SlideShare a Scribd company logo
Wir nutzen Technologien, um unsere Kunden glücklich zu machen. Und uns selbst.
Security Considerations
Securely Setting up your Open Nebula Cloud
A top 10 Best Practise Guide
OpenNebula Conf, September 25, 2013 in Berlin, Germany
Nils Magnus
inovex GmbH
Senior System Engineer
25.09.13
Agenda and Preamble
Protecting your Open Nebula Cloud
I.
Security is 90% architecture and 10% implementation.
Apparently trivial suggestions form the base of your protection.
II.
Security is intrinsically understaffed. Management wants
„quick wins“, team is looking to „get the job done“. Somehow.
III.
Security is not about checklists. If you are (or feel)
responsible, you need to know your individual
vulnerabilities. In this mode think like an attacker.
Share my thoughts how to protect
an Open Nebula cloud!
25.09.13
Security needs Ressources
Don't underestimate the necessity of security.
Assign proper ressources to
adress this issue. Security is a
costly investment in the future.
It is a bargain compared to the loss of your
main business processes. The possible damage
scales to the same extend as your cloud itself.
25.09.13
Admin Account
Protect access to the
• ONE admin account,
• the SunStone UI, and
infrastructure.
Once attackers gain unlawful access to your command bridge,
your systems might be doomed. All of them.
25.09.13
VLAN Hopping
Prevent VLAN hopping in the scope of your SDN
and between physical hosts.
Network virtualization with
VLAN tagging comes very
handy, but keep in mind that
the very frames of all virtual
segments may travel of a
shared medium.
25.09.13
Environments
Partition your cloud
network segments into
distinct security areas.
Protect the different security
environments and border them
from each other.
Actively separate
maturity environments
and different types of
processed data.
25.09.13
Apply Classic Best Practises Anyway
Despite in the cloud, nonetheless apply
network security best practises like
• firewalls,
• intrusion detection, or
• data leak prevention,
based on the very requirements of your
environment.
25.09.13
Host Protection
Securing
virtual machines
is not enough.
Make sure you also protect
the access to all of your hosts,
even if they are not designed
to have users on them.
25.09.13
Key and User Management
Set up a working SSH
infrastructure and enforce it.
Open Nebula heavily relies on a working and
secured way to communicate with your hosts and
virtual machines.
Properly configured keys help both automating the
system deployment process and restricting acess on
a need-to-know basis.
25.09.13
Sensible Distrust
Auto discovery and self
registration to the inventory are
powerful features that alleviate
the system engineer's duties.
But make sure that only known
bare metal systems register into
your cloud store and virtual
ressources.
Don't boot systems you don't
have full control over.
25.09.13
Shared Storage
Protect access to your
shared storage.
Several hosts have to
access the images of
all security
environments.
Rogue images injected in
the right place might act as
trojan horses in otherwise
well-protected
environments.
25.09.13
Availability
Keep ressources in mind. One major
advantage of virtualization is to share
ressources like CPU or IO bandwidth.
But some player in your cloud may or
may not play fair.
Those situations, both intended and
unintended, threaten your availability.
Enacting QoS measure could be helpful.
25.09.13
Wrap-up
1. assign proper ressources
2. protect your admin
account
3. secure the networks
4. partition into
environments
5. apply classic network
security measures
6. protect your hosts
7. install a key infrastructure
8. authenticate all repositories
9. protect the shared storage
10. keep an eye on
availability
What did I say
about lists, anyway?
25.09.13
Freedom is the brother of security. The great photos of this presentation are licensed
under the free Creative Commons license (CC-BY SA) that allows use and
redistribution (share alike) as long as you give proper attribution. A big thank you goes
to:
UCL Engineering for the chainmail:
http://flickr.com/photos/uclengineering/6946862623
Jwalanta Shrestha for the multi lanes in Kathmandu:
http://flickr.com/photos/jwalanta/4496289019/
Drgriz52 and the bears at the tent:
http://flickr.com/photos/drbair_photography/3571049565/
Steve Tannock and his meadows of the Peak District:
http://flickr.com/photos/stv/2586761094/
Chris McBrien for his photo of the blue keys:
http://flickr.com/photos/cmcbrien/4715320000/
Sergio Morchon for the array of cannons:
http://flickr.com/photos/smorchon/2951615532/
Simon Hooks for his shot of the Trojan Horse:
http://flickr.com/photos/gogap/253649673/
Sam Greenhalgh took a photo of a rack in a data center:
http://flickr.com/photos/80476901
Matt Peoples for the kegs:
http://flickr.com/photos/leftymgp/7332282888/
Justin Ennis photographed the Swiss Guard in Rome:
http://flickr.com/photos/averain/5307438963/
Schub@ took a photo a looking glass:
http://flickr.com/photos/schubi74/5793584347
Maury Landsman for the applause:
http://www.flickr.com/photos/mau3ry/3763640652
Sources and Acknowledgment
25.09.13
Thanks for listening! Questions?
Contact
Nils Magnus
Senior System Engineer
inovex GmbH
Office Munich
Valentin-Linhof-Str. 2
81829 Munich, Germany
+49-173-3181-057
nils.magnus@inovex.de
Agent L9 Oxycryocrypt

More Related Content

What's hot (20)

PDF
Building a redundant CloudStack management cluster - Vladimir Melnik
ShapeBlue
 
PDF
Multisite OpenStack for NFV: Bridging the Gap
Dimitri Mazmanov
 
PDF
OpenNebula TechDay Boston 2015 - HA HPC with OpenNebula
OpenNebula Project
 
PDF
Open stack in action enovance-quantum in action
eNovance
 
PPTX
KuberNETes - meetup
Nathan Ness
 
PPTX
Whats New in Apache CloudStack Version 4.5
ShapeBlue
 
PDF
Hybrid cloud federation
openstackindia
 
PDF
Using OpenContrail with Kubernetes
Matt Baldwin
 
PDF
[OpenStack Day in Korea 2015] Track 3-2 - Huawei Cloud Computing Powered by O...
OpenStack Korea Community
 
PDF
Boyan Krosnov - Building a software-defined cloud - our experience
ShapeBlue
 
PDF
OpenStack in Action! 5 - Dell - OpenStack powered solutions - Patrick Hamon
eNovance
 
PDF
[OpenStack Day in Korea 2015] Track 3-6 - Archiectural Overview of the Open S...
OpenStack Korea Community
 
PPTX
Docker, Innovation Accelerator
Docker, Inc.
 
PDF
Containers 101 Meetup - VMs vs Containers
Tommy Berry
 
PPTX
Intro to OpenStack
donnieh1
 
PPTX
Optimising nfv service chains on open stack using docker
Ananth Padmanabhan
 
PPTX
Dependable Storage and Computing using Multiple Cloud Providers
Alysson Bessani
 
PDF
Wido den Hollander - building highly available cloud with Ceph and CloudStack
ShapeBlue
 
PDF
[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업
OpenStack Korea Community
 
PDF
Raspberry pi x kubernetes x tensorflow
霈萱 蔡
 
Building a redundant CloudStack management cluster - Vladimir Melnik
ShapeBlue
 
Multisite OpenStack for NFV: Bridging the Gap
Dimitri Mazmanov
 
OpenNebula TechDay Boston 2015 - HA HPC with OpenNebula
OpenNebula Project
 
Open stack in action enovance-quantum in action
eNovance
 
KuberNETes - meetup
Nathan Ness
 
Whats New in Apache CloudStack Version 4.5
ShapeBlue
 
Hybrid cloud federation
openstackindia
 
Using OpenContrail with Kubernetes
Matt Baldwin
 
[OpenStack Day in Korea 2015] Track 3-2 - Huawei Cloud Computing Powered by O...
OpenStack Korea Community
 
Boyan Krosnov - Building a software-defined cloud - our experience
ShapeBlue
 
OpenStack in Action! 5 - Dell - OpenStack powered solutions - Patrick Hamon
eNovance
 
[OpenStack Day in Korea 2015] Track 3-6 - Archiectural Overview of the Open S...
OpenStack Korea Community
 
Docker, Innovation Accelerator
Docker, Inc.
 
Containers 101 Meetup - VMs vs Containers
Tommy Berry
 
Intro to OpenStack
donnieh1
 
Optimising nfv service chains on open stack using docker
Ananth Padmanabhan
 
Dependable Storage and Computing using Multiple Cloud Providers
Alysson Bessani
 
Wido den Hollander - building highly available cloud with Ceph and CloudStack
ShapeBlue
 
[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업
OpenStack Korea Community
 
Raspberry pi x kubernetes x tensorflow
霈萱 蔡
 

Viewers also liked (10)

PDF
Community Clouds from Scratch
NETWAYS
 
PDF
rOCCI – Providing Interoperability through OCCI 1.1 Support for OpenNebula
NETWAYS
 
PDF
High Performance Computing Cloud at SURFsara: Experiences with OpenNebula 3.x
NETWAYS
 
PPTX
OpenNebula in a Multiuser Environment
NETWAYS
 
PDF
Making Clouds: Turning OpenNebula into a Product
NETWAYS
 
PDF
Monitoring Large-scale Cloud Infrastructures with OpenNebula
NETWAYS
 
PDF
CentOS and OpenNebula, a Perfect Match
NETWAYS
 
PDF
Welcome talk unleashing the future of open-source enterprise cloud computing
NETWAYS
 
PDF
Monitoring of OpenNebula installations
NETWAYS
 
PDF
How Can OpenNebula Fit Your Needs: A European Project Feedback
NETWAYS
 
Community Clouds from Scratch
NETWAYS
 
rOCCI – Providing Interoperability through OCCI 1.1 Support for OpenNebula
NETWAYS
 
High Performance Computing Cloud at SURFsara: Experiences with OpenNebula 3.x
NETWAYS
 
OpenNebula in a Multiuser Environment
NETWAYS
 
Making Clouds: Turning OpenNebula into a Product
NETWAYS
 
Monitoring Large-scale Cloud Infrastructures with OpenNebula
NETWAYS
 
CentOS and OpenNebula, a Perfect Match
NETWAYS
 
Welcome talk unleashing the future of open-source enterprise cloud computing
NETWAYS
 
Monitoring of OpenNebula installations
NETWAYS
 
How Can OpenNebula Fit Your Needs: A European Project Feedback
NETWAYS
 
Ad

Similar to Top Ten Security Considerations when Setting up your OpenNebula Cloud (20)

PDF
Top ten security considerations when setting up your open nebula cloud
inovex GmbH
 
PPT
OpenStack - Security Professionals Information Exchange
Cybera Inc.
 
PPTX
Open Source Private Cloud Management with OpenStack and Security Evaluation w...
XHANI TRUNGU
 
PDF
Nebula Webinar | Private Cloud Security: Practical Solutions for a Challengin...
NebulaInc
 
PPT
Aws training in bangalore
apponix123
 
PPT
CyberCrime in the Cloud and How to defend Yourself
Alert Logic
 
PDF
Security Patterns for Microservice Architectures - ADTMag Microservices & API...
Matt Raible
 
PDF
Staying safe in the cloud
Oleg Podsechin
 
PDF
Security Patterns for Microservice Architectures - Oktane20
Matt Raible
 
PPTX
DevSecOps in a cloudnative world
Karthik Gaekwad
 
PDF
Security Patterns for Microservice Architectures - SpringOne 2020
Matt Raible
 
PDF
Security Patterns for Microservice Architectures
VMware Tanzu
 
PDF
Security for AWS: Journey to Least Privilege
Lacework
 
PPTX
Security for AWS : Journey to Least Privilege (update)
dhubbard858
 
PDF
Security Patterns for Microservice Architectures - London Java Community 2020
Matt Raible
 
PDF
AWS Security Challenges
STO STRATEGY
 
PDF
Aspirin as a Service: Using the Cloud to Cure Security Headaches
Priyanka Aash
 
PDF
Fixing security in the cloud, you can't secure what you cannot see 11 oct2019
Eturnti Consulting Pvt Ltd
 
PDF
AWS Cloud Security From the Point of View of the Compliance
Yury Chemerkin
 
PPTX
18CSE442 Cloud Security Introduction SRM.pptx
191013607gouthamsric
 
Top ten security considerations when setting up your open nebula cloud
inovex GmbH
 
OpenStack - Security Professionals Information Exchange
Cybera Inc.
 
Open Source Private Cloud Management with OpenStack and Security Evaluation w...
XHANI TRUNGU
 
Nebula Webinar | Private Cloud Security: Practical Solutions for a Challengin...
NebulaInc
 
Aws training in bangalore
apponix123
 
CyberCrime in the Cloud and How to defend Yourself
Alert Logic
 
Security Patterns for Microservice Architectures - ADTMag Microservices & API...
Matt Raible
 
Staying safe in the cloud
Oleg Podsechin
 
Security Patterns for Microservice Architectures - Oktane20
Matt Raible
 
DevSecOps in a cloudnative world
Karthik Gaekwad
 
Security Patterns for Microservice Architectures - SpringOne 2020
Matt Raible
 
Security Patterns for Microservice Architectures
VMware Tanzu
 
Security for AWS: Journey to Least Privilege
Lacework
 
Security for AWS : Journey to Least Privilege (update)
dhubbard858
 
Security Patterns for Microservice Architectures - London Java Community 2020
Matt Raible
 
AWS Security Challenges
STO STRATEGY
 
Aspirin as a Service: Using the Cloud to Cure Security Headaches
Priyanka Aash
 
Fixing security in the cloud, you can't secure what you cannot see 11 oct2019
Eturnti Consulting Pvt Ltd
 
AWS Cloud Security From the Point of View of the Compliance
Yury Chemerkin
 
18CSE442 Cloud Security Introduction SRM.pptx
191013607gouthamsric
 
Ad

Recently uploaded (20)

PDF
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PPTX
The Project Compass - GDG on Campus MSIT
dscmsitkol
 
PDF
🚀 Let’s Build Our First Slack Workflow! 🔧.pdf
SanjeetMishra29
 
DOCX
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
PPTX
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
PDF
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PPTX
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
PDF
Transcript: Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
PDF
“Squinting Vision Pipelines: Detecting and Correcting Errors in Vision Models...
Edge AI and Vision Alliance
 
PPTX
Seamless Tech Experiences Showcasing Cross-Platform App Design.pptx
presentifyai
 
PDF
Future-Proof or Fall Behind? 10 Tech Trends You Can’t Afford to Ignore in 2025
DIGITALCONFEX
 
PDF
UiPath DevConnect 2025: Agentic Automation Community User Group Meeting
DianaGray10
 
PPTX
Designing_the_Future_AI_Driven_Product_Experiences_Across_Devices.pptx
presentifyai
 
PDF
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit
 
PPTX
MuleSoft MCP Support (Model Context Protocol) and Use Case Demo
shyamraj55
 
PDF
How do you fast track Agentic automation use cases discovery?
DianaGray10
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
The Project Compass - GDG on Campus MSIT
dscmsitkol
 
🚀 Let’s Build Our First Slack Workflow! 🔧.pdf
SanjeetMishra29
 
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
Transcript: Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
“Squinting Vision Pipelines: Detecting and Correcting Errors in Vision Models...
Edge AI and Vision Alliance
 
Seamless Tech Experiences Showcasing Cross-Platform App Design.pptx
presentifyai
 
Future-Proof or Fall Behind? 10 Tech Trends You Can’t Afford to Ignore in 2025
DIGITALCONFEX
 
UiPath DevConnect 2025: Agentic Automation Community User Group Meeting
DianaGray10
 
Designing_the_Future_AI_Driven_Product_Experiences_Across_Devices.pptx
presentifyai
 
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit
 
MuleSoft MCP Support (Model Context Protocol) and Use Case Demo
shyamraj55
 
How do you fast track Agentic automation use cases discovery?
DianaGray10
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 

Top Ten Security Considerations when Setting up your OpenNebula Cloud

  • 1. Wir nutzen Technologien, um unsere Kunden glücklich zu machen. Und uns selbst. Security Considerations Securely Setting up your Open Nebula Cloud A top 10 Best Practise Guide OpenNebula Conf, September 25, 2013 in Berlin, Germany Nils Magnus inovex GmbH Senior System Engineer
  • 2. 25.09.13 Agenda and Preamble Protecting your Open Nebula Cloud I. Security is 90% architecture and 10% implementation. Apparently trivial suggestions form the base of your protection. II. Security is intrinsically understaffed. Management wants „quick wins“, team is looking to „get the job done“. Somehow. III. Security is not about checklists. If you are (or feel) responsible, you need to know your individual vulnerabilities. In this mode think like an attacker. Share my thoughts how to protect an Open Nebula cloud!
  • 3. 25.09.13 Security needs Ressources Don't underestimate the necessity of security. Assign proper ressources to adress this issue. Security is a costly investment in the future. It is a bargain compared to the loss of your main business processes. The possible damage scales to the same extend as your cloud itself.
  • 4. 25.09.13 Admin Account Protect access to the • ONE admin account, • the SunStone UI, and infrastructure. Once attackers gain unlawful access to your command bridge, your systems might be doomed. All of them.
  • 5. 25.09.13 VLAN Hopping Prevent VLAN hopping in the scope of your SDN and between physical hosts. Network virtualization with VLAN tagging comes very handy, but keep in mind that the very frames of all virtual segments may travel of a shared medium.
  • 6. 25.09.13 Environments Partition your cloud network segments into distinct security areas. Protect the different security environments and border them from each other. Actively separate maturity environments and different types of processed data.
  • 7. 25.09.13 Apply Classic Best Practises Anyway Despite in the cloud, nonetheless apply network security best practises like • firewalls, • intrusion detection, or • data leak prevention, based on the very requirements of your environment.
  • 8. 25.09.13 Host Protection Securing virtual machines is not enough. Make sure you also protect the access to all of your hosts, even if they are not designed to have users on them.
  • 9. 25.09.13 Key and User Management Set up a working SSH infrastructure and enforce it. Open Nebula heavily relies on a working and secured way to communicate with your hosts and virtual machines. Properly configured keys help both automating the system deployment process and restricting acess on a need-to-know basis.
  • 10. 25.09.13 Sensible Distrust Auto discovery and self registration to the inventory are powerful features that alleviate the system engineer's duties. But make sure that only known bare metal systems register into your cloud store and virtual ressources. Don't boot systems you don't have full control over.
  • 11. 25.09.13 Shared Storage Protect access to your shared storage. Several hosts have to access the images of all security environments. Rogue images injected in the right place might act as trojan horses in otherwise well-protected environments.
  • 12. 25.09.13 Availability Keep ressources in mind. One major advantage of virtualization is to share ressources like CPU or IO bandwidth. But some player in your cloud may or may not play fair. Those situations, both intended and unintended, threaten your availability. Enacting QoS measure could be helpful.
  • 13. 25.09.13 Wrap-up 1. assign proper ressources 2. protect your admin account 3. secure the networks 4. partition into environments 5. apply classic network security measures 6. protect your hosts 7. install a key infrastructure 8. authenticate all repositories 9. protect the shared storage 10. keep an eye on availability What did I say about lists, anyway?
  • 14. 25.09.13 Freedom is the brother of security. The great photos of this presentation are licensed under the free Creative Commons license (CC-BY SA) that allows use and redistribution (share alike) as long as you give proper attribution. A big thank you goes to: UCL Engineering for the chainmail: http://flickr.com/photos/uclengineering/6946862623 Jwalanta Shrestha for the multi lanes in Kathmandu: http://flickr.com/photos/jwalanta/4496289019/ Drgriz52 and the bears at the tent: http://flickr.com/photos/drbair_photography/3571049565/ Steve Tannock and his meadows of the Peak District: http://flickr.com/photos/stv/2586761094/ Chris McBrien for his photo of the blue keys: http://flickr.com/photos/cmcbrien/4715320000/ Sergio Morchon for the array of cannons: http://flickr.com/photos/smorchon/2951615532/ Simon Hooks for his shot of the Trojan Horse: http://flickr.com/photos/gogap/253649673/ Sam Greenhalgh took a photo of a rack in a data center: http://flickr.com/photos/80476901 Matt Peoples for the kegs: http://flickr.com/photos/leftymgp/7332282888/ Justin Ennis photographed the Swiss Guard in Rome: http://flickr.com/photos/averain/5307438963/ Schub@ took a photo a looking glass: http://flickr.com/photos/schubi74/5793584347 Maury Landsman for the applause: http://www.flickr.com/photos/mau3ry/3763640652 Sources and Acknowledgment
  • 15. 25.09.13 Thanks for listening! Questions? Contact Nils Magnus Senior System Engineer inovex GmbH Office Munich Valentin-Linhof-Str. 2 81829 Munich, Germany +49-173-3181-057 [email protected] Agent L9 Oxycryocrypt