Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity

    How to Secure an OpenStack Cloud

    Written by

    Sean Michael Kerner
    Published May 27, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Security is a key concern across all sectors of modern IT and is often noted as a primary barrier to adoption for cloud computing. Security was a key focus of many sessions at the OpenStack Summit, which ran from May 18 to May 22 in Vancouver, B.C. Several sessions covered how to properly deploy and configure OpenStack clouds securely. Security is also being baked into the development of OpenStack itself though a number of different initiatives.

      OpenStack is now used in production deployments by some of the largest companies in the United States, including Walmart, Comcast, BestBuy, Time Warner Cable, AT&T and eBay. Recent exploits like VENOM, a virtual machine (VM) breakout, and Heartbleed, an SSL-related flaw, have affected OpenStack.

      Robert Clark, lead security architect for HP’s Helion cloud and project technical lead (PTL) of the OpenStack Security Group, spoke in several sessions at the latest summit, and explained that many different technologies can be used on host operating systems and within OpenStack to provide security.

      Clark has been actively contributing to OpenStack to help improve security for several years. At the OpenStack Summit in Portland, Ore., in 2013, Clark discussed how the OpenStack Security Group (OSSG) was working on best practices and guidance for OpenStack deployment.

      Clark explained that the OSSG recently incorporated the Vulnerability Management Team (VMT) within OpenStack, and it is now an official OpenStack project.

      “The OpenStack Security project is responsible for providing a number of different services to OpenStack,” Clark said.

      VMT is an autonomous group within the OpenStack Security Project, with the responsibly for responding quickly and confidentially to potential new security exploits. The VMT is the group that issues OpenStack security advisories while the larger OpenStack Security project will release security notes. The difference between an advisory and a note is that an advisory is for an immediate security issue that can be fixed. In contrast, a security note provides guidance and recommendations on best practices for deployment to reduce security risk.

      The Security Project also produces the OpenStack Security Guide, an effort to provide a comprehensive set of guidelines for secure deployment of OpenStack. The group also performs threat analysis for OpenStack projects.

      OpenStack Security Project manages a pair of tools to help developers make sure that OpenStack code is secure: The Anchor tool is an ephemeral public key infrastructure (PKI), and Bandit is a python security tool looking for coding errors.

      “The Anchor project has a passive revocation system, which means that provisioning certificates is a lot safer,” Clark explained.

      Best Practices

      For Clark, best practices for OpenStack cloud deployment begin with hardware. He suggests that it’s important for an organization to be able to trust the hardware a cloud is running in order to be able to verify that it hasn’t been tampered with or modified.

      A flat network where everyone has equal access is not a good idea for a cloud. Clark recommends that there be at least four domains in an organization that is deploying an OpenStack cloud: public, guest, management and data networks. The public and guest networks are largely untrusted while the management and data networks are trusted nodes.

      How to Secure an OpenStack Cloud

      Providing security in OpenStack is not as easy as simply deploying a firewall and enabling antivirus; many additional controls need to be deployed, Clark said. He advocates the use of defense in depth—multiple layers and combinations of tools and techniques.

      “In all of our threat analysis and designs, at least at HP, we assume that all the virtual machines want to hurt us,” Clark said. “We assume that everything is completely hostile.”

      Reducing the attack surface throughout the stack is very important. To that end, one key recommendation from Clark is to deploy only the applications needed on OpenStack nodes to deliver a specific service, rather than a full Linux distribution.

      Looking specifically at VM breakouts, like the recent VENOM exploit, Clark provided a number of recommendations on technologies and configurations that can be used to minimize risk.

      “VM breakouts aren’t unicorns; they actually happen fairly regularly in the wild,” Clark said.

      Since VM breakouts happen, there is a need to have VM containment strategies in place. One way to handle VM containment is with mandatory access controls, including Security Enhanced Linux (SELinux) and AppArmor. Mandatory access controls define how a process should behave and can block rogue processes and alert administrators when a process attempts to step outside of policy.

      Looking beyond SELinux and AppArmor, Clark discussed the benefits of Secure Computing Mode (SECCOMP), which provides application sandboxing within Linux.

      Linux also has an isolation technology, known as namespaces. Clark explained that with Linux namespace isolation, a defined namespace within Linux can be isolated from other namespaces. Linux Control Groups (CGroups) also can be used to limit and isolate resource use for a given Linux process.

      Even with security controls in place to limit the risk of potential vulnerabilities, the ability to also update and patch a server is also important, Clark said. “Controls don’t fix things like VENOM. They just buy you time to react without breaking your business,” he said.

      While multiple sets of controls and policies can be used to help secure an OpenStack cloud, “don’t use the default passwords,” Clark said.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×