Processor architecture may also play a role in this. https://blog.trailofbits.com/2015/07/21/hardware-side-channels-in-the-cloud / -Josh On 8/14/15, 9:33 AM, "Clark, Robert Graham" <robert.clark at hp.com> wrote: >There¹s a few summit talks on the the topic: > >https://www.youtube.com/watch?v=y8L6B6Q5EdI > >https://www.youtube.com/watch?v=43ffumzzfKU > > >It¹s also a big topic in the OpenStack Security Guide: >http://docs.openstack.org/sec/ > > >Hope this helps. > >-Rob > > >On 14/08/2015 15:05, "Darren J Moffat" <Darren.Moffat at Oracle.COM> wrote: > >> >> >>On 08/13/15 16:51, Damedeu Eric wrote: >>> Hi all, >>> I'm a new guy using Openstack and want to know how to well isolate VMs >>> when it instanced by the hypervisor. This is avoid attack by covert >>> channel. >> >>That depends which hypervisor your are using and on which OS platform. >>You should look at your hypervisor and OS vendors documentation for that >>information. OpenStack just configures and deploys the VMs it doesn't >>provide the security isolation boundaries. >> >>-- >>Darren J Moffat >> >>_______________________________________________ >>Openstack-security mailing list >>Openstack-security at lists.openstack.org >>http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security > > >_______________________________________________ >Openstack-security mailing list >Openstack-security at lists.openstack.org >http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security