Title :
Security considerations in data center configuration management
Author :
Kant, Krishna ; Le, Meixing ; Jajodia, Sushil
Author_Institution :
George Mason Univ., Fairfax, VA, USA
fDate :
Oct. 31 2011-Nov. 1 2011
Abstract :
Data centers need to manage a large amount of configuration information for a variety of computational, storage and networking assets at multiple levels (e.g., individual devices to entire data center). The increasingly sophisticated configuration management required to support virtualization significantly enhances chances of misconfigurations and exploitation by hackers that could impact data center operations. In this paper, we expose a number of attack/misconfiguration scenarios for data center resources. We also propose a mechanism, called Sentry, for securing this data by exploiting the hierarchical setup and redundancy in the server and network configurations. We show that the scheme can secure configuration data with only a small overhead.
Keywords :
computer centres; configuration management; security of data; Sentry; configuration information; data center configuration management; hierarchical setup; network configurations; secure configuration data; security considerations; virtualization; Authentication; Computer hacking; Computer integrated manufacturing; Servers; Software; XML; Common Information Model; Configuration Management; Data Center; Security;
Conference_Titel :
Configuration Analytics and Automation (SAFECONFIG), 2011 4th Symposium on
Conference_Location :
Arlington, VA
Print_ISBN :
978-1-4673-0401-6
Electronic_ISBN :
978-1-4673-0400-9
DOI :
10.1109/SafeConfig.2011.6111676