云计算第六章

Fundamental Cloud Security基本云安全

Basic Terms and Concepts

§ Information security protects the integrity of and access to computer systems and data.
信息安全:保护计算机系统和数据的完整性和对它们的访问。
§ IT security measures aim to defend against threats and interference that arise from both malicious intent and unintentional user error.
IT安全措施:防御由于恶意的企图和无心的用户错误造成的威胁和干扰

Confidentiality 保密性

  • Confidentiality is the characteristic of something being made accessible only to authorized parties
    信息只被授权用户使用
  • Within cloud environments, confidentiality primarily pertains to restricting access to data in transit and storage.

Integrity 完整性

  • Integrity is the characteristic of not having been altered by an unauthorized party.

  • a cloud consumer can be guaranteed that the data it transmits to a cloud service matches the data received by that cloud service.

Authenticity 真实性

  • Authenticity is the characteristic of something having been provided by an authorized source.
    信息是由经过授权的源提供的这一特性
  • Authentication in non-repudiable(不可否认) interactions provides proof that these interactions are uniquely linked to an authorized source.

Availability 可用性

  • Availability is the characteristic of being accessible and usable during a specified time period.
    在特定的时间段内可以访问和可以使用的特性

Threat 威胁

  • A threat is a potential security violation that can challenge defenses in an attempt to breach privacy and/or cause harm.
    一种潜在的安全性违反,企图侵犯隐私和/或造成伤害,以此可以挑战防御。

1.Both manually and automatically instigated(激起) threats are designed to exploit (利用 )known weaknesses, also referred to as vulnerabilities(漏洞 ).
2.A threat that is carried out results in an attack.

Vulnerability 漏洞

A vulnerability is a weakness that can be exploited either because it is protected by ①insufficient(不足的) security controls, or because ②existing security controls are overcome by an attack.
漏洞是一种可能被利用的弱点

IT resource vulnerabilities can have a range of causes, including configuration deficiencies(缺陷), security policy weaknesses, user errors, hardware or firmware(固件) flaws, software bugs, and poor security architecture.

Risk 风险

Risk is the possibility of loss or harm arising from performing an activity.
风险是指执行一个行为带来损失或危害的可能性。

Risk is typically measured according to① its threat level and the② number of possible or known vulnerabilities.

Two metrics(标准) :

the probability of a threat occurring to exploit vulnerabilities in the IT resource 威胁的可能性
the expectation of loss upon the IT resource being compromised损失预期

Security Controls 安全控制

Security controls are countermeasures(对策) used to prevent or respond to security threats and to reduce or avoid risk.

安全控制是用来预防或应对安全威胁,减少或避免风险的对策。

maximum protection of sensitive and critical IT resources.

Security Mechanisms 安全机制

Countermeasures are typically described in terms of security mechanisms, which are components comprising a defensive framework that protects IT resources, information, and services.

对策通常以安全机制的形式来描述,安全机制是构成保护IT资源、信息和服务的防御框架的组件部分。

Security Policies安全策略

A security policy establishes a set of security rules and regulations.
安全策略建立了一套安全规则和规章。

For example, the positioning(定位) and usage of security controls and mechanisms can be determined by security policies.

Threat Agents 威胁作俑者

A threat agent is an entity that ①poses a threat because it is capable of ②carrying out an attack.
一个威胁作俑者是一个构成威胁的实体

Cloud security threats can originate either internally or externally①, from ②humans or software programs.

↻Anonymous Attacker 匿名攻击者
↻Malicious Service Agent恶意服务作俑者
↻Trusted Attacker 授信的攻击者
↻Malicious Insider 恶意的内部人员

Anonymous Attacker 匿名攻击者

An anonymous attacker is a non-trusted cloud service consumer without permissions in the cloud .
云中没有权限、不被信任的云服务用户


匿名攻击者是不被信任的威胁作俑者,通常试图从云边界的外部进行攻击。

It typically exists as
①an external software program that launches network-level attacks through public networks.(方式)
anonymous attackers often resort to(采取)
②committing acts like bypassing user accounts or stealing user credentials, while using methods that either
③ensure anonymity or require substantial resources for prosecution(检举)(匿名的含义)

Malicious Service Agent恶意服务作俑者

A malicious service agent is able to intercept and forward the network traffic that flows within a cloud . 能够拦截和转发云中的网络流量


恶意服务作俑者截取网络通信,试图恶意地使用或篡改数据

It typically exists as①a service agent (or a program pretending to be a service agent) with compromised(损坏) or malicious logic.
It may also exist as ②an external program able to remotely intercept and potentially corrupt(破坏)message contents.

Trusted Attacker 授信的攻击者

A trusted attacker shares IT resources in the same cloud environment as ①the cloud consumer and attempts to exploit legitimate credentials to ②target cloud providers and the cloud tenants with whom they share IT resources

①与同一云环境中的云用户共享IT资源 ②试图利用合法的证书来把云提供者以及与他们共享IT 资源的云租户 作为攻击目标

trusted attackers usually launch their attacks from ①within a cloud’s trust boundaries by abusing legitimate credentials or via the appropriation(挪用) of sensitive and confidential information
Trusted attackers (also known as② malicious tenants)恶意租户

Malicious Insider 恶意的内部人员

Malicious insiders are ①human threat agents acting on behalf of or in relation to ②the cloud provider.
恶意的内部人员是人为的威胁和云提供者有关的代理者
是试图滥用对云资源范围的访问特权的人

They are typically current or former employees or third parties with access to the cloud provider’s premises.
现任或前任雇员或者能够访问云提供者资源第三方
This type of threat agent carries tremendous damage potential 会带来巨大的破坏可能性

Note 注释:
A notation(符号) used to represent a general form of human-driven attack is the workstation combined with a lightning(闪电) bolt

表示通过工作站发起攻击的记号

Cloud Security Threats云安全威胁

↻Traffic Eavesdropping 流量窃听
↻Malicious Intermediary恶意媒介
↻Denial of Service 拒绝服务
↻Insufficient Authorization 授权不足
↻Virtualization Attack 虚拟化攻击
↻Overlapping Trust Boundaries 信任边界重叠

Traffic Eavesdropping 流量窃听

Traffic eavesdropping occurs when data being transferred to or within a cloud (①usually from the cloud consumer to the cloud provider) is passively intercepted by a ②malicious service agent for illegitimate information gathering purposes .
数据在传输过程被动地被恶意的服务作用者截获,非法的收集信息

The aim of this attack is to directly compromise(破坏) the confidentiality .
it can more easily go undetected for extended periods of time.

Malicious Intermediary恶意媒介

The malicious intermediary threat arises when messages are intercepted and altered by a malicious service agent.
此威胁是指消息被恶意服务作用者截获并被篡改

compromising(破坏)the message’s confidentiality and/or integrity.
also insert harmful data into the message before forwarding it to its destination.

Denial of Service 拒绝服务

The ①objective of the denial of service (DoS) attack is to ②overload IT resources to the point where they cannot function properly.
IT资源陷于瘫痪或不可用 =>无法提供正常的服务

Insufficient Authorization 授权不足

The insufficient authorization attack occurs when access is granted to an attacker erroneously(错误地)or too broadly.
错误地授予了攻击者的访问权限或者授权太宽泛

Resulting in the attacker getting access to IT resources that are normally protected.

A variation of this attack, known as weak authentication(弱认证), can result when weak password or shared accounts are used to protect IT resources.
一种变种称为弱认证

Virtualization Attack 虚拟化攻击

A virtualization attack exploits ①vulnerabilities(漏洞)in the virtualization platform to jeopardize(危害) its confidentiality(保密性), integrity (完整性), and/or availability (可用性).

An authorized cloud service consumer carries out a virtualization attack by ①abusing its administrative access to a virtual server to② exploit the underlying hardware

Overlapping Trust Boundaries 信任边界重叠

If physical IT resources within a cloud are shared by different cloud service consumers, these cloud service consumers have overlapping trust boundaries.

Malicious cloud service consumers can target shared IT resources with the intention of compromising cloud consumers or other IT resources that share the same trust boundary.

–恶意的云服务用户可以把目标设定为共享的IT资源,意图损害其他共享同样信任边界的云服务用户或IT资源
–重叠的信任边界潜藏了一个威胁,攻击者可以利用多个云用户共享的基于云的IT资源。

Summary

Basic Terms and Concepts

  • Confidentiality 保密性
  • Integrity 完整性
  • Authenticity 真实性
  • Availability 可用性
  • Threat 威胁
  • Vulnerability 漏洞
  • Risk 风险
  • Security Controls 安全控制
  • Security Mechanisms 安全机制
  • Security Policies安全策略

Threat Agents 威胁作俑者

  • Anonymous Attacker 匿名攻击者
  • Malicious Service Agent恶意服务作用者
  • Trusted Attacker 授信的攻击者
  • Malicious Insider 恶意的内部人员

Cloud Security Threats云安全威胁

  • Traffic Eavesdropping 流量窃听→保密性
  • Malicious Intermediary恶意媒介→保密性,完整性
  • Denial of Service 拒绝服务→可用性
  • Insufficient Authorization 授权不足→保密性,完整性
  • Virtualization Attack 虚拟化攻击→保密性,完整性,可用性
  • Overlapping Trust Boundaries 信任边界重叠→保密性,完整性,可用性
如果您有什么问题或建议可以在下方的评论区评论,我会及时回复的。
欢迎关注我的公众号,共同学习,共同提升!
您可以通过公众号向我留言,也可以通过邮箱(lklong@88.com)联系我