Infrastructure as a Service (IAAS)
Provides virtualized computing resources over the Internet. A third party provider hosts infrastructure components, applications and services on behalf of its subscribers with a hypervisor (VMware, Virtualbox, Xen or KVM) running the virtual machines as guests.
Platform as a Service (PAAS)
Geared toward software development hosted in the cloud.
Software as a Service
A software distribution model providing on-demand applications to subscribers over the Internet. SAAS provides easier administration, automated patch management, compatibility and version control.
Cloud Deployment Models
NIST Cloud Computing Reference Architecture 500-292 - Major Cloud Roles
Cloud regulatory
FEDRAMP: Government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.
PCI
FIPS
Cloud Security Alliance (CSA)
Trusted Computing Model
An attempt to resolve computer security problems through hardware enhancements and associated software modifications.
Trusted Computing Group - made up of hardware and software providers who cooperate to come up with specific plans
Roots of Trust (RoT) - set of functions with the Trusted Computing model that are always trusted by the Computer’s operating system
Cloud Control Layers
Cloud Security Tools
CloudInspect - penetration testing CloudPassage Halo Dell Cloud Manager Qualsys CLoud Suite Trend Micros Instant-On Cloud Security Panda Cloud Office Protection
Cloud Attacks
Data Breach of Loss
Abuse of cloud resources - leveraging the cloud for crypto key cracking for example
Insecure Interfaces and APIs
Insufficient Due Diligence
Shared technology issues in multitenant environments not providing proper isolation
Unknown risk profiles - users don’t know what security providers are using in the background
Malicious Insiders
Inadequate Design
DDOS
Wrapping attack - SOAP message is intercepted and the data in the envelope is changed and then sent/replayed
Session Riding - CSFR under a different name
Side Channel attack - Cross-guest VM breach deals with virtualization itself
Shadow IT
IT systems and solutions that are developed to handle an issue but aren’t necessarily taken through proper organizational approval chains.