<p>That was certainly a concern at at least one deployment site I have been at.</p><p>The want as I see it. Is to isolate a running VM. Snapshot it. And then perform forensics on the running isolated VM.</p><p>I think quantum integration will definitely help with this. But we may also need to look at how roles play out for this sort of thing inside of keystone.</p>
<p><br>I am definitely interested in pursuing this in my free time. So keep me in the loop if you want some assistance.<br></p><p>-Matt<br></p><p></p><div class="gmail_quote">On Jul 16, 2012 3:55 PM, "Josiah Dykstra" <<a href="mailto:dykstra@umbc.edu" target="_blank">dykstra@umbc.edu</a>> wrote:<br type="attribution">
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<p>Devs,</p>
<p>I am new to the list and wanted to run an idea by you. I am interested in adding some extensions to support incident response and forensics. Are others working on this, or is there wider interest in doing so? I think this could take several forms, such as introspection, hashes of virtual drives, authenticated logs, or memory dumps. I believe that users and admins would welcome these features. Would be interested in hearing your feedback.</p>
<p>Josiah Dykstra<br>
<a href="mailto:dykstra@umbc.edu" target="_blank">dykstra@</a><a href="mailto:dykstra@umbc.edu" target="_blank">umbc.edu</a><br>
Cyber Defense Lab, Department of Computer Science and Electrical Engineering<br>
University of Maryland Baltimore County (UMBC)</p>
<br>_______________________________________________<br>
OpenStack-dev mailing list<br>
<a href="mailto:OpenStack-dev@lists.openstack.org" target="_blank">OpenStack-dev@lists.openstack.org</a><br>
<a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev</a><br>
<br></blockquote></div>