Handling Compromised Components in an IaaS Cloud Installation
Although Cloud Computing has been heralded as a new computing model, it is fundamentally an old idea of providing computing resources as a utility. This computing model will reduce the upfront cost for developing and deploying new services in the Internet. This paper presents an approach to handle compromised components in the OpenStack Infrastructure-as-a-Service cloud environment. The authors present two specific use cases; a compromised service process and the introduction of a bogus component, and they describe several approaches for containment, eradication and recovery after an incident. Their experiments show that traditional incident handling procedures are applicable for cloud computing, but need some modification to function optimally.