Cloud Computing
Cloud Computing
Cloud Computing
s cloud computing increases its presence in the public sector, more and more businesses are seeking cloud services (that is, software as a service, infrastructure as a service, and plat-
This revelation, although not surprising, demonstrates the security challenges inherent in publiccloud computing and virtualization. Can both the user and provider communities adapt their security mind-set to contend with the unique vulnerabilities in the virtualized environment that traditional security solutions cant combat?
from multiple organizations on a single server, you must provide security at the VM level rather than at the perimeter. This situation is exacerbated when cloud users create Web-based applications. Although this concern seems well defined, we need to better understand virtualizations unique vulnerabilities. Without this understanding, public-cloud security can never be properly realized.
JULY/AUGUST 2010 1540-7993/10/$26.00 2010 IEEE COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES
It All Depends
environment, applying traditional perimeter-security approaches will increase their potential for exploitation. As I mentioned earlier, to thwart attacks in public clouds, you ultimately need to move the security from the perimeter to the VM.
same OS and applications across their enterprise. So, the same vulnerabilities are distributed throughout the physical and virtual enterprise. This environment creates an atmosphere in which a cyberattacker, malware, or other threat can remotely exploit these vulnerabilities. Additionally, the VMs colocation increases the risk of VM-to-VM vulnerability exploitation. VMs dynamic nature allows for quick reconfiguration. You can revert them to previous instantiations, pause and restart them, clone them, and move them among the various servers. This inherent virtualization capability creates unique security concerns. The ease of reconfiguration creates an optimal environment to propagate vulnerabilities and unknown configuration errors. Similarly, owing to the dynamic virtualization environment, maintaining records of the overall cloud security state at any given moment is difficult, if not impossible. Another unique vulnerability is that when a VM is offline, its still available to any application
56
IEEE SECURITY & PRIVACY
that can access the physical server on which it resides. So, a remote user on one VM can access another dormant VM if both reside on the same physical server. Because dormant machines cant perform malware scans, theyre highly susceptible to malware attacks. Exploitation of this vulnerability isnt restricted to the VMs on a particular hypervisor. This attack can also affect other physical devices in the cloud. For example, a dormant machine might have been backed up or archived to another server or storage device. Among the most dynamic vulnerabilities are those introduced by patch management. Whenever a user creates an application (for example, a Web server) in a VM, the responsibility for patch management no longer resides with the cloud provider but with the user. This is because the number of users and applications that could reside in a public cloud make it impossible for the service provider to ensure that all applications are properly updated with the latest patches. Although these security risks are embedded in the virtual operating
It All Depends
public clouds entire security at a level equivalent to that found in current data center configurations and minimize the vulnerabilities associated with reconfiguration and dormant machines. Similarly, they should deploy IDS/IPS on VMs to minimize the potential for vulnerability exploitations. erhaps the easiest form of security involves monitoring the network, files, OSs, physical devices, and so on and log inspections. As is true in traditional data centers, monitoring system integrity and evaluating log files provide a critical layer of defense. Because end users might develop applications to be hosted on their VM, the cloud service provider must provide a well-
formed process to monitor network and system integrity.3 Such monitoring can alert the service provider to unexpected changes that could indicate malicious activities. Similarly, log inspections provide insight to OS and application security events. By optimizing log inspection rules, the cloud provider can ease detection of suspicious behavior and ensure timely awareness of this information.
References 1. P. Mell and T. Grance, The NIST Definition of Cloud Computing, ver. 15, US Natl Inst. of Standards and Technology, 7 Oct. 2009; http://csrc.nist.gov/groups/ SNS/cloud-computing/cloud-def -v15.doc. 2. 2010 State of Virtualization Security
Survey, Prism Microsystems, Apr. 2010; www.prismmicrosys.com/ documents/VirtualizationSecurity Survey2010.pdf. 3. J.W. Rittinghouse and J.F. Ransome, Cloud Security Challenges, Cloud Computing: Implementation, Management, and Security, CRC Press, 2009, pp. 158161; www. infosectoday.com/Articles/Cloud _Security_Challenges.htm. 4. Cloud Computing Security: Making Virtual Machines Cloud-Ready, Trend Micro, Aug. 2009.
Lori M. Kaufman is a director of IT security for BAE Systems IT. Contact her at lori.kaufman@ieee.org.
Selected CS articles and columns are also available for free at http://ComputingNow.computer.org.
of Artificial Intelligence
IEEE Intelligent Systems provides peer-reviewed, cutting-edge articles on the theory and applications of systems that perceive, reason, learn, and act intelligently.
stay on the
Cutting Edge
The #1 AI Magazine
www.computer.org/intelligent
IEEE
w ww.computer.org/security
57