波音游戏-波音娱乐城赌球打不开

IV. Hardening Steps to Secure Cloud Computing Environment - Infrastructure as a Service

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

IaaS includes the entire computing infrastructure resources stack from the facilities to the hardware platforms that reside in them. It provides limited application-like features but enormous extensibility. This generally means less integrated security capabilities and functionalities offered on the part of the cloud providers. As such, the security measures at IaaS are mainly managed and secured by the customers.

1. Data Encryption

To prevent data leakage to unauthorised parties, encryption techniques shall be implemented on:

  • All network traffic using protocols such as Secure Socket Layer (SSL), Internet Protocol Security (IPSEC), Secure Shell Client (SSH) or Hypertext Transfer Protocol Secure (HTTPS)
  • File systems or device drivers
  • All data kept in storage areas, such as Storage Area Network (SAN), Network-attached Storage (NAS), etc.

Moreover, never store decrypting keys in the IaaS environment. Those keys shall only enter the system when decrypting.

2. Operating System

Security in the operating systems used in IaaS can be enhanced via the following approach:

  • Increase the security measures of the underlying operating systems using specific security hardening tools. For example, Microsoft Baseline Security Analyzer (MBSA), Bastille Linux, etc.
  • Install an Intrusion Detection System (IDS), such as Open Source Security (OSSEC) and CISCO Security Agent (CSA), at the operating system level.
  • Regularly install security patches at the operating system level and update virus definition of anti-virus software.

3. Network Management

IaaS are accessed via the Internet. Hence, the following conventional network security measures can still be applied:

  • Use customer RSA security tokens or client SSL certificates instead of access passwords in the console mode.
  • Limit the number of network ports to the minimum. Except for public services like HTTP/HTTPS, limit the number of source IP addresses authorised to connect, especially to administrative remote accesses services.
  • Perform recurring vulnerability or penetration tests to detect new undiscovered vulnerabilities.

4. Application Development

Security considerations shall be included during the Software Development Life Cycle (SDLC). Security framework such as Open Web Application Security Project (OWASP) can be used in developing programs in an IaaS environment.

 

Reference:

http://blogs.orange-business.com/live/2010/05/cloud-iaas-16-recommendations-for-secure-servers.html


[Previous section] [Next section]

线上百家乐怎么玩| 威尼斯人娱乐城优惠| 代理百家乐最多占成| 赞皇县| 百家乐五湖四海娱乐平台| 赌百家乐官网大小点桌| 威尼斯人娱乐城线上博彩| 百家乐官网下注法| 阆中市| 威尼斯人娱乐城网上赌博| 百家乐娱乐城怎么样| 百家乐官网网上投注文章| 大发888在线开户| 百家乐赌博现金网| 筹码百家乐官网的玩法技巧和规则 | 7人百家乐官网桌布| 大发888注册开户| 百家乐输了100万| 嬴澳门百家乐官网的公式| 真人游戏| 百家乐官网网站源码 | 灵寿县| 大发888 今日头条| 百家乐哪家赌安全| 百家乐官网赌博工具| 塔河县| 申博娱乐城官网| 大发888博爱彩| 真人百家乐赌城| 有百家乐的棋牌游戏| 2016虎和蛇合作做生意| 百家乐官网无损打法| 百家乐官网高手长胜攻略| 网上棋牌室| 大发888官方备用网址| 伯爵百家乐的玩法技巧和规则| 百家乐龙虎的投注法| 百家乐投注法减注| 362百家乐官网的玩法技巧和规则 大集汇百家乐官网的玩法技巧和规则 | 百家乐博弈之赢者理论坛| 网页百家乐官网的玩法技巧和规则 |