More Related Content
Similar to Real security in a virtual environment - Infosecurity 2011 (20)
Real security in a virtual environment - Infosecurity 2011
- 1. Real Security in a Virtual Environment By Mattias GeniarSystem Engineer @Nucleus
- 2. So ... Who am I? Mattias Geniar576 𝑦𝑒𝑎𝑟𝑠 𝑜𝑙𝑑 System Engineer at Nucleus (Cloud) Hosting provider http://mattiasgeniar.be @mattiasgeniar
- 3. My comfort zone. root@mattias:~#
- 5. Now what’s this about?
- 7. From becoming this one.
- 9. Quote “ Every security system that has ever been breached was once thought infallible.
- 10. It’s about layers. Many layers.
- 12. With sufficient power.
- 15. But that’s just the bottom layer.
- 17. How virtual is ‘virtual’?
- 22. On your storage itself?
- 27. Have backups. Lots of them.
- 28. The kidneys: connectivity.
- 35. We like graphs. And IDS.
- 36. And boxes. With info.
- 37. Even when the cloud ‘moves’.
- 38. # diff ‘os-virt’ ‘hardware-virt’
- 39. Oh hai root. root@srv:~# hostname srv.domain.be root@srv:~# vzlist --all CTID NPROC STATUS IP_ADDR HOSTNAME 101 74 running 10.0.2.1 topsecret-srv root@srv:~# vzctl enter 101 -bash-3.1# hostname topsecret-srv.domain.be -bash-3.1# id uid=0(root) gid=0(root)
- 42. Quote “ The weakest link in any security system, is the person holding the information
- 44. That don’t do stupid things.
- 47. No no. Real management.
- 48. Quote “ Geeks don’t have interests. They have passions.
- 51. Thank you. root@mattias:~# logout Twitter: @mattiasgeniar www.nucleus.be Mail: m@ttias.be