Confirmed VPN Privacy Audit and Open Watch Analysis Summary Report and Documentation

Similar documents
Getting Started with AWS Security

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

CogniFit Technical Security Details

Getting started with AWS security

APPLICATION & INFRASTRUCTURE SECURITY CONTROLS

TLSnotary - a mechanism for independently audited https sessions

Integrity Check Mechanism in Cloud Using SHA-512 Algorithm

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

Swift Web Applications on the AWS Cloud

Are You Sure Your AWS Cloud Is Secure? Alan Williamson Solution Architect at TriNimbus

Hosting DesktopNow in Amazon Web Services. Ivanti DesktopNow powered by AppSense

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

CCEVS APPROVED ASSURANCE CONTINUITY MAINTENANCE REPORT

We are ready to serve Latest IT Trends, Are you ready to learn? New Batches Info

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

Title: Planning AWS Platform Security Assessment?

Dyadic Security Enterprise Key Management

Securing Microservices Containerized Security in AWS

Security & Compliance in the AWS Cloud. Amazon Web Services

DevOps Anti-Patterns. Have the Ops team deal with it. Time to fire the Ops team! Let s hire a DevOps unit! COPYRIGHT 2019 MANICODE SECURITY

AppGate for AWS Step-by-Step Setup Guide. Last revised April 28, 2017

Getting started with AWS security

Introduction to AWS GoldBase. A Solution to Automate Security, Compliance, and Governance in AWS

Exam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo

Security Architecture

Certificate reputation. Dorottya Papp

Security & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web

Cloud Computing. Amazon Web Services (AWS)

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

SSH PK Authentication and Auto login configuration for Chassis Management Controller

WHITE PAPER. Authentication and Encryption Design

INTRO TO AWS: SECURITY

Security in NVMe Enterprise SSDs

Secure Key Management and Data Privacy on z/tpf

Sichere Netzwerke in der Cloud

Cloud Security Whitepaper

itexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공

SIEMLESS THREAT DETECTION FOR AWS

UNIT - IV Cryptographic Hash Function 31.1

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

HashiCorp Vault on the AWS Cloud

Service Managed Gateway TM. Configuring IPSec VPN

PROTECT WORKLOADS IN THE HYBRID CLOUD

Layer Security White Paper

Network Security & Access Control in AWS

Deep Freeze Cloud. Architecture and Security Overview

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0

Architecting for Greater Security in AWS

Assurance Activity Report (AAR) for a Target of Evaluation

Dyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof

DIGITALSIGN - CERTIFICADORA DIGITAL, SA.

Simple Security for Startups. Mark Bate, AWS Solutions Architect

Cloud Security Standards Supplier Survey. Version 1

AWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE

Cian Kinsella CEO, Digiprove

Detecting Credential Compromise in AWS

Shine and Security. Our app is playful and encourages sharing, but we take keeping this information secure very seriously.

Twilio cloud communications SECURITY

Amazon Web Services Training. Training Topics:

How to Configure a Site-To-Site IPsec VPN to the Amazon AWS VPN Gateway

Digital it Signatures. Message Authentication Codes. Message Hash. Security. COMP755 Advanced OS 1

OneID An architectural overview

Amazon Web Services (AWS) Solutions Architect Intermediate Level Course Content

SignalFx Platform: Security and Compliance MARZENA FULLER. Chief Security Officer

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE

THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA

Security Principles for Stratos. Part no. 667/UE/31701/004

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Microsoft Architecting Microsoft Azure Solutions.

Efficient integrity checking technique for securing client data in cloud computing

SnowAlert Documentation. Snowflake Security

AWS Security. Stephen E. Schmidt, Directeur de la Sécurité

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015

Amazon Web Services (AWS) Training Course Content

INTRODUCING CISCO SECURITY FOR AWS

Securing VMware NSX-T J U N E 2018

Cryptography Standard

DEVOPSIFYING NETWORK SECURITY. An AlgoSec Technical Whitepaper

About Intellipaat. About the Course. Why Take This Course?

How Secured2 Uses Beyond Encryption Security to Protect Your Data

WHITEPAPER. Security overview. podio.com

Building a Modular and Scalable Virtual Network Architecture with Amazon VPC

IMPLEMENTING A SOLUTION FOR ASSURING KEYS AND CERTIFICATES

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

Cloud Security Standards and Guidelines

Security Specification

e-authentication guidelines for esign- Online Electronic Signature Service

Securing Distributed Computation via Trusted Quorums. Yan Michalevsky, Valeria Nikolaenko, Dan Boneh

CND Exam Blueprint v2.0

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure

COMMON CRITERIA CERTIFICATION REPORT

Content and Purpose of This Guide... 1 User Management... 2

Deploying to the Cloud: A Case study on the Development of EHNAC s Cloud Enabled Accreditation Program (CEAP)

Security and Privacy in Cloud Computing

VISION ONE: SECURITY WITHOUT SACRIFICE

Cisco Desktop Collaboration Experience DX650 Security Overview

Splunk & AWS. Gain real-time insights from your data at scale. Ray Zhu Product Manager, AWS Elias Haddad Product Manager, Splunk

Transcription:

Confirmed VPN Privacy Audit and Open Watch Analysis Summary Report and Documentation November 21, 2018

Document Revision History Version Modification Date Author 1.0 Created Report Tue, Nov 20, 2018 Ryan Koven Contacts Appsec Contacts Contact Title Phone # Email Address Ryan Koven Security Consultant [hidden] [hidden] Application Contacts Contact Title Phone # Email Address Johnny Lin Application Developer johnny@confirmedvpn.com

! Summary Confirmed VPN is a subscription VPN service that encrypts users internet traffic and routes it through secure servers. Confirmed VPN is an open source and openly operated service: it intends to allow users to view the source code for the application and to verify the code that is running on application servers. To aid in the verification of its claims as an openly operated service, the Confirmed VPN team built an app called Open Watch that automates several auditing steps that allow users to confirm that claims made by the service are true. This report summarizes a review of the Open Watch app that included code review and testing to verify functionality. Using a threat model of a malicious service claiming to be openly operated, the review verified that the Open Watch app performs the audit steps it claims to perform, and that the audit steps that the Open Watch app performs provide evidence that Confirmed VPN has not violated any of the basic criteria of an openly operated service. This report may also serve as documentation for auditors who would like to use Open Watch to verify claims made by Confirmed VPN. Timeframe and Proof of Audit These activities were performed between 11/20/2018 and 11/21/2018. The audit may be verified by inspecting Cloudtrail logs. The Open Watch app triggers several events that will be logged by Cloudtrail, including the ListPublicKeys event as it fetches the public key necessary to verify the signature of the digest file sent with Cloudtrail logs (see screenshot below). Confirmed VPN and Open Watch Confirmed VPN uses AWS Cloudtrail to track activity across its AWS infrastructure. The Open Watch app relies on an AWS public audit account to access Cloudtrail logs. Cloudtrail logs contain records of events triggered by AWS APIs, SDKs, command line tools, and management console actions for things like user/role creation, and actions through services like CodeDeploy and CodeCommit. Cloudtrail logs support file integrity validation through SHA-256 hashing and RSA for signing, which helps ensure that logs are authentic and have not been altered.

Confirmed VPN uses CodeCommit to manage source code. The combination of the Cloudtrail logs and CodeCommit repositories make it possible for an auditor to track code deployments and inspect source code running on AWS instances. The state of a repository deployed to AWS instances may be tracked in Cloudtrail logs and viewed in the CodeCommit repository. Beyond viewing and confirming deployed code, Cloudtrail logs aid auditors in ensuring that operators of a service do not intend to log user data or modify code or data directly on machines. Such an assurance is possible because Cloudtrail logs track events related to AWS roles and policies, remote sessions, logging of data, and creation of parameters for SSH and direct database access, such as key pairs. Open Watch Audit Details Open Watch audits sets of rules that form the base of trust for an openly operated service. The app works by downloading Cloudtrail logs from Amazon S3, validating digest files containing log hashes that are signed with the private key of an RSA key pair, and parsing the logs and reporting rule violations that represent deviations from the service s openly operated commitment. Open Watch also reports on code deployment events. Sensitive Parameter Access ( Get Parameters ) Violation: Secret looked up

Open Watch looks for evidence of sensitive parameter access in Cloudtrail logs and reports such access as a rule violation. Sensitive parameters include encryption keys that may allow for out-of-band decryption of sensitive data stored in a database. Direct Access to Machines ( Safe Bringup, Run Command, Remote Session ) Violations: SSH enabled on bringup; SSH session initiated; Run command executed Open Watch reports on events from Cloudtrail logs that represent evidence of direct access to machines that may allow operators of the VPN service to alter code, settings, or data on active AWS instances. Events that are evidence of direct access (or the ability for administrators to access machines directly) are logs of remote sessions, a SendCommand event for remote commands, logs of SSH sessions, and evidence of SSH access enabled on running instances. Role Changes ( Role Policy ) Violations: Role policy change; Assume role policy change Role policy changes are tracked and reported by Open Watch. Such changes may be evidence of a service manipulating authentication or access control policies in ways that are not documented or disclosed to users. Logging of Data ( Flow Logs ) Violation: Created flow logs VPC Flow Logs log information about IP traffic to and from network interfaces in a VPC. Confirmed VPN does not intend to collect data on VPN traffic, so evidence of the creation of Flow Logs is reported by Open Watch as a violation. Conclusion Code review and testing confirmed that the Open Watch app performs audit tasks that ensure that Confirmed VPN meets openly operated criteria. During testing, the Open Watch app was used to perform an audit of the Confirmed VPN service, and to track code deployment events in a one-week window. The audit revealed no evidence of violations of openly operated criteria. No deviations from access control policies verified in an earlier audit were found during this assessment. The review found no evidence of third-party data sharing or logging of data from internet traffic. As confirmed during the assessment, Cloudtrail logs and CodeCommit repositories allow auditors (perhaps using Open Watch) to verify that the VPN service is not logging or sharing user data. Cloudtrail logs would provide clear evidence of manipulation of application code or servers to log, share, or otherwise exfiltrate user data.