cse543 computer and network security module cloud
play

CSE543 Computer and Network Security Module: Cloud Computing - PowerPoint PPT Presentation


  1. �������฀฀���฀฀�������� ��������������฀�������� � � �������฀���฀��������฀��������฀������ ����������฀��฀��������฀�������฀���฀����������� ������������฀�����฀�����������฀����������฀����฀฀�� CSE543 Computer and Network Security Module: Cloud Computing Professor Trent Jaeger Systems and Internet Infrastructure Security Laboratory (SIIS) Page 1 Friday, November 30, 12

  2. Cloud Computing Is Here Systems and Internet Infrastructure Security (SIIS) Laboratory Page 2 Friday, November 30, 12

  3. Cloud Computing Is Here Systems and Internet Infrastructure Security (SIIS) Laboratory Page 2 Friday, November 30, 12

  4. Cloud Computing Is Here Systems and Internet Infrastructure Security (SIIS) Laboratory Page 2 Friday, November 30, 12

  5. Cloud Computing Is Here Systems and Internet Infrastructure Security (SIIS) Laboratory Page 2 Friday, November 30, 12

  6. Cloud Computing Is Here Systems and Internet Infrastructure Security (SIIS) Laboratory Page 2 Friday, November 30, 12

  7. Cloud Computing Is Here Systems and Internet Infrastructure Security (SIIS) Laboratory Page 2 Friday, November 30, 12

  8. Cloud Computing Is Here Systems and Internet Infrastructure Security (SIIS) Laboratory Page 2 Friday, November 30, 12

  9. Cloud Computing Is Here Systems and Internet Infrastructure Security (SIIS) Laboratory Page 2 Friday, November 30, 12

  10. Cloud Computing Is Here Systems and Internet Infrastructure Security (SIIS) Laboratory Page 2 Friday, November 30, 12

  11. Cloud Computing Is Here Systems and Internet Infrastructure Security (SIIS) Laboratory Page 2 Friday, November 30, 12

  12. Cloud Computing Is Here Why not use it? Systems and Internet Infrastructure Security (SIIS) Laboratory Page 2 Friday, November 30, 12

  13. What’s Happening in There? Systems and Internet Infrastructure Security (SIIS) Laboratory Page 3 Friday, November 30, 12

  14. From Data Center to Cloud Systems and Internet Infrastructure Security (SIIS) Laboratory Page 4 Friday, November 30, 12

  15. From Data Center to Cloud Systems and Internet Infrastructure Security (SIIS) Laboratory Page 4 Friday, November 30, 12

  16. From Data Center to Cloud Systems and Internet Infrastructure Security (SIIS) Laboratory Page 4 Friday, November 30, 12

  17. Reasons to Doubt • History has shown they are vulnerable to attack ‣ SLAs, audits, and armed guards offer few guarantees ‣ Insiders can subvert even hardened systems Incident Attack Vector Data Loss Incidents 986 903 Accidental 770 23% 695 678 641 External Insider 54% 16% Unknown 7% ‘06 ‘07 ‘08 ‘09 ‘10 ‘11 Credit: The Open Security Foundation datalossdb.org Systems and Internet Infrastructure Security Laboratory (SIIS) Page 5 Friday, November 30, 12

  18. What is Cloud Computing? • Cloud vendor provides computing resources for rent by customers • What do you want to rent? ‣ Hosts (Infrastructure as a Service) • Rent cycles: Amazon EC2, Rackspace Cloud Servers ‣ Environment (Platform as a Service) • Rent instances: Microsoft Azure, Google App Engine ‣ Programs (Software as a Service) • Rent services: Salesforce, Google Docs • Other variations can be rented Systems and Internet Infrastructure Security Laboratory (SIIS) Page 6 Friday, November 30, 12

  19. What is Cloud Computing? Systems and Internet Infrastructure Security Laboratory (SIIS) Page 7 Friday, November 30, 12

  20. IaaS Cloud Example Cloud Client Customer Cloud API Cloud Instances Database Cloud Message Queue Node Image Volume Network Scheduler Store Store Controller Systems and Internet Infrastructure Security (SIIS) Laboratory Page 8 Friday, November 30, 12

  21. Multiple Stakeholders Client Data Are my data protected? Clients Cloud Are my services Instance (VM) running correctly? Service Providers Is my platform secure? Cloud Node Cloud Administrators Systems and Internet Infrastructure Security (SIIS) Laboratory Page 9 Friday, November 30, 12

  22. Cloud Complexity • Cloud environment challenges ‣ Opaque, Complex, Dynamic ‣ Insiders, Instances, Co-hosting Client Service Systems and Internet Infrastructure Security Laboratory (SIIS) Page 10 Friday, November 30, 12

  23. Cloud Complexity • Cloud environment challenges ‣ Opaque, Complex, Dynamic ‣ Insiders, Instances, Co-hosting Cloud Cloud Cloud Client Node Node Platform Cloud Cloud Node Node Systems and Internet Infrastructure Security Laboratory (SIIS) Page 10 Friday, November 30, 12

  24. Cloud Complexity • Cloud environment challenges ‣ Opaque, Complex, Dynamic ‣ Insiders, Instances, Co-hosting Cloud Cloud Client Node Node Cloud Cloud Node Node Systems and Internet Infrastructure Security Laboratory (SIIS) Page 10 Friday, November 30, 12

  25. Cloud Complexity • Cloud environment challenges ‣ Opaque, Complex, Dynamic ‣ Insiders, Instances, Co-hosting VM Cloud Cloud Client Node Node Cloud Cloud Node Node Systems and Internet Infrastructure Security Laboratory (SIIS) Page 10 Friday, November 30, 12

  26. Cloud Complexity • Cloud environment challenges ‣ Opaque, Complex, Dynamic ‣ Insiders, Instances, Co-hosting VM Cloud Cloud Client Node Node Cloud Cloud Node Node Systems and Internet Infrastructure Security Laboratory (SIIS) Page 10 Friday, November 30, 12

  27. Cloud Complexity • Cloud environment challenges ‣ Opaque, Complex, Dynamic ‣ Insiders, Instances, Co-hosting VM VM Cloud Cloud Client Node Node Cloud Cloud Node Node Systems and Internet Infrastructure Security Laboratory (SIIS) Page 10 Friday, November 30, 12

  28. Cloud Complexity • Cloud environment challenges ‣ Opaque, Complex, Dynamic ‣ Insiders, Instances, Co-hosting VM VM Cloud Cloud Client Node Node Cloud Cloud Node Node Systems and Internet Infrastructure Security Laboratory (SIIS) Page 10 Friday, November 30, 12

  29. Cloud Complexity • Cloud environment challenges ‣ Opaque, Complex, Dynamic ‣ Insiders, Instances, Co-hosting VM VM VM Cloud Cloud Client Node Node VM Cloud Cloud Node Node Systems and Internet Infrastructure Security Laboratory (SIIS) Page 10 Friday, November 30, 12

  30. Cloud Complexity • Cloud environment challenges ‣ Opaque, Complex, Dynamic ‣ Insiders, Instances, Co-hosting VM VM Cloud Cloud Client Node Node VM VM Cloud Cloud Node Node Systems and Internet Infrastructure Security Laboratory (SIIS) Page 10 Friday, November 30, 12

  31. Insider Threats • May trust the cloud vendor company ‣ But, do you trust all its employees? • Insiders can control platform ‣ Determine what software runs consumers’ code • Insiders can monitor execution ‣ Log instance operation from remote • Insiders may have physical access ‣ Can monitor hardware, access physical memory, and tamper secure co-processors Systems and Internet Infrastructure Security Laboratory (SIIS) Page 11 Friday, November 30, 12

  32. Insider’s Physical Access Systems and Internet Infrastructure Security Laboratory (SIIS) Page 12 Friday, November 30, 12

  33. Cloud Nodes Server Systems and Internet Infrastructure Security Laboratory (SIIS) Page 13 Friday, November 30, 12

  34. Cloud Nodes • Clouds manages node provisioning ‣ Administers PKI for machine identities ‣ Network installs a master disk image and customizes Server Systems and Internet Infrastructure Security Laboratory (SIIS) Page 13 Friday, November 30, 12

  35. Cloud Nodes • Clouds manages node provisioning ‣ Administers PKI for machine identities ‣ Network installs a master disk image and customizes PKI Server Systems and Internet Infrastructure Security Laboratory (SIIS) Page 13 Friday, November 30, 12

  36. Cloud Nodes • Clouds manages node provisioning ‣ Administers PKI for machine identities ‣ Network installs a master disk image and customizes PKI Server Systems and Internet Infrastructure Security Laboratory (SIIS) Page 13 Friday, November 30, 12

  37. Cloud Nodes • Clouds manages node provisioning ‣ Administers PKI for machine identities ‣ Network installs a master disk image and customizes Server Systems and Internet Infrastructure Security Laboratory (SIIS) Page 13 Friday, November 30, 12

  38. Cloud Nodes • Clouds manages node provisioning ‣ Administers PKI for machine identities ‣ Network installs a master disk image and customizes Server Systems and Internet Infrastructure Security Laboratory (SIIS) Page 13 Friday, November 30, 12

  39. Cloud Nodes • Clouds manages node provisioning ‣ Administers PKI for machine identities ‣ Network installs a master disk image and customizes Server Systems and Internet Infrastructure Security Laboratory (SIIS) Page 13 Friday, November 30, 12

  40. Cloud Nodes • Clouds manages node provisioning ‣ Administers PKI for machine identities ‣ Network installs a master disk image and customizes Cloud Server Node Systems and Internet Infrastructure Security Laboratory (SIIS) Page 13 Friday, November 30, 12

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend