Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Watch a 38-minute conference talk that delves into comprehensive security strategies for Ceph storage systems. Explore the fundamental Ceph security model while progressively examining various hardening techniques suitable for different threat scenarios. Learn to define effective threat models, implement security zones to contain potential attacks, and utilize encryption mechanisms both at rest and in transit with FIPS 140-2 validated ciphers. Discover approaches to hardened builds, default configuration optimization, user access control implementation, and key management strategies. Gain insights into data retention policies and secure deletion practices, all presented by Federico Lucifredi at the OpenInfra Foundation's Ceph Days event.