How Safe Are Your Backup Encryption Keys?
In a private experiment at Worcester Polytechnic Institute, Amazon Web Services (AWS) got mud on their faces when a group of academics were able to sneak a peek at encryption keys temporarily stored in CPU cache. And in other news, HP has withdrawn from the public Cloud arena citing reasons of cloud-investment prudence. Oracle, on the other hand, are jumping in with both feet citing reasons of making loads and loads of money.
Wait, what? Encryption keys were stolen how?
Yes, a few well-intentioned professors were able to leverage an RSA encryption library vulnerability to scan the cache of the CPU on a machine hosting several VMs. After sifting through the heaps of information contained in said cache, they managed to glean the RSA encryption keys used by the adjacent VMs. Fortunately, their report reveals that this technique could be used on other multi-tenant cloud environments – unfortunately AWS were the lab mice this time around. The vulnerability has since been patched.
This illustrates how cloud security can be taken for granted. In an article by Network World, Yehuda Lindell, chief scientist and co-founder of security firm Dyadic, was quoted saying, "Although a difficult attack to carry out, this further highlights the fact that secret keys are vulnerable, wherever they may be. They are even more vulnerable in cloud and virtualised environments where you have less direct control. This specific attack may be prevented by appropriate patching... However, the type of attack is almost impossible to completely prevent."
The best defence...
Since your backup solution is already a line of defence against data loss, you'll need to ensure it cannot be easily compromised. So how does one attempt to "completely" prevent these types of attacks, especially concerning cloud-based backup?
- Your first salvo is still the encryption key – ensure that all backup data stored on a collocated or multi-tenanted environment is encrypted with a symmetric key algorithm such as AES. One caveat though: your backup data should always remain in encrypted form on the server and should only ever be decrypted on the client where the data is restored. This circumvents any CPU snooping done in the cloud.
- Patching security vulnerabilities is ideally the best solution but one has to become aware of the vulnerabilities somehow and the fix must be available, which it isn't always.
- Alternatively, avoid using shared clouds a.k.a. elastic cloud storage. Consider having your backup solution hosted on a dedicated instance i.e. where VMs are isolated at host-level. Most cloud providers will be able to accommodate this.
- AWS recommend using, and provide, Hardware Security Modules (HSM). These devices are external to the host system and safeguard digital encryption keys by isolating them from the computing environment. HSMs prevent key tampering and bus probing.
A stitch in time...
So you see, your backup encryption keys might not be as safe as you thought. With all the other cloud-security considerations and mitigations to be aware of, if you can take these precautions, it will be one less thing to worry about in keeping your backup data safe from attack.
Redstor Accounting For Financial Data Backups at The Alternative Accountancy Strategic IT Conference 2018
Continuing from a series of events in the first two months of the year, Redstor will be in attendance of this years, Alternative Accountancy... read more