万本电子书0元读

万本电子书0元读

顶部广告

OpenStack Cloud Security电子书

售       价:¥

4人正在读 | 0人评论 6.2

作       者:Fabio Alessandro Locati

出  版  社:Packt Publishing

出版时间:2015-07-28

字       数:125.7万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
If you are an OpenStack administrator or developer, or wish to build solutions to protect your OpenStack environment, then this book is for you. Experience of Linux administration and familiarity with different OpenStack components is assumed.
目录展开

OpenStack Cloud Security

Table of Contents

OpenStack Cloud Security

Credits

About the Author

About the Reviewers

www.PacktPub.com

Support files, eBooks, discount offers, and more

Why subscribe?

Free access for Packt account holders

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Downloading the example code

Errata

Piracy

Questions

1. First Things First – Creating a Safe Environment

Access control

The CIA model

Confidentiality

Integrity

Availability

Some considerations

A real-world example

The principles of security

The Principle of Insecurity

The Principle of Least Privilege

The Principle of Separation of Duties

The Principle of Internal Security

Data center security

Select a good place

Implement a castle-like structure

Secure your authorization points

Defend your employees

Defend all your support systems

Keep a low profile

The power of redundancy

Cameras

Blueprints

Data center in office

Server security

The importance of logs

Where to store the logs?

Evaluate what to log

Evaluate the number of logs

The people aspect of security

Simple forgetfulness

Shortcuts

Human error

Lack of information

Social engineering

Evil actions under threats

Evil actions for personal advantage

Summary

2. OpenStack Security Challenges

Private cloud versus public cloud security

The private cloud

The public cloud

Private cloud versus public cloud

The different kinds of security threats

Possible attackers

The possible attacks

Denial of Service

0-day

Brute force

Advanced Persistent Threat

Automated exploitation tools

The ISP intercept

The supply chain attack

Social engineering

The Hypervisor breakout

The OpenStack structure

OpenStack Compute Service – Nova

OpenStack Object Storage Service – Swift

OpenStack Image Service – Glance

OpenStack Dashboard – Horizon

OpenStack Identity Service – Keystone

OpenStack Networking Service – Neutron

OpenStack Block Storage Service – Cinder

OpenStack Orchestration – Heat

OpenStack Telemetry – Ceilometer

OpenStack Database Service – Trove

OpenStack Data Processing Service – Sahara

Future components

Ironic – bare metal provisioning

Zaqar – cloud messaging

Manila – file sharing

Designate – DNS

Barbican – key management

Summary

3. Securing OpenStack Networking

The Open Systems Interconnection model

Layer 1 – the Physical layer

Layer 2 – the Data link layer

Address Resolution Protocol (ARP) spoofing

MAC flooding and Content Addressable Memory table overflow attack

Dynamic Host Configuration Protocol (DHCP) starvation attack

Cisco Discovery Protocol (CDP) attacks

Spanning Tree Protocol (STP) attacks

Virtual LAN (VLAN) attacks

Layer 3 – the Network layer

Layer 4 – the Transport layer

Layer 5 – the Session layer

Layer 6 – the Presentation layer

Layer 7 – the Application layer

TCP/IP

Architecting secure networks

Different uses means different network

The importance of firewall, IDS, and IPS

Firewall

Intrusion detection system (IDS)

Intrusion prevention system (IPS)

Generic Routing Encapsulation (GRE)

VXLAN

Flat network versus VLAN versus GRE in OpenStack Quantum

Design a secure network for your OpenStack deployment

The networking resource policy engine

Virtual Private Network as a Service (VPNaaS)

Summary

4. Securing OpenStack Communications and Its API

Encryption security

Symmetric encryption

Stream cipher

Block cipher

Asymmetric encryption

Diffie-Hellman

RSA algorithm

Elliptic Curve Cryptography

Symmetric/asymmetric comparison and synergies

Hashing

MD5

SHA

Public key infrastructure

Signed certificates versus self-signed certificates

Cipher security

Designing a redundant environment for your APIs

Secure your OpenStack API with TLS

Apache HTTPd

Nginx

Enforcing HTTPS for future connections

Summary

5. Securing the OpenStack Identification and Authentication System and Its Dashboard

Identification versus authentication versus authorization

Identification

Authentication

Something you know

Something you have

Something you are

The multifactor authentication

Authorization

Mandatory Access Control

Discretionary Access Control

Role-based Access Control

Lattice-based Access Control

Session management

Federated identity

Configuring OpenStack Keystone to use Apache HTTPd

Apache HTTPd configuration

Making Keystone available to Apache HTTPd

Configuring iptables

Configuring firewalld

SELinux

Setting up shared tokens

Setting up the startup properly

Setting up Keystone as a Identity Provider

Configuring Apache HTTPd

Configuring Shibboleth

Configuring OpenStack Keystone

Summary

6. Securing OpenStack Storage

Different storage types

Object storage

Block storage

File storage

Comparison between storage solutions

Security

Backends

Ceph

GlusterFS

The Logical Volume Manager

The Network File System

Sheepdog

Swift

Z File System (ZFS)

Security

Securing OpenStack Swift

Hiding information

Securing ports

Summary

7. Securing the Hypervisor

Various types of virtualization

Full virtualization

Paravirtualization

Partial virtualization

Comparison of virtualization levels

Hypervisors

Kernel-based Virtual Machine

Xen

VMware ESXi

Hyper-V

Baremetal

Containers

Docker

Linux Containers

Criteria for choosing a hypervisor

Team expertise

Product or project maturity

Certifications and attestations

Features and performance

Hardware concerns

Hypervisor memory optimization

Additional security features

Hardening the hardware management

Physical hardware – PCI passthrough

Virtual hardware with Quick Emulator

sVirt – SELinux and virtualization

Hardening the host operative system

Summary

Index

累计评论(0条) 2个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部