![Lead Image © zelfit, 123RF.com Lead Image © zelfit, 123RF.com](/var/ezflow_site/storage/images/archive/2017/39/harden-your-openstack-configuration/123rf_15406348_fortress-clouds_zelfit_resized.png/138183-1-eng-US/123rf_15406348_Fortress-clouds_zelfit_resized.png_medium.png)
Lead Image © zelfit, 123RF.com
Harden your OpenStack configuration
Fortress in the Clouds
One of the biggest concerns about virtualization is that an attacker could succeed in breaking out of the virtual machine (VM) and thus gain access to the resources of the physical host. The security of virtual systems thus hinges on the ability to isolate resources of the various VMs on the same server.
A simple thought experiment shows how important it is that the boundaries of VM and host are not blurred. Assume you have a server that hosts multiple VMs that all belong to the same customer. In this scenario, a problem occurs if a user manages to break out from a VM and gain direct access to the server: In the worst case, the attacker now has full access to the VMs on the host and can access sensitive data at will, or even set up booby traps to fish for even more information.
To gain unauthorized access, attackers need to negotiate multiple obstacles: First, they must gain access to the VM itself. If all VMs belong to the same customer and the same admins regularly maintain them, this risk is minimized, but it cannot be ruled out. In the second step, an attacker needs to negotiate the barrier between the VM and the host. Technologies such as SELinux can help to minimize the risks of an attacker crossing the VM barrier.
Aggravated in the Cloud
The risk potential is far greater when the environment does not operate under a single, uniform management system, such as the case where individual customers operate within a public cloud.
In a public cloud setting, the VMs maintained by each customer must run alongside one another on a common host. Customers cannot choose which host the VM runs on and who else has machines on the same host. You have no control over the software that runs on the other VMs or on how well the other VMs are maintained. Instead, you need to trust the provider of the platform.
This article describes some potential attack vectors for VMs running in
...Buy this article as PDF
(incl. VAT)