VMworld Europe 2011: Penetration Testing the Cloud

I will be presenting the following Session in two weeks at VMworld Europe 2011:

Session ID: SEC1236
Title: Penetration Testing the Cloud
Twitter hashtag: #SEC1236
Track: Cloud Infrastructure: Security and Compliance
Day: Tuesday 09:00

Cloud computing is said to represent a fundamentally different approach to building IT environments. Lessons from common management tools and processes, which work with discrete processes across static computing stacks, often are not incorporated into the new virtual environments. Predictably, this causes gaps in security. This presentation shows where and how to test for weakness. You will also learn how to deploy controls and improve security when resources are pooled across multiple sources, provisioning and capacity are highly dynamic, and configurations are fluid

This is a repeat of the same session presented at VMworld in Las Vegas, which was scored overall at 4.63 (4.72 for effectiveness) out of 5.00 with nearly 500 in attendance.

Hope to see you there.

VMworld 2011

RSA Europe 2011: Virtual Compliance

I will be presenting the following Session next week at RSA Europe 2011:

Session ID: GRC-303
Title: Everything You Wanted to Know About Virtual Compliance (But Were Afraid to Ask)
Scheduled Session Times: Thursday, Oct 13, 11:10 AM
Room: Buckingham (East Wing)

The session will address the most common sticking points for virtual environments with their auditors. It will cover examples of cloud environments and virtual environments that have achieved compliance with common regulations. If you think the “Cookies Directive” or FISMA High is impossible for a cloud provider, or mulit-tenant multi-level workloads will never be accepted by a QSA for PCI DSS 2.0, this session is for you.

Hope to see you there.

Steam Car for Sale

An auction tomorrow will be for a four-seater steam “quadricycle” with a range of 20 miles on 40 gallons of water — the 1884 De Dion Bouton Et Trepardoux Dos-A-Dos Steam Runabout.

De Dion’s little quadricycle can claim to be the first family car, despite its arcane power source. What makes it different from road-going locomotives dating back to Cugnot’s 1770 tractor is its sophisticated boiler, which can be steamed in 45 minutes. It is also compact at only nine feet long and relatively light at 2,100 pounds. But, it has four wheels, seats four, and can be driven by one person — like a modern car.

Steam Car

One of the oldest still functioning vehicles, and a promising early design, but it is said to have been expensive even back in 1884.

By 1889 you could buy a tricycle for 2,800 francs ($540) and a quadricycle for 4,400 francs ($850).

Those prices were certainly out of the reach for the average enthusiast, when a French laborer might make five francs a day, and sales were confined to the very rich.

Hmmm, 5 francs a day x 365 days = 1825 francs. So a tricycle would be double an annual salary. An American laborer might make $120 a day x 365 days = $43,800. So a car today, in relative terms, is about half the price of one “confined to the very rich” in the 1890s? That’s like saying a $60,000 car today is confined to the very rich. Am I missing something?

Price was surely a factor but it seems the real reason for demise was the allure of gasoline.

By 1893 gasoline was the up-and-coming power source, and steam devotee Trepardoux left the firm and presumably went back to toys. A celebrated duelist and ladies’ man, De Dion was keen on animal welfare and made a few large steam trucks in an effort to free horses from hauling heavy carts, and then he and Bouton focused on gasoline automobiles. They patented their transmission in 1895 and dominated the early years of the 20th century, with De Dion engines powering some of the first great marques, like Renault, Pierce-Arrow and Delage.

Betfair’s Gamble on Disclosure

Nearly four million records were stolen last year, apparently even encryption keys, from the fast-growing gambling company. The Telegraph reports they were forced to report it to law enforcement, partners and regulators

The theft was so serious that Betfair was forced to inform the UK’s Serious Organised Crime Agency (SOCA), the Australian Federal Police and German law enforcement officials. It also notified the UK Gambling Commission and the Maltese Lotteries and Gaming Authority, as well as Royal Bank of Scotland, its “acquiring bank” – the lender responsible for accepting credit and debit card payments made via Betfair.

They did not, however, report it to the owners of the records who would be impacted

Its July report to regulators states it had decided there was no reason to inform its customers, after taking advice from SOCA that “public disclosure would be detrimental to any intelligence operation or investigation”.

The argument for not disclosing the breach to customers supposedly hinged on a little detail about whether sensitive track data was exposed.

“We have taken the prudent view that the criminal has the expertise to decrypt the payment card details,” Betfair admitted, though stressed that the “CVV2/CVC security numbers” were not stolen.

It said advice from RBS was that “this very significantly limits the ability of the cards to be used fraudulently”.

That’s nonsense, of course. If it were so hard to use data fraudulently then why was it encrypted in the first place? The PCI DSS wouldn’t be so strict about encryption and clean destruction of it if the RBS argument about “significantly limits” were true. We are talking about RBS, another company infamous for weak security, I have to point out.

CVV2/CVC were not present because it is strictly prohibited from being stored, but it’s not like the card brands say go ahead and let the rest of the data float around. More to the point, criminals make fraudulent use of cards all the time without the CVV2/CVC.

It’s a story to make many people upset, surely, but here’s a little humorous twist in the details. They only discovered the breach when a server that should have been used for monitoring for breaches crashed two months after the breach started.

The first Betfair knew of the theft was when a “production log server” crashed in its Malta data centre on May 20 – more than two months after the initial breach. That led to the discovery that “at least nine servers [had] been compromised in the UK and two in Malta”.

Hey, someone check the log server. It stopped responding. Oh, well look at that, the logs say we have been breached for a while.

That might scare some executives into proceeding with caution, but Betfair not only took a gamble by not disclosing the breach to customers, they then took an even bigger gamble — going public while faced with serious operational deficiencies.

Just a month before the decision to press ahead with the float, Betfair had received a “Forensic Investigation Report” on the cyber theft from security consultancy Information Risk Management (IRM).

Its first conclusion was that: “Appropriate information security governance is not in place within Betfair and as a consequence the business has been exposed to significant risks.”

Another one? That “appropriate technical controls relating to such elements as network segregation and file integrity monitoring that would provide Betfair the ability to deter, prevent and detect such an incident are not in place”.

Now we can watch and see how the gambles work out for them.