14.1 - Cloud Computing
14.1 - Cloud computing
Key Terms:
- Content security policy (CSP) - A trusted entity that gives subscribers tokens and electronic credentials.
- Domain name system security extensions (DNSSEC) - A network control.
- Triple data encryption standard (3DES) - A symmetric-key block cipher.
- Structured query language (SQL) - A standard computing language used with relational database management/manipulation.
- Cloud access security broker (CASB) - CASB is a software that sits between cloud service users and cloud applications to monitor all activity and enforce security policies.
- Infrastructure as a service (IaaS) - IaaS is a cloud computing service model that delivers infrastructure to the client.
- Platform as a service (PaaS) - PaaS is a cloud computing service model that delivers everything a developer needs to build an application.
- Software as a service (SaaS) - SaaS is a cloud computing service model that delivers software applications to the client.
- Quality of service (QoS) - QoS is network control.
- Service-level agreement (SLA) - SLA is an agreement between a service provider and a client, like a contract.
- System development life cycle (SDLC) - SDLC is an application layer control.
- Data loss prevention (DLP) - DLP is information control.
- Content management framework (CMF) - CMF is information control.
- Information security management program (ISMP) - ISMP is a program that protects information from being deleted, modified or stolen.
- Governance risk compliance (GRC) - Management control
- Identity and access management (IAM) - Management control
- Virtual appliance/virtual machine (VA/VM) - Management control
- Network intrusion detection system/network intrusion protection system (NIDS/NIPS) - Network control
- Open authorisation (OAuth) - Network control
- Root of trust (RoT) - Security control
- Host-based intrusion detection system/host-based intrusion protection system (HIDS/HIPS) - HIDS/HIPS is a computation and storage control.
- LoadStorm - LoadStorm is a cloud load testing solution to find the scalability of web or mobile applications.
- BlazeMeter - BlazeMeter is a continuous testing solution to help with the early stages of app development.
- JMeter - JMeter is an Apache project used as a load testing tool for analyzing and measuring the performance of a variety of services, especially web applications.
- Nexpose - Nexpose is a vulnerability scanner that strives to support the entire vulnerability management lifecycle. It integrates with Rapid7's Metasploit for vulnerability exploitation.
Threats
In a regular system, data transmissions are secured behind ACLs, encryption, firewalls, ect... With a cloud-based system, all that data is being transmitted over the internet to a third party server. The cloud provider must be able to secure your data safely to prevent breaches and loss. Cloud providers may claim that their services are secure, however, breaches and hacking incidents have occurred on various cloud services before.
Data Loss
Large scale data loss is not very common with reliable cloud providers however, small data loss is common. An incident may occur where data is wiped by accident either by human or machine error. To mitigate this issue, make sure backups are made frequently.
Account and Service Traffic Hijacking
Hackers may be able to intercept network packets to steal data. They may also be able to use social engineering to gain access to a cloud server. Make sure you are educated in social engineering techniques like phishing and use encrypted protocols wherever possible to mitigate the threat of a MITM attack.
Unsecure APIs
Sometimes, a cloud provider may use an API to allow third party developers to implement applications in the cloud. An unsecure API may allow a hacker access to the cloud server and enable them to dig through information and perform malicious acts. Make sure that, when choosing a cloud provider, enquire about the interface security model, authentication and data encryption.
Denial of Service
Although uncommon, a DOS attack is possible on a cloud-based server. Due to the amount of people using a cloud server, the attack may even be more detrimental than a regular DOS attack.
Malicious Insider
A malicious insider is someone who had or still has access to a cloud server in which they have a desire to perform malicious acts. Most often, malicious insiders compromise data in exchange for money. A strict supply change management policy should be used to limit employee access. Also, HR requirements should be made on legal contracts to act as a deterrent towards malicious insiders.
Poor Security
Poor cloud security by the provider can lead to security breaches, data attacks and encryption modification. It’s important to investigate the provider’s security policies before signing a contract with them.
Multi-Tenancy Environments
Multi-tenancy environments mean that two or more clients share the same hardware on the same cloud server. This theoretically makes data leakage more common inside these environments. To combat this, end-to-end protection should be established.
Natural Disasters
Although uncommon, natural disasters can wipe out cloud infrastructure leading to data loss and downtime. If a business is very reliant on cloud services, natural disasters can be catastrophic to their prodcutivity, reputation and financial standing. Make sure you know where the cloud server is located and verify that the cloud service provider is backing up your data in another location.
Hardware Failure
Hardware failure such as hard disk malfunction can cause data to become inaccessible. Make sure that a physical security program is in place at the cloud servers and that the hardware is checked regularly either by software or humans.
Social Engineering
By using social engineering techniques like phishing or pharming, a hacker can steal credentials from a legitimate user to login to their cloud infrastructure, usually to perform malicious acts.
Network Sniffing
Hackers can use packet sniffers to steal packet information like passwords, emails, and usernames. They can use these credentials to login to cloud servers and perform malicious acts.
XSS
A cross site scripting attack can be used to take away the cookies utilised by the user authentication process. The hacker inserts malicious code into the website and collects cookies which are used to exploit active computer sessions.
Session Riding
This attack occurs when a hacker tricks a user to login to a malicious website. These login credentials are logged and used by the hacker to gain access to the cloud server.
DNS Poisoning
This attack is when the hacker poisons the DNS server sending the user to an illegitimate website where their credentials can be stored.
Cybersquatting
This is when a hacker hosts a fake website on a domain which is almost the same as the cloud service provider. An example could be:
Cloudservice.com - Real
Cloudservices.com - Fake
Side Channel VM Breach
This is when a hacker runs a virtual machine on the user’s physical host machine to access physical resources like the cache.
Cryptanalysis
All data stored in the cloud should be encrypted. If the encryption is weak, a hacker may be able to use cryptanalysis to decipher the data and steal it in plain text form.
Wrapping Attack
When a user sends a request over the internet, the web server creates a SOAP message containing the structural information. The hacker intercepts this SOAP message and copies the body and the XML signature, then they can insert malicious code into the body of the legitimate message. The duplicated copy is sent to the cloud server.
Man-in-the-Cloud
A hacker will convince a user to install malicious code that will send a sync token to the user’s drive. They will then steal that token and gain access to the cloud system.
Comments
Post a Comment