官术网_书友最值得收藏!

  • OpenStack Cloud Security
  • Fabio Alessandro Locati
  • 187字
  • 2021-07-16 13:28:18

Chapter 2. OpenStack Security Challenges

As we have seen in the first chapter, each level of your infrastructure can be an object of the unwanted attention for an attacker. Software is no exception to this. There are a lot of attacks that aim to find bugs or misconfigurations in software and exploit them to gain access to the machines that run the software, or to data. OpenStack, with all its parts and all the software it relies on, can be a very effective attack vehicle if not safely configured, due to its very trustful policy that allows nodes to access all data if the node requires it. So, an attacker can quickly compromise and obtain your data if he or she is able to compromise a single node.

Before looking at OpenStack directly, I would like to deal with a critical aspect: security in cloud environments; that is, the ownership of machines.

In this chapter, we will to cover:

  • The differences between the private and the public cloud with a focus on the security aspects
  • The possible security threats to a cloud components of OpenStack
主站蜘蛛池模板: 常山县| 三穗县| 揭西县| 磐石市| 灵宝市| 南投县| 普定县| 海口市| 绥中县| 扎鲁特旗| 罗平县| 潞城市| 吴旗县| 湟源县| 临泽县| 福贡县| 望奎县| 大名县| 延庆县| 沛县| 威海市| 富裕县| 天镇县| 长治县| 东丽区| 曲阳县| 邵阳县| 高碑店市| 武安市| 保康县| 沙洋县| 当涂县| 当阳市| 海口市| 宁安市| 砀山县| 峡江县| 永清县| 青龙| 江陵县| 广德县|