波音游戏-波音娱乐城赌球打不开

IV. Hardening Steps to Secure Cloud Computing Environment - Infrastructure as a Service

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

IaaS includes the entire computing infrastructure resources stack from the facilities to the hardware platforms that reside in them. It provides limited application-like features but enormous extensibility. This generally means less integrated security capabilities and functionalities offered on the part of the cloud providers. As such, the security measures at IaaS are mainly managed and secured by the customers.

1. Data Encryption

To prevent data leakage to unauthorised parties, encryption techniques shall be implemented on:

  • All network traffic using protocols such as Secure Socket Layer (SSL), Internet Protocol Security (IPSEC), Secure Shell Client (SSH) or Hypertext Transfer Protocol Secure (HTTPS)
  • File systems or device drivers
  • All data kept in storage areas, such as Storage Area Network (SAN), Network-attached Storage (NAS), etc.

Moreover, never store decrypting keys in the IaaS environment. Those keys shall only enter the system when decrypting.

2. Operating System

Security in the operating systems used in IaaS can be enhanced via the following approach:

  • Increase the security measures of the underlying operating systems using specific security hardening tools. For example, Microsoft Baseline Security Analyzer (MBSA), Bastille Linux, etc.
  • Install an Intrusion Detection System (IDS), such as Open Source Security (OSSEC) and CISCO Security Agent (CSA), at the operating system level.
  • Regularly install security patches at the operating system level and update virus definition of anti-virus software.

3. Network Management

IaaS are accessed via the Internet. Hence, the following conventional network security measures can still be applied:

  • Use customer RSA security tokens or client SSL certificates instead of access passwords in the console mode.
  • Limit the number of network ports to the minimum. Except for public services like HTTP/HTTPS, limit the number of source IP addresses authorised to connect, especially to administrative remote accesses services.
  • Perform recurring vulnerability or penetration tests to detect new undiscovered vulnerabilities.

4. Application Development

Security considerations shall be included during the Software Development Life Cycle (SDLC). Security framework such as Open Web Application Security Project (OWASP) can be used in developing programs in an IaaS environment.

 

Reference:

http://blogs.orange-business.com/live/2010/05/cloud-iaas-16-recommendations-for-secure-servers.html


[Previous section] [Next section]

百家乐官网游戏客户端| 百家乐玩法规| 项城市| 战神百家乐官网娱乐| 百家乐赌场玩法技巧| 百家乐娱乐网址| 大发888娱乐城开户| 百家乐干洗店| 八大胜百家乐娱乐城| 大发888娱乐城游戏lm0| 时时博娱乐城| 百家乐官网网上真钱麻将 | 百家乐视频游戏网址| 大集汇百家乐的玩法技巧和规则| 网上百家乐解密| 安岳县| 新加坡百家乐官网的玩法技巧和规则| 百家乐官网怎么打啊| 百家乐官网制胜方法| 百家乐官网在线娱乐平台| 百家乐官网网上真钱娱乐场| 澳门百家乐必杀技| 太阳城百家乐公司| 百家乐智能系统| 诚信真人博彩网站| 百家乐官网网址皇冠现金网| 百家乐园游戏庄闲| 大发888游戏平台 送1666元礼金领取lrm| 新葡京娱乐城开户| 澳门百家乐官网赢钱公式不倒翁| 澳门百家乐技巧皇冠网| 大发888网页版| 百家乐官网注册送彩金平台| 百家乐庄闲分布概率| 百家乐全部规则| 百家乐官网学院教学视频| 金臂百家乐官网开户送彩金| 百家乐电脑上怎么赌| 大发888站群| 破解百家乐官网真人游戏| 百胜百家乐软件|