Continuous auditing and threat detection in multi-cloud infrastructure

被引:29
作者
Torkura, K. A. [1 ]
Sukmana, Muhammad I. H. [1 ]
Cheng, Feng [1 ]
Meinel, Christoph [1 ]
机构
[1] Univ Potsdam, Hasso Plattner Inst Digital Engn, Potsdam, Germany
关键词
Cloud-security; Cloud audit; Security metrics; Security risk assessment; Secure configuration; Cloud security posture management; Threat detection;
D O I
10.1016/j.cose.2020.102124
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Efficient change control and configuration management is imperative for addressing the emerging security threats in cloud infrastructure. These threats majorly exploit misconfiguration vulnerabilities e.g. excessive permissions, disabled logging features and publicly accessible cloud storage buckets. Traditional security tools and mechanisms are unable to effectively and continuously track changes in cloud infrastructure owing to transience and unpredictability of cloud events. Therefore, novel tools that are proactive, agile and continuous are imperative. This article proposes CSBAuditor, a novel cloud security system that continuously monitors cloud infrastructure, to detect malicious activities and unauthorized changes. CSBAuditor leverages two concepts: state transition analysis and reconciler pattern to overcome the aforementioned security issues. Furthermore, security metrics are used to compute severity scores for detected vulnerabilities using a novel scoring system: Cloud Security Scoring System . CSBAuditor has been evaluated using various strategies including security chaos engineering (fault injection) strategies on Amazon Web Services and Google Cloud Platform. CSBAuditor effectively detects misconfigurations in real-time with a detection rate of over 98%. Also, the performance overhead is within acceptable limits. (c) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:21
相关论文
共 51 条
[1]  
Alliance C, 2017, SECURITY GUIDANCE CR
[2]  
Almorsy M., CLOUD COMP CLOUD 201
[3]  
[Anonymous], 2007, 1 FORUM INCIDENT RES
[4]  
[Anonymous], NEXT GEN INF TECHN I
[5]  
AWS, AWS CLOUDTR TRACK US
[6]  
AWS, AWS XRAY AN DEB PROD
[7]  
AWS, 2020, GETT CRED REP YOUR A
[8]  
AWS, 2020, SHAR RESP MOD
[9]  
Chang WY, 2010, TRANSFORMING ENTERPRISE CLOUD SERVICES, P273, DOI 10.1007/978-90-481-9846-7_7
[10]   There's a Hole in that Bucket! A Large-scale Analysis of Misconfigured S3 Buckets [J].
Continella, Andrea ;
Polino, Mario ;
Pogliani, Marcello ;
Zanero, Stefano .
34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, :702-711