[Openstack-security] Security concern VMs isolation

Josh Gibbs josh.gibbs at RACKSPACE.COM
Fri Aug 14 14:49:39 UTC 2015


Processor architecture may also play a role in this.

https://blog.trailofbits.com/2015/07/21/hardware-side-channels-in-the-cloud
/

-Josh




On 8/14/15, 9:33 AM, "Clark, Robert Graham" <robert.clark at hp.com> wrote:

>There¹s a few summit talks on the the topic:
>
>https://www.youtube.com/watch?v=y8L6B6Q5EdI
>
>https://www.youtube.com/watch?v=43ffumzzfKU
>
>
>It¹s also a big topic in the OpenStack Security Guide:
>http://docs.openstack.org/sec/
>
>
>Hope this helps.
>
>-Rob
>
>
>On 14/08/2015 15:05, "Darren J Moffat" <Darren.Moffat at Oracle.COM> wrote:
>
>>
>>
>>On 08/13/15 16:51, Damedeu Eric wrote:
>>> Hi all,
>>> I'm a new guy using Openstack and want to know how to well isolate VMs
>>> when it instanced by the hypervisor. This is avoid attack by  covert
>>> channel.
>>
>>That depends which hypervisor your are using and on which OS platform.
>>You should look at your hypervisor and OS vendors documentation for that
>>information.  OpenStack just configures and deploys the VMs it doesn't
>>provide the security isolation boundaries.
>>
>>-- 
>>Darren J Moffat
>>
>>_______________________________________________
>>Openstack-security mailing list
>>Openstack-security at lists.openstack.org
>>http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security
>
>
>_______________________________________________
>Openstack-security mailing list
>Openstack-security at lists.openstack.org
>http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security



More information about the Openstack-security mailing list