enardeitjaptrues

Cloud security vendor Wiz has announced PEACH, a tenant isolation framework for cloud applications designed to evaluate security posture and outline areas of improvement. The firm stated that the framework has been developed on the back of its cloud vulnerability research to tackle security challenges impacting tenant isolation.

Security boundaries, incohesion, transparency impacting tenant isolation in cloud applications

In a blog post, Wiz wrote that there have been several cross-tenant vulnerabilities in various multi-tenant cloud applications over the last 18 months. These include ExtraReplica and Hell’s Keychain. “Although these issues have been reported on extensively and were dealt with appropriately by the relevant vendors, we’ve seen little public discussion on how to mitigate such vulnerabilities across the entire industry,” Wiz stated. What’s more, the root cause of these vulnerabilities – improperly implemented security boundaries, usually compounded by otherwise harmless bugs in customer-facing interfaces – is significant, the firm added.

The Wiz research team said that, over time, it discovered a problematic pattern, outlined as:

  • There is no common language in the industry to talk about best practices for tenant isolation, so each vendor ends up relying on different terminology and implementation standards for their security boundaries, making it difficult to assess their efficacy.
  • There is no baseline for what measures vendors should take to ensure tenant isolation in their products, neither in terms of which boundaries they’re using or how they are implemented.
  • There is no standard for transparency – while some vendors are forthcoming about the details of their security boundaries, others share very little about them. This makes it harder for customers to manage the risks of using cloud applications.

Speaking to CSO, Rik Turner, senior principal analyst at Omdia, says that when vulnerabilities affect cross-tenant cloud databases/applications, the risks for organizations are significant. “The risks for enterprises storing their data in cloud databases is clearly huge, since anyone able to leverage such a vulnerability would be able to exfiltrate data from multiple tenants.” He thinks public discussion about how to mitigate such vulnerabilities is getting better as more enterprises move to the cloud, but admits there is room for more, particularly in the technical forums where defenders congregate to discuss tactics and strategies.

Experts from the Cloud Security Alliance (CSA) agree. “As multi-tenancy is focused on public cloud usage, of which typically shares an ecosystem with multiple companies, there can run a risk of data breaches and/or corrupted data,” Josh Buker, CSA research analyst, tells CSO. If there is a misconfiguration from the vendor or customer’s side, spread from one tenant to another is also likely, as well as the possibility of malicious tenants, he adds. “The additional challenge on top of this risk is the cost effectiveness and difficulty in retaining or otherwise acquiring expertise that a business may not have.”

What is typically not discussed enough in this area is the shared responsibility model between cloud service providers and customers, says John Yeoh, global VP of research, CSA. “I continuously see companies resting on the idea that cloud providers are securing both ends of the spectrum when this is simply not true.”