Security Audit as a Service (SAaaS)

Security Audit as a Service (SAaaS) is a project funded by the German Ministry for Education and Research (BMBF) and investigates how audits of cloud infrastructure can enhance trust in cloud environments.

SAaaS is based on a cloud intrusion detection system with distributed agents deployed at logical key locations (e.g. VMs, VM hosts, cloud management) of a cloud infrastructure monitoring occurrences. An occurrence can be anything describable like a simple successfully login event, a series of unsuccessful login attempts, network connections between VMs or increasing CPU consumption of a certain VM. In the event of an identified occurrence the agent generates an event feeding a complex event processing engine which draws the cloud's security state. Thus, distributed attacks on a cloud computing environment or misuse of cloud resource will be detected early.

SAaaS Use Cases

The Security Audit as a Service Infrastructure aims to support the following use cases:

A) Automated security audit of a customer IT infrastructure
This service can be used on-demand targeting an infrastructure not necessarily running in a cloud computing environment. Based on a toolbox available
a customer can schedule security audits of its IT infrastructure. Tools like a vulnerability scanner of all internet exposed systems are possible and can be scheduled in a repetitive manner. Results will be user friendly conditioned to an audit security report.

B) Audit and monitoring of cloud instances
Cloud user are running special monitored cloud instances, virtual machines (VMs), within a provider's cloud infrastructure. Monitoring is done via audit agents which are
positioned within a customers VMs as well as in the cloud infrastructure of the provider. The user de fines Security Service Level Agreements (SSLA) de fining what to monitor and how to alert in case of system deviation from the de ned manner.

C. Cloud infrastructure audit and monitoring
A Security Audit Service is used by the cloud provider as well as a 3rd party (e.g. security service provider) to audit and monitor the cloud infrastructure. Results of external security audits like penetration test results of the cloud management infrastructure combined with internal information from the a cloud centralized Security Audit Service creates a comprehensive view of the security status.

Scientific project publications

Book & magazine contributions

  • Book Chapter: F. Doelitzscher, Ch. Reich, M.Knahl and N. Clarke, Understanding Cloud Audits, Book Chapter, Privacy and Security for Cloud Computing, ISBN: 978-1-4471-4188-4, Publication: August 31, 2012
  • Hacking9: article on "Security risks and audit criteria for cloud infrastructures" published

Project presentations & talks

Projekt Partners