Threat Modeling Cloud Applications - What you Don't Know Will Hurt You
2
Agenda Cloud Terminology and Background Threat Modeling Basics
3
NIST Cloud Definition Framework
4
What is a Threat Model A model of the a software system that depicts
5
Threat Modeling - High-level process Diagram the System Structure 2 Idently Assets and Security Controls
6
Using S3 Storage Use Case
7
Classic Architecture: Primary with DR Site
8
Cloud Architecture: Augment DR with AWS
9
Threat Modeling - High-level process 1 Diagram the System Structure 2 Identity Assets and Security Controls
10
What Does Cloud Do to Our Threat Model?
11
To the Cloud - New Application Structure
12
Identify the Assets and Security Controls
13
AWS Security Control Differences
14
EC2 Security Groups An EC2 Security Group is a set of ACCEPT firewall
15
Integration with Enterprise Authentication Stand alone application mechanism means that the user store must be provisioned
16
Elasticity Drives Change
17
Most Common AWS Security Credentials Purpose
18
S3 ACLs and Bucket Policies
19
Using S3 Drives Design Changes
20
Cloud "Doomsday" Scenarios to consider Reprioritized or Changed by Cloud
21
Additional Attackers
22
Enumeration and Risk Management
23
Conclusion
Description:
Explore threat modeling for cloud applications in this 45-minute LASCON conference talk. Learn essential cloud terminology, threat modeling basics, and the NIST Cloud Definition Framework. Discover how to create effective threat models for cloud systems, including diagramming system structure and identifying assets and security controls. Examine the impact of cloud architecture on traditional threat models, focusing on AWS services like EC2 and S3. Investigate security considerations such as EC2 Security Groups, enterprise authentication integration, and S3 ACLs and Bucket Policies. Address cloud-specific "doomsday" scenarios, reprioritized threats, and additional attacker profiles. Gain insights into enumeration and risk management techniques for cloud environments, equipping yourself with the knowledge to protect cloud applications from potential threats.
Threat Modeling Cloud Apps - What You Don't Know Will Hurt You