Security in a cloud context David Crooks, for the EGI CSIRT Lessons - - PowerPoint PPT Presentation

security in a cloud context
SMART_READER_LITE
LIVE PREVIEW

Security in a cloud context David Crooks, for the EGI CSIRT Lessons - - PowerPoint PPT Presentation

Security in a cloud context David Crooks, for the EGI CSIRT Lessons learned from recent incidents www.egi.eu EGI-Engage is co-funded by the Horizon 2020 Framework Programme of the European Union under grant number 654142 Cloud Security EGI


slide-1
SLIDE 1

www.egi.eu

EGI-Engage is co-funded by the Horizon 2020 Framework Programme

  • f the European Union under grant number 654142

Security in a cloud context

David Crooks, for the EGI CSIRT

Lessons learned from recent incidents

slide-2
SLIDE 2

EGI Conference 2019 2

EGI CSIRT: Security in a cloud context

Cloud Security

slide-3
SLIDE 3

EGI Conference 2019 3

EGI CSIRT: Security in a cloud context

Features of cloud security

  • Separation between resource provider and

application running on top

  • Split responsibility for security between infrastructure

(eg Openstack) and application/service

  • Applications/services potentially run by non-admins

(by design!)

  • Reuse of images
  • Potential double edged sword: allows ready source

for secure images...

  • ... but one insecure config could have wide impact
slide-4
SLIDE 4

EGI Conference 2019 4

EGI CSIRT: Security in a cloud context

Incidents

slide-5
SLIDE 5

EGI Conference 2019 5

EGI CSIRT: Security in a cloud context

What kind of incidents?

  • Weak passwords
  • Brute force attacks
  • Misconfigured services
  • Unexpected or unintended access to running VMs
  • Network storage with open permissions
  • Remote access mechanisms without proper controls
slide-6
SLIDE 6

EGI Conference 2019 6

EGI CSIRT: Security in a cloud context

Attack via NFS

  • Highlight particular example on FedCloud
  • EGI-20160509
  • Attacker gained access to two FedCloud machines

via world writeable NFS instances

  • Contextualised via orchestrator service with

vulnerable configuration

  • Investigation spanned many sites
  • Setup is easy using these services, but can lead to

propagation of config flaws

slide-7
SLIDE 7

EGI Conference 2019 7

EGI CSIRT: Security in a cloud context

Months later

slide-8
SLIDE 8

EGI Conference 2019 8

EGI CSIRT: Security in a cloud context

Attack via NFS

  • VMs created which were again vulnerable
  • But: detected prior to exploitation
  • EGI-20161013-01 and EGI-20161124-01
  • Emphasises importance of taking action following

incidents to avoid reoccurrence

  • And the importance of good monitoring!
  • Particularly true in a cloud context
  • In this case, lead to review of best practices
slide-9
SLIDE 9

EGI Conference 2019 9

EGI CSIRT: Security in a cloud context

What could be done?

slide-10
SLIDE 10

EGI Conference 2019 10

EGI CSIRT: Security in a cloud context

Community and education

  • Maintain good links between Cloud and Security

teams

  • User education on importance of secure configuration

and use of strong passwords/other access methods

slide-11
SLIDE 11

EGI Conference 2019 11

EGI CSIRT: Security in a cloud context

SECANT

  • Security cloud assessment framework
  • https://github.com/CESNET/secant
  • Developed by CESNET
  • Checks security characteristics of virtual machines

and their images

  • Combines external and internal checks
  • Aims at
  • typical configuration errors
  • vulnerabilities commonly misused by Internet

attackers

  • Being developed for AppDB
slide-12
SLIDE 12

EGI Conference 2019 12

EGI CSIRT: Security in a cloud context

Notes on good practice

  • Signed images - ideally use images from trusted

sources only

  • If not, look at SECANT?
  • Storage encryption
  • Remote logging and security auditing
slide-13
SLIDE 13

EGI Conference 2019 13

EGI CSIRT: Security in a cloud context

Notes on good practice

  • Match security groups to running VMs
  • Shutdown VMs not in use (and isolate/update them

when they come up)

  • Don’t keep sensitive data in the images
  • Monitor network activity
slide-14
SLIDE 14

EGI Conference 2019 14

EGI CSIRT: Security in a cloud context

Notes on good practice

  • Network isolation of cloud services
  • Restrict access from cloud instance to hypervisor
  • Isolate tenants; avoid memory optimisation which

uses de-duplication

  • Keep software patched!
slide-15
SLIDE 15

EGI Conference 2019 15

EGI CSIRT: Security in a cloud context

Other cloud communities

  • Work done in US by Trusted-CI
  • https://trustedci.org/cloud-service-provider-security-

best-practices

slide-16
SLIDE 16

EGI Conference 2019 16

EGI CSIRT: Security in a cloud context

Any questions?