Overview
Syllabus
Threat Modeling Cloud Applications - What you Don't Know Will Hurt You
Agenda Cloud Terminology and Background Threat Modeling Basics
NIST Cloud Definition Framework
What is a Threat Model A model of the a software system that depicts
Threat Modeling - High-level process Diagram the System Structure 2 Idently Assets and Security Controls
Using S3 Storage Use Case
Classic Architecture: Primary with DR Site
Cloud Architecture: Augment DR with AWS
Threat Modeling - High-level process 1 Diagram the System Structure 2 Identity Assets and Security Controls
What Does Cloud Do to Our Threat Model?
To the Cloud - New Application Structure
Identify the Assets and Security Controls
AWS Security Control Differences
EC2 Security Groups An EC2 Security Group is a set of ACCEPT firewall
Integration with Enterprise Authentication Stand alone application mechanism means that the user store must be provisioned
Elasticity Drives Change
Most Common AWS Security Credentials Purpose
S3 ACLs and Bucket Policies
Using S3 Drives Design Changes
Cloud "Doomsday" Scenarios to consider Reprioritized or Changed by Cloud
Additional Attackers
Enumeration and Risk Management
Conclusion
Taught by
LASCON