百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

IV. Hardening Steps to Secure Cloud Computing Environment - Infrastructure as a Service

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

IaaS includes the entire computing infrastructure resources stack from the facilities to the hardware platforms that reside in them. It provides limited application-like features but enormous extensibility. This generally means less integrated security capabilities and functionalities offered on the part of the cloud providers. As such, the security measures at IaaS are mainly managed and secured by the customers.

1. Data Encryption

To prevent data leakage to unauthorised parties, encryption techniques shall be implemented on:

  • All network traffic using protocols such as Secure Socket Layer (SSL), Internet Protocol Security (IPSEC), Secure Shell Client (SSH) or Hypertext Transfer Protocol Secure (HTTPS)
  • File systems or device drivers
  • All data kept in storage areas, such as Storage Area Network (SAN), Network-attached Storage (NAS), etc.

Moreover, never store decrypting keys in the IaaS environment. Those keys shall only enter the system when decrypting.

2. Operating System

Security in the operating systems used in IaaS can be enhanced via the following approach:

  • Increase the security measures of the underlying operating systems using specific security hardening tools. For example, Microsoft Baseline Security Analyzer (MBSA), Bastille Linux, etc.
  • Install an Intrusion Detection System (IDS), such as Open Source Security (OSSEC) and CISCO Security Agent (CSA), at the operating system level.
  • Regularly install security patches at the operating system level and update virus definition of anti-virus software.

3. Network Management

IaaS are accessed via the Internet. Hence, the following conventional network security measures can still be applied:

  • Use customer RSA security tokens or client SSL certificates instead of access passwords in the console mode.
  • Limit the number of network ports to the minimum. Except for public services like HTTP/HTTPS, limit the number of source IP addresses authorised to connect, especially to administrative remote accesses services.
  • Perform recurring vulnerability or penetration tests to detect new undiscovered vulnerabilities.

4. Application Development

Security considerations shall be included during the Software Development Life Cycle (SDLC). Security framework such as Open Web Application Security Project (OWASP) can be used in developing programs in an IaaS environment.

 

Reference:

http://blogs.orange-business.com/live/2010/05/cloud-iaas-16-recommendations-for-secure-servers.html


[Previous section] [Next section]

金花百家乐娱乐城| 百家乐官网平台开发| 大发888案件| 网上百家乐有哪些玩法| 玩百家乐平台| 做生意放什么东西招财| 时时博百家乐官网的玩法技巧和规则| 锡林郭勒盟| 东源县| 靖安县| 玩百家乐官网会犯法吗| 金公主百家乐官网现金网| 太阳城百家乐官网网上| 百家乐官网游戏资料网| 百家乐官网棋牌官网| 可以玩百家乐官网的博彩公司| 真人百家乐官网破解软件下载| 百家乐官网视频中国象棋| 伊通| 玩百家乐官网678娱乐城| MG百家乐官网大转轮| 云鼎百家乐官网的玩法技巧和规则| 百家乐官网庄闲的比例| 百家乐官网英皇娱乐平台| 娱乐百家乐官网下载| 百家乐官网真人视频出售| 百家乐路单破解器| 太阳百家乐代理| 盛京棋牌网| 浦江县| 百家乐官网网址皇冠现金网| 新时代百家乐官网娱乐城| 在线百家乐官网策略| 百家乐投注方法多不多| 百家乐棋牌游| 大发888易付168 充值| 如意坊娱乐城| 百家乐官网破解策略| 百家乐长龙有几个| 拉斯维加斯国际娱乐| 澳门百家乐官网开户投注|