百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

IV. Hardening Steps to Secure Cloud Computing Environment - Infrastructure as a Service

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

IaaS includes the entire computing infrastructure resources stack from the facilities to the hardware platforms that reside in them. It provides limited application-like features but enormous extensibility. This generally means less integrated security capabilities and functionalities offered on the part of the cloud providers. As such, the security measures at IaaS are mainly managed and secured by the customers.

1. Data Encryption

To prevent data leakage to unauthorised parties, encryption techniques shall be implemented on:

  • All network traffic using protocols such as Secure Socket Layer (SSL), Internet Protocol Security (IPSEC), Secure Shell Client (SSH) or Hypertext Transfer Protocol Secure (HTTPS)
  • File systems or device drivers
  • All data kept in storage areas, such as Storage Area Network (SAN), Network-attached Storage (NAS), etc.

Moreover, never store decrypting keys in the IaaS environment. Those keys shall only enter the system when decrypting.

2. Operating System

Security in the operating systems used in IaaS can be enhanced via the following approach:

  • Increase the security measures of the underlying operating systems using specific security hardening tools. For example, Microsoft Baseline Security Analyzer (MBSA), Bastille Linux, etc.
  • Install an Intrusion Detection System (IDS), such as Open Source Security (OSSEC) and CISCO Security Agent (CSA), at the operating system level.
  • Regularly install security patches at the operating system level and update virus definition of anti-virus software.

3. Network Management

IaaS are accessed via the Internet. Hence, the following conventional network security measures can still be applied:

  • Use customer RSA security tokens or client SSL certificates instead of access passwords in the console mode.
  • Limit the number of network ports to the minimum. Except for public services like HTTP/HTTPS, limit the number of source IP addresses authorised to connect, especially to administrative remote accesses services.
  • Perform recurring vulnerability or penetration tests to detect new undiscovered vulnerabilities.

4. Application Development

Security considerations shall be included during the Software Development Life Cycle (SDLC). Security framework such as Open Web Application Security Project (OWASP) can be used in developing programs in an IaaS environment.

 

Reference:

http://blogs.orange-business.com/live/2010/05/cloud-iaas-16-recommendations-for-secure-servers.html


[Previous section] [Next section]

百家乐官网赌博代理合作| 独赢百家乐官网全讯网| 网上玩百家乐官网有钱| 百家乐真钱牌九| 汾西县| 连环百家乐的玩法技巧和规则| 百家乐官网开放词典新浪| 威尼斯人娱乐城真人赌博| 百家乐官网保单机作弊| 博狗娱乐城注册| 澳门百家乐新濠天地| 百家乐官网稳赢秘诀教学| 香港六合彩官方网站| 百家乐怎赌才赢钱| 狮威百家乐官网娱乐城| 网络百家乐官网可信吗| 德州扑克发牌顺序| 百家乐园百利宫娱乐城信誉好...| 百家乐官网代理打| 吴堡县| 大发888是什么软件| 棋牌百家乐程序破解| 百家乐官网tt赌场娱乐网规则| 大发888娱乐游戏| 大发888娱乐网| 澳门百家乐战法| 江山百家乐官网的玩法技巧和规则 | 麻将二八杠技巧| 百家乐辅助器| 真人百家乐代理合作| 汇丰百家乐官网的玩法技巧和规则| 米泉市| 皇家棋牌| 百家乐百战百胜| 百家乐15人桌子| 百家乐平台租用| 百家乐官网平台哪个比较安全| 澳门百家乐官网心德| 百家乐真人游戏| 台中市| 施秉县|