security in a cloud context
play

Security in a cloud context David Crooks, for the EGI CSIRT Lessons - PowerPoint PPT Presentation

Security in a cloud context David Crooks, for the EGI CSIRT Lessons learned from recent incidents www.egi.eu EGI-Engage is co-funded by the Horizon 2020 Framework Programme of the European Union under grant number 654142 Cloud Security EGI


  1. Security in a cloud context David Crooks, for the EGI CSIRT Lessons learned from recent incidents www.egi.eu EGI-Engage is co-funded by the Horizon 2020 Framework Programme of the European Union under grant number 654142

  2. Cloud Security EGI Conference 2019 2 EGI CSIRT: Security in a cloud context

  3. Features of cloud security • Separation between resource provider and application running on top • Split responsibility for security between infrastructure (eg Openstack) and application/service • Applications/services potentially run by non-admins (by design!) • Reuse of images • Potential double edged sword: allows ready source for secure images... • ... but one insecure config could have wide impact EGI Conference 2019 3 EGI CSIRT: Security in a cloud context

  4. Incidents EGI Conference 2019 4 EGI CSIRT: Security in a cloud context

  5. What kind of incidents? • Weak passwords • Brute force attacks • Misconfigured services • Unexpected or unintended access to running VMs • Network storage with open permissions • Remote access mechanisms without proper controls EGI Conference 2019 5 EGI CSIRT: Security in a cloud context

  6. Attack via NFS • Highlight particular example on FedCloud • EGI-20160509 • Attacker gained access to two FedCloud machines via world writeable NFS instances • Contextualised via orchestrator service with vulnerable configuration • Investigation spanned many sites • Setup is easy using these services, but can lead to propagation of config flaws EGI Conference 2019 6 EGI CSIRT: Security in a cloud context

  7. Months later EGI Conference 2019 7 EGI CSIRT: Security in a cloud context

  8. Attack via NFS • VMs created which were again vulnerable • But: detected prior to exploitation • EGI-20161013-01 and EGI-20161124-01 • Emphasises importance of taking action following incidents to avoid reoccurrence • And the importance of good monitoring! • Particularly true in a cloud context • In this case, lead to review of best practices EGI Conference 2019 8 EGI CSIRT: Security in a cloud context

  9. What could be done? EGI Conference 2019 9 EGI CSIRT: Security in a cloud context

  10. Community and education • Maintain good links between Cloud and Security teams • User education on importance of secure configuration and use of strong passwords/other access methods EGI Conference 2019 10 EGI CSIRT: Security in a cloud context

  11. SECANT • Security cloud assessment framework • https://github.com/CESNET/secant • Developed by CESNET • Checks security characteristics of virtual machines and their images • Combines external and internal checks • Aims at • typical configuration errors • vulnerabilities commonly misused by Internet attackers • Being developed for AppDB EGI Conference 2019 11 EGI CSIRT: Security in a cloud context

  12. Notes on good practice • Signed images - ideally use images from trusted sources only • If not, look at SECANT? • Storage encryption • Remote logging and security auditing EGI Conference 2019 12 EGI CSIRT: Security in a cloud context

  13. Notes on good practice • Match security groups to running VMs • Shutdown VMs not in use (and isolate/update them when they come up) • Don’t keep sensitive data in the images • Monitor network activity EGI Conference 2019 13 EGI CSIRT: Security in a cloud context

  14. Notes on good practice • Network isolation of cloud services • Restrict access from cloud instance to hypervisor • Isolate tenants; avoid memory optimisation which uses de-duplication • Keep software patched! EGI Conference 2019 14 EGI CSIRT: Security in a cloud context

  15. Other cloud communities • Work done in US by Trusted-CI • https://trustedci.org/cloud-service-provider-security- best-practices EGI Conference 2019 15 EGI CSIRT: Security in a cloud context

  16. Any questions? EGI Conference 2019 16 EGI CSIRT: Security in a cloud context

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend