Advances, Systems and Applications
From: Security transparency: the next frontier for security research in the cloud
Threats | VM Life cycle stage | Security solutions |
---|---|---|
NA | Image definition | NA |
NA | Image Creation | NA |
NA | Image Customisation | NA |
Threats 4and 5 | Transportation | Cryptographic protection |
Threats 1–5 | Storage | Cryptographic protection |
Threats 1, 2, 3 and 5 | Deployment | Encrypted boot and data partition Custom binding |
Threats 1-6 | Contextualisation | Custom binding |
Threats 1, 3,4,5,6 and 7 | Runtime | Deviation from “normal” |
Threats 2, 3 and 5 | Undeployment | VM introspection (VM memory consistency checks |