Security Testing for entities hosted in cloud
For the applications that are getting migrated to cloud / planned to be hosted in the cloud will need additional security considerations. Failure to ensure proper security protection when using cloud services may potentially result in higher costs and loss to business. Organizations must consider security controls for different services viz. Infrastructures as a service(Iaas), Software as a service (SaaS) or Platform as a service.
Which applications should be moved to cloud?
· Low to Medium Risk
What are the key security risks while hosting in cloud?
· Isolation Failure – Multi tenancy is a key thing in cloud. Failure in controls that separate the storage, memory, identity and access control and routing between tenants is a huge risk.
· Authentication and Authorization
· Compliance and Legal risks
· Loss of Governance
· Management Interfaces for applications
· Service unavailability
· Insecure or incomplete data deletion
· Visibility and audit
Keeping above in mind, while the traditional approaches for security testing the applications and infrastructure still applies for the hosted entities on the cloud – the following additional measures must be taken into consideration:
Ø Understand how the isolation is provided to the hosted entity (application / infrastructure) in cloud from other tenants.
Ø Ensure there are governance and compliances processes in place with the provider and they are happy to share the details and allow clients to perform audits.
Ø Existence of documented business and operational processes.
Ø Ensure IDAM solutions laid by the provider caters each tenant separately.
Ø Ensure network connections are secure.
Ø Evaluate security controls on physical infra and facilities.
Ø Understand the security requirements of the exit process.
While planning for security assessments on the applications on the cloud the above measures must be kept in mind.
What do we need to plan differently while considering security assessment on the hosted entities?
Ø In order to conduct vulnerability assessments and penetration tests – what options are available with the provider?
o Hosting a penetration testing virtual machine in the same zone where application servers are hosted.*
o Acquiring written permission from the provider to scan in their cloud.
o Acquiring certificate of Penetration testing / VA conducted by the provider on the hosted entities.
o Conducting testing from another cloud where the Security assessment systems are hosted.* (either our own or using cloud services for scanning e.g. Nessus on AWS, Qualys Cloud, Kali on AWS, Parrot cloud etc.)
Ø Performing Paper assessment against all the controls promised by the provider.
Ø Traffic screening
Ø Denial of service protection
Ø Existence of IDS and IPS
Ø Logging and notifications
Ø Audit - Hypervisor based filters, firewall filtering rules and VPN connections.
The above comprises of the approach towards conducting security assessment on entities hosted on the cloud.
*As far as the tools are considered – all standard tools will work however where and how to host them will differ.
Also it is not unusual to see a resistance from the cloud service provider in allowing to conduct in-depth security assessments – that is where the Security testing team needs to ensure that the provider actually walks the talk viz. assess all the security controls individually – either by testing or doing paper passed assessments to verify them.
Comments
Post a Comment