As more companies have begun to bring OpenStack out of the development environments and into production (refer to the following chart), real concerns about security are taking priority. This chapter will not only help outline some best practices about the OpenStack infrastructure security, but also highlight how OpenStack users and operators can bring the same level of legacy security to workloads that run on top of OpenStack clouds. The following chart show the results from the 2017 (June-December) OpenStack User Survey:
In this chapter, we will cover the following:
- Security zones within OpenStack
- Software vulnerabilities
- Hardening hypervisors