protecting data in untrusted locations

40
Jan Schaumann @jschauma 99CE 1DC7 770A C5A8 09A6 0DCD 66CE 4FE9 6F6B D3D7 Protecting Data in Untrusted Locations An exercise in “Real World” threat modeling.

Upload: jan-schaumann

Post on 12-Jul-2015

513 views

Category:

Internet


0 download

TRANSCRIPT

Page 1: Protecting Data in Untrusted Locations

Jan Schaumann @jschauma

99CE 1DC7 770A C5A8 09A6 0DCD 66CE 4FE9 6F6B D3D7

Protecting Data in Untrusted Locations An exercise in “Real World” threat modeling.

Page 2: Protecting Data in Untrusted Locations

Me. Errday.

Page 3: Protecting Data in Untrusted Locations
Page 4: Protecting Data in Untrusted Locations

https://t.co/Ej94YI4Ovr

Threat ModelObliga

tory

James M

ickens

“This World of O

urs”

reference.

Page 5: Protecting Data in Untrusted Locations

https://t.co/Ej94YI4Ovr

Threat ModelObliga

tory

James M

ickens

“This World of O

urs”

reference.

Page 6: Protecting Data in Untrusted Locations
Page 7: Protecting Data in Untrusted Locations

gonna tweetTweeters

Page 8: Protecting Data in Untrusted Locations

https://t.co/ykdsHGV84r

Page 9: Protecting Data in Untrusted Locations

https://t.co/ykdsHGV84r

Page 10: Protecting Data in Untrusted Locations

https://t.co/ykdsHGV84r

Page 11: Protecting Data in Untrusted Locations

Threat Actors:

• hackeris vulgaris

• organized crime (fsvo “organized”)

• local governments or intelligence services

• foreign governments or intelligence services

Threat Model

Page 12: Protecting Data in Untrusted Locations

Threat ModelAssets:

• Physical Equipment

• Local Service Access Point

• Access/Entry point to Infrastructure

• TLS keys

Page 13: Protecting Data in Untrusted Locations

Access/Entry point to Infrastructure

• physically protected systems

• no “secrets” permanently stored on systems

• traffic severely restricted

• all traffic must be mutually authenticated

Page 14: Protecting Data in Untrusted Locations
Page 15: Protecting Data in Untrusted Locations

https://www.xkcd.com/538/

Obligatory X

KCD comic.

This also works.

Page 16: Protecting Data in Untrusted Locations
Page 17: Protecting Data in Untrusted Locations

TLS keys

Page 18: Protecting Data in Untrusted Locations

Y U NO HSM?

TLS keys

Page 19: Protecting Data in Untrusted Locations

No time to explain - get in the llama!

Page 20: Protecting Data in Untrusted Locations
Page 21: Protecting Data in Untrusted Locations
Page 22: Protecting Data in Untrusted Locations
Page 23: Protecting Data in Untrusted Locations

BootingFirst time:

• boot into single-user mode

• generate TPM-backed CSR

• submit CSR to service in datacenter

• cert generated, used to encrypt client puppet key

• encrypted puppet key stored in host image

Nth time:

• iPXE via TLS

• init script decrypts puppet key using TPM

• puppet does its thing

Page 24: Protecting Data in Untrusted Locations

http://cm.bell-labs.com/who/ken/trust.html

Obligatory

“Reflections o

n Trusting Trust”

reference.

Page 25: Protecting Data in Untrusted Locations

Wile E. Coyote has an MBA.

Value of Asset

Cost of Attack

Wile’s ROI

Page 26: Protecting Data in Untrusted Locations

Wile E. Coyote has an MBA.

Value of Asset

Cost of Attack

Wile’s ROI

Page 27: Protecting Data in Untrusted Locations

Raising the cost of attackWile E. Coyote needs:

• physical access

• ability to attack running system

• persistent undetected presence

Page 28: Protecting Data in Untrusted Locations

Wile E. Coyote has an MBA.

Value of Asset

Cost of Attack

Wile’s ROI

Page 29: Protecting Data in Untrusted Locations

Wile E. Coyote has an MBA.

Value of Asset

Cost of Attack

Wile’s ROI

Page 30: Protecting Data in Untrusted Locations

Reducing the value of TLS keys

• Forward Secrecy

• tightly scoped certificates

• short-lived

• alert if observed outside of expected env

Page 31: Protecting Data in Untrusted Locations

Possible scenarios• hardware compromised prior to us

racking it

• resources compromised through temporary physical access (ACME backdoor)

• ACME fake hole, ACME rocket powered roller skates, ACME do-it-yourself tornado kit, ACME earthquake pills, ...

Page 32: Protecting Data in Untrusted Locations
Page 33: Protecting Data in Untrusted Locations
Page 34: Protecting Data in Untrusted Locations

Lessons: You can’t just rub some crypto on it.

http://youtu.be/YsY2-yi5W74

Page 35: Protecting Data in Untrusted Locations

Lessons:Know your assets, know your adversaries.

Page 36: Protecting Data in Untrusted Locations
Page 37: Protecting Data in Untrusted Locations
Page 38: Protecting Data in Untrusted Locations
Page 39: Protecting Data in Untrusted Locations
Page 40: Protecting Data in Untrusted Locations

Jan Schaumann @jschauma

54FE 193F 64ED DD0B CFDE 40D6 1983 626F 1E52 3D3A

Thanks! (now get in the llama!)