Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing...

25
Cloud Security: Securing The Invisible Thing Mohammad Febri R, OSCP, CEH – Sr. Security Engineer mohammad.ramadlan @tiket.com

Transcript of Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing...

Page 1: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

Cloud Security: Securing The Invisible Thing

Mohammad Febri R, OSCP, CEH – Sr. Security [email protected]

Page 2: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

Agenda1. Introduction

2. Background

3. Objective

4. Cloud IAM

5. Result

Page 3: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

Introduction1.

Page 4: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

About Me• Mohammad Febri Ramadlan (Ebi)

• Information Security Consultant

• Open-source Enthusiasts (OWASP Project Leader and Mozilla Keyholder)

• Par-Time Blogger, Swimmer, and Musician

Contact:

• +6281809809636

Page 5: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

Background2.

Page 6: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

Background• PCI DSS: 18. Data Control & Access Control Policies

• ISO 27001: Annex A.9: Access Control

Page 7: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

Objective3.

Page 8: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

Objective• Fulfill the KPI

• Improve the current process

• User access monitoring

• Access control review

Page 9: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

Cloud IAM4.

Page 10: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

Cloud

Page 11: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

Cloud IAM

“ _who (identity) has _what access (role) for _which resource.”

Page 12: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

IAM Entity

• User and Group

• Service Account

• Role

• Policy

• Version

• Environment

Page 13: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

Tools Option

• Forseti

• Security monkey

• Dollhouse

• ScoutSuite

• CloudSploit

Page 14: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

Sample:

ScoutSuite

Page 15: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

Sample (2):

ScoutSuiteServices

Page 16: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

Sample (3):

ScoutSuiteCloudsql

Page 17: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

Result5.

Page 18: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

JSON File

Page 19: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

JSON View

Page 20: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda
Page 21: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

Slack Notification: Services[+] Service : cloudsql[+] Data : findings

*** Dashboard : Instances*** Description : Instance with automatic backups disabled*** Rationale : <b>Description:</b><br><br>Automatic backups should be

configured for Cloud SQL instances in order to ensure backups are created regularly.

*** Dashboard : Instances*** Description : Instance allows root login from any host*** Rationale : <b>Description:</b><br><br>Root access to MySQL Database

Instances should be allowed only through trusted IPs.<br><br><b>References:</b><ul><li>CIS Google Cloud Platform Foundations v1.0.0 6.4</li></ul>

Page 22: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

Slack Notification: User and IAM Role[+] User Count : 5-----[+] Email : [email protected][+] Roles : [u'owner']-----[+] Email : [email protected][+] Roles : [u'owner']-----[+] Email : [email protected][+] Roles : [u'owner', u'viewer']-----[+] Email : [email protected][+] Roles : [u'owner']-----[+] Email : [email protected][+] Roles : [u'iam.securityReviewer', u'viewer']

Page 23: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

Question

?

Page 24: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

Summarize

1. Fulfill the regulation (PCI DSS & ISO 27001)

2. Cloud Audit is developed to ensure the proper user access

3. User access matrix review in daily activity

Page 25: Cloud Security: Securing The Invisible Thing · Cloud Security: Securing The Invisible Thing Mohammad FebriR, OSCP, CEH –Sr. Security Engineer mohammad.ramadlan@tiket.com. Agenda

Thank you!