Cloud Note
Cloud Note
China:
- 2017 Cyber Security Law
During the second quarter of 2017, China issued Draft Regulations on Cross Border Data Transfers to supplement
the Cyber Security Law. These regulations would go beyond the working of the Cyber Security Law, and expand
its scope.
Japan
- Act on the Protection of Personal Information (APPI)
requires the private sector to protect personal information and data securely.
limit the ability to transfer personal data to third parties, with prior consent of the data subject generally being
required to transfer data to a third party. Consent to the transfer is not required if the country of destination has
an established framework for the protection of personal information that meets the standard specified by the
Personal Information Protection Commission.
- the Law on the Protection of Personal Information Held by Administrative Organs
- Medical Practitioners’ Act; the Act on Public Health Nurses, Midwives and Nurses; and the Pharmacist Act,
Russia:
- Since September 2015, companies are required to store personal data of Russian citizens within Russia.
EU
- GDPR
The GDPR applies to the processing of personal data in the context of the activities of an establishment of a
controller or processor in the EU/EEA, regardless of whether the processing takes place in the EU/EEA or not.
For example, Security Guidance v4.0 © Copyright 2021, Cloud Security Alliance. All rights reserved 42 the GDPR
requires companies to keep records of their data processing activities. Certain categories of processing require a
prior “Privacy Impact Assessment.”
US:
Since all Digital Rights Management (DRM)/Enterprise Rights Management (ERM) is based on encryption, existing tools
may break cloud capabilities, especially in SaaS.
IP addresses will change far more quickly than on a traditional network, which security tools must account for. Ideally
they should identify assets on the network by a unique ID, not an IP address or network name.
Software container systems always include three key components: • The execution environment (the container). • An
orchestration and scheduling controller (which can be a collection of multiple tools). • A repository for the container
images or code to execute. • Together, these are the place to run things, the things to run, and the management system to
tie them together.
A deep understanding of container security relies on a deep understanding of operating system internals, such as
namespaces, network port mapping, memory, and storage access
Some examples of tasks you can automate include: • Snapshotting the storage of the virtual machine. • Capturing any
metadata at the time of alert, so that the analysis can happen based on what the infrastructure looked like at that time. • If
your provider supports it, “pausing” the virtual machine, which will save the volatile memory state.
Domain 10
Cloud computing
Opportunities
- Higher baseline security (significant economic incentives to maintain higher baseline security)
- Responsiveness
- Isolated environments
- Independent virtual machines
- Elasticity
- DevOps
- Unified Interface
Challenges
- Limited detailed visibility
- Increased application scope (management plane, meta-structure)
- Changing threat models
- Reduced transparency
SSDLC
- Training: secure coding practice, writing security tests. Provider technical training
- Define: code standards, security functional requirements
- Design: threat modelling, secure design
- Develop: code review, unit testing, static analysis, dynamic analysis
- Test: Vulnerability Assessment, Dynamic Analysis, Functional tests, QA
-
Training: Three different roles will require two new categories of training. Development, operations, and security should
all receive additional training on cloud security fundamentals (which are not provider specific), as well as appropriate
technical security training on any specific cloud providers and platforms used on their projects. There is typically greater
developer and operations involvement in directly architecting and managing the cloud infrastructure, so baseline
security training that’s specific to the tools they will use is essential.
7 layers:
APSTNDP
Application
Presentation
Session
Transport
Network
Data
Physical
Infrastructure: The core components of a computing system: compute, network, and storage.
The foundation that everything else is built on. The moving parts.
Infrastructure: The core components of a computing system: compute, network, and storage. The foundation that
everything else is built on. The moving parts
Metastructure: The protocols and mechanisms that provide the interface between the infrastructure layer and the
other layers. The glue that ties the technologies and enables management and configuration.
Infostructure: The data and information. Content in a database, file storage, etc.
Applistructure: The applications deployed in the cloud and the underlying application services used to build them.
For example, Platform as a Service features like message queues, artificial intelligence analysis, or notification
services.
SDN can offer a single management plane for physical network appliances (not virtual appliances)
It is completely up to the provider as to how they build a storage pool. They can use any of the other technologies listed in
the answers, or they can use something completely different and proprietary.
Cloud overlay networks are a special kind of WAN virtualization technology for created networks
that span multiple “base” networks.
This phase is all about the telemetry (logging, monitoring, metrics, alerts, and other messages) you get from systems and
other IT components
For the exam, remember that the CCM states the control and the responsible party, whereas the CAIQ provides questions
you can ask in plain language.
This chapter addressed incident response recommendations as per the CSA Guidance. The main items to remember for
your exam include the following:
• Establishing SLAs and setting expectations around the roles and responsibilities of the customer and the provider are
the most important aspects of IR in a cloud environment. These SLAs must cover all phases of IR.
• Practice makes perfect. You have a great opportunity to create an IR practice environment—use it! Know how to handle
aspects of IR that belong to you and how hand-offs to the provider are performed.
• You must establish clear communication channels (from customer to provider and vice versa). Remember that the
provider may need to contact your organization if they notice something. Don’t allow these messages to be sent to an e-
mail address that isn’t being monitored.
• Customers must understand the content and the format of the data that a provider may supply for analysis. Data that is
supplied in a format that you can’t use is useless.
• Understand how any data supplied by the provider meets chain-of-custody requirements.
• Use the automation capabilities of the cloud environment to your advantage. Implementing continuous and serverless
monitoring may help you detect potential issues much more quickly than what is possible in a traditional data center.
• Understand the tools that are made available to you by the provider. Engage the provider with your plans—they may
be able to improve your IR plan.
• What works in one cloud environment may not work in another. Make sure that the approaches you use to detect and
handle incidents are planned for each provider as part of your enterprise IR plan.
• Without logging, there is no detection. Without detection, there is no ability to respond. Make sure your logging has as
much visibility into your environment as possible.
• Test, test, test. Testing must be performed at least annually or when significant changes are made. Again, consult your
provider and make sure they become part of your tests to the greatest extent possible.
An investigation should be performed using the master account so there is complete visibility of all activity taking place in
the management plane. Snapshots of servers being investigated can be performed, but this should be done only after it is
confirmed that the attacker is no longer in the management plane. Logging everyone off may have limited benefits, but,
again, confirmation that the attacker no longer has management plane access is the first step in incident response of the
metastructure. Terminating all server instances is not an appropriate answer at all.
Remember, though, that the CSA Guidance specifically states that tests should be performed annually or when significant
changes are made. Remember both when you take your exam.
PaaS (and serverless application architectures) will likely need custom application-level logging because there will likely
be gaps in what the provider offers and what is required for incident response support.
When leveraging immutable workloads, security can be increased by removing the ability to log in remotely. Any changes
must be made centrally in immutable environments. File integrity monitoring can also be implemented to enhance
security, as any change made to an immutable instance is likely evidence of a security incident.
If you’re asked about the difference between software-defined security and event-driven security, remember that
software-defined security is a concept, whereas event-driven security puts that concept into action.
Event-driven security is a game-changer. Using serverless technology, you can easily kick off a script that will
automatically respond to a potential incident.
Instance-managed encryption: The encryption engine runs inside the instance itself. An example of this is the Linux
Unified Key Setup. The issue with instance-managed encryption is that the key itself is stored in the instance and
protected with a passphrase. In other words, you could have AES-256 encryption secured with a passphrase of 1234.
IaaS encryption PaaS encryption SaaS encryption
Volume storage Instance managed Provider-managed encryption
Externally managed Proxy encryption – pass
Object storage Client side through encryption proxy
Server side before sent to SaaS
Proxy
Database Built-in encryption (e.g. TDE)
Application Application layer encryption
Key management:
HSM, Virtual appliance, Cloud provider service, hybrid