波音游戏-波音娱乐城赌球打不开

IV. Hardening Steps to Secure Cloud Computing Environment - Infrastructure as a Service

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

IaaS includes the entire computing infrastructure resources stack from the facilities to the hardware platforms that reside in them. It provides limited application-like features but enormous extensibility. This generally means less integrated security capabilities and functionalities offered on the part of the cloud providers. As such, the security measures at IaaS are mainly managed and secured by the customers.

1. Data Encryption

To prevent data leakage to unauthorised parties, encryption techniques shall be implemented on:

  • All network traffic using protocols such as Secure Socket Layer (SSL), Internet Protocol Security (IPSEC), Secure Shell Client (SSH) or Hypertext Transfer Protocol Secure (HTTPS)
  • File systems or device drivers
  • All data kept in storage areas, such as Storage Area Network (SAN), Network-attached Storage (NAS), etc.

Moreover, never store decrypting keys in the IaaS environment. Those keys shall only enter the system when decrypting.

2. Operating System

Security in the operating systems used in IaaS can be enhanced via the following approach:

  • Increase the security measures of the underlying operating systems using specific security hardening tools. For example, Microsoft Baseline Security Analyzer (MBSA), Bastille Linux, etc.
  • Install an Intrusion Detection System (IDS), such as Open Source Security (OSSEC) and CISCO Security Agent (CSA), at the operating system level.
  • Regularly install security patches at the operating system level and update virus definition of anti-virus software.

3. Network Management

IaaS are accessed via the Internet. Hence, the following conventional network security measures can still be applied:

  • Use customer RSA security tokens or client SSL certificates instead of access passwords in the console mode.
  • Limit the number of network ports to the minimum. Except for public services like HTTP/HTTPS, limit the number of source IP addresses authorised to connect, especially to administrative remote accesses services.
  • Perform recurring vulnerability or penetration tests to detect new undiscovered vulnerabilities.

4. Application Development

Security considerations shall be included during the Software Development Life Cycle (SDLC). Security framework such as Open Web Application Security Project (OWASP) can be used in developing programs in an IaaS environment.

 

Reference:

http://blogs.orange-business.com/live/2010/05/cloud-iaas-16-recommendations-for-secure-servers.html


[Previous section] [Next section]

大发888提款之后多久到账| 申请百家乐会员送彩金| 百家乐官网客户端皇冠| 百家乐官网视频二人雀神| 诸子百家乐官网的玩法技巧和规则 | 百家乐官网输惨了| 百家乐打劫法| 最新博彩论坛| 做生意的风水摆件| 大发888 赌博网站| 百家乐官网赌场彩| 澳门百家乐网40125| 利高娱乐城| 24山向中那个向最好| 怎么赢百家乐的玩法技巧和规则| 新乐市| 百家乐币| 百家乐官网玩法的秘诀| 百家乐出千的高科技| 易发娱乐城| 百家乐辅助分析软件| 顶级赌场连环夺宝| 24山入宅择日| 大众百家乐官网娱乐城| 大发888真钱游戏祖比| 百家乐官网视频美女| 百家乐如何玩法| 足球投注网| 新濠国际娱乐| 百家乐赌博机怎么玩| 盈禾体育| 百家乐技巧之微笑心法| 百家乐官网5式直缆打法| 洛克百家乐的玩法技巧和规则| 百家乐官网中P代表| 大连百家乐食品| 网上百家乐大赢家| 赌场百家乐官网网站| 信誉棋牌评测网| 百家乐桌子| 百家乐官网翻天主题曲|