波音游戏-波音娱乐城赌球打不开

IV. Hardening Steps to Secure Cloud Computing Environment - Infrastructure as a Service

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

IaaS includes the entire computing infrastructure resources stack from the facilities to the hardware platforms that reside in them. It provides limited application-like features but enormous extensibility. This generally means less integrated security capabilities and functionalities offered on the part of the cloud providers. As such, the security measures at IaaS are mainly managed and secured by the customers.

1. Data Encryption

To prevent data leakage to unauthorised parties, encryption techniques shall be implemented on:

  • All network traffic using protocols such as Secure Socket Layer (SSL), Internet Protocol Security (IPSEC), Secure Shell Client (SSH) or Hypertext Transfer Protocol Secure (HTTPS)
  • File systems or device drivers
  • All data kept in storage areas, such as Storage Area Network (SAN), Network-attached Storage (NAS), etc.

Moreover, never store decrypting keys in the IaaS environment. Those keys shall only enter the system when decrypting.

2. Operating System

Security in the operating systems used in IaaS can be enhanced via the following approach:

  • Increase the security measures of the underlying operating systems using specific security hardening tools. For example, Microsoft Baseline Security Analyzer (MBSA), Bastille Linux, etc.
  • Install an Intrusion Detection System (IDS), such as Open Source Security (OSSEC) and CISCO Security Agent (CSA), at the operating system level.
  • Regularly install security patches at the operating system level and update virus definition of anti-virus software.

3. Network Management

IaaS are accessed via the Internet. Hence, the following conventional network security measures can still be applied:

  • Use customer RSA security tokens or client SSL certificates instead of access passwords in the console mode.
  • Limit the number of network ports to the minimum. Except for public services like HTTP/HTTPS, limit the number of source IP addresses authorised to connect, especially to administrative remote accesses services.
  • Perform recurring vulnerability or penetration tests to detect new undiscovered vulnerabilities.

4. Application Development

Security considerations shall be included during the Software Development Life Cycle (SDLC). Security framework such as Open Web Application Security Project (OWASP) can be used in developing programs in an IaaS environment.

 

Reference:

http://blogs.orange-business.com/live/2010/05/cloud-iaas-16-recommendations-for-secure-servers.html


[Previous section] [Next section]

百家乐官网代理占成| 总统百家乐官网的玩法技巧和规则| 风水24山图解| 太阳城娱乐总站| 哪里有百家乐官网赌博网站| 百家乐牌机的破解法| 舟山星空棋牌下载| 娱乐网百家乐官网补丁| 申请百家乐会员送彩金| 网上百家乐官网娱乐场| 百家乐用品| 太阳城百家乐群| 百家乐官网园sun811.com| 大发888英皇国际| 百家乐官网家| 玩百家乐官网最好方法| 大发888娱乐城dafa888dafa8| 百家乐娱乐城新闻| 帝王百家乐新足球平台| 韩城市| 狮威百家乐官网赌场娱乐网规则| 皇冠大全| 伟易博百家乐官网的玩法技巧和规则| 大发888官网df888esbgfwz| 百家乐官网赢钱秘籍鹰| 华克山庄娱乐| 桐城太阳城招聘| 百家乐赌场在线娱乐| 马洪刚百家乐官网技巧| 百家乐官网知敌便能制胜| 澳门顶级赌场317 | 属狗与属鸡做生意| 678百家乐官网博彩赌场娱乐网规则 | 百家乐官网赌博彩| 3U百家乐官网的玩法技巧和规则| 垫江县| 易发娱乐| 娱乐城网址| 大发888微信公众号2| 大发888在线娱乐城加盟合作| 大发888游戏软件下载|