This document provides an overview of securing cloud infrastructure using the Xen hypervisor. It begins with introducing Xen security features like driver domains and PVgrub that isolate different components of the system. It then analyzes various attack surfaces like the network path, PyGrub bootloader, and Qemu device model. For each, it discusses what a successful exploit could achieve and how Xen features like driver domains and stub domains constrain the impact. The document concludes with recommendations to use the Xen security module FLASK to further restrict privileges and provides examples of applying it.
Related topics: