First on the list is data breaches. To illustrate the potential
magnitude of this threat, CSA pointed to a research paper from last
November describing how a virtual machine could use side-channel timing information to extract private cryptographic keys
in use by other VMs on the same server. A malicious hacker wouldn't
necessarily need to go to such lengths to pull off that sort of feat,
though. If a multitenant cloud service database isn't designed properly,
a single flaw in one client's application could allow an attacker to
get at not just that client's data, but every other clients' data as
well.
The challenge in addressing this threats of data loss and data leakage
is that "the measures you put in place to mitigate one can exacerbate
the other," according to the report. You could encrypt your data to
reduce the impact of a breach, but if you lose your encryption key,
you'll lose your data. However, if you opt to keep offline backups of
your data to reduce data loss, you increase your exposure to data
breaches.
The second-greatest threat in a cloud computing environment, according
to CSA, is data loss: the prospect of seeing your valuable data
disappear into the ether without a trace. A malicious hacker might
delete a target's data out of spite -- but then, you could lose your
data to a careless cloud service provider or a disaster, such as a fire,
flood, or earthquake. Compounding the challenge, encrypting your data
to ward off theft can backfire if you lose your encryption key.
Data loss isn't only problematic in terms of impacting relationships
with customers, the report notes. You could also get into hot water with
the feds if you're legally required to store particular data to remain
in compliance with certain laws, such as HIPAA.
The third-greatest cloud computing security risk
is account or service traffic hijacking. Cloud computing adds a new
threat to this landscape, according to CSA. If an attacker gains access
to your credentials, he or she can eavesdrop on your activities and
transactions, manipulate data, return falsified information, and
redirect your clients to illegitimate sites. "Your account or services
instances may become a new base for the attacker. From here, they may
leverage the power of your reputation to launch subsequent attacks,"
according to the report. As an example, CSA pointed to an XSS attack on
Amazon in 2010 that let attackers hijack credentials to the site.
The key to defending against this threat is to protect credentials from
being stolen. "Organizations should look to prohibit the sharing of
account credentials between users and services, and they should leverage
strong two-factor authentication techniques where possible," according
to CSA.
Fourth on the list of threats are insecure interfaces and APIs. IT
admins rely on interfaces for cloud provisioning, management,
orchestration, and monitoring. APIs are integral to security and
availability of general cloud services. From there, organizations and
third parties are known to build on these interfaces, injecting add-on
services. "This introduces the complexity of the new layered API; it
also increases risk, as organizations may be required to relinquish
their credentials to third parties in order to enable their agency," the
report notes.
Denial of service ranks as the fifth-greatest security threat to cloud
computing. DoS has been an Internet threat for years, but it becomes
more problematic in the age of cloud computing when organizations are
dependent on the 24/7 availability of one or more services. DoS outages
can cost service providers customers and prove pricey to
customers who are billed based on compute cycles and disk space
consumed. While an attacker may not succeed in knocking out a service
entirely, he or she "may still cause it to consume so much processing
time that it becomes too expensive for you to run and you'll be forced
to take it down yourself," the report says.
No. 6 on the list is malicious insiders, which can be a current or
former employee, a contractor, or a business partner who gains access to
a network, system, or data for malicious purposes. In an improperly
designed cloud scenario, a malicious insider can wreak even greater
havoc. From IaaS to PaaS
to SaaS, the malicious insider has increasing levels of access to more
critical systems and eventually to data. In situations where a cloud
service provider is solely responsible for security, the risk is great.
"Even if encryption is implement, if the keys are not kept with the
customer and are only available at data-usage time, the system is still
vulnerable to malicious insider attack," according to CSA.
Seventh on the list is cloud abuse, such as a bad guy using a cloud
service to break an encryption key too difficult to crack on a standard
computer. Another example might be a malicious hacker using cloud
servers to launch a DDoS attack, propagate malware, or share pirated
software. The challenge here is for cloud providers to define what
constitutes abuse and to determine the best processes for identify it.
Eight on the list of top security threats to cloud computing is
insufficient due diligence; that is, organizations embrace the cloud
without fully understanding the cloud environment and associated risks.
For example, entering the cloud can generate contractual issues with
providers over liability and transparency. What's more, operational and
architectural issues can arise if a company's development team isn't
sufficiently familiar with cloud technologies as it pushes an app to the
cloud. CSA's basic advice is for organizations to make sure they have
sufficient resources and to perform extensive due diligence before
jumping into the cloud.
Last but not least, CSA has pegged shared technology vulnerabilities as
the ninth-largest security threat to cloud computing. Cloud service
providers share infrastructure, platforms, and applications to deliver
their services in a scalable way. "Whether it's the underlying
components that make up this infrastructure (e.g. CPU caches, GPUs,
etc.) that were not designed to offer strong isolation properties for a
multi-tenant architecture (IaaS), re-deployable platforms (PaaS), or
multi-customer applications (SaaS), the threat of shared vulnerabilities
exists in all delivery models," according to the report.
If an integral component gets compromised -- say, a hypervisor, a shared
platform component, or an application -- it exposes the entire
environment to a potential of compromise and breach. CSA recommends a
defensive, in-depth strategy, including compute, storage, network,
application, and user security enforcement, as well as monitoring.
No comments:
Post a Comment