Скачиваний:
50
Добавлен:
20.06.2019
Размер:
50.48 Mб
Скачать

17  Securing the Cloud

299

the cloud for analysis. It may also be necessary to isolate the physical server used by the suspicious instance. In this case, all instances currently running on the same hardware must also be isolated for inspection and transitioned to new physical resources.

18.Scan the cloud for unauthorized instances in order to identify, isolate, and remove them. The introduction of rogue instances is a significant concern, and the cloud should be scanned frequently to ensure only legitimate instances exist. Any

instance that is not on the list of authorized instances should be removed from the cloud and isolated. It may also be necessary to isolate the physical server used by the suspicious instance. In this case, all instances currently running on the same hardware would have be isolated for inspection and transitioned to new physical resources.

19. Audit resource utilization records to detect suspicious activity. Resource utilization is an important tool to identify suspicious activity on the cloud. An audit of the total resource usage, including memory, disk, CPU, and network activity, across all instances on the cloud, can be used to locate suspicious instances. This data should also be compared against historical records to identify potential anomalies.

20. Audit instances of “life” events, such as creation, migration, hibernation, and startup, to ensure compliance. After an instance is brought to life on the cloud, it may go through various life events, such as hibernation, a move across physical hardware platforms, or an increase/decrease in available resources. At each life event, the instance should be assessed for compliance with the cloud’s security requirements. If the instance is no longer in compliance, it should be isolated.

17.4  Case Studies

Many of the 20 recommendations proposed above are actively being applied by both public and private cloud providers. In this section, we describe some of the security features offered by two particular providers, Amazon.com and a Fortune 100 company, in order to show alignment with our recommendations.

17.4.1  Private Cloud: Fortune 100 Company

The first case study is for a private cloud built for a Fortune 100 company. Although a private cloud, the need for security and privacy is not removed; proprietary information is still hosted in the cloud and must be protected. Table 17.2 identifies 7 of our 20 security recommendations that this company has incorporated into their security model.

Соседние файлы в папке CLOUD COMPUTING