Merge "Removed some duplicate spaces"
This commit is contained in:
@@ -95,7 +95,7 @@
|
||||
When running a virtual machine, virtual hardware is a software
|
||||
layer that provides the hardware interface for the virtual
|
||||
machine. Instances use this functionality to provide network,
|
||||
storage, video, and other devices that may be needed. With
|
||||
storage, video, and other devices that may be needed. With
|
||||
this in mind, most instances in your environment will
|
||||
exclusively use virtual hardware, with a minority that will
|
||||
require direct hardware access. The major open source
|
||||
@@ -104,7 +104,7 @@
|
||||
to be a very challenging software project to write and
|
||||
maintain. Much of the functionality in QEMU is implemented
|
||||
with low-level code that is difficult for most developers to
|
||||
comprehend. Furthermore, the hardware virtualized by QEMU
|
||||
comprehend. Furthermore, the hardware virtualized by QEMU
|
||||
includes many legacy devices that have their own set of
|
||||
quirks. Putting all of this together, QEMU has been the source
|
||||
of many security problems, including hypervisor breakout
|
||||
@@ -254,7 +254,7 @@
|
||||
<para>
|
||||
With unique kernel-level architecture and National Security
|
||||
Agency (NSA) developed security mechanisms, KVM provides
|
||||
foundational isolation technologies for multi-tenancy. With
|
||||
foundational isolation technologies for multi-tenancy. With
|
||||
developmental origins dating back to 2002, the Secure
|
||||
Virtualization (sVirt) technology is the application of
|
||||
SELinux against modern day virtualization. SELinux, which was
|
||||
@@ -284,7 +284,7 @@
|
||||
threat vector unique to virtualization and represents
|
||||
considerable risk as a multitude of virtual machine file
|
||||
images could be compromised due to vulnerability in a
|
||||
single application. This virtual network attack is a
|
||||
single application. This virtual network attack is a
|
||||
major concern as the administrative techniques for
|
||||
protecting real networks do not directly apply to the
|
||||
virtual environment.</para>
|
||||
|
||||
@@ -68,7 +68,7 @@
|
||||
When you use a user name and password to authenticate,
|
||||
Identity does not enforce policies on password strength,
|
||||
expiration, or failed authentication attempts as recommended
|
||||
by NIST Special Publication 800-118 (draft). Organizations
|
||||
by NIST Special Publication 800-118 (draft). Organizations
|
||||
that desire to enforce stronger password policies should
|
||||
consider using Identity extensions or external authentication
|
||||
services.</para>
|
||||
|
||||
@@ -33,7 +33,7 @@
|
||||
<para>Below we provide sample recommended configuration settings for enabling SSL in some of
|
||||
the more popular web servers/SSL terminators. Note that we have SSL v3 enabled in some of
|
||||
these examples as this will be required in many deployments for client compatibility.</para>
|
||||
<para>Before we delve into the configurations, we briefly discuss the ciphers' configuration element and its format. A more exhaustive treatment on available ciphers and the OpenSSL cipher list format can be found at: <link xlink:href="https://www.openssl.org/docs/apps/ciphers.html">ciphers</link>.</para>
|
||||
<para>Before we delve into the configurations, we briefly discuss the ciphers' configuration element and its format. A more exhaustive treatment on available ciphers and the OpenSSL cipher list format can be found at: <link xlink:href="https://www.openssl.org/docs/apps/ciphers.html">ciphers</link>.</para>
|
||||
<programlisting>
|
||||
ciphers = "HIGH:!RC4:!MD5:!aNULL:!eNULL:!EXP:!LOW:!MEDIUM"
|
||||
</programlisting>
|
||||
@@ -202,7 +202,7 @@ write-proxy = off</programlisting>
|
||||
</section>
|
||||
<section xml:id="ssl-proxies-and-http-services-idp53424">
|
||||
<title>nginx</title>
|
||||
<para>This nginx example requires TLS v1.1 or v1.2 for maximum security. The <option>ssl_ciphers</option> line can be tweaked based on your needs, however this
|
||||
<para>This nginx example requires TLS v1.1 or v1.2 for maximum security. The <option>ssl_ciphers</option> line can be tweaked based on your needs, however this
|
||||
is a reasonable starting place.</para>
|
||||
<programlisting>server {
|
||||
listen : ssl;
|
||||
|
||||
@@ -117,8 +117,8 @@
|
||||
Seagate Technology
|
||||
</para>
|
||||
<para>Rodney D. Beede is the Cloud Security Engineer for
|
||||
Seagate Technology. He contributed the missing chapter on
|
||||
securing OpenStack Object Storage (swift). He holds a M.S.
|
||||
Seagate Technology. He contributed the missing chapter on
|
||||
securing OpenStack Object Storage (swift). He holds a M.S.
|
||||
in Computer Science from the University of Colorado.
|
||||
</para>
|
||||
</listitem>
|
||||
|
||||
Reference in New Issue
Block a user