Analyzing Attack Surfaces in Clouds
Figure1.Thecloudcomputingtriangleandthesixattacksurfaces
(APIdependingontheservicemodeltype,IaaS,PaaS,
orSaaS)thattheserviceinstancecanuse(i.e.runon).
Inthesameway,aserviceinstanceprovidesitsservice
toauserwithadedicatedinterface(e.g.website,SSH
connection,WebService,...).Thus,with3participants,
thereare6suchinterfacestoconsider(asshownin
Figure1).Fortheremainderofthispaper,wewill
refertotheseinterfacesasbeingtheattacksurfaces.
2.1.AttackSurfaces
Thefirstandmostprominentattacksurfaceisthatof
aserviceinstancetowardsauser(a).Thisisnothing
elsethanthecommonserver-to-clientinterface,thus
enabling(andbeingvulnerableto)allkindsofattacks
thatarepossibleincommonclient-server-architectures
aswell.Thisinvolvesthingslikebufferoverflow
attacks,SQLinjection,orprivilegeescalation.
Inthesameway,theattacksurfacetheserviceuser
providestowardstheservice(b)isnothingelsethan
thecommonenvironmentaclientprogramprovides
toaserver,e.g.browser-basedattacksforanHTML-
basedservicelikeSSLcertificatespoofing[4],attacks
onbrowsercaches,orPhishingattacksonmailclients.
Theinterfacebetweenaserviceinstanceandacloud
system(c)isalittlebitmorecomplex.Here,the
separationofserviceinstanceandcloudprovidercan
betricky,butingeneralthecloudsystem’sattack
surfacetotheserviceinstancecoversallattacksthat
aserviceinstancecanrunagainstitshostingcloud
system.Anexamplewouldberesourceexhaustion
attacks,triggeringthecloudprovidertoprovidemore
resourcesorendupinaDenial-of-Service,orattacks
onthecloudsystemhypervisor(seeSection3.2).
Theotherwayaround,theattacksurfaceofaservice
instanceagainstthecloudsystem(d)isaverysensi-
tiveone.Itincorporatesallkindsofattacksacloud
providercanperformagainstaservicerunningonit.
Thismaystartwithavailabilityreductions(i.e.shut
downserviceinstances),butmayalsocoverprivacy-
relatedattacks(scanningaserviceinstance’sdatain
process)orevenmaliciousinterference(e.g.tampering
datainprocess,injectingadditionaloperationstoser-
viceinstanceexecutions;everythingarootkit[5]can
do).Totheauthor’sconsideration,thisisbyfarthe
mostcriticalkindofattacksurface,asitsexploitationis
rathereasy(oncebeingthecloudprovider)andattack
impactsaretremendous.
Thefifthattacksurfaceofinterestisthatofthe
cloudsystemtowardstheuser(e).Thisisalittle
bithardtodefinesincebothusuallydonothavea
realtouchingpoint;incommonscenariostherealways
existsaserviceinbetween.However,thecloudsystem
hastoprovideaninterfaceforcontrollingitsservices.
Thatinterface,whichwecallcloudcontrol,provides
cloudcustomerswiththeabilitytoaddnewservices,
requiremoreserviceinstances,deleteserviceinstances
etc.Asthisisnotaserviceinstanceinthesense
ofFigure1,itisdiscussedhereasaseparateattack
surface,withattackthreatsbeingmerelysimilartothe
onesacommoncloudservicehastofacefromauser.
Thelastattacksurfaceistheoneprovidedby
277
Figure from: Gruschkaet al., Attack Surfaces: A Taxonomy for Attacks on
Cloud Services.
Cloud attack surfaces can
be modeled using a 3 entity
model (user, service, cloud)