Page 173 - How Cloud Computing Is Transforming Business and Why You Cant Afford to Be Left Behind
P. 173

D ANGERS ABOUND: SECURITY IN THE C L O UD



                 protect their Web site as they do with traditional hosting solu-
                 tions, so it is no easier for potential abusers to compromise
                 Amazon EC2 based Web sites. . . . We were able to locate the
                 Zeus botnet controller and promptly shut it down. We take all
                 claims of misuse of the services very seriously and investigate
                 each one. When we find misuse, we take action quickly and

                 shut it down.”
                     All of this is to Amazon Web Services’ credit, but it also
                 makes clear that it’s impossible to keep all malware out of the
                 cloud. Variants of the Zeus botnet are believed to have been re-
                 sponsible for the theft of $100 million from bank accounts in
                 2009. The Cloud Security Alliance, in a white paper released
                 last April, says, “Hosts running within an infrastructure-as-a-

                 service are akin to hosts running in the DMZ of your enter-
                 prise’s network.” Cloud service providers would say that that’s
                 too harsh, but for now, it’s a good warning.
                     The most disquieting concerns about computing on infra-
                 structure as a service are the things that we lack years of solid
                 experience in dealing with—multiple virtual machine servers
                 running on one physical piece of hardware is a relatively recent
                 phenomenon in the data center. As noted in Chapter 3, the
                 ability to manage servers flexibly in this manner leads to many

                 of the basic ideas of cloud computing. But there remain trou-
                 bling questions.
                     When an intruder gets onto a server, intrusion detection
                 systems know where to watch for activity and have well-defined
                 patterns of software event sequences that tell them that some-
                 thing is amiss. But the operation of the virtual machine, an ap-
                 plication with its own operating system, is a different realm of



                                                                     153
   168   169   170   171   172   173   174   175   176   177   178