SSH hardening for cloud virtual machines

What’s specific to Cloud Virtual Machines? SSH is required to access your virtual machines that run in your Cloud infrastructure, so you can not disable it. Due to new threats that arise with IaaS Cloud Computing (Cloud Security Alliance Top Threats), you must protect your infrastructure against Malicious insiders. Even if we refer to IaaS…

How to detect side-channel attacks in cloud infrastructures

Cloud Computing is a disruptive technology which brought enormous benefits. However, even if the benefits are countless, there are several security challenges, such as elasticity and multi-tenancy, which require an innovative approach. Indeed, traditional security tools are not suitable for Cloud Computing, since infrastructures can be very dynamic. Therefore, automation is the only answer to…