Slide 17 ■  A single *aaS can involve numerous ways to read/write data: ◆  Web consoles, APIs, SDKs, mobile applications, and more! ◆  If you add a security feature, it should apply to ALL ways ■  Not convinced? Consider Apple’s security of iCloud… ◆  “CelebrityGate” exposed how weak Apple’s coverage of user data was, even when using their advanced features A Security Control is All or Nothing

Slide 18

Slide 18 text

Slide 18 Heartbleed: It Could Have Been WAY Worse

Slide 19

Slide 19 text

Slide 19 Reacting to Heartbleed… Sort of? Slack – April 2014 Slack – March 2015

Slide 20

Slide 20 text

Slide 20 So What’s This “There’s a Storm Coming” Thing? You Are Here The First Ten Years of Cloud Computing The Next Ten Years of Cloud Computing We’re in the eye of the storm. Shocked? J

Slide 21

Slide 21 text

Slide 21 The Next 10 Years of Cloud Security ■  Figure out how to actually add security to all of these new container technologies everyone is deploying without concern ◆  $150M in funding to Docker, $20M to CoreOS == security? ■  See the mass adoption of two-factor authentication across all cloud computing vendors (those that will survive, anyways…) ◆  Salesforce just bought the two-factor platform Toopher ■  Watch as the “Internet of Things” rises, backed off of *aaS solutions and wait intently for the first major breach to occur ◆  All of the problems of early cloud but with big risks at hand

Slide 22

Slide 22 text

Slide 22 Docker: The Golden Child of 2015 Cloud

Slide 23

Slide 23 text

Slide 23 A Glimpse into the Internet of Things …and this is just one device…

Slide 24

Slide 24 text

Slide 24 ■  IoT has to collapse for platforms, services, and hardware to allow for “the dream” to be realized – but this is a huge risk ◆  Imagine if IFTTT or any similar service was compromised, how much access one attacker would have to people’s lives What Do I Worry About With Cloud + IoT?

Slide 25

Slide 25 text

Slide 25 “If Only Cloud Providers Would…” Microsoft Azure Security

Slide 26

Slide 26 text

Slide 26 “If Only Cloud Providers Would…” Amazon Web Services

Slide 27

Slide 27 text

Slide 27 Some SaaS Providers Get it Right, Too Github •  Two Factor •  Sessions •  Audit History •  Notifications •  Revoke Tokens •  SSH Fingerprints

Slide 28

Slide 28 text

Slide 28 IaaS Security - CloudPassage

Slide 29

Slide 29 text

Slide 29 SaaS Security – Duo Security

Slide 30

Slide 30 text

Slide 30 API Security - apigee

Slide 31

Slide 31 text

Slide 31 Don’t Forget F/OSS Options

Slide 32

Slide 32 text

Slide 32 ■  Just because you can use a cloud service doesn’t mean you should use it – an easy sign-up doesn’t excuse losing data ◆  If your organization wants to go 100% cloud, that’s fine, just understand that you are taking risks that you likely didn’t have before, or weren’t as likely to come true ◆  Build a proper data retention policy, clean up objects you don’t need anymore, create off-line data backups still ◆  Encrypt-before-cloud if you can, else, segment data well, separate privileges as much as able, and please audit J ■  Every bad employee password or reused password cloud be the end of your entire company (remember Code Spaces?) ◆  Two-factor authentication or you’re just being neglectful Cloud Security Housekeeping Notes

Slide 33

Slide 33 text

Slide 33 Data Deletion? Maybe! Be Careful. Deletion may not uh, delete data.

Slide 34

Slide 34 text

Slide 34 ■  Virtual Private Cloud (VPC) is the default these days ◆  If it doesn’t need a public IP, don’t you dare give it one ■  Ingress & egress firewalls, network-level AND host-based ■  Just say no to community AMIs; vendor-provided or custom! ■  If an API call allows you to set transparent encryption: do it ◆  Start leveraging the new Key Management Service (KMS) ■  Create Identity and Access Management (IAM) for roles ◆  Super user privilege should be done at a user-level ◆  Require two-factor authentication for all remote users ■  Enable logging for as much as you can handle, it may matter Some Tips for Secure IaaS (AWS-focused)

Slide 35

Slide 35 text

Slide 35 Some Tips for Secure SaaS ■  Consider using SAML to tie your SaaS applications into the organization’s existing authentication backend and for SSO ◆  Okta, OneLogin, etc. then provide “portal” access to SaaS ■  Provide solutions to employees before they provide their own ◆  Controlling SaaS is hard… don’t make employees stray! ■  Yep, two-factor authentication for all business services ◆  This includes social media, HR, sales, marketing, etc. ■  If the service allows, create policies for valid IP/geo ranges ◆  This may buy you time, help act as an early alert, etc. ■  Tie these services into your SIEM and actually review reports ◆  Unfortunately, very few SaaS applications do this natively

Slide 36

Slide 36 text

THANK YOU! Mark Stanislav [email protected] Please Remember To Fill Out Your Session Evaluation Forms!