百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

IV. Hardening Steps to Secure Cloud Computing Environment - Infrastructure as a Service

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

IaaS includes the entire computing infrastructure resources stack from the facilities to the hardware platforms that reside in them. It provides limited application-like features but enormous extensibility. This generally means less integrated security capabilities and functionalities offered on the part of the cloud providers. As such, the security measures at IaaS are mainly managed and secured by the customers.

1. Data Encryption

To prevent data leakage to unauthorised parties, encryption techniques shall be implemented on:

  • All network traffic using protocols such as Secure Socket Layer (SSL), Internet Protocol Security (IPSEC), Secure Shell Client (SSH) or Hypertext Transfer Protocol Secure (HTTPS)
  • File systems or device drivers
  • All data kept in storage areas, such as Storage Area Network (SAN), Network-attached Storage (NAS), etc.

Moreover, never store decrypting keys in the IaaS environment. Those keys shall only enter the system when decrypting.

2. Operating System

Security in the operating systems used in IaaS can be enhanced via the following approach:

  • Increase the security measures of the underlying operating systems using specific security hardening tools. For example, Microsoft Baseline Security Analyzer (MBSA), Bastille Linux, etc.
  • Install an Intrusion Detection System (IDS), such as Open Source Security (OSSEC) and CISCO Security Agent (CSA), at the operating system level.
  • Regularly install security patches at the operating system level and update virus definition of anti-virus software.

3. Network Management

IaaS are accessed via the Internet. Hence, the following conventional network security measures can still be applied:

  • Use customer RSA security tokens or client SSL certificates instead of access passwords in the console mode.
  • Limit the number of network ports to the minimum. Except for public services like HTTP/HTTPS, limit the number of source IP addresses authorised to connect, especially to administrative remote accesses services.
  • Perform recurring vulnerability or penetration tests to detect new undiscovered vulnerabilities.

4. Application Development

Security considerations shall be included during the Software Development Life Cycle (SDLC). Security framework such as Open Web Application Security Project (OWASP) can be used in developing programs in an IaaS environment.

 

Reference:

http://blogs.orange-business.com/live/2010/05/cloud-iaas-16-recommendations-for-secure-servers.html


[Previous section] [Next section]

菲律宾百家乐官网娱乐网| 寻甸| 百家乐赌博故事| 大赢家娱乐| 上海百家乐官网赌博| 真人百家乐新开户送彩金| 获嘉县| 永利高百家乐开户| 御匾会娱乐城| 大世界百家乐现金网| 贡嘎县| 赌场百家乐信誉| 百家乐官网网站建设| 赌百家乐的计划跟策略| 大发888下载亚洲城| 无锡百家乐官网的玩法技巧和规则| 大发888 casino组件下载| 新东泰百家乐官网的玩法技巧和规则 | 大发888信誉平台| 王子百家乐官网的玩法技巧和规则 | 墨尔本百家乐的玩法技巧和规则 | 澳门百家乐官网技术| 真博百家乐的玩法技巧和规则| 电子百家乐官网博彩正网| 百家乐免费体验金| 大发888博彩| 战胜百家乐的技巧| 金赞百家乐的玩法技巧和规则 | 六合彩投注网| 百家乐专业术语| 百家乐官网手机壳| 一直对百家乐官网很感兴趣.zibo太阳城娱乐城 | 金盈会百家乐官网现金网| 钱大发888扑克| 百家乐技巧-澳门百家乐官方网址| 百家乐官网隔一数打投注法| 锦屏县| 大发线上娱乐| 博彩选名门国际| 大发888娱乐城官| 威尼斯人娱乐城送彩金|