TY - GEN
T1 - Self-aware deployment enforcement of virtualized and cloud-based images
AU - Hadar, Ethan
AU - Jerbi, Amir
AU - Hadar, Irit
PY - 2012
Y1 - 2012
N2 - This position paper presents our approach for deployment enforcement of virtual images (VM), in order to prevent an unauthorized usage, potential insider threat, and theft of VMs. In existing systems, regular images in a virtual environment can be mounted and installed in a different location, while our system prevents the intentional and unintentional roaming of these images, triggered by either humans or automation tools. This paper proposes an approach that secures installation location according to policy in virtualized environments, by intercepting the image installation process.
AB - This position paper presents our approach for deployment enforcement of virtual images (VM), in order to prevent an unauthorized usage, potential insider threat, and theft of VMs. In existing systems, regular images in a virtual environment can be mounted and installed in a different location, while our system prevents the intentional and unintentional roaming of these images, triggered by either humans or automation tools. This paper proposes an approach that secures installation location according to policy in virtualized environments, by intercepting the image installation process.
KW - Cloud security vulnerabilities
KW - Cloud virtualization
KW - Infrastructure as a service
KW - Privileged access management
UR - http://www.scopus.com/inward/record.url?scp=84864883900&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84864883900
SN - 9789898565051
T3 - CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science
SP - 602
EP - 605
BT - CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science
PB - SciTePress
T2 - 2nd International Conference on Cloud Computing and Services Science, CLOSER 2012
Y2 - 18 April 2012 through 21 April 2012
ER -