utsa
play

UTSA Community-Based Secure Information and Resource Sharing in AWS - PowerPoint PPT Presentation

UTSA Community-Based Secure Information and Resource Sharing in AWS Public Cloud Cyber Incident Response A Model for Information and Resource Sharing Amy(Yun) Zhang, Farhan Patwa, Ravi Sandhu Institute for Cyber Security University of Texas


  1. UTSA Community-Based Secure Information and Resource Sharing in AWS Public Cloud Cyber Incident Response 
 A Model for Information and Resource Sharing Amy(Yun) Zhang, Farhan Patwa, Ravi Sandhu Institute for Cyber Security University of Texas at San Antonio CIC, Oct 2015, Hangzhou, China Presented by: Ravi Sandhu

  2. UTSA Public Cloud • Public cloud provides cloud services for self- service use by general public over the internet. • Amazon Web Service (AWS) • Communities in public cloud • organizations with shared concern, such as mission, security requirements, business models, etc. • self-formed and self-organized. 2

  3. UTSA Cyber Collaboration Initiatives • Cyber attacks are becoming increasingly sophisticated. – Hard to defend by a single organization on its own. • Collaborate to enhance situational awareness – Share cyber information in community • M alicious activities • Technologies, tools, procedures, analytics. Ref: www.huffingtonpost.co.uk/2013/04/23/uk-government- faces-1000-cyber-attacks-a-day_n_3138164.html 3

  4. UTSA Secure Isolated Domain (SID) Model Secure Isolated Domain (SID) Secure Secure Core Open Isolated Isolated Project Project Project Project (CP) (OP) SIP-1 SIP-n 4

  5. UTSA SID Model Secure Isolated Domain (SID) Secure Secure Core Open Isolated Isolated Project Project Project Project (CP) (OP) SIP-1 SIP-n Expert-1 Expert-k Org-1 Org-m Community Experts 5

  6. UTSA Assumptions and Scope • In a public cloud platform • Amazon Web Service (AWS) • Sharing amongst a set of organizations – Sensitive cyber information, infrastructure, tools, analytics, etc. – May share malicious or infected code/systems (e.g. virus, worms, etc.) • Focus on access control model 6

  7. UTSA Amazon Web Service (AWS) • Dominant public cloud software – Amazon Web Services ( AWS ), a collection of remote computing services, also called web services, make up a cloud-computing platform offered by Amazon.com. 7 Ref: https://en.wikipedia.org/wiki/Amazon_Web_Services

  8. UTSA AWS Access Control Model • AWS Access Control within a Single Account Groups Virtual (G) Services Permission (S) Assignment Group (VPA) Ownership (GO) user_ OT group Ownership (OTO) Virtual Permission User Assignment Ownership Object (VPA) Accounts (UO) Users Types (A) (U) (OT) Virtual Permission virtual PRMS Assignment Roles user_role (VPA) Ownership (RO) Operations “Roles” (OP) (R) 8

  9. UTSA AWS Access Control Model • AWS Access Control Across Accounts [Users in account A access services and resources in account B] Account B Services (S) Roles OT Ownership Ownership (RO) (OTO) Virtual Permission User virtual Assignment Ownership user_role Object (VPA) (UO) Users “Roles” Account A Types (U) (R) (OT) PRMS Operations (OP) 9

  10. UTSA SID Model Secure Isolated Domain (SID) Secure Secure Core Open Isolated Isolated Project Project Project Project (CP) (OP) SIP-1 SIP-n Expert-1 Expert-k Org-1 Org-m Community Experts 10

  11. UTSA AWS Access Control Model with SID Extension Secure Isolated Secure Accounts Domain Isolated (A) (SID) Project [Non-community SIP_ (SIP) Organizations] SID_ association association (assoc) Roles User (uSet) Ownership Ownership (RO) (UO) Accounts virtual (A) user_role [Community Expert Organizations] (VUR) “Roles” Users virtual (R) (EU) virtual User user_role user_role Ownership (VUR) (UO) (VUR) virtual Roles user_role Ownership Core Users (VUR) “Roles” (RO) Project (U) (R) virtual (CP) user_role (VUR) Roles Ownership Open (RO) “Roles” Project (R) (OP) Virtual Virtual Permission Permission Virtual Assignment Assignment Permission (VPA) (VPA) Assignment (VPA) OT Ownership Object PRMS (OTO) Operations Services Types (OP) (S) (OT) 11

  12. UTSA AWSAC-SID Administrative Model • SipCreate(subuSet, sip) 
 /* A subset of organization security admin users together create a sip */ • SipDelete(subuSet, sip) 
 /* The same subset of security admin users together delete a sip */ • CpUserAdd(adminu, u) 
 /* CP admin add a user from his home account to CP */ • CpUserRemove(adminu, u) 
 /* CP admin remove a user from CP */ • SIPUserAdd(adminu, u, r, sip) 
 /* Sip admin add a user from his home account to SIP */ • SIPUserRemove(adminu, u, r, sip) 
 /* Sip admin remove a user from SIP */ • OpenUserAdd(u) 
 /* Users add themselves to OP */ • OpenUserRemove(u) 
 /* Users remove themselves from OP */ 12

  13. UTSA AWSAC-SID Administrative Model • CpEUserAdd(adminu, eu) 
 /* CP admin add an expert user to CP */ • CpEUserRemove(adminu, eu) 
 /* CP admin remove an expert user from CP */ • SipEUserAdd(adminu, eu, r, sip) 
 /* SIP admin add an expert user to SIP */ • SipEUserRemove(adminu, eu, r, sip) 
 /* SIP admin remove an expert user from SIP */ • CpCopyObject(u, o1, o2) 
 /* Users copy object from organization accounts to CP */ • CpExportObject(adminu, o1, o2) 
 /* Admin users export object from CP to organizations accounts */ • SipCopyObject(u, r, o1, o2, sip) 
 /* Users copy object from organization accounts to a SIP */ • SipExportObject(adminu, o1, o2, sip) 
 /* Admin users export object from SIP to organization accounts */ 13

  14. UTSA Enforcement • SID Service Setting-up SID Operational Services Accounts (S) Roles OT Ownership Ownership (RO) (OTO) Virtual Virtual User Permission user_role Assignment Ownership [AssumeRole] Object (VPA) SID Manager (UO) Users “Roles” Types Account (U) (R) [Special (OT) Permission Assignment] PRMS Operations (OP) 14

  15. UTSA Enforcement • Setting up SID service – Create two roles in the Core Project account: CPadmin and CPmember – CPadmin allows the user have limited administrative power to use the role CPmember and specify policies for users from his organization. – Create one role in the Open Project account: OPmember – CPadmin allows all users from the community to access the Open Project account . – SID manager maintains a list of security administrative users ( uSet ) from organizations. 15

  16. UTSA Enforcement • SIP User Assignment SIP Accounts Services (S) Roles OT Ownership Ownership (RO) (OTO) Virtual Virtual User Permission user_role Ownership Assignment [AssumeRole] Object Organization (UO) Users “Roles” (VPA) Types Accounts (U) (R) (OT) PRMS Operations (OP) 16

  17. UTSA Enforcement • SIP request handling – Users from uSet send a SIP request to SID manager – SID manager creates a SIP – SID manager associates the group of organizations to the SIP – Two roles are created in the SIP account: SIPadmin and SIPmember – SIPadmin allows the user have limited administrative power to use the role SIPmember and specify policies for users from organizations to join the SIP – SID manager returns an SIP account number with the name of the SIPadmin role to each user from uSet . 17

  18. UTSA Conclusion and future work • Suggested AWSAC and AWSAC-SID models to AWS public cloud – Allow c yber collaboration across organizations • cyber incident response • Self-service • Future work – Explore other model options. – Explore local roles in the model. – Explore models in other dominant cloud platforms. 18

  19. UTSA Thanks! 19

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend