computation may someday be organized as a public utility
play

computation may someday be organized as a public utility John - PowerPoint PPT Presentation

Security and Cloud Computing computation may someday be organized as a public utility John McCarthy, 1960 2 How did we get here? Security and Cloud Computing 3 What Is Cloud Computing? On-demand self-service Add or


  1. Security and Cloud Computing “… computation may someday be organized as a public utility…” – John McCarthy, 1960 2

  2. How did we get here? Security and Cloud Computing 3

  3. What Is Cloud Computing? • On-demand self-service • Add or subtract resources as necessary • Broad network access • Mobile, desktop, mainframe • Resource pooling • Multiple tenants share resources that can be reassigned dynamically according to need and invisibly to the tenants • Rapid elasticity • Services can quickly and automatically scale up or down to meet customer need • Measure service • Like water, gas, or telephone service, usage can be monitored for billing 4

  4. Cloud Model Applies at all Levels of the IT Stack – Resulting in Different Security Requirements, Different Responsibilities Y The Cloud
 T I Curtain R U C E S The Cloud
 Y T I Curtain R U C E S Y Curtain T I R U C E S 5 Security and Cloud Computing 5

  5. Service Models Administered Applications by the SaaS Provider Application Platform: Tools and APIs for Building and Deploying Applications Administered by the PaaS Provider Virtual Machines, Virtual Volume Storage, Virtual Networking Equipment Hypervisor Administered by the IaaS Provider Hardware: Servers, Storage Devices, and Networking Equipment 6

  6. Cloud Computing Delivery Models Community … Several organizations with 
 • similar needs and policies 
 share a private cloud Private … Public … Access limited to enterprise Cloud Services • Access open to everybody, • and its partner network subject to subscription Dedicated resources • Shared resources • Single tenant • Multiple tenants Cloud Computing • Drives e ffi ciency, • Delivers select set of • Model standardization and best standardized business practices while retaining process, application and/or greater customization and infrastructure services on a control flexible price per use basis Might be managed or hosted • • Always managed and hosted Hybrid … by third party by 3 rd party Private infrastructure, • integrated with public cloud Customization, e ffi ciency, availability, resiliency, 
 Standardization, capital security and privacy … preservation, flexibility and time to deploy … Security and Cloud Computing 7

  7. Move it to the cloud? 8

  8. Categories of Cloud Computing Risks Data Control Migrating workloads to a shared network and Many companies and governments are compute infrastructure increases the potential for uncomfortable with the idea of their information unauthorized exposure. located on systems they do not control. Authentication and access Providers must offer a high degree of technologies become increasingly security transparency to help 
 important. put customers at ease. Reliability High availability will be a key concern. 
 IT departments will worry about a loss of 
 service should outages occur. Mission critical applications may not run in the cloud without strong Compliance availability guarantees. Security Management Complying with SOX, HIPAA 
 and other regulations may prohibit the use Even the simplest of tasks may be behind layers of of clouds for some applications. abstraction or performed by someone else. Providers must supply easy controls to Comprehensive auditing manage security settings for application and capabilities are essential. runtime environments. Security and Cloud Computing 9

  9. Cloud Migration Risk Analysis • Identify assets • Determine vulnerabilities • Estimate likelihood of exploitation • Compute expected loss • Survey and select new controls • Project savings 10

  10. • How sensitive is the data moving to the cloud? • Do we need to share that data with anyone? What access controls are needed? • Export controls or other regulations? • Does the CSP expect us to share our crypto keys with them? • How will the CSP support changing crypto keys? 11

  11. Cloud Storage • By default, most cloud storage solutions either store users’ data unencrypted or encrypt all data for all customers using a single key and therefore don’t provide strong confidentiality • Some cloud services provide better confidentiality by generating keys on a per-user basis based on that user’s password or some other secret • For maximum confidentiality, some cloud providers embrace a trust no one (TNO) model in which even the provider does not have the keys to decrypt user data 12

  12. Cloud Provider Assessment • Security issues to consider: • Authentication, authorization, and access control options • Encryption options • Audit logging capabilities • Incident response capabilities • Reliability and uptime • Resources to help with assessment: • FedRAMP • PCI DSS • CSA STAR 13

  13. Switching Cloud Providers • Switching cloud providers is expensive and di ffi cult but sometimes becomes necessary and urgent • It is best to have backup options in place in case a migration away from a cloud provider is necessary, but many cloud providers make that practically impossible • SaaS providers are generally hardest to migrate away from, followed by PaaS, then IaaS 14

  14. What about security in the cloud? Security and Cloud Computing 15

  15. Security Benefits of Cloud Services • Geographic diversity • Many cloud providers run data centers in disparate geographic locations and mirror data across locations, providing protection from natural and other local disasters. • Platform and infrastructure diversity • Di ff erent platforms and infrastructures mean di ff erent bugs and vulnerabilities, which makes a single attack or error less likely to bring a system down. Using cloud services as part of a larger system can be a good way to diversify your technology stack. 16

  16. Cloud-Based Security Functions • Some security functions may be best handled by cloud service providers: • Email filtering • Since email is already hopping through a variety of SMTP servers, adding a cloud-based email filter is as simple as adding another hop. • DDoS protection • Cloud-based DDoS protection services update your DNS records to insert their servers as proxies in front of yours. They maintain su ffi cient bandwidth to handle the flood of attack tra ffi c. • Network monitoring • Cloud-based solutions can help customers deal with steep hardware requirements and can provide monitoring and incident response expertise. 17

  17. What about data protection in the cloud? Security and Cloud Computing 18

  18. Cloud Functionality vs. Privacy If we have to choose, 
 which do you think will win? Security and Cloud Computing 19

  19. “The old way is to treat our infrastructure as pets: you name your equipment and when it gets sick you nurse it back to health. The new way is to treat your infrastructure as cattle: you number your equipment and when one gets sick you shoot it.” –Trevor Pott ( The Register ) 20

  20. Homomorphic Encryption 21

  21. Illustration from American Scientist, 2012 22

  22. Illustration from American Scientist, 2012 23

  23. Illustration from American Scientist, 2012 24

  24. Illustration from American Scientist, 2012 25

  25. Performance then and now • Prior to Gentry’s breakthrough, HE was essentially impossible • Over the last four years, performance has improved by 3 orders of magnitude (3500x) – 2010 : 2 gates in 1 hour – 2013 : 128-bit AES, 20000 gates, in 3 hours – 2018 : 26

  26. IBM’s HElib * on github HElib is a software library that implements homomorphic encryption (HE). This library is written in C++ and uses the NTL mathematical library. It is distributed under the terms of the GNU General Public License (GPL). * https://github.com/shaih/HElib 27

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend