Secure Cloud Management

Jakob Schlyter
Gravatar for Andreas Jonsson
TrackTrack 1 -- Lecture Hall X on the First Floor
DescriptionManaging large scale centralized cloud services requires the operators to automate as much of the infrastructure as possible to ensure that the solution is competitive. As all consumers of resources must be considered hostile to preserve the privacy of other consumers, security requirements are high. Tools as data-in-transit and data-at-rest encryption, tenant isolation and least privilege are vital to provide secure cloud services to fulfill customers' requirements.
Technologies covered: Type Enforcement, TLSv1-1.2, ASLR, seccomp, SED storage, automated deployement of TE-policies, mandatory host firewall rules, hardening, auditing, backup & archive security.

All talks