blueprints/doc/source/caf/ready/security.rst
Kyriakos Akriotis 8f13cc9a18 - CAF draft
2023-11-23 16:56:19 +01:00

126 lines
3.1 KiB
ReStructuredText

Security
~~~~~~~~
Cloud customers need the following security capabilities:
- Service continuity, such as network attack blocking, intrusion
prevention, and legal compliance.
- Data confidentiality, such as defense against unauthorized access
from external parties, insiders, and cloud service providers.
- Manageable O&M, such as security policies, risk identification and
handling, and operation audit and tracing.
The architecture is designed to enhance the following aspects of network
security:
- Region boundaries
- Boundary protection: controlled connections, illegal private
connection prevention, illegal external connection prevention, and
wireless access restriction
- Access control policies
- Intrusion prevention: known threat prevention, unknown threat
prevention, and intrusion audits
- Malicious code prevention: malicious code detection and spam
filtering
- System audits: user behavior audit, security event audit and analysis
- Network communications
- Network architecture: performance redundancy, link redundancy, device
redundancy, and partition isolation
- Communication and transmission: The encryption technology is used to
ensure data confidentiality and integrity during transmission.
- Computing environment
- Identity identification: identity uniqueness and credential
complexity
- Access control: user permissions management and redundant account
clearance
- Security audit: user behavior audits and audit process protection
- Intrusion prevention: intrusion detection, closing unused ports, and
vulnerability scans
- Malicious code detection and blocking
- Image integrity check and snapshot protection
- Data integrity and confidentiality during transmission and storage.
- Secure data destruction: When service application data is deleted,
all copies in the cloud storage need to be deleted too.
- Management center
- System management: identity authentication and system configuration
for system administrators
- Audit management: permissions management and operation audits
- Security management: permissions management and operation audits
- Centralized management and control: independent secure partitions,
network monitoring, centralized log audit, and security event
awareness
The following figure shows the security architecture on the cloud:
.. image:: ../../assets/caf/image40.png
|
Abbreviations:
- AAD: Advanced Anti-DDoS
- Anti-DDoS: traffic cleaning service
- WAF: Web Application Firewall
- ELB: Elastic Load Balance
- OBS: Object Storage Service
- EVS: Elastic Volume Service
- SFS: Scalable File Service
- SG: security group
- NACL: network access control list
- HSS: Host Security Service
- CGS: Container Guard Service
- DBSS: Database Security Service
- DEW: Data Encryption workshop
- RDS: Relational Database Service
- DCS: Distributed Cache Service
- CBH: Cloud Bastion Host
- CTS: Cloud Trace Service (used for auditing)
- CES (used for monitoring)
- IAM: Identity and Access Management (used for unified authentication)
- SA: Situation Awareness
- SCM: SSL Certificate Manager
.. toctree::
:maxdepth: 1