SlideShare a Scribd company logo
Wir nutzen Technologien, um unsere Kunden glücklich zu machen. Und uns selbst.
Security Considerations
Securely Setting up your Open Nebula Cloud
A top 10 Best Practise Guide
OpenNebula Conf, September 25, 2013 in Berlin, Germany
Nils Magnus
inovex GmbH
Senior System Engineer
25.09.13
Agenda and Preamble
Protecting your Open Nebula Cloud
I.
Security is 90% architecture and 10% implementation.
Apparently trivial suggestions form the base of your protection.
II.
Security is intrinsically understaffed. Management wants
„quick wins“, team is looking to „get the job done“. Somehow.
III.
Security is not about checklists. If you are (or feel)
responsible, you need to know your individual
vulnerabilities. In this mode think like an attacker.
Share my thoughts how to protect
an Open Nebula cloud!
25.09.13
Security needs Ressources
Don't underestimate the necessity of security.
Assign proper ressources to
adress this issue. Security is a
costly investment in the future.
It is a bargain compared to the loss of your
main business processes. The possible damage
scales to the same extend as your cloud itself.
25.09.13
Admin Account
Protect access to the
• ONE admin account,
• the SunStone UI, and
infrastructure.
Once attackers gain unlawful access to your command bridge,
your systems might be doomed. All of them.
25.09.13
VLAN Hopping
Prevent VLAN hopping in the scope of your SDN
and between physical hosts.
Network virtualization with
VLAN tagging comes very
handy, but keep in mind that
the very frames of all virtual
segments may travel of a
shared medium.
25.09.13
Environments
Partition your cloud
network segments into
distinct security areas.
Protect the different security
environments and border them
from each other.
Actively separate
maturity environments
and different types of
processed data.
25.09.13
Apply Classic Best Practises Anyway
Despite in the cloud, nonetheless apply
network security best practises like
• firewalls,
• intrusion detection, or
• data leak prevention,
based on the very requirements of your
environment.
25.09.13
Host Protection
Securing
virtual machines
is not enough.
Make sure you also protect
the access to all of your hosts,
even if they are not designed
to have users on them.
25.09.13
Key and User Management
Set up a working SSH
infrastructure and enforce it.
Open Nebula heavily relies on a working and
secured way to communicate with your hosts and
virtual machines.
Properly configured keys help both automating the
system deployment process and restricting acess on
a need-to-know basis.
25.09.13
Sensible Distrust
Auto discovery and self
registration to the inventory are
powerful features that alleviate
the system engineer's duties.
But make sure that only known
bare metal systems register into
your cloud store and virtual
ressources.
Don't boot systems you don't
have full control over.
25.09.13
Shared Storage
Protect access to your
shared storage.
Several hosts have to
access the images of
all security
environments.
Rogue images injected in
the right place might act as
trojan horses in otherwise
well-protected
environments.
25.09.13
Availability
Keep ressources in mind. One major
advantage of virtualization is to share
ressources like CPU or IO bandwidth.
But some player in your cloud may or
may not play fair.
Those situations, both intended and
unintended, threaten your availability.
Enacting QoS measure could be helpful.
25.09.13
Wrap-up
1. assign proper ressources
2. protect your admin
account
3. secure the networks
4. partition into
environments
5. apply classic network
security measures
6. protect your hosts
7. install a key infrastructure
8. authenticate all repositories
9. protect the shared storage
10. keep an eye on
availability
What did I say
about lists, anyway?
25.09.13
Freedom is the brother of security. The great photos of this presentation are licensed
under the free Creative Commons license (CC-BY SA) that allows use and
redistribution (share alike) as long as you give proper attribution. A big thank you goes
to:
UCL Engineering for the chainmail:
http://flickr.com/photos/uclengineering/6946862623
Jwalanta Shrestha for the multi lanes in Kathmandu:
http://flickr.com/photos/jwalanta/4496289019/
Drgriz52 and the bears at the tent:
http://flickr.com/photos/drbair_photography/3571049565/
Steve Tannock and his meadows of the Peak District:
http://flickr.com/photos/stv/2586761094/
Chris McBrien for his photo of the blue keys:
http://flickr.com/photos/cmcbrien/4715320000/
Sergio Morchon for the array of cannons:
http://flickr.com/photos/smorchon/2951615532/
Simon Hooks for his shot of the Trojan Horse:
http://flickr.com/photos/gogap/253649673/
Sam Greenhalgh took a photo of a rack in a data center:
http://flickr.com/photos/80476901
Matt Peoples for the kegs:
http://flickr.com/photos/leftymgp/7332282888/
Justin Ennis photographed the Swiss Guard in Rome:
http://flickr.com/photos/averain/5307438963/
Schub@ took a photo a looking glass:
http://flickr.com/photos/schubi74/5793584347
Maury Landsman for the applause:
http://www.flickr.com/photos/mau3ry/3763640652
Sources and Acknowledgment
25.09.13
Thanks for listening! Questions?
Contact
Nils Magnus
Senior System Engineer
inovex GmbH
Office Munich
Valentin-Linhof-Str. 2
81829 Munich, Germany
+49-173-3181-057
nils.magnus@inovex.de
Agent L9 Oxycryocrypt

More Related Content

PDF
Enabling Scientific Workflows on FermiCloud using OpenNebula
PPTX
Opening the Path to Technical Excellence
PDF
Contrail Virtual Execution Platform
PDF
Making clouds: turning opennebula into a product
PDF
OpenNebulaConf2015 2.05 OpenNebula at the Leibniz Supercomputing Centre - Mat...
PDF
Adventures in Research
PDF
XCP-ng - past, present and future
PDF
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
Enabling Scientific Workflows on FermiCloud using OpenNebula
Opening the Path to Technical Excellence
Contrail Virtual Execution Platform
Making clouds: turning opennebula into a product
OpenNebulaConf2015 2.05 OpenNebula at the Leibniz Supercomputing Centre - Mat...
Adventures in Research
XCP-ng - past, present and future
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking

What's hot (20)

PDF
Building a redundant CloudStack management cluster - Vladimir Melnik
PDF
Multisite OpenStack for NFV: Bridging the Gap
PDF
OpenNebula TechDay Boston 2015 - HA HPC with OpenNebula
PDF
Open stack in action enovance-quantum in action
PPTX
KuberNETes - meetup
PPTX
Whats New in Apache CloudStack Version 4.5
PDF
Hybrid cloud federation
PDF
Using OpenContrail with Kubernetes
PDF
[OpenStack Day in Korea 2015] Track 3-2 - Huawei Cloud Computing Powered by O...
PDF
Boyan Krosnov - Building a software-defined cloud - our experience
PDF
OpenStack in Action! 5 - Dell - OpenStack powered solutions - Patrick Hamon
PDF
[OpenStack Day in Korea 2015] Track 3-6 - Archiectural Overview of the Open S...
PPTX
Docker, Innovation Accelerator
PDF
Containers 101 Meetup - VMs vs Containers
PPTX
Intro to OpenStack
PPTX
Optimising nfv service chains on open stack using docker
PPTX
Dependable Storage and Computing using Multiple Cloud Providers
PDF
Wido den Hollander - building highly available cloud with Ceph and CloudStack
PDF
[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업
PDF
Raspberry pi x kubernetes x tensorflow
Building a redundant CloudStack management cluster - Vladimir Melnik
Multisite OpenStack for NFV: Bridging the Gap
OpenNebula TechDay Boston 2015 - HA HPC with OpenNebula
Open stack in action enovance-quantum in action
KuberNETes - meetup
Whats New in Apache CloudStack Version 4.5
Hybrid cloud federation
Using OpenContrail with Kubernetes
[OpenStack Day in Korea 2015] Track 3-2 - Huawei Cloud Computing Powered by O...
Boyan Krosnov - Building a software-defined cloud - our experience
OpenStack in Action! 5 - Dell - OpenStack powered solutions - Patrick Hamon
[OpenStack Day in Korea 2015] Track 3-6 - Archiectural Overview of the Open S...
Docker, Innovation Accelerator
Containers 101 Meetup - VMs vs Containers
Intro to OpenStack
Optimising nfv service chains on open stack using docker
Dependable Storage and Computing using Multiple Cloud Providers
Wido den Hollander - building highly available cloud with Ceph and CloudStack
[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업
Raspberry pi x kubernetes x tensorflow
Ad

Viewers also liked (10)

PDF
Community Clouds from Scratch
PDF
rOCCI – Providing Interoperability through OCCI 1.1 Support for OpenNebula
PDF
High Performance Computing Cloud at SURFsara: Experiences with OpenNebula 3.x
PPTX
OpenNebula in a Multiuser Environment
PDF
Making Clouds: Turning OpenNebula into a Product
PDF
Monitoring Large-scale Cloud Infrastructures with OpenNebula
PDF
CentOS and OpenNebula, a Perfect Match
PDF
Welcome talk unleashing the future of open-source enterprise cloud computing
PDF
Monitoring of OpenNebula installations
PDF
How Can OpenNebula Fit Your Needs: A European Project Feedback
Community Clouds from Scratch
rOCCI – Providing Interoperability through OCCI 1.1 Support for OpenNebula
High Performance Computing Cloud at SURFsara: Experiences with OpenNebula 3.x
OpenNebula in a Multiuser Environment
Making Clouds: Turning OpenNebula into a Product
Monitoring Large-scale Cloud Infrastructures with OpenNebula
CentOS and OpenNebula, a Perfect Match
Welcome talk unleashing the future of open-source enterprise cloud computing
Monitoring of OpenNebula installations
How Can OpenNebula Fit Your Needs: A European Project Feedback
Ad

Similar to Top Ten Security Considerations when Setting up your OpenNebula Cloud (20)

PDF
Top ten security considerations when setting up your open nebula cloud
PPT
OpenStack - Security Professionals Information Exchange
PPTX
Open Source Private Cloud Management with OpenStack and Security Evaluation w...
PDF
Nebula Webinar | Private Cloud Security: Practical Solutions for a Challengin...
PPT
Aws training in bangalore
PPT
CyberCrime in the Cloud and How to defend Yourself
PDF
Security Patterns for Microservice Architectures - ADTMag Microservices & API...
PDF
Staying safe in the cloud
PDF
Security Patterns for Microservice Architectures - Oktane20
PPTX
DevSecOps in a cloudnative world
PDF
Security Patterns for Microservice Architectures - SpringOne 2020
PDF
Security Patterns for Microservice Architectures
PDF
Security for AWS: Journey to Least Privilege
PPTX
Security for AWS : Journey to Least Privilege (update)
PDF
Security Patterns for Microservice Architectures - London Java Community 2020
PDF
AWS Security Challenges
PDF
Aspirin as a Service: Using the Cloud to Cure Security Headaches
PDF
Fixing security in the cloud, you can't secure what you cannot see 11 oct2019
PDF
AWS Cloud Security From the Point of View of the Compliance
PPTX
18CSE442 Cloud Security Introduction SRM.pptx
Top ten security considerations when setting up your open nebula cloud
OpenStack - Security Professionals Information Exchange
Open Source Private Cloud Management with OpenStack and Security Evaluation w...
Nebula Webinar | Private Cloud Security: Practical Solutions for a Challengin...
Aws training in bangalore
CyberCrime in the Cloud and How to defend Yourself
Security Patterns for Microservice Architectures - ADTMag Microservices & API...
Staying safe in the cloud
Security Patterns for Microservice Architectures - Oktane20
DevSecOps in a cloudnative world
Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures
Security for AWS: Journey to Least Privilege
Security for AWS : Journey to Least Privilege (update)
Security Patterns for Microservice Architectures - London Java Community 2020
AWS Security Challenges
Aspirin as a Service: Using the Cloud to Cure Security Headaches
Fixing security in the cloud, you can't secure what you cannot see 11 oct2019
AWS Cloud Security From the Point of View of the Compliance
18CSE442 Cloud Security Introduction SRM.pptx

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Electronic commerce courselecture one. Pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Cloud computing and distributed systems.
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Approach and Philosophy of On baking technology
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Mobile App Security Testing_ A Comprehensive Guide.pdf
NewMind AI Weekly Chronicles - August'25 Week I
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Unlocking AI with Model Context Protocol (MCP)
Electronic commerce courselecture one. Pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Cloud computing and distributed systems.
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Approach and Philosophy of On baking technology
Network Security Unit 5.pdf for BCA BBA.
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Per capita expenditure prediction using model stacking based on satellite ima...
20250228 LYD VKU AI Blended-Learning.pptx
Building Integrated photovoltaic BIPV_UPV.pdf

Top Ten Security Considerations when Setting up your OpenNebula Cloud

  • 1. Wir nutzen Technologien, um unsere Kunden glücklich zu machen. Und uns selbst. Security Considerations Securely Setting up your Open Nebula Cloud A top 10 Best Practise Guide OpenNebula Conf, September 25, 2013 in Berlin, Germany Nils Magnus inovex GmbH Senior System Engineer
  • 2. 25.09.13 Agenda and Preamble Protecting your Open Nebula Cloud I. Security is 90% architecture and 10% implementation. Apparently trivial suggestions form the base of your protection. II. Security is intrinsically understaffed. Management wants „quick wins“, team is looking to „get the job done“. Somehow. III. Security is not about checklists. If you are (or feel) responsible, you need to know your individual vulnerabilities. In this mode think like an attacker. Share my thoughts how to protect an Open Nebula cloud!
  • 3. 25.09.13 Security needs Ressources Don't underestimate the necessity of security. Assign proper ressources to adress this issue. Security is a costly investment in the future. It is a bargain compared to the loss of your main business processes. The possible damage scales to the same extend as your cloud itself.
  • 4. 25.09.13 Admin Account Protect access to the • ONE admin account, • the SunStone UI, and infrastructure. Once attackers gain unlawful access to your command bridge, your systems might be doomed. All of them.
  • 5. 25.09.13 VLAN Hopping Prevent VLAN hopping in the scope of your SDN and between physical hosts. Network virtualization with VLAN tagging comes very handy, but keep in mind that the very frames of all virtual segments may travel of a shared medium.
  • 6. 25.09.13 Environments Partition your cloud network segments into distinct security areas. Protect the different security environments and border them from each other. Actively separate maturity environments and different types of processed data.
  • 7. 25.09.13 Apply Classic Best Practises Anyway Despite in the cloud, nonetheless apply network security best practises like • firewalls, • intrusion detection, or • data leak prevention, based on the very requirements of your environment.
  • 8. 25.09.13 Host Protection Securing virtual machines is not enough. Make sure you also protect the access to all of your hosts, even if they are not designed to have users on them.
  • 9. 25.09.13 Key and User Management Set up a working SSH infrastructure and enforce it. Open Nebula heavily relies on a working and secured way to communicate with your hosts and virtual machines. Properly configured keys help both automating the system deployment process and restricting acess on a need-to-know basis.
  • 10. 25.09.13 Sensible Distrust Auto discovery and self registration to the inventory are powerful features that alleviate the system engineer's duties. But make sure that only known bare metal systems register into your cloud store and virtual ressources. Don't boot systems you don't have full control over.
  • 11. 25.09.13 Shared Storage Protect access to your shared storage. Several hosts have to access the images of all security environments. Rogue images injected in the right place might act as trojan horses in otherwise well-protected environments.
  • 12. 25.09.13 Availability Keep ressources in mind. One major advantage of virtualization is to share ressources like CPU or IO bandwidth. But some player in your cloud may or may not play fair. Those situations, both intended and unintended, threaten your availability. Enacting QoS measure could be helpful.
  • 13. 25.09.13 Wrap-up 1. assign proper ressources 2. protect your admin account 3. secure the networks 4. partition into environments 5. apply classic network security measures 6. protect your hosts 7. install a key infrastructure 8. authenticate all repositories 9. protect the shared storage 10. keep an eye on availability What did I say about lists, anyway?
  • 14. 25.09.13 Freedom is the brother of security. The great photos of this presentation are licensed under the free Creative Commons license (CC-BY SA) that allows use and redistribution (share alike) as long as you give proper attribution. A big thank you goes to: UCL Engineering for the chainmail: http://flickr.com/photos/uclengineering/6946862623 Jwalanta Shrestha for the multi lanes in Kathmandu: http://flickr.com/photos/jwalanta/4496289019/ Drgriz52 and the bears at the tent: http://flickr.com/photos/drbair_photography/3571049565/ Steve Tannock and his meadows of the Peak District: http://flickr.com/photos/stv/2586761094/ Chris McBrien for his photo of the blue keys: http://flickr.com/photos/cmcbrien/4715320000/ Sergio Morchon for the array of cannons: http://flickr.com/photos/smorchon/2951615532/ Simon Hooks for his shot of the Trojan Horse: http://flickr.com/photos/gogap/253649673/ Sam Greenhalgh took a photo of a rack in a data center: http://flickr.com/photos/80476901 Matt Peoples for the kegs: http://flickr.com/photos/leftymgp/7332282888/ Justin Ennis photographed the Swiss Guard in Rome: http://flickr.com/photos/averain/5307438963/ Schub@ took a photo a looking glass: http://flickr.com/photos/schubi74/5793584347 Maury Landsman for the applause: http://www.flickr.com/photos/mau3ry/3763640652 Sources and Acknowledgment
  • 15. 25.09.13 Thanks for listening! Questions? Contact Nils Magnus Senior System Engineer inovex GmbH Office Munich Valentin-Linhof-Str. 2 81829 Munich, Germany +49-173-3181-057 nils.magnus@inovex.de Agent L9 Oxycryocrypt