356
Chapter 9
■
Security Vulnerabilities, Threats, and Countermeasures
themselves. Cloud providers often have the resources to invest in security engineers, opera-
tions, and testers that many small to midsize (or even large) organizations simply can’t
afford. It is important to investigate the security of a cloud service before adopting it.
With the increased burden of industry regulations, such as the Sarbanes–Oxley Act of
2002 (SOX), Health Insurance Portability and Accountability Act (HIPAA), and Payment
Card Industry Data Security Standards (PCI DSS), it is essential
to ensure that a cloud
service provides sufficient protections to maintain compliance. Additionally, cloud service
providers may not maintain your data in close proximity to your primary physical location.
In fact, they may distribute your data across numerous locations, some of which may reside
outside your country of origin. It may be necessary to add to a cloud service contract a
limitation to house your data only within specific logical and geographic boundaries.
It is important to investigate the encryption solutions employed by a cloud service. Do
you send your data to them preencrypted, or is it encrypted only after reaching the cloud?
Where are the encryption keys stored? Is there segregation between your data and that
belonging to other cloud users? An encryption mistake can reveal your secrets to the world
or render your information unrecoverable.
What is the method and speed of recovery or restoration from the cloud? If you have
system failures locally, how do you get your environment back to normal? Also consider
whether the cloud service has its own disaster-recovery solution.
If it experiences a disaster,
what is its plan to recover and restore services and access to your cloud resources?
Other issues include the difficulty with which investigations can be conducted, concerns
over data destruction, and what happens if the current cloud-computing service goes out of
business or is acquired by another organization.
Snapshots
are backups of virtual machines. They offer a quick means to recover from
errors or poor updates. It’s often easier and faster to make backups of entire virtual systems
rather than the equivalent native hardware-installed system.
Virtualization doesn’t lessen the security management requirements of an OS. Thus,
patch management is still essential. Patching or updating virtualized OSs is the same pro-
cess as for a traditionally hardware-installed OS, with the added benefit that you may be
able to patch systems (or swap out active systems) without taking the service down. Also,
don’t forget that you need to keep the virtualization host updated as well.
When you’re using virtualized systems, it’s important to protect the stability of the host.
This usually means avoiding using the host for any purpose other than hosting the virtual-
ized elements. If host
availability is compromised, the availability and stability of the vir-
tual systems are also compromised.
Virtualized systems should be security tested. The virtualized OSs can be tested in the
same manner as hardware-installed OSs, such as with vulnerability assessment and pen-
etration testing. However, the virtualization product may introduce additional and unique
security concerns, so the testing process needs to be adapted to include those idiosyncrasies.
A
cloud access security broker (CASB)
is a security policy enforcement solution that
may be installed on-premises, or it may be cloud-based. The goal of a CASB is to enforce
and ensure that proper security measures are implemented between a cloud solution and a
customer organization.
Distributed Systems and Endpoint Security
357
Security as a service (SECaaS)
is a cloud provider concept in which security is provided
to an organization through or by an online entity. The purpose
of SECaaS solutions are to
reduce the cost and overhead of implementing and managing security locally. SECaaS often
implements software-only security components that do not need dedicated on-premises
hardware. SECaaS security components can include a wide range of security products,
including authentication, authorization, auditing/accounting, anti-malware, intrusion
detection, compliance and vulnerability scanning, penetration testing, and security event
management.
The
cloud shared responsibility model
is the concept that when an organization uses a
cloud solution, there is a division of security and stability responsibility between the pro-
vider and the customer. The different forms of cloud service (such as SaaS, PaaS, and IaaS)
may each have different levels or division points of shared responsibility. A SaaS solution
places most of the management burden on the shoulders
of the cloud provider, while IaaS
management leans more toward the customer. When electing to use a cloud service, it is
important to consider the specifics of the management, troubleshooting, and security man-
agement and how those responsibilities are assigned, divided, or shared between the cloud
provider and the customer.
Do'stlaringiz bilan baham: