- Introduction to Infrastructure Security for Cloud Computing
- Software Defined Network
- Cloud Network Security
- Securing Compute Workloads
- Management Plane Security
- Business Continuity & Disaster Recovery
-
Macro layers (bottom to top) - Base Infra, Virtualized Infra, and Management Plane.
-
Cloud security broadly covers components such as infra, hypervisors, network and management plane. Its advantages include:
- Reduced capital expenditure
- Better agility, resiliency
- Better economic and security benefits
-
Simplified Infrastructure Components:
-
Securing cloud infrastructure:
- Harden hosts
- Harden infra services
- Secure networks
- Secure architecture
- Harden management plane
- Underlying Iaas Networks:
-
While building underlying networks for cloud, it is recommended to:
- Use separate physical networks (not VLANs).
- Isolate the cloud networks from the LAN.
-
Virtual networks:
- Have same security concerns of a physical network (as it runs on top of one).
- May provide a simpler stack to build private cloud.
- Can include inherent security capabilities.
-
Types of virtual networks:
-
VLAN:
- Leverage existing technology
- Made for network segregation
- Not effective in security
- Limitations in cloud
-
SDN:
- Decouple network control plane from underlying hardware
- Does not have limitations like traditional LAN
- Flexibility, multiple implementations (API-enabled)
- Rely on packet encapsulation
- Effective in security
-
-
SDN security benefits:
- Easier isolation
- Topology not limited to physical structure
- SDN firewalls & security groups
- Policies & controls
-
SDN firewalls & security groups:
- Policy-based
- No additional hardware/software
- Default-Deny usually
- Apply on per-asset level (managed outside the asset)
- Integrated into core SDN logic
-
We can control the blast radius with virtual networks & cloud accounts using isolation.
-
Losing network visibility is a common issue in virtual networks.
-
Third-party security tools - pros & cons:
-
Bastion virtual network - hybrid cloud network connecting isolated networks (cloud) and dedicated networks (data center).
-
Provider & Consumer responsibilities:
-
Provider:
- Security of virtualization technology and management infra
- Exposing security controls
- Disabling attack surface
-
Consumer:
- Proper virtual network design
- Implementing virtual security controls
- Securing metastructure
-
-
For securing workloads like virtual machines, stored procedures, code execution:
- Configure environment securely
- Implement application security fundamentals
- Implement monitoring/logging
-
Impact on traditional workload security controls:
-
Compute workloads:
- Standard/Long running - managed like traditional servers, less secure
- Automated configuration management - VM configured using template/policy-based tool; manual changes disabled; moderately secure
- Immutable - based on images and automatically deployed; login disabled to prevent changes; can be hardened for better security.
-
Creating immutable images with deployment pipelines:
-
Provider & Consumer responsibilities:
-
Provider:
- Workload isolation
- Underlying infra security
- Securing virtualization tech
- Providing users security controls
- Protecting volatile memory
-
Consumer:
- Security settings and controls
- Monitoring, logging
- Image asset management
- Dedicated hosting if required
-
-
Compute security recommendations:
- Leverage immutable workloads if possible.
- Maintain security controls for standard workloads using cloud-aware tools.
- Store logs outside workloads.
- Comply with cloud provider limitations on assessments and pentesting.
-
Management plane:
- Key functions - provisioning resources, starting/stopping/terminating, config resources
- Security considerations - authentication, access control, logging/monitoring
- Access methods - Web console (MFA), API (REST, uses keys/tokens)
- All connections should always use TLS
-
Management plane security:
- Secure root account
- Manage non-root users
- Enable monitoring/auditing
-
Root account security:
- Enable hardware MFA (multi-factor authentication)
- Use isolated credentials
- Use account security questions
- Never use account except for emergencies
-
Cloud IAM (Identity & Access Management):
- Role-based access control (RBAC)
- Variable granularity across providers
- Variable granularity within product lines
- Integrate with SSO or directory services
-
Privileged users (from highest to lowest) - root, super-admin, service admin, service.
-
Monitoring/auditing:
-
Cloud platforms should be:
- Architected for failure and resiliency
- Designed for high availability in cloud provider using Availability Zones
- Prepared for graceful failure in case of cloud provider outage
-
Key aspects of BC/DR:
- Continuity within provider/platform
- Preparing for and managing cloud provider outages
- Portability
-
The entire stack should be covered:
- Metastructure - cloud configuration, IAM, monitoring, compliance artifacts; software-defined infra is key.
- Infrastructure - core config, leverage provider resiliency capabilities.
- Infostructure - leverage resilient provider storage; keep backups for rapid restore.
- Applistructure - PaaS limitations, downtime; adopt chaos engineering.