protecting data in untrusted locations
play

Protecting Data in Untrusted Locations An exercise in Real World - PowerPoint PPT Presentation

Protecting Data in Untrusted Locations An exercise in Real World threat modeling. Jan Schaumann 99CE 1DC7 770A C5A8 09A6 @jschauma 0DCD 66CE 4FE9 6F6B D3D7 Me. Errday. Obligatory James Mickens This World of Ours reference.


  1. Protecting Data in Untrusted Locations An exercise in “Real World” threat modeling. Jan Schaumann 99CE 1DC7 770A C5A8 09A6 @jschauma 0DCD 66CE 4FE9 6F6B D3D7

  2. Me. Errday.

  3. Obligatory James Mickens “This World of Ours” reference. Threat Model https://t.co/Ej94YI4Ovr

  4. Obligatory James Mickens “This World of Ours” reference. Threat Model https://t.co/Ej94YI4Ovr

  5. Tweeters gonna tweet

  6. https://t.co/ykdsHGV84r

  7. https://t.co/ykdsHGV84r

  8. https://t.co/ykdsHGV84r

  9. Threat Model Threat Actors: • hackeris vulgaris • organized crime (fsvo “organized”) • local governments or intelligence services • foreign governments or intelligence services

  10. Threat Model Assets: • Physical Equipment • Local Service Access Point • Access/Entry point to Infrastructure • TLS keys

  11. Access/Entry point to Infrastructure • physically protected systems • no “secrets” permanently stored on systems • traffic severely restricted • all traffic must be mutually authenticated

  12. Obligatory XKCD comic. This also works. https://www.xkcd.com/538/

  13. TLS keys

  14. TLS keys Y U NO HSM?

  15. No time to explain - get in the llama!

  16. Booting First time: • boot into single-user mode • generate TPM-backed CSR • submit CSR to service in datacenter • cert generated, used to encrypt client puppet key • encrypted puppet key stored in host image Nth time: • iPXE via TLS • init script decrypts puppet key using TPM • puppet does its thing

  17. “Reflections on Trusting Trust” Obligatory reference. http://cm.bell-labs.com/who/ken/trust.html

  18. Wile E. Coyote has an MBA. Cost of Attack Wile’s ROI Value of Asset

  19. Wile E. Coyote has an MBA. Cost of Attack Wile’s ROI Value of Asset

  20. Raising the cost of attack Wile E. Coyote needs: • physical access • ability to attack running system • persistent undetected presence

  21. Wile E. Coyote has an MBA. Cost of Attack Wile’s ROI Value of Asset

  22. Wile E. Coyote has an MBA. Cost of Attack Wile’s ROI Value of Asset

  23. Reducing the value of TLS keys • Forward Secrecy • tightly scoped certificates • short-lived • alert if observed outside of expected env

  24. Possible scenarios • hardware compromised prior to us racking it • resources compromised through temporary physical access (ACME backdoor) • ACME fake hole, ACME rocket powered roller skates, ACME do-it- yourself tornado kit, ACME earthquake pills, ...

  25. Lessons: You can’t just rub some crypto on it. http://youtu.be/YsY2-yi5W74

  26. Lessons: Know your assets, know your adversaries.

  27. Thanks! (now get in the llama!) Jan Schaumann 54FE 193F 64ED DD0B CFDE @jschauma 40D6 1983 626F 1E52 3D3A

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend