Watch a 38-minute conference talk that delves into comprehensive security strategies for Ceph storage systems. Explore the fundamental Ceph security model while progressively examining various hardening techniques suitable for different threat scenarios. Learn to define effective threat models, implement security zones to contain potential attacks, and utilize encryption mechanisms both at rest and in transit with FIPS 140-2 validated ciphers. Discover approaches to hardened builds, default configuration optimization, user access control implementation, and key management strategies. Gain insights into data retention policies and secure deletion practices, all presented by Federico Lucifredi at the OpenInfra Foundation's Ceph Days event.
Overview
Syllabus
Ceph Days Data Security and Storage Hardening in Rook and Ceph
Taught by
OpenInfra Foundation