utsa
play

UTSA Community-Based Secure Information and Resource Sharing in - PowerPoint PPT Presentation

UTSA Community-Based Secure Information and Resource Sharing in Azure Cloud IaaS Cyber Incident Response Models for Information and Resource Sharing Yun Zhang, Farhan Patwa , Ravi Sandhu Institute for Cyber Security University of Texas at


  1. UTSA Community-Based Secure Information and Resource Sharing in Azure Cloud IaaS Cyber Incident Response 
 Models for Information and Resource Sharing Yun Zhang, Farhan Patwa , Ravi Sandhu Institute for Cyber Security University of Texas at San Antonio San Antonio, TX 78249 May 30, 2016 Presented by: Amy(Yun) Zhang

  2. UTSA Overview • Motivations • Scope • Background • Secure Isolated Domain (SID) Concept • Azure Access Control Model • Azure SID Model • Enforcement • Conclusion 2

  3. UTSA Motivations • Cyber Collaboration Initiatives • Cyber attacks are becoming increasingly sophisticated. – Hard to defend by a single organization on its own. • Collaborate to enhance situational awareness – Share cyber information • M alicious activities • Technologies, tools, procedures, analytics. • Dominant IaaS cloud platforms are lacking models for group sharing Ref: www.huffingtonpost.co.uk/2013/04/23/uk-government- faces-1000-cyber-attacks-a-day_n_3138164.html 3

  4. UTSA Scope • Sharing models — sharing amongst a set of organizations – Information, infrastructure, tools, analytics, etc. – May want to share malicious or infected code/ systems (e.g. virus, worms, etc.) – Sensitive • Cloud service models — focus on Infrastructure as a Service (IaaS) — Microsoft Azure • Scenario — Cyber Incident Response 4

  5. UTSA Traditional Cyber Collaboration • Traditional collaboration – Subscription services – Limitations • Organizations Sharing information through subscription. • Organizations are not actively participating in analyzing and processing the cyber information they submit. • Organizations don't directly interact with each other on sharing activities. 5

  6. UTSA Cloud IaaS Advantages for 
 Cyber Incident Sharing • Virtualized resources – Theoretically, one can take a snapshot and mobilize • Operational efficiency – Light-weight and agile – Rapid deployment and configuration – Dynamic scaling – Self-service 6

  7. UTSA Sharing Model in Cloud IaaS Add/Remove Data Add/Remove View #1: Org C Data View #1: Org A Participant Sharing Participant C Group A Join/Leave Join/Leave Users Users Add/Remove Join/Leave Data Users Participant B View #1: Org B 7 refer paper: Towards a framework for group-centric secure collaboration.

  8. UTSA Community Cyber Incident Response Governance Incident Response Group Organization Cyber Security External Security Committee Experts Specialists Conditional Shared Membership Information 8 refer paper: RT-based administrative models for community cyber security information sharing.

  9. UTSA Cyber Collaboration in Cloud • Cloud platform — IaaS – Community in Cloud – Cyber Security Committee. – Organizations routinely collect cyber information. – Cross organization cyber collaborations. 9

  10. UTSA Secure Isolated Domain (SID) Model Secure Isolated Domain (SID) Secure Secure Core Open Isolated Isolated Project Project Project Project (CP) (OP) SIP-1 SIP-n Expert-1 Expert-k Org-1 Org-m Community Experts 10

  11. UTSA Sharing Model in Cloud IaaS Add/Remove Data Add/Remove View #1: Org C Data Secure View #1: Org A Participant Isolated View #2: SID Participant C View #2: SID Domain A Join/Leave (SID) Join/Leave Users Users Add/Remove Join/Leave Data Users Participant B Can create multiple View #1: Org B secure isolated projects View #2: SID (SIPs) within SID with different controls 11

  12. UTSA Microsoft Azure • Popular public cloud software – Microsoft Azure: is a cloud computing platform and infrastructure created by Microsoft for building, deploying, and managing applications and services through a global network of Microsoft-managed datacenters. 12 Ref: https://azure.microsoft.com/

  13. UTSA Azure Access Control Model Accounts Resources Services (A) Account (RS) (S) Ownership AAD Subscription Resource (AO) Ownership Ownership Co-Ownership (AADO) (SubO) (RO) ot_ OT Subscription resource Ownership Assignment Azure Active (OTO) (SA) Subscriptions Directories (Sub) (AAD) RG AADRoles Group Ownership Ownership Ownership Object (RGO) (AADRO) (GO) Types (OT) Group *Permission RG-R pair AAD User Assignment Assignment Resource Ownership (GA) (PA) AADRoles Groups Roles Groups (AADUO) PRMS (AADR) (G) (R) (RG) User user_ AADAdmin Assignment group Operations User (UA) (OP) Assignment (AADAUA) SubAdmin User SUBRole Assignment Ownership AAD NonAAD (SAUA) (SubRA) SubRoles Users Users (SubR) (AADU) (NAADU) Resource Co-Ownership (RO) 13

  14. UTSA Azure Access Control Model with SID Extension Core Open SIPs Project Project [Sub] [Sub] [Sub] SIP/CP/OP Resource Ownership Co-Ownership (SIPO/CPO/OPO) RG (RO) Services Ownership (S) (RGO) RG RG Ownership Ownership (RGO) (RGO) OT Resources SIDs Ownership ot_ (RS) Resource (OTO) resource Groups (RG) Object RG-R pair SID- Types Association (OT) Permission (assoc) Assignment (PA) Roles PRMS (R) Organization Accounts Operations (OA) User (OP) Assignment (UA) User Resource Ownership Co-Ownership (UO) (RO) Expert Users Users (U) 14 (EU)

  15. UTSA SID Service 15

  16. UTSA Enforcement • Azure Account Resource Division Azure Account Subscription 1 Subscription 2 Subscription N Resource Resource Resource Resource Resource Group 1-1 Group 1-2 Group 2-1 Group N-1 Group N-X VM1 VM1 VM1 VM2 VM2 VM3 16

  17. UTSA Enforcement • Setting up SID service – Create two roles in the Core Project account: CPadmin and CPmember – CPadmin allows the user have limited administrative power to use the role CPmember and specify policies for users from his organization. – Create one role in the Open Project account: OPmember – CPadmin allows all users from the community to access the Open Project account . – SID manager maintains a list of security administrative users ( uSet ) from organizations. 17

  18. UTSA Enforcement • SIP request 18

  19. UTSA Conclusion and future work • Developed sharing models – Formal specification • Enhanced Azure Cloud IaaS with SID/SIP capabilities – Cyber incident response capabilities • Self-service • SID/SIP specific security • Share data, tools, etc. in an isolated environment • Ability to execute and analyze malicious code in an isolated environment • Future work – more fine grained access control within a SIP – compare SID/SIP enforcement on dominant IaaS cloud platforms (OpenStack, AWS and Azure) 19

  20. UTSA Thanks! 20

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend