Domain 4 Cloud application Security
Domain 4 Cloud application Security
• The goal of The Cloud Application Security domain is to provide you with knowledge
as it relates to cloud application security
• You will gain knowledge in identity and access management solutions for the cloud
and the cloud application architecture
• You’ll also learn how to ensure data and application availability, integrity, and
confidentiality (AIC) through cloud software assurance and validation
Introduction
• it is important to recognize the benefits and efficiencies, along with the challenges and
complexities
• Failure to address inherent risks directly affects the organization, its software supply chain
(extended enterprise API management), and its customers
• Application for cloud deployment, you must remember that applications can be broken
down to the following subcomponents:
o Data
o Functions
o Processes
• The components can be broken up so that the portions that have sensitive data can
be processed or stored in specified locations to comply with enterprise policies, standards,
and applicable laws and regulations.
Complexities of integration
overarching challenges
Most software development lifecycle models include a maintenance phase as their endpoint
Disposal phase
Crypto-shredding is effectively summed up as the deletion of the key used to encrypt data that’s
stored in the cloud.
THREAT MODELLING
▪ Threat modeling is performed once an application design is created
▪ The goal of threat modelling is to determine any weaknesses in the application and
the potential ingress, egress, and actors involved before the weakness is introduced
to production
▪ CCSP should always remember that the nature of threats faced by a system
changes over time
▪ Because of dynamic nature of changing threat, constant vigilance and monitoring
are important aspects of overall system security in the cloud
▪ STRIDE threat model
o it remains the responsibility of the organization to assess code for proper,
secure function no matter where the code is sourced.
▪ Approved application Programming interfaces
o Application programming interfaces (APIs) are a means for a company to
expose func-tionality to applications. Following are three benefits of APIs:
▪ Programmatic control and access
▪ Automation
▪ Integration with third-party tools
o Consumption of APIs can lead to your firm leveraging insecure products
o Consumption of external APIs should go through the same approval
process that’s used for all other software being consumed by the
organization
o The CCSP needs to ensure that there is a formal approval process in
place for all API If there is a change in an API or an issue due to an
unforeseen threat, a vendor update, or any other reason, the API in
question should not be allowed until a thorough revie
Identity and access management (IAM) includes people, processes, and systems that manage access
to enterprise resources by ensuring that the identity of an entity is verified and then granting the
correct level of access based on the protected resource
• Identity management
• Access management
• Identity repository and directory services
identity management
• Identity management is a broad administrative area that deals with identifying individuals
in a system and controlling their access to resources within that system by associating user
rights and restrictions with the established identity.
Access Management
• Access management deals with managing an individual’s access to resources
o Authentication identifies the individual and ensures that he is who he claims to be
o Authorization evaluates “What do you have access to?” after authentication
o Policy management establishes the security and access policies based on business
needs and the degree of acceptable risk.
o Federation is an association of organizations that come together to exchange
information as appropriate about their users and resources to enable collaborations
and transactions
o Identity repository includes the directory services for the administration of user
account attributes.
• Federated identity management (FIM) provides the policies, processes, and mechanisms
that manage identity and trusted access to systems across organizations.
• federated identities allow for the generation of tokens (authentication) in one domain and
the consumption of these tokens (authorization) in another domain.
• Federation standards
o SAML allows business entities to make assertions regarding the identity,
attributes, and entitlements of a subject (an entity that is often a human user) to
other entities, such as a partner company or another enterprise application.”
o Security Assertion Markup Language (SAML) is by far the most commonly
accepted standard used in the industry today. Security Assertion Markup
Language (SAML) is an XML standard that allows secure web domains to
exchange user authentication and authorization data. Using SAML, an online
service provider can contact a separate online identity provider to
authenticate users who are trying to access secure content.
o
o XML-based framework for communicating user authentica-tion, entitlement, and
attribute information
o
Identity Provider Relying Party
Would hold all of the identities and generate a Would be the service provider and would
token for now users consume these tokens.
Federated sso
• Federated SSO is typically used for facilitating interorganizational and intersecurity
domain access to resources leveraging federated identity management.
Multifactor authentication
• Multifactor authentication is to add an extra level of protection to verify the
legitimacy of a transaction
• One-time passwords also fall under the banner of multifactor authentication
• Step-up authentication is an additional factor or procedure that validates a user’s
identity, normally prompted by high-risk transactions or violations according to
policy rules.
• Three methods are commonly used:
o Challenge questions
o Out-of-band authentication (a call or Short Message Service [SMS] text
message to the end user)
o Dynamic knowledge-based authentication (questions unique to the end
user)
o Firewalls
▪ Firewalls can be distributed or configured across the SaaS, PaaS, and IaaS
landscapes; these can be owned and operated by the provider or can be
out-sourced to a third party for ongoing management and maintenance.
▪ Firewalls in the cloud need to be installed as software components
o API gateway
▪ An API gateway is a device that filters API traffic, it can be installed as a
proxy
▪ API gateway can implement access control, rate limiting, logging, metrics,
and security filtering
Cryptography
• When working with cloud-based systems, it is important to remember they are operating
within and across trusted and untrusted networks
o Transport layer security (TLS)
▪ A protocol that ensures privacy between communicating applications and
their users on the Internet.
o SSL
▪ establishing an encrypted link between a web server and a browser
o Virtual private network (VPN, such as IPSec gateway):
▪ A network that is con-structed by using public wires—usually the Internet—
to connect to a private network, such as a company’s internal network
All these technologies encrypt data to and from your data centre and system
communications within the cloud environment.
• Data-at-rest encryption used in cloud systems:
o Whole instance encryption
▪ Encrypting all the data associated with operation and use of virtual machine,
such as data stored at rest, protect snapshot create from volume
o Volume encryption
▪ Encrypting single volume,
o File level encryption
▪ Encrypting specific file or single file
Technologies and approaches such as tokenization, data masking, and sandboxing are
valuable to augment the implementation of a cryptographic solution
Sometimes the use of encryption is not the most appropriate or functional choice for a
system protection element due to design, usage, and performance concern
Tokenization
• Tokenization generates a token (often a string of characters) that is used to substitute
sensitive data, which is itself stored in a secured location such as a database
Data masking
• Data masking is a technology that keeps the format of a data string but alters the content
• Data masking ensures that data retains its original format without being actionable by
anyone who manages to intercept the data
Sandboxing
• A sandbox isolates and utilizes only the intended components, while having appropriate
separation from the remaining components (that is, the ability to store personal information
in one sandbox, with corporate information in another sandbox)
• sandboxing is typically used to run untested or untrusted code in a tightly controlled
environment
• Organizations can use a sandbox environment to better understand how an application
actually works and fully test applications by executing them and observing the file behaviour
for indications of malicious activity
Application Virtualization
• Application virtualization is a technology that creates a virtual environment for an
application to run
• Application virtualization can be used to isolate or sandbox an application to see the
processes the application performs.
• Examples
o Wine
o Microsoft App-V
o Xenapp
• The main goal of application virtualization is to be able to test applications while protecting
the OS and other applications on a particular system.
• it is of critical importance to address the security of applications through the use of
assurance and validation techniques
o Software assurance is vital to ensuring the security of critical information
technology resources. Information and communications technology vendors have a
responsibility to address assurance through every stage of application development.
o Verification and validation
▪ Coupled with relevant segregation of duties and appropriate independent
review, verification and validation look to ensure that the initial concept and
delivered product are complete
▪ Verification and validation occur at each stage of development to ensure
consistency of the application
▪ It should be inline with change management process
• Both concepts can be applied to code developed by the enterprise and to APIs and services
sourced externally
• ISO/IEC 27034-1
o Security of applications must be viewed as a holistic approach in a broad context
that includes not just software development considerations but also the business
and regulatory context and other external factors that can affect the overall security
posture of the applications being consumed by an organization.
o ISO/IEC 27034-1 defines concepts, frameworks, and processes to help organizations
integrate security within their software development lifecycle
o Standards are also required to increase the trust that companies place in particular
software development companies.
• Organizational normative Framework
o ISO 27034-1 lays out an organizational normative framework (ONF) for all
components of application security best practice
▪ The containers include the following:
• Business context: Includes all application security policies,
standards, and best practices adopted by the organization
• Regulatory context: Includes all standards, laws, and regulations
that affect application security
• Technical context: Includes required and available technologies that
are applicable to application security
• Specifications: Documents the organization’s IT functional
requirements and the solutions that are appropriate to address
these requirements
• Roles, responsibilities, and qualifications: Documents the actors
within an organization who are related to IT application
• ISO 27034-1 defines an ONF management process. This bidirectional process is meant to
create a continuous improvement loop
• Application normative Framework
o The application normative framework (ANF) is used in conjunction with the ONF and
is created for a specific application.
o The ONF to ANF is a one-to-many relationship, where one ONF is used as the basis
to create multiple ANFs
• Application security management Process
o ISO/IEC 27034-1 defines an application security management process (ASMP) to
manage and maintain each ANF
▪ 1. Specifying the application requirements and environment
▪ 2. Assessing application security risks
▪ 3. Creating and maintaining the ANF
▪ 4. Provisioning and operating the application
▪ 5. Auditing the security of the application
Summary