Category Archives: Security

NIST Cloud Computing Standards Roadmap

The near final draft of the NIST Cloud Computing Standards Roadmap has been posted. I submitted a lot of updates and this paragraph stood out to me in particular:

Auditing is especially important for federal agencies and “agencies should include a contractual clause enabling third parties to assess security controls of cloud providers” (by Vivek Kundra, Federal Cloud Computing Strategy, Feb. 2011.) Security controls are the management, operational, and technical safeguards or countermeasures employed within an organizational information system to protect the confidentiality, integrity, and availability of the system and its information. For security auditing, a cloud auditor can make an assessment of the security controls in the information system to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system.

It might not be wise for me to draw the attention of a man who pretends on TV to play Russian roulette with a nail gun, but the above paragraph indicates to me that Google’s cloud campaign spokesman may be headed for trouble.

Eran Feigenbaum, who is apparently also known as a Television magician or “mentalist”, has boasted on numerous occasions that customers do not get to audit Google. He has even said if customers need to audit an environment, Google is not the right place for them. Anyone who wants assurances about things like password protection is told to read their SAS 70.

So, I wonder…if Feigenbaum were selling houses made by Google would he say “you don’t get windows, you just get a list from us of what’s on the other side of this wall: tree, grass, bird…it’s all there, trust us”? They appear to be floating a non-standard definition of transparency.

We’ve been very transparent about our FISMA authorization. Our documentation has always been readily available for any government agency to review, and dozens of officials from a range of departments and agencies have availed themselves of the opportunity to learn more about how we keep our customers’ data secure.

What does it mean to be “availed of the opportunity to learn more”? I had to look up Feigenbaum’s experience with compliance and information audit to get some perspective. His public profile says little other than he spent a couple years as a sales engineer before jumping to a CISO title at a consulting firm and then Google. Surprise. Not transparent. Did I avail myself of the opportunity to learn more?

So, it will be interesting to see if/how cloud providers will change their messaging around audits if NIST avails themselves of this opportunity to push through their draft definition:

…agencies should include a contractual clause enabling third parties to assess security controls of cloud providers.

Amazon has adjusted itself already to the PCI DSS, which requires auditors on-site. Can Google catch up?

3 Financial Firm Cloud Questions

Securities Technology Monitor has a short list of risk questions for financial firms who are considering the cloud. Spoiler alert, they provide a list of eight:

  1. Who Will Have Access to Your Data?
  2. Will the Regulators Approve?
  3. Where Will My Data Be?
  4. How Will My It Be Kept Separate?
  5. How Will It Be Brought Back?
  6. What If Your Service Provider Goes Out of Business?
  7. What Financial Applications Can Be Safely Put into the Cloud?
  8. What About Executing Trades?

No surprises, except maybe for the fact that it’s a mixed bag of questions and they have no regulators listed in their sources of information.

SOURCES: Gartner, Accenture, Lime Brokerage, BT Radianz

Easy to tidy things up with some regular compliance-relevant concepts:

  1. Data Inventory: Location, Access and Recoverability
  2. Application Security
  3. Regulatory Approval

Do they have to be questions?

  1. Will you be able to maintain a Data Inventory: Location, Access and Recoverability?
  2. Will applications be secure enough to protect you and your customers?
  3. Will the regulators approve?

Cloud API Query for Firewall Rules

The “Hello Cloud” walk-through for Project Kenai gives an example of how “examining the virtual data center” with the Sun Cloud API would show rules on a VM firewall

  "vms": [
    {
      "name" : "Firewall"
      "uri": "/vdc/m~FW01",
      "run_status" : "HALTED",
      "description" : "Firewall appliance; ports 80 and 22 open.",
      "hostname" : "FW01",
      "os" : "Solaris 10",
      "cpu" : 1800,
      "memory" : 2,
      "boot_disk" : 10,
      "data_disk" : 80,
      "temp_disk" : 10,
      "params" : { },
      "tags" : [ ],
      "back_up": "/vdc/m~FW01/ops/back-up",
      "attach": "/vdc/m~FW01/ops/attach",
      "detach": "/vdc/m~FW01/ops/detach",
      "backups" : [ ],
      "interfaces" : [
        {
          "mac_address": "00:16:3E:08:00:91",
          "ip_address": "144.34.100.199",
          "public_address": "/addresses/144.34.100.199",
          "nic": "eth0"
        },
        {
          "vnet": "/vnets/10.31.145.0",
          "mac_address": "00:16:3E:08:00:92",
          "ip_address": "10.31.145.254",
          "nic": "eth1"
        }
      ]
      "controllers": {
        "start": "/vdc/m~FW01/ops/start",
      }
    }
  ]

Replacing Access Controls for Large Sets

Binder is a logic-based security language by John DeTreville

We introduce the concept of a security language, used to express security statements in a distributed system. Most existing security languages encode security statements as schematized data structures, such as ACLs and X.509 certificates. In contrast, Binder is an open logic-based security language that encodes security statements as components of communicating distributed logic programs.

Soutei, a dialect of Binder, is a trust-management system by Andrew Pimlott and Oleg Kiselyov. It attempts to improve upon and replace simple data structures like access control lists in order to accommodate large and volatile sets of users and resources, complicated constraints, and distributed administration.

Soutei brings Binder from a research prototype into the real world. Supporting large, truly distributed policies required non-trivial changes to Binder, in particular mode-restriction and goal-directed top-down evaluation. To improve the robustness of our evaluator, we describe a fair and terminating backtracking algorithm.