Key Features
Book Description
If you are an OpenStack administrator or developer, or wish to build solutions to protect your OpenStack environment, then this book is for you. Experience of Linux administration and familiarity with different OpenStack components is assumed.What you will learn
- Secure your servers, data center, and network to improve your environment for the cloud
- Gain insights into ISP intercept and social engineering
- Explore automated attacks with the help of mass phishing, brute force, and automated exploitation tools
- Secure your OpenStack installation from a networking perspective at both low and high levels
- Get to know how to secure your OpenStack to use only encrypted communications for APIs
- Configure secure communications on the OpenStack API
- Harden OpenStack Keystone and Horizon for a more secure environment
- Protect the Swift replication mechanism through network hardening
Who this book is for
If you are an OpenStack administrator or developer, or wish to build solutions to protect your OpenStack environment, then this book is for you. Experience of Linux administration and familiarity with different OpenStack components is assumed.
Table of Contents
- First Things First - Creating a Safe Environment
- OpenStack Security Challenges
- Securing OpenStack Networking
- Securing OpenStack Communication and Ita API
- Securing the OpenStack Identification and Authentication System and Its Dashboard
- Securing OpenStack Storage
- Securing the Hypervisor