The two broadly defined types of nodes that generally make up an OpenStack installation are:
Documentation should provide a general description of the OpenStack environment and cover all systems used (production, development, test, etc.). Documenting system components, networks, services, and software often provides the bird’s-eye view needed to thoroughly cover and consider security concerns, attack vectors and possible security domain bridging points. A system inventory may need to capture ephemeral resources such as virtual machines or virtual disk volumes that would otherwise be persistent resources in a traditional IT system.
Clouds without stringent compliance requirements for written documentation might benefit from having a Configuration Management Database (CMDB). CMDBs are normally used for hardware asset tracking and overall life-cycle management. By leveraging a CMDB, an organization can quickly identify cloud infrastructure hardware such as compute nodes, storage nodes, or network devices. A CMDB can assist in identifying assets that exist on the network which may have vulnerabilities due to inadequate maintenance, inadequate protection or being displaced and forgotten. An OpenStack provisioning system can provide some basic CMDB functions if the underlying hardware supports the necessary auto-discovery features.
As with hardware, all software components within the OpenStack deployment should be documented. Examples include:
An authoritative list of software components may be critical when assessing the impact of a compromise or vulnerability in a library, application or class of software.
A network topology should be provided with highlights specifically calling out the data flows and bridging points between the security domains. Network ingress and egress points should be identified along with any OpenStack logical system boundaries. Multiple diagrams may be needed to provide complete visual coverage of the system. A network topology document should include virtual networks created on behalf of tenants by the system along with virtual machine instances and gateways created by OpenStack.
Knowing information about organizational assets is typically a best practice, therefore it is beneficial to create a table which contains information regarding the service, protocols and ports being utilized in the OpenStack deployment. The table can be created from information derived from a CMDB or can be constructed manually. The table can be customized to include an overview of all services running within the cloud infrastructure. The level of detail contained in this type of table can be beneficial as the information can immediately inform, guide, and assist with validating security requirements. Standard security components such as firewall configuration, service port conflicts, security remediation areas, and compliance become easier to maintain when concise information is available. An example of this type of table is provided below:
Service | Protocols | Ports | Purpose | Used by | Security domains(s) |
---|---|---|---|---|---|
beam.smp | AMQP | 5672/tcp | AMQP message service | RabbitMQ | MGMT |
tgtd | iSCSI | 3260/tcp | iSCSI initiator service | iSCSI | PRIVATE(data network) |
sshd | ssh | 22/tcp | allows secure login to nodes and guest VMs | Various | MGMT, GUEST, and PUBLIC as configured |
mysqld | mysql | 3306/tcp | MySQL database service | Various | MGMT |
apache2 | http | 443/tcp | Dashboard | Tenants | PUBLIC |
dnsmasq | dns | 53/tcp | DNS services | Guest VMs | GUEST |
Referencing a table of services, protocols and ports can help in understanding the relationship between OpenStack components. It is highly recommended that OpenStack deployments have information similar to this on record.
Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.