官术网_书友最值得收藏!

  • OpenStack Cloud Security
  • Fabio Alessandro Locati
  • 187字
  • 2021-07-16 13:28:18

Chapter 2. OpenStack Security Challenges

As we have seen in the first chapter, each level of your infrastructure can be an object of the unwanted attention for an attacker. Software is no exception to this. There are a lot of attacks that aim to find bugs or misconfigurations in software and exploit them to gain access to the machines that run the software, or to data. OpenStack, with all its parts and all the software it relies on, can be a very effective attack vehicle if not safely configured, due to its very trustful policy that allows nodes to access all data if the node requires it. So, an attacker can quickly compromise and obtain your data if he or she is able to compromise a single node.

Before looking at OpenStack directly, I would like to deal with a critical aspect: security in cloud environments; that is, the ownership of machines.

In this chapter, we will to cover:

  • The differences between the private and the public cloud with a focus on the security aspects
  • The possible security threats to a cloud components of OpenStack
主站蜘蛛池模板: 微博| 皮山县| 镇宁| 洛宁县| 无为县| 鲁甸县| 五常市| 长寿区| 东丰县| 东兴市| 临西县| 三原县| 托克托县| 长宁县| 岐山县| 五寨县| 上高县| 衡阳县| 邵东县| 鄂州市| 玉溪市| 元谋县| 香河县| 亚东县| 瑞丽市| 乐清市| 达日县| 黄浦区| 西盟| 胶南市| 梧州市| 惠水县| 青冈县| 龙海市| 宝鸡市| 安岳县| 子洲县| 盈江县| 柳州市| 沧源| 正安县|