Protecting Data in Untrusted Locations

40
Jan Schaumann @jschauma 99CE 1DC7 770A C5A8 09A6 0DCD 66CE 4FE9 6F6B D3D7 Protecting Data in Untrusted Locations An exercise in “Real World” threat modeling.

Transcript of Protecting Data in Untrusted Locations

Page 1: Protecting Data in Untrusted Locations

Jan Schaumann @jschauma

99CE 1DC7 770A C5A8 09A6 0DCD 66CE 4FE9 6F6B D3D7

Protecting Data in Untrusted Locations An exercise in “Real World” threat modeling.

Page 2: Protecting Data in Untrusted Locations

Me. Errday.

Page 3: Protecting Data in Untrusted Locations
Page 4: Protecting Data in Untrusted Locations

https://t.co/Ej94YI4Ovr

Threat ModelObliga

tory

James M

ickens

“This World of O

urs”

reference.

Page 5: Protecting Data in Untrusted Locations

https://t.co/Ej94YI4Ovr

Threat ModelObliga

tory

James M

ickens

“This World of O

urs”

reference.

Page 6: Protecting Data in Untrusted Locations
Page 7: Protecting Data in Untrusted Locations

gonna tweetTweeters

Page 8: Protecting Data in Untrusted Locations

https://t.co/ykdsHGV84r

Page 9: Protecting Data in Untrusted Locations

https://t.co/ykdsHGV84r

Page 10: Protecting Data in Untrusted Locations

https://t.co/ykdsHGV84r

Page 11: Protecting Data in Untrusted Locations

Threat Actors:

• hackeris vulgaris

• organized crime (fsvo “organized”)

• local governments or intelligence services

• foreign governments or intelligence services

Threat Model

Page 12: Protecting Data in Untrusted Locations

Threat ModelAssets:

• Physical Equipment

• Local Service Access Point

• Access/Entry point to Infrastructure

• TLS keys

Page 13: Protecting Data in Untrusted Locations

Access/Entry point to Infrastructure

• physically protected systems

• no “secrets” permanently stored on systems

• traffic severely restricted

• all traffic must be mutually authenticated

Page 14: Protecting Data in Untrusted Locations
Page 15: Protecting Data in Untrusted Locations

https://www.xkcd.com/538/

Obligatory X

KCD comic.

This also works.

Page 16: Protecting Data in Untrusted Locations
Page 17: Protecting Data in Untrusted Locations

TLS keys

Page 18: Protecting Data in Untrusted Locations

Y U NO HSM?

TLS keys

Page 19: Protecting Data in Untrusted Locations

No time to explain - get in the llama!

Page 20: Protecting Data in Untrusted Locations
Page 21: Protecting Data in Untrusted Locations
Page 22: Protecting Data in Untrusted Locations
Page 23: Protecting Data in Untrusted Locations

BootingFirst time:

• boot into single-user mode

• generate TPM-backed CSR

• submit CSR to service in datacenter

• cert generated, used to encrypt client puppet key

• encrypted puppet key stored in host image

Nth time:

• iPXE via TLS

• init script decrypts puppet key using TPM

• puppet does its thing

Page 24: Protecting Data in Untrusted Locations

http://cm.bell-labs.com/who/ken/trust.html

Obligatory

“Reflections o

n Trusting Trust”

reference.

Page 25: Protecting Data in Untrusted Locations

Wile E. Coyote has an MBA.

Value of Asset

Cost of Attack

Wile’s ROI

Page 26: Protecting Data in Untrusted Locations

Wile E. Coyote has an MBA.

Value of Asset

Cost of Attack

Wile’s ROI

Page 27: Protecting Data in Untrusted Locations

Raising the cost of attackWile E. Coyote needs:

• physical access

• ability to attack running system

• persistent undetected presence

Page 28: Protecting Data in Untrusted Locations

Wile E. Coyote has an MBA.

Value of Asset

Cost of Attack

Wile’s ROI

Page 29: Protecting Data in Untrusted Locations

Wile E. Coyote has an MBA.

Value of Asset

Cost of Attack

Wile’s ROI

Page 30: Protecting Data in Untrusted Locations

Reducing the value of TLS keys

• Forward Secrecy

• tightly scoped certificates

• short-lived

• alert if observed outside of expected env

Page 31: Protecting Data in Untrusted Locations

Possible scenarios• hardware compromised prior to us

racking it

• resources compromised through temporary physical access (ACME backdoor)

• ACME fake hole, ACME rocket powered roller skates, ACME do-it-yourself tornado kit, ACME earthquake pills, ...

Page 32: Protecting Data in Untrusted Locations
Page 33: Protecting Data in Untrusted Locations
Page 34: Protecting Data in Untrusted Locations

Lessons: You can’t just rub some crypto on it.

http://youtu.be/YsY2-yi5W74

Page 35: Protecting Data in Untrusted Locations

Lessons:Know your assets, know your adversaries.

Page 36: Protecting Data in Untrusted Locations
Page 37: Protecting Data in Untrusted Locations
Page 38: Protecting Data in Untrusted Locations
Page 39: Protecting Data in Untrusted Locations
Page 40: Protecting Data in Untrusted Locations

Jan Schaumann @jschauma

54FE 193F 64ED DD0B CFDE 40D6 1983 626F 1E52 3D3A

Thanks! (now get in the llama!)