波音游戏源码-波音博彩公司评级_百家乐园天将_新全讯网3344111.c(中国)·官方网站

IV. Hardening Steps to Secure Cloud Computing Environment - Infrastructure as a Service

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

IaaS includes the entire computing infrastructure resources stack from the facilities to the hardware platforms that reside in them. It provides limited application-like features but enormous extensibility. This generally means less integrated security capabilities and functionalities offered on the part of the cloud providers. As such, the security measures at IaaS are mainly managed and secured by the customers.

1. Data Encryption

To prevent data leakage to unauthorised parties, encryption techniques shall be implemented on:

  • All network traffic using protocols such as Secure Socket Layer (SSL), Internet Protocol Security (IPSEC), Secure Shell Client (SSH) or Hypertext Transfer Protocol Secure (HTTPS)
  • File systems or device drivers
  • All data kept in storage areas, such as Storage Area Network (SAN), Network-attached Storage (NAS), etc.

Moreover, never store decrypting keys in the IaaS environment. Those keys shall only enter the system when decrypting.

2. Operating System

Security in the operating systems used in IaaS can be enhanced via the following approach:

  • Increase the security measures of the underlying operating systems using specific security hardening tools. For example, Microsoft Baseline Security Analyzer (MBSA), Bastille Linux, etc.
  • Install an Intrusion Detection System (IDS), such as Open Source Security (OSSEC) and CISCO Security Agent (CSA), at the operating system level.
  • Regularly install security patches at the operating system level and update virus definition of anti-virus software.

3. Network Management

IaaS are accessed via the Internet. Hence, the following conventional network security measures can still be applied:

  • Use customer RSA security tokens or client SSL certificates instead of access passwords in the console mode.
  • Limit the number of network ports to the minimum. Except for public services like HTTP/HTTPS, limit the number of source IP addresses authorised to connect, especially to administrative remote accesses services.
  • Perform recurring vulnerability or penetration tests to detect new undiscovered vulnerabilities.

4. Application Development

Security considerations shall be included during the Software Development Life Cycle (SDLC). Security framework such as Open Web Application Security Project (OWASP) can be used in developing programs in an IaaS environment.

 

Reference:

http://blogs.orange-business.com/live/2010/05/cloud-iaas-16-recommendations-for-secure-servers.html


[Previous section] [Next section]

虎林市| 优博在线娱乐| 百家乐官网游戏机破解方法| 百家乐官网那里玩| 百家乐桌子北京| 大发888游戏登陆| 阿城市| 旧金山百家乐官网的玩法技巧和规则 | 网络娱乐| 百家乐官网游戏机高手| 百家乐官网招商用语| 百家乐官网换人| 百家乐平台是最好的娱乐城| 大发888网络赌博害人| 一二博网| 战神线上娱乐| 布加迪百家乐官网的玩法技巧和规则| 怎样赢百家乐的玩法技巧和规则| 新天地百家乐的玩法技巧和规则 | 南京百家乐官网电| 百家乐对打反水| 大发888ios版| 伟德百家乐下载| 六合彩公式| 网上百家乐官网真钱游戏| 太阳城在线| 粤港澳百家乐娱乐| 百家乐官网算牌方| 赌百家乐官网的高手| KTV百家乐的玩法技巧和规则| 澳门百家乐官网群代理| 百家乐官网认牌| 香港六合彩85期开奖结果| 威尼斯人娱乐城赌场| 玩百家乐出千方法| 闲和庄百家乐官网娱乐平台| 保单百家乐官网路单| ewin棋牌官网| 百家乐娱乐网网77scs| 电玩百家乐官网的玩法技巧和规则 | 缅甸百家乐娱乐场开户注册|