Book Image

OpenStack Cloud Security

By : Fabio Alessandro Locati
Book Image

OpenStack Cloud Security

By: Fabio Alessandro Locati

Overview of this book

Table of Contents (14 chapters)
OpenStack Cloud Security
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Chapter 3. Securing OpenStack Networking

OpenStack, as any other software, has to assume certain hypothesis as though they were true. This is necessary to develop flexible software in a speedy way. On the other side of the coin, this approach endangers the security of the software. In the case of OpenStack, there is a single hypothesis that can trash your security measurements.

Note

OpenStack fully trusts each node of the cluster.

As we have seen in the Hypervisor breakout section in Chapter 2, OpenStack Security Challenges, this exposes all the data and resources in the cluster in case someone obtains access to a machine in the cluster. The hypervisor breakout is not the only case in which this can happen, and is rare. The most common exploit of that hypothesis is a network attack in which the attacker is able to use an insecure network to gain access to more data than it should.