Cloud Computing: Security and Forensics
Cloud Computing: Security and Forensics
Govind Maheswaran
[email protected]
facebook.com/govindmaheswara
n
twitter.com/RestlessMystic
Cloud Computing
Cloud security
Risk Assesment
Cloud Forensics
Conclusion
Contents
Game
Cloud
Just On
Computing
Pay As You Go
Cloud is loud
From 46.4 billion $ to 150.8 billion $ in an ye
Tremendous Cost Cutting
In Simple English,
I can get my data when I want, over some kind of network, and even though
the data might be coming from different places and my computing power
shared with others, somehow the back end is going to scale up or down to
fulfill my needs, and interestingly, bills me for only what I use.
Essential Characteristics
On-Demand
Self-Service
Resource
Pooling
Rapid Elasticity
Broad Network
Access
Measured
Service
Metering capability
Resource usage can be monitored, controlled, and reported
providing transparency for both the provider and consumer
Service Models
Servers and Network
connections.
User needs to install
Required OS and Platform
and Applications.(some
vendors provide OS)
Eg: Windows Azure
Infrastructure
as a Service
[IaaS]
Platform as a
Service
[PaaS]
Software as a
Service
[SaaS]
Processor
Memory
Storage
Operating
System
Runtime
API
Web Server
Application
Web Service
Web UI
Deployment Models
Public Cloud
Community
Cloud
Private Cloud
Hybrid Cloud
Windows Azure
ricing..
Compute
Storage
Database
Transaction
Cons
Pros
Lack of Control
Reliability
Issues
Lock In
Data out of
Premises
Security
technology demands of
We were hackedtheThe
cybersecurity adviser's job
are relatively trivial..
Cloud Security
May be I am an Idiot,but
Cloud Computing is Non-Sensical
click-and-pawn kind of situation
Cloud is vapourware
Cloud Security
*Cloud is a relatively newer technology. So, its
security domains are not fully known.
*Cloud based Security Risks => CRISKS
Targets
* Hardware
* Data
* Applications
* (in short, everything in the cloud)
Some
Some major
major security
security Issues
Issues are
are discussed
discussed in
in the
the following
following slides
slides
1. Shared Service
Consequences
2. Run-on-the-cloud
3. Lock In
4. Data protection
5. Lack of Transparency
how the data is backed up, who back up the data,whether the cloud service
provider does it or has they outsourced to some third party,
6. Privacy
7. Application security
8. Record Keeping
Security Testing in
Security testing is a process to determine that
Cloud
Permission Issues
If a user traverse through unauthorised areas of a cloud,
he may reach a black hole.
An application is tested today and found vulnerable or
not, how do you know that the app tested tomorrow is
the same one that was tested yesterday?
Risk
Assesment
Risk Assesment
Framework
Identify
the Asset
Evaluate
The Asset
Map the
asset to
Existing
cloud
Deployment
Models
Evaluate
Cloud
Service
Models and
Providers
Sketch the
Potential
Data Flow
Identify
the Asset
Evaluate
The Asset
Map the
asset to
Existing
cloud
Deployment
Models
Evaluate
Cloud
Service
Models and
Providers
Sketch the
Potential
Data Flow
Identify
the Asset
Evaluate
The Asset
Map the
asset to
Existing
cloud
Deployment
Models
Evaluate
Cloud
Service
Models and
Providers
Sketch the
Potential
Data Flow
Identify
the Asset
Evaluate
The Asset
Map the
asset to
Existing
cloud
Deployment
Models
Evaluate
Cloud
Service
Models and
Providers
Sketch the
Potential
Data Flow
Identify
the Asset
Evaluate
The Asset
Map the
asset to
Existing
cloud
Deployment
Models
Evaluate
Cloud
Service
Models and
Providers
Sketch the
Potential
Data Flow
Identify
the Asset
Evaluate
The Asset
Map the
asset to
Existing
cloud
Deployment
Models
Evaluate
Cloud
Service
Models and
Providers
Sketch the
Potential
Data Flow
Required to analyse how and when data will move In and Out the
cloud..
Cloud
Forensics
Digital Forensics
Science
DEFINITION:
The use of scientifically derived and proven
methods toward the preservation, collection,
validation, identification, analysis, interpretation,
documentation and presentation of digital evidence
derived from digital sources for the purpose of
facilitating or furthering the reconstruction of events
found to be criminal, or helping to anticipate
unauthorized actions shown to be disruptive to
planned operations.
Cloud Forensics refers to the usage of Digital
Forensics Science in Cloud computing models.
Opportunities
Challenges
Legal Regulations
Legal & regulatory requirements and compliances
may be lacking in the location(s) where the data is
actually stored.
Record Retention Policies
There exists no standardized logging format for the
cloud.
Each provider logs in different formats,
making log crunching for forensics difficult in case of
Cloud.
Identity Management
There exists no proper KYC norms in case of Cloud
Providers. Anyone with a credit card can purchase
a cloud account.
Challenges
Continously Overwriten Logs
The cloud keeps working, and its logs are replicated
and overwritten continously. So it poses a great
challenge to the forensic scientist to spot the state of
the log file at the time of an attempted crime..
Admissibility
Along with finding the evidence, the scientist must
also prove it to a legal non technical person. This part
is worser than the real forensics process.
Privacy
Someone hacked something somewhere. Why
should a Forensic guy check the data that i have put in
my cloud ..?
Cloud
Conclusion
Conclusion
Cloud is changing the way systems and services are
Conclusion
Use a Risk Assesment framework before data is put on the
cloud.
Cloud forensics, being younger than Cloud computing, has
very less to offer as of now.
Watch your activities, keep in touch with your cloud
service provider, read the user manual carefully.
References
Questions..?
Thank you..!