Today we are used to be identified and authenticated to various types of systems. We start very early in the morning unlocking our phones (if it has a PIN or other kind of security). We do it continually on websites, smartphones, doors, and so on. We are so used to be identified and authenticated that a lot of times we do not focus enough on the importance and the security of this critical process. In this chapter, we will focus on each of those and how to secure them.
OpenStack Cloud Security
By :
OpenStack Cloud Security
By:
Overview of this book
Table of Contents (14 chapters)
OpenStack Cloud Security
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
First Things First – Creating a Safe Environment
OpenStack Security Challenges
Securing OpenStack Networking
Securing OpenStack Communications and Its API
Securing the OpenStack Identification and Authentication System and Its Dashboard
Securing OpenStack Storage
Securing the Hypervisor
Index
Customer Reviews