{"id":16654,"date":"2019-10-22T06:00:01","date_gmt":"2019-10-22T14:00:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/10\/22\/news-10393\/"},"modified":"2019-10-22T06:00:01","modified_gmt":"2019-10-22T14:00:01","slug":"news-10393","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/10\/22\/news-10393\/","title":{"rendered":"The Shared Responsibility Model"},"content":{"rendered":"<p><strong>Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Tue, 22 Oct 2019 13:05:29 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/10\/iStock-969188382-300x169.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"Hands in for support\/sharinga\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/10\/iStock-969188382-300x169.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/10\/iStock-969188382-768x432.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/10\/iStock-969188382-1024x576.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/10\/iStock-969188382-640x360.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/10\/iStock-969188382-900x506.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/10\/iStock-969188382-440x248.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/10\/iStock-969188382-380x214.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p class=\"p3\"><span class=\"s1\">I\u2019m often asked what the biggest cyberthreats are in the cloud. When people pose that question, they seem to be expecting an answer on par with <a href=\"https:\/\/www.imdb.com\/title\/tt2717822\/\">a Hollywood movie plo<span class=\"s2\">t<\/span><\/a>. The truth is far simpler.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>The number one threat in the cloud today is service misconfigurations.<\/b><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Despite the cloud\u2019s clear operating model, teams continue to make simple mistakes or overlook the simple task of properly configuring the services they use in the cloud.<\/span><\/p>\n<h2 class=\"p4\"><b>How Does Security Work in The Cloud?<\/b><\/h2>\n<p class=\"p3\"><span class=\"s1\">Security in the cloud works using the Shared Responsibility Model. This model dictates who is responsible for any operational task in the cloud and security is simply a subset of those tasks.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">The model itself is simple.<\/span><\/p>\n<div class=\"outerImageWrap\" style=\"max-width:1920px;margin-left:auto;margin-right:auto;margin-bottom:0px;margin-top:0px;\">\n<div class=\"imageBorder \" style=\"\">\n<div class=\"imageWrapper\"><img decoding=\"async\" class=\"responsiveImage\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/10\/shared-responsibility-model.jpg\" alt=\"\" title=\"\" \/><span class=\"imagePreloader\" style=\"position:absolute;top:0px;width:100%;height:100%;overflow:hidden;\"><\/span><\/div>\n<\/div>\n<\/div>\n<p class=\"p3\"><span class=\"s1\">There are six areas where daily work is required. Starting with the physical (is the building holding the systems safe, paid for, etc.) moving through infrastructure, virtualization, operating systems, applications, and data.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">In a traditional on-premises environment, your organization is responsible for all six areas. That work is usually divided up among several teams, but at the end of the day they all report into one person within the organization, typically the CIO.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">When you move to the cloud, at least half of your responsibilities are delegated to your cloud provider.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">In infrastructure (IaaS) level services like instances or virtual machines, you take over at the operating system level. The configuration and maintenance of the OS is entirely on you and your team.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">So if you want to set your Administrator or root password to <i>password<\/i> you can. <b>Don\u2019t<\/b>. But you could, it\u2019s your responsibility.<\/span><\/p>\n<p class=\"p3\">\n<div class=\"outerImageWrap\" style=\"max-width:1920px;margin-left:auto;margin-right:auto;margin-bottom:0px;margin-top:0px;\">\n<div class=\"imageBorder \" style=\"\">\n<div class=\"imageWrapper\"><img decoding=\"async\" class=\"responsiveImage\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/10\/shared-responsibility-model-summary.jpg\" alt=\"\" title=\"\" \/><span class=\"imagePreloader\" style=\"position:absolute;top:0px;width:100%;height:100%;overflow:hidden;\"><\/span><\/div>\n<\/div>\n<\/div>\n<p class=\"p3\"><span class=\"s1\">As you move towards more abstract or SaaS-type services, your responsibilities <i>decrease<\/i>.<span class=\"Apple-converted-space\">\u00a0 <\/span>This means that you can focus on fewer areas in order to improve your security posture.<\/span><\/p>\n<h2 class=\"p4\"><b>Trust But Verify<\/b><\/h2>\n<p class=\"p3\"><span class=\"s1\">Any security professional worth their salt won\u2019t simply take the cloud service providers word that they are fulfilling their responsibilities under the model, nor should they.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">This is where compliance attestation comes into play. The big three cloud providers all have an overwhelming amount of audit evidence showing how they provide world class security.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">From the hyper-local compliance frameworks to broadly applicable ones like <a href=\"https:\/\/www.pcisecuritystandards.org\">PCI-DS<span class=\"s2\">S<\/span><\/a> or <a href=\"https:\/\/www.ssae-16.com\/soc-1\/\">SOC<span class=\"s2\">1<\/span><\/a> or <a href=\"https:\/\/www.iso.org\/isoiec-27001-information-security.html\">ISO 2700<span class=\"s2\">1<\/span><\/a>, any concern about the cloud service providers&#8217; side of this model should be alleviated.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Taking things a step further, you can always request a copy of the audit results from your provider for a specific compliance framework. In fact, you\u2019ll need that report for your compliance report when the time comes.<\/span><\/p>\n<h2 class=\"p4\"><b>Where Do Misconfigurations Come From?<\/b><\/h2>\n<p class=\"p3\"><span class=\"s1\">Circling back to the main cloud threat of misconfigurations, they bubble up from two separate places. The first is misunderstanding of who is responsible for an area of responsibility.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">In these scenarios, teams building in the cloud are expecting their provider to build controls and monitor for specific issues when in fact these areas are the responsibility of the team.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">A sadly common example of this is when teams are using virtual machines or instances in the cloud with a pre-configured deployment service. In these cases, the cloud provider has simplified the steps required to get common configurations up and running in the cloud.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">That\u2019s great, but the gap is that once the configuration is up and running, it\u2019s the responsibility of the team building the solution to patch, harden, and maintain that configuration.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Just because your provider has given you a lead out of the gate doesn\u2019t mean you don\u2019t have to run the rest of the race!<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">The second area where misconfigurations come from are simple mistakes. The cloud is an amplifier for teams. With one API call you can launch the equivalent of an entire data centre. The downside is that smaller teams are responsible for a wider variety of tech stacks and services.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Inevitably, teams make simple mistakes that lead to unnecessary exposures. One crucial way to address this is by embracing the software principle \u201csystems over people.\u201d<\/span><\/p>\n<h2 class=\"p4\"><b>Systems Over People<\/b><\/h2>\n<p class=\"p3\"><span class=\"s1\">This principle is a simple one. Most of the work for your cloud solutions should be done by systems and not people. Automation is key to success here.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Let\u2019s say the operating system your team uses for your systems has a new patch that needs to be deployed. Instead of someone patching each of the production virtual machines, that team member should patch the original template of the virtual machines and a build system should redeploy production.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">In fact, team members shouldn\u2019t even have the ability to log in to production servers. Production should be as stable as possible and managed only by the systems you put in place.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">This will reduce errors overall and the errors that do come into play are consistent and easier to address.<\/span><\/p>\n<h2 class=\"p4\"><b>Security is a Quality Problem<\/b><\/h2>\n<p class=\"p3\"><span class=\"s1\">Understanding the Shared Responsibility Model is critical to success in the cloud. While complex, sci-fi-type threats are fun to imagine, there is a very real challenge around misconfigurations <b>today<\/b>.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">In addition to understanding the model, treating service configuration like another set of software tests will catch these misconfigurations before they hit product. Using automation tools or a configuration management tool provided by a cloud provider will help ensure that you\u2019re taking full advantage of the features that your provider has built to help you secure your use of these services.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">By embracing the principle of systems over people and having a set of automations that cover your responsibilities in the cloud you can have a strong security posture in the cloud while enabling business teams to move quickly.<\/span><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/the-shared-responsibility-model\/\">The Shared Responsibility Model<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/the-shared-responsibility-model\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Tue, 22 Oct 2019 13:05:29 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/10\/iStock-969188382-300x169.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"Hands in for support\/sharinga\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/10\/iStock-969188382-300x169.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/10\/iStock-969188382-768x432.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/10\/iStock-969188382-1024x576.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/10\/iStock-969188382-640x360.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/10\/iStock-969188382-900x506.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/10\/iStock-969188382-440x248.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/10\/iStock-969188382-380x214.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>I\u2019m often asked what the biggest cyberthreats are in the cloud. When people pose that question, they seem to be expecting an answer on par with a Hollywood movie plot. The truth is far simpler. The number one threat in the cloud today is service misconfigurations. Despite the cloud\u2019s clear operating model, teams continue to&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/the-shared-responsibility-model\/\">The Shared Responsibility Model<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[11728,11064,11146],"class_list":["post-16654","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-cloud","tag-cloud-computing","tag-cloud-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16654"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16654\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16654"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}