SlideShare a Scribd company logo
Security Considerations
Securely Setting up your Open Nebula Cloud
A top 10 Best Practise Guide

OpenNebula Conf, September 25, 2013 in Berlin, Germany
Nils Magnus
inovex GmbH
Senior System Engineer

Wir nutzen Technologien, um unsere Kunden glücklich zu machen. Und uns selbst.
Agenda and Preamble
Protecting your Open Nebula Cloud
I.

Security is 90% architecture and 10% implementation.
Apparently trivial suggestions form the base of your protection.
II.

Security is intrinsically understaffed. Management wants
„quick wins“, team is looking to „get the job done“. Somehow.
III.

Security is not about checklists. If you are (or feel)
responsible, you need to know your individual
vulnerabilities. In this mode think like an attacker.
Share my thoughts how to protect
an Open Nebula cloud!

25.09.13
Security needs Ressources
Don't underestimate the necessity of security.

Assign proper ressources to
adress this issue. Security is a
costly investment in the future.
It is a bargain compared to the loss of your
main business processes. The possible damage
scales to the same extend as your cloud itself.
25.09.13
Admin Account
Protect access to the
• ONE admin account,
• the SunStone UI, and
infrastructure.

Once attackers gain unlawful access to your command bridge,
your systems might be doomed. All of them.
25.09.13
VLAN Hopping

Prevent VLAN hopping in the scope of your SDN
and between physical hosts.

Network virtualization with
VLAN tagging comes very
handy, but keep in mind that
the very frames of all virtual
segments may travel of a
shared medium.

25.09.13
Environments

Partition your cloud
network segments into
distinct security areas.

Protect the different security
environments and border them
from each other.

25.09.13

Actively separate
maturity environments
and different types of
processed data.
Apply Classic Best Practises Anyway

Despite in the cloud, nonetheless apply
network security best practises like
• firewalls,
• intrusion detection, or
• data leak prevention,

based on the very requirements of your
environment.

25.09.13
Host Protection

Securing
virtual machines
is not enough.
Make sure you also protect
the access to all of your hosts,
even if they are not designed
to have users on them.
25.09.13
Key and User Management

Set up a working SSH
infrastructure and enforce it.
Open Nebula heavily relies on a working and
secured way to communicate with your hosts and
virtual machines.
Properly configured keys help both automating the
system deployment process and restricting acess on
a need-to-know basis.
25.09.13
Sensible Distrust

Auto discovery and self
registration to the inventory are
powerful features that alleviate
the system engineer's duties.
But make sure that only known
bare metal systems register into
your cloud store and virtual
ressources.
Don't boot systems you don't
have full control over.

25.09.13
Shared Storage

Protect access to your
shared storage.
Several hosts have to
access the images of
all security
environments.
25.09.13

Rogue images injected in
the right place might act as
trojan horses in otherwise
well-protected
environments.
Availability

Keep ressources in mind. One major
advantage of virtualization is to share
ressources like CPU or IO bandwidth.
But some player in your cloud may or
may not play fair.
Those situations, both intended and
unintended, threaten your availability.
Enacting QoS measure could be helpful.

25.09.13
Wrap-up

ay
id I s anyway?
d
What
s,
ut list
abo

1. assign proper ressources
2. protect your admin
account
3. secure the networks
4. partition into
environments
5. apply classic network
security measures
6. protect your hosts
7. install a key infrastructure

25.09.13

8. authenticate all repositories
9. protect the shared storage
10. keep an eye on
availability
Sources and Acknowledgment
Freedom is the brother of security. The great photos of this presentation are licensed
under the free Creative Commons license (CC-BY SA) that allows use and
redistribution (share alike) as long as you give proper attribution. A big thank you goes
to:
UCL Engineering for the chainmail:
http://flickr.com/photos/uclengineering/6946862623
Jwalanta Shrestha for the multi lanes in Kathmandu:
http://flickr.com/photos/jwalanta/4496289019/
Drgriz52 and the bears at the tent:
http://flickr.com/photos/drbair_photography/3571049565/
Steve Tannock and his meadows of the Peak District:
http://flickr.com/photos/stv/2586761094/
Chris McBrien for his photo of the blue keys:
http://flickr.com/photos/cmcbrien/4715320000/
Sergio Morchon for the array of cannons:
http://flickr.com/photos/smorchon/2951615532/
Simon Hooks for his shot of the Trojan Horse:
http://flickr.com/photos/gogap/253649673/
Sam Greenhalgh took a photo of a rack in a data center:
http://flickr.com/photos/80476901
Matt Peoples for the kegs:
http://flickr.com/photos/leftymgp/7332282888/

25.09.13

Justin Ennis photographed the Swiss Guard in Rome:
http://flickr.com/photos/averain/5307438963/
Schub@ took a photo a looking glass:
http://flickr.com/photos/schubi74/5793584347
Maury Landsman for the applause:
http://www.flickr.com/photos/mau3ry/3763640652
Thanks for listening! Questions?
Contact
Nils Magnus
Senior System Engineer
inovex GmbH
Office Munich
Valentin-Linhof-Str. 2
81829 Munich, Germany
+49-173-3181-057
nils.magnus@inovex.de

Agent L9 Oxycryocrypt

25.09.13

More Related Content

PDF
Top Ten Security Considerations when Setting up your OpenNebula Cloud
PPTX
In Cloud We Trust
PDF
7 cloud security tips
PPTX
Surveillance Presentation
PDF
CLOUD STORAGE IS MUCH MORE SECURE THAN YOU THINK
PDF
Make your OpenStack Cloud Self-Defending with VESPA!
ODP
A pinguin as a bouncer... Open Source Security Solutions
PPTX
Enhance Virtual Machine Security in OpenStack Using Suricata IPS
Top Ten Security Considerations when Setting up your OpenNebula Cloud
In Cloud We Trust
7 cloud security tips
Surveillance Presentation
CLOUD STORAGE IS MUCH MORE SECURE THAN YOU THINK
Make your OpenStack Cloud Self-Defending with VESPA!
A pinguin as a bouncer... Open Source Security Solutions
Enhance Virtual Machine Security in OpenStack Using Suricata IPS

What's hot (17)

PPTX
Real security in a virtual environment - Infosecurity 2011
PDF
Modern sandbox escaping techniques
PDF
Network security
PDF
Virtual Networking Security - Network Security
PPTX
Network security
PDF
2020-12-21 ISC^2 Suisse Romande speech
PPTX
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
PPTX
Top 10 Encryption Myths
PPTX
Te chnical presentation networkexploits and security
PDF
A Migration Imperative With Windows 10 Enterprise-Grade Security
PDF
Acknowledging Boundaries: How to Bring Back Consistency to Your Microservice ...
PDF
Onsite Vs Hosted Desktop Security
PDF
The World Against the Bad, Cisco AMP Solution to the Rescue
PDF
Alternatives for-securing-virtual-networks
PPTX
CIS Control Solution Guide
PPTX
VMware Technical Overview (2012)
PPT
Proactive Security That Works
Real security in a virtual environment - Infosecurity 2011
Modern sandbox escaping techniques
Network security
Virtual Networking Security - Network Security
Network security
2020-12-21 ISC^2 Suisse Romande speech
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
Top 10 Encryption Myths
Te chnical presentation networkexploits and security
A Migration Imperative With Windows 10 Enterprise-Grade Security
Acknowledging Boundaries: How to Bring Back Consistency to Your Microservice ...
Onsite Vs Hosted Desktop Security
The World Against the Bad, Cisco AMP Solution to the Rescue
Alternatives for-securing-virtual-networks
CIS Control Solution Guide
VMware Technical Overview (2012)
Proactive Security That Works
Ad

Viewers also liked (20)

PDF
Test Driven Development
PDF
Deep Dive into dockerized Microservices
PDF
Entwicklungsumgebungen - Packer, Vagrant, Puppet
PDF
Software-defined networking
PDF
Configuration Management with Saltstack
PDF
SaltStack – (Not) just another Automation & Remote Execution Tool
PDF
Application configuration in containers
PDF
repositor.io - Simple Repository Management
PDF
Infrastructure as code: Cloud-Umgebungen mit Terraform verwalten
PDF
A system architect guide - ten ways to ruin your cloud experience ...and how ...
PDF
A system architect guide - ten ways to ruin your cloud experience ...and how ...
PDF
Agile Data Analytics
PDF
Kubernetes - how to orchestrate containers
PDF
Bootstrapping Forman with Vagrant - Setting up a local Provision & Deployment...
PDF
Integration in der Cloud mit Camel, Karaf und Cellar
PDF
Definition of almost done
PDF
Kanban Paper Airplanes
PDF
Sling sitebuilder and Sling CMS
PPTX
Big Data Basics
PDF
Puppet: Designing modules & repositories
Test Driven Development
Deep Dive into dockerized Microservices
Entwicklungsumgebungen - Packer, Vagrant, Puppet
Software-defined networking
Configuration Management with Saltstack
SaltStack – (Not) just another Automation & Remote Execution Tool
Application configuration in containers
repositor.io - Simple Repository Management
Infrastructure as code: Cloud-Umgebungen mit Terraform verwalten
A system architect guide - ten ways to ruin your cloud experience ...and how ...
A system architect guide - ten ways to ruin your cloud experience ...and how ...
Agile Data Analytics
Kubernetes - how to orchestrate containers
Bootstrapping Forman with Vagrant - Setting up a local Provision & Deployment...
Integration in der Cloud mit Camel, Karaf und Cellar
Definition of almost done
Kanban Paper Airplanes
Sling sitebuilder and Sling CMS
Big Data Basics
Puppet: Designing modules & repositories
Ad

Similar to Top ten security considerations when setting up your open nebula cloud (20)

PDF
OpenNebulaConf 2013 - Top Ten Security Considerations when Setting up your Op...
PPT
OpenStack - Security Professionals Information Exchange
PDF
Nebula Webinar | Private Cloud Security: Practical Solutions for a Challengin...
PPT
Aws training in bangalore
PPT
CyberCrime in the Cloud and How to defend Yourself
PPTX
Open Source Private Cloud Management with OpenStack and Security Evaluation w...
PDF
AWS Security Challenges
DOCX
How to implement cloud computing security
PPTX
18CSE442 Cloud Security Introduction SRM.pptx
PDF
Security Patterns for Microservice Architectures - ADTMag Microservices & API...
PDF
Staying safe in the cloud
PPT
Cloud Computing Security Issues
PDF
AWS Cloud Security From the Point of View of the Compliance
PDF
Security for AWS: Journey to Least Privilege
PPTX
Security for AWS : Journey to Least Privilege (update)
PDF
Fixing security in the cloud, you can't secure what you cannot see 11 oct2019
PPTX
Cloud Security - Idealware
PDF
Security Patterns for Microservice Architectures - Oktane20
PDF
Dos and don'ts in AWS
PPT
Cloud Security
OpenNebulaConf 2013 - Top Ten Security Considerations when Setting up your Op...
OpenStack - Security Professionals Information Exchange
Nebula Webinar | Private Cloud Security: Practical Solutions for a Challengin...
Aws training in bangalore
CyberCrime in the Cloud and How to defend Yourself
Open Source Private Cloud Management with OpenStack and Security Evaluation w...
AWS Security Challenges
How to implement cloud computing security
18CSE442 Cloud Security Introduction SRM.pptx
Security Patterns for Microservice Architectures - ADTMag Microservices & API...
Staying safe in the cloud
Cloud Computing Security Issues
AWS Cloud Security From the Point of View of the Compliance
Security for AWS: Journey to Least Privilege
Security for AWS : Journey to Least Privilege (update)
Fixing security in the cloud, you can't secure what you cannot see 11 oct2019
Cloud Security - Idealware
Security Patterns for Microservice Architectures - Oktane20
Dos and don'ts in AWS
Cloud Security

More from inovex GmbH (20)

PDF
lldb – Debugger auf Abwegen
PDF
Are you sure about that?! Uncertainty Quantification in AI
PDF
Why natural language is next step in the AI evolution
PDF
WWDC 2019 Recap
PDF
Network Policies
PDF
Interpretable Machine Learning
PDF
Jenkins X – CI/CD in wolkigen Umgebungen
PDF
AI auf Edge-Geraeten
PDF
Prometheus on Kubernetes
PDF
Deep Learning for Recommender Systems
PDF
Azure IoT Edge
PDF
Representation Learning von Zeitreihen
PDF
Talk to me – Chatbots und digitale Assistenten
PDF
Künstlich intelligent?
PDF
Dev + Ops = Go
PDF
Das Android Open Source Project
PDF
Machine Learning Interpretability
PDF
Performance evaluation of GANs in a semisupervised OCR use case
PDF
People & Products – Lessons learned from the daily IT madness
PDF
Infrastructure as (real) Code – Manage your K8s resources with Pulumi
lldb – Debugger auf Abwegen
Are you sure about that?! Uncertainty Quantification in AI
Why natural language is next step in the AI evolution
WWDC 2019 Recap
Network Policies
Interpretable Machine Learning
Jenkins X – CI/CD in wolkigen Umgebungen
AI auf Edge-Geraeten
Prometheus on Kubernetes
Deep Learning for Recommender Systems
Azure IoT Edge
Representation Learning von Zeitreihen
Talk to me – Chatbots und digitale Assistenten
Künstlich intelligent?
Dev + Ops = Go
Das Android Open Source Project
Machine Learning Interpretability
Performance evaluation of GANs in a semisupervised OCR use case
People & Products – Lessons learned from the daily IT madness
Infrastructure as (real) Code – Manage your K8s resources with Pulumi

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Cloud computing and distributed systems.
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Empathic Computing: Creating Shared Understanding
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Electronic commerce courselecture one. Pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
MIND Revenue Release Quarter 2 2025 Press Release
Cloud computing and distributed systems.
Spectral efficient network and resource selection model in 5G networks
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Machine learning based COVID-19 study performance prediction
Reach Out and Touch Someone: Haptics and Empathic Computing
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Programs and apps: productivity, graphics, security and other tools
Dropbox Q2 2025 Financial Results & Investor Presentation
Diabetes mellitus diagnosis method based random forest with bat algorithm
Empathic Computing: Creating Shared Understanding
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Electronic commerce courselecture one. Pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Spectroscopy.pptx food analysis technology
Network Security Unit 5.pdf for BCA BBA.
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Top ten security considerations when setting up your open nebula cloud

  • 1. Security Considerations Securely Setting up your Open Nebula Cloud A top 10 Best Practise Guide OpenNebula Conf, September 25, 2013 in Berlin, Germany Nils Magnus inovex GmbH Senior System Engineer Wir nutzen Technologien, um unsere Kunden glücklich zu machen. Und uns selbst.
  • 2. Agenda and Preamble Protecting your Open Nebula Cloud I. Security is 90% architecture and 10% implementation. Apparently trivial suggestions form the base of your protection. II. Security is intrinsically understaffed. Management wants „quick wins“, team is looking to „get the job done“. Somehow. III. Security is not about checklists. If you are (or feel) responsible, you need to know your individual vulnerabilities. In this mode think like an attacker. Share my thoughts how to protect an Open Nebula cloud! 25.09.13
  • 3. Security needs Ressources Don't underestimate the necessity of security. Assign proper ressources to adress this issue. Security is a costly investment in the future. It is a bargain compared to the loss of your main business processes. The possible damage scales to the same extend as your cloud itself. 25.09.13
  • 4. Admin Account Protect access to the • ONE admin account, • the SunStone UI, and infrastructure. Once attackers gain unlawful access to your command bridge, your systems might be doomed. All of them. 25.09.13
  • 5. VLAN Hopping Prevent VLAN hopping in the scope of your SDN and between physical hosts. Network virtualization with VLAN tagging comes very handy, but keep in mind that the very frames of all virtual segments may travel of a shared medium. 25.09.13
  • 6. Environments Partition your cloud network segments into distinct security areas. Protect the different security environments and border them from each other. 25.09.13 Actively separate maturity environments and different types of processed data.
  • 7. Apply Classic Best Practises Anyway Despite in the cloud, nonetheless apply network security best practises like • firewalls, • intrusion detection, or • data leak prevention, based on the very requirements of your environment. 25.09.13
  • 8. Host Protection Securing virtual machines is not enough. Make sure you also protect the access to all of your hosts, even if they are not designed to have users on them. 25.09.13
  • 9. Key and User Management Set up a working SSH infrastructure and enforce it. Open Nebula heavily relies on a working and secured way to communicate with your hosts and virtual machines. Properly configured keys help both automating the system deployment process and restricting acess on a need-to-know basis. 25.09.13
  • 10. Sensible Distrust Auto discovery and self registration to the inventory are powerful features that alleviate the system engineer's duties. But make sure that only known bare metal systems register into your cloud store and virtual ressources. Don't boot systems you don't have full control over. 25.09.13
  • 11. Shared Storage Protect access to your shared storage. Several hosts have to access the images of all security environments. 25.09.13 Rogue images injected in the right place might act as trojan horses in otherwise well-protected environments.
  • 12. Availability Keep ressources in mind. One major advantage of virtualization is to share ressources like CPU or IO bandwidth. But some player in your cloud may or may not play fair. Those situations, both intended and unintended, threaten your availability. Enacting QoS measure could be helpful. 25.09.13
  • 13. Wrap-up ay id I s anyway? d What s, ut list abo 1. assign proper ressources 2. protect your admin account 3. secure the networks 4. partition into environments 5. apply classic network security measures 6. protect your hosts 7. install a key infrastructure 25.09.13 8. authenticate all repositories 9. protect the shared storage 10. keep an eye on availability
  • 14. Sources and Acknowledgment Freedom is the brother of security. The great photos of this presentation are licensed under the free Creative Commons license (CC-BY SA) that allows use and redistribution (share alike) as long as you give proper attribution. A big thank you goes to: UCL Engineering for the chainmail: http://flickr.com/photos/uclengineering/6946862623 Jwalanta Shrestha for the multi lanes in Kathmandu: http://flickr.com/photos/jwalanta/4496289019/ Drgriz52 and the bears at the tent: http://flickr.com/photos/drbair_photography/3571049565/ Steve Tannock and his meadows of the Peak District: http://flickr.com/photos/stv/2586761094/ Chris McBrien for his photo of the blue keys: http://flickr.com/photos/cmcbrien/4715320000/ Sergio Morchon for the array of cannons: http://flickr.com/photos/smorchon/2951615532/ Simon Hooks for his shot of the Trojan Horse: http://flickr.com/photos/gogap/253649673/ Sam Greenhalgh took a photo of a rack in a data center: http://flickr.com/photos/80476901 Matt Peoples for the kegs: http://flickr.com/photos/leftymgp/7332282888/ 25.09.13 Justin Ennis photographed the Swiss Guard in Rome: http://flickr.com/photos/averain/5307438963/ Schub@ took a photo a looking glass: http://flickr.com/photos/schubi74/5793584347 Maury Landsman for the applause: http://www.flickr.com/photos/mau3ry/3763640652
  • 15. Thanks for listening! Questions? Contact Nils Magnus Senior System Engineer inovex GmbH Office Munich Valentin-Linhof-Str. 2 81829 Munich, Germany +49-173-3181-057 nils.magnus@inovex.de Agent L9 Oxycryocrypt 25.09.13