SlideShare a Scribd company logo
CLOUD 9:UNCOVERING SECURITY & FORENSICS DISCOVERY IN CLOUDbyManu ZachariaMVP (Enterprise Security), C|EH, ISLA-2010 (ISC)², C|HFI, CCNA, MCPCertified ISO 27001:2005 Lead AuditorHackIT – Technology & Advisory Services“Aut viam inveniam aut faciam ” Hannibal Barca
# whoami I am an Information Security Evangelist
 For paying my bills – I do consulting -  HackIT – Technology & Advisory Services – A startup.
 Awards
Information Security Leadership Achievement Award from (ISC)² - 2010
 Microsoft Most Valuable Professional (Enterprise Security) – 2009 and 2010
Co-Author of a Book
 President – Information Security Research Association - NPO# whoami Chief Architect - Matriux – (www.matriux.com) - OS for Hacking, Forensics and Security testing – Open Source & Free 
 Founder c0c0n – International Security & Hacking Conference
 Extend service to various state and central investigations agencies as Cyber Forensics Consultant# whoami Speaker at various national and international security, technology and hacking conferences:
 Microsoft Tech-Ed 2010 (& 2011 upcoming)
 IQPC - Enterprise Security 2010 - Singapore
 Information Security Conference - Bangalore
ClubHack, etc
DevCon# whoami Training associations:
Indian Navy - Signal School , Centre for Defense Communication and Electronic and Information / Cyber Warfare  and INS Valsura.
Centre for Police Research, Pune and Kerala Police
 SCIT -  Symbiosis Centre for Information Technology,Pune
 Institute of Management Technology (IMT) – Ghaziabad
IGNOU M-Tech (Information Systems Security) – Expert Member – Curriculum Review Committee
C-DAC, ACTS (DISCS  & DSSD)DISCLAIMER(S) The opinion here represented are my personal ones and do not necessary reflect my employers views.
 Registered brands belong to their legitimate owners.
 The information contained in this presentation does not break any intellectual property, nor does it provide detailed information that may be in conflict with any laws (hopefully...) :)6
REFERENCES Information and resources from Internet (including publications from Cloud Security Alliance) were extensively used for the creation of this presentation.7
AGENDAINTRO & CLOUD ARCHITECTURECLOUD SECURITY & RISK ASSESSMENT FRAMEWORKEXPLOITING CLOUD & FORENSICSCONCLUSION8
INTRODUCTION9
QUESTION So what is Cloud Computing?
 Do you know what is EC2 and S3?
 What is SPI Model?10
WHY THIS TALK? cloud is loud
 Headline stealer
 Everybody is concerned about Cloud Security11
WHY CLOUD IS DIFFERENT? Why handle cloud differently?
 Simple – power of cloud12
TIGR - ??????Barack Obama's Technology Innovation and Government Reform Team (TIGR) describe the use of cloud computing as "one of the most important transformations the federal government will go through in the next decade." 13
CLOUD POWER A 64 node Linux cluster can be online in just five minutes
 Forget about those sleepless nights in your data centers14
EC2 Amazon Elastic Compute Cloud (Amazon EC2)
 A web service that provides resizable compute capacity in the cloud15
EC2 - WIKIPEDIA Allows users to rent computers on which to run their own computer applications.
 A user can boot an Amazon Machine Image (AMI) to create a virtual machine, which Amazon calls an "instance", containing any software desired.16
EC2 - WIKIPEDIA A user can create, launch, and terminate server instances as needed, paying by the hour for active servers, hence the term "elastic".17
S3 Amazon S3 (Simple Storage Service) is an online storage web service offered by Amazon Web Services.
 Provides unlimited storage through a simple web services interface18
S3 $0.15 per gigabyte-month
 102 billion objects as of March 201019
POWER OF CLOUD The New York Times - Amazon EC2 and S3 - PDF's of 15M scanned news articles.
 NASDAQ  uses Amazon S3 to deliver historical stock information.20
CLOUD Cloud separates:
 application and information resources from the underlying infrastructure, and
 the mechanisms used to deliver them.21
CLOUD Use of a collection of services,
 applications,
 information, and
 infrastructure  comprised of pools of compute, network, information, and storage resources.22
CLOUD Components can be
rapidly orchestrated,
 provisioned,
 implemented & decommissioned, and
 scaled up or down
 Provide an on-demand utility-like model.23
CLOUD CONFUSION From an architectural perspective; there is much confusion
 How cloud is both similar to and different from existing models of computing? 24
CLOUD CONFUSION How these similarities and differences impact the
 organizational,
 operational, and
 technological approaches to network and information security practices.25
CLOUD SECURITY – DIFFERENT?Marcus Ranum - Same old, Same old 26
CLOUD SECURITY – DIFFERENT?Same Client / Server paradigm from Mainframe days – Bruce Schneier27
So what is this cloud?28
CLOUD ARCHITECTURE29
CLOUD NIST (U.S. National Institute of Standards and Technology) defines cloud computing by describing:
 five essential characteristics,
 three cloud service models, and
 four cloud deployment models.30
CLOUD CHARACTERISTICS Five essential characteristics
 On-demand self-service
 Broad network access
 Resource pooling
 Rapid elasticity
 Measured service31
CLOUD CHARACTERISTICS On-demand self-service
Unilaterally provision computing capabilities as needed automatically, without requiring human interaction with a service provider.
 Computing capabilities include server time and network storage 32
CLOUD CHARACTERISTICS Broad network access
Available over the network and accessed through standard mechanisms33
CLOUD CHARACTERISTICS Can be accessed through heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs) as well as other traditional or cloud based software services.34
CLOUD CHARACTERISTICS Resource pooling
 The provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model,
 Different physical and virtual resources dynamically assigned and reassigned according to consumer demand.35
CLOUD CHARACTERISTICS Degree of location independence - customer has no control or knowledge over the exact location of the provided resources
 Customer may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). 36
CLOUD CHARACTERISTICS Examples of resources include:
 storage,
 processing,
 memory,
 network bandwidth, and
 virtual machines.37
CLOUD CHARACTERISTICS Rapid elasticity
 Capabilities can be
 rapidly and elastically provisioned to quickly scale out ; and
 rapidly released to quickly scale in.
 In some cases this is done automatically.38
CLOUD CHARACTERISTICS Measured service.
Metering capability at some level of abstraction appropriate to the type of service
 Resource usage can be monitored, controlled, and reported — providing transparency for both the provider and consumer of the service.39
CLOUD CHARACTERISTICS Example:
 storage,
 processing,
 bandwidth,
 active user accounts40
MYTHS - CLOUD CHARACTERISTICS Myths about Cloud Computing Essential Characteristics
Virtualization is mandatory
 Answer is No
 Cloud services are often but not always utilized in conjunction with, and enabled by, virtualization technologies41
MYTHS - CLOUD CHARACTERISTICS There is no requirement that ties the abstraction of resources to virtualization technologies
 In many offerings virtualization by hypervisor or operating system container is not utilized.42
MYTHS - CLOUD CHARACTERISTICSMulti-tenancy as an essential cloud characteristic
 Multi-tenancy is not called out as an essential cloud characteristic by NIST but is often discussed as such.43
CLOUD SERVICE MODELS Divided into three archetypal models.
 The three fundamental classifications are known as the SPI Model.
 Various other derivative combinations are also available.44
CLOUD SERVICE MODELS Cloud Service Models
 Cloud Software as a Service (SaaS).
 Cloud Platform as a Service (PaaS).
 Cloud Infrastructure as a Service (IaaS).45
CLOUD SERVICE MODELS - SaaS The client use the software / applications running on a cloud infrastructure.
 Accessed through thin client interface such as a browser.46
CLOUD SERVICE MODELS - SaaS User does not manage or control the underlying cloud infrastructure including:
 network,
 servers,
 operating systems,
 storage, or
 even individual application capabilities47
CLOUD SERVICE MODELS - SaaS Possible exception - limited user specific application configuration settings.48
CLOUD SERVICE MODELS - PaaS User can deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider.49
CLOUD SERVICE MODELS - PaaS The consumer does not manage or control the underlying cloud infrastructure including
 network,
 servers,
 operating systems, or
 storage,50
CLOUD SERVICE MODELS - PaaS Has control over the deployed applications and possibly application hosting environment configurations.51
CLOUD SERVICE MODELS - IaaS The user can provision
 processing,
 storage,
 networks, and
 other fundamental computing resources52
CLOUD SERVICE MODELS - IaaS The consumer is able to deploy and run arbitrary software, which can include operating systems and applications.
 The consumer does not manage or control the underlying cloud infrastructure53
CLOUD SERVICE MODELS - IaaS Has control over
 operating systems,
 storage,
 deployed applications, and
 possibly limited control of select networking components (e.g., host firewalls).54
CLOUD DEPLOYMENT MODELS Regardless of the service model, there are four cloud deployment models:
 Public Cloud
 Private Cloud
 Community Cloud
 Hybrid Cloud55
CLOUD DEPLOYMENT MODELS There are derivative variations that address specific requirements.56
CLOUD DEPLOYMENT MODELS Public Cloud
 The cloud infrastructure is made available to the general public or a large industry group
 Owned by an organization providing cloud services.57
CLOUD DEPLOYMENT MODELS Private Cloud
 The cloud infrastructure is operated solely for a single organization.
 It may be managed by the organization or a third party, and may exist on-premises or off-premises.58
CLOUD DEPLOYMENT MODELS Community Cloud
 The cloud infrastructure is shared by several organizations
 Supports a specific community that has shared concerns59
CLOUD DEPLOYMENT MODELS Examples:
 mission,
 security requirements,
 policy, or
 compliance considerations60
CLOUD DEPLOYMENT MODELS It may be managed by the: organizations or
 a third party and may exist  on-premises or
 off-premises.61
CLOUD DEPLOYMENT MODELS Hybrid Cloud
 Composition of two or more clouds (private, community, or public)
 They remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability 62
CLOUD DEPLOYMENT MODELS Example -  Hybrid Cloud
 Cloud bursting for load-balancing between clouds.63
CLOUD BURSTING New twist on an old concept :)
 Bursting into the cloud when necessary, or
 using the cloud when additional compute resources are required temporarily64
CLOUD BURSTING Example - used to shoulder the burden of some of the application's processing requirements.
 How it is done?
 Basic application functionality could be provided from within the cloud65
CLOUD BURSTING More critical (e.g. revenue-generating or mission critical) applications continue to be served from within the controlled enterprise data center.66
CLOUD BURSTING How it is different from the traditional bursting?
 Traditionally been applied to resource allocation and automated provisioning / de-provisioning of resources
 Historically focused on bandwidth.67
CLOUD BURSTING In the cloud, it is being applied to resources such as:
 servers,
 application servers,
 application delivery systems, and
 other infrastructure…68
CLOUD BURSTING …required to provide on-demand computing environments that expand and contract as necessary, without manual intervention.69
CLOUD BURSTING Without manual intervention means?
 We generally call it - automation
 But is automation sufficient for cloud? or is it the right thing for cloud?70
CLOUD ORCHESTRATION Orchestration describes the automated arrangement,
 coordination, and
 management of complex computer systems, middleware, and services.71
CLOUD ORCHESTRATION Generally used in the context of:
 Service Oriented Architecture,
 virtualization,
 provisioning, and
 dynamic datacenter topics.72
DERIVATIVE - DEPLOYMENT MODELS Derivative cloud deployment models are emerging due to the maturation of market offerings and customer demand.

More Related Content

PPTX
Virtualization on embedded boards
PDF
Cloud Computing - ISO/IEC 17788
PPTX
Cloud management
PDF
Case Study: Anuta NCX empowers Telstra Cloud Gateway to deliver Global Interc...
PDF
Cloud computing standards
PDF
Comparison between Cisco ACI and VMWARE NSX
PPTX
Cloud computing
PDF
Rp059 Icect2012 E694
Virtualization on embedded boards
Cloud Computing - ISO/IEC 17788
Cloud management
Case Study: Anuta NCX empowers Telstra Cloud Gateway to deliver Global Interc...
Cloud computing standards
Comparison between Cisco ACI and VMWARE NSX
Cloud computing
Rp059 Icect2012 E694

What's hot (20)

PDF
Review on Security Techniques using Cloud Computing
PDF
Cloud computing
PDF
Made to measure Cloud
PPTX
M commerce
PPTX
PhD Projects in Cloud Computing Security Research Topics
PPT
security Issues of cloud computing
PDF
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
PDF
Implementing security groups in open stack
PDF
Impact of busines model elements on cloud computing adoption
PDF
Cloud computing intro
PPTX
Servizi Cloud Computing: Scenario, Strategia e Mercato Nicoletta Maggiore
PDF
Advanced Concepts of Cloud Computing
PDF
The Latest in Cloud Computing Standards
PDF
Emerging Computing Architectures
PPTX
Hybrid Cloud and Its Implementation
PDF
D32035052
DOCX
Cloud computing
PDF
Cloud Cryptography
PDF
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
PPTX
Cloud computing security
Review on Security Techniques using Cloud Computing
Cloud computing
Made to measure Cloud
M commerce
PhD Projects in Cloud Computing Security Research Topics
security Issues of cloud computing
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
Implementing security groups in open stack
Impact of busines model elements on cloud computing adoption
Cloud computing intro
Servizi Cloud Computing: Scenario, Strategia e Mercato Nicoletta Maggiore
Advanced Concepts of Cloud Computing
The Latest in Cloud Computing Standards
Emerging Computing Architectures
Hybrid Cloud and Its Implementation
D32035052
Cloud computing
Cloud Cryptography
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Cloud computing security
Ad

Viewers also liked (7)

PDF
ICAWC 2013 - How the Digital Revolution is Transforming Organisations -Bertie...
PDF
Redefining Literacy in the Emerging Digital Society
PDF
Understanding The Digital Revolution July 2014
PPTX
Portfolio security, analytics and forensic blue coat
PPT
It security forensic
PDF
Digital Media & Society
PDF
The 1st revolution marketing the digital revolution bt.20120606_slide_share2
ICAWC 2013 - How the Digital Revolution is Transforming Organisations -Bertie...
Redefining Literacy in the Emerging Digital Society
Understanding The Digital Revolution July 2014
Portfolio security, analytics and forensic blue coat
It security forensic
Digital Media & Society
The 1st revolution marketing the digital revolution bt.20120606_slide_share2
Ad

Similar to nullcon 2011 - Security and Forensic Discovery in Cloud Environments (20)

PPTX
Cloud computing security & forensics (manu)
PPTX
IT-35 Cloud Computing Unit 1.pptx
PPTX
Cloud Computing
PPT
PPT
Cloud computing ppt
 
PPT
Lect15 cloud
PPT
Cloud
PPT
Lect15 cloud
PPT
Lect15 cloud
PPT
Cloud Computing
PPT
Lect15 cloud
PPT
Lect15 cloud
PPT
Cloud computing ppt
 
PPT
Introduction to cloud computing
PPT
Cloud introduction
DOCX
Cloud notes 1
PPT
cloud computing
PPT
cloudintro-lec01.ppt
PPT
cloudintro-lec01.ppt
Cloud computing security & forensics (manu)
IT-35 Cloud Computing Unit 1.pptx
Cloud Computing
Cloud computing ppt
 
Lect15 cloud
Cloud
Lect15 cloud
Lect15 cloud
Cloud Computing
Lect15 cloud
Lect15 cloud
Cloud computing ppt
 
Introduction to cloud computing
Cloud introduction
Cloud notes 1
cloud computing
cloudintro-lec01.ppt
cloudintro-lec01.ppt

More from n|u - The Open Security Community (20)

PDF
Hardware security testing 101 (Null - Delhi Chapter)
PPTX
SSRF exploit the trust relationship
PDF
PDF
Api security-testing
PDF
Introduction to TLS 1.3
PDF
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
PDF
Talking About SSRF,CRLF
PPTX
Building active directory lab for red teaming
PPTX
Owning a company through their logs
PPTX
Introduction to shodan
PDF
Detecting persistence in windows
PPTX
Frida - Objection Tool Usage
PDF
OSQuery - Monitoring System Process
PDF
DevSecOps Jenkins Pipeline -Security
PDF
Extensible markup language attacks
PPTX
PDF
Hardware security testing 101 (Null - Delhi Chapter)
SSRF exploit the trust relationship
Api security-testing
Introduction to TLS 1.3
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Talking About SSRF,CRLF
Building active directory lab for red teaming
Owning a company through their logs
Introduction to shodan
Detecting persistence in windows
Frida - Objection Tool Usage
OSQuery - Monitoring System Process
DevSecOps Jenkins Pipeline -Security
Extensible markup language attacks

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PPTX
A Presentation on Artificial Intelligence
PDF
Encapsulation theory and applications.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
cuic standard and advanced reporting.pdf
PDF
KodekX | Application Modernization Development
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
Teaching material agriculture food technology
PDF
Modernizing your data center with Dell and AMD
Cloud computing and distributed systems.
A Presentation on Artificial Intelligence
Encapsulation theory and applications.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Electronic commerce courselecture one. Pdf
Encapsulation_ Review paper, used for researhc scholars
Reach Out and Touch Someone: Haptics and Empathic Computing
cuic standard and advanced reporting.pdf
KodekX | Application Modernization Development
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Big Data Technologies - Introduction.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
The AUB Centre for AI in Media Proposal.docx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Review of recent advances in non-invasive hemoglobin estimation
Teaching material agriculture food technology
Modernizing your data center with Dell and AMD

nullcon 2011 - Security and Forensic Discovery in Cloud Environments