CEE Hardening Checklist
Cloud Execution Environment

Contents

1Introduction
1.1Target Audience
1.2Required Competence

2

Hardening Checklists
2.1Assess Hardening Activities
2.2Perform Hardening Activities

Reference List

1   Introduction

This document enumerates the various hardening steps that must be performed in order to make the Cloud Execution Environment (CEE) secure during its whole lifecycle.

Attention!

Hardening is not an optional feature or function. The assessment of security risks in an operational environment must be performed (refer to Section 4.2.4.2 in ISO 27011, Reference [1]). If the result of the assessment contains some acceptable risks, the corresponding control mitigating the non-important risk may not be applied (refer to Section 4.2.4.3 in ISO 27011, Reference [1]). The owner or the responsible (refer to Section 6.1.1 in ISO 27011, Reference [1]) of the CEE node must assess the risks to have clear responsibility and accountability.

For more information on how to manage information security in the telecommunications organization, refer to the ISO 27011 standard, Reference [1].

This document provides two checklists, one to assess, and one to perform the hardening activities described in System Hardening Guideline. For more information, see Section 2.

1.1   Target Audience

This document is primarily intended to be used by staff responsible for CEE. This includes operational personnel performing installing, upgrading/updating, or maintaining activities. Furthermore, security administrators managing security and IT, and Telecom (security) operational managers responsible for Information Security Management System (ISMS) according to ISO 27011, Reference [1] and ISO 27002, Reference [2]. More specifically, in Section 6.1.1 in ISO 27011, Reference [1] and in Section 6.1.1 b) in ISO 27002, Reference [2].

1.2   Required Competence

The following sections describe the required competence for operational personnel and decision makers.

1.2.1   Operational Personnel

It is required for operational personnel, performing the installing, upgrading/updating, or maintaining activities to understand the security concepts before handling security. For that reason, the intended audience of the document must be skilled in security and have at least CISSP or equivalent certificates. Furthermore deep domain knowledge on cloud and security is required, especially on those components on which the hardening steps are to be performed. The security topics are, for example, cryptography, secure protocols (IPSec, TLS, SSH, and so on), security architecture, security operations management, firewall configuration, key management, security log analysis, user management, web server security, certificate management, OpenStack, Linux, Lightweight Directory Access Protocol (LDAP) and Simple Network Management Protocol (SNMP).

1.2.2   Decision Makers

It is required for the decision makers, who identify operational risks and decide required controls, such as security administrators managing security and IT, and Telecom (security) operational managers responsible for ISMSs, that they understand the security concepts before taking responsibility and making decisions. At least CISSP, CISM, and ISO27001 lead auditor or equivalent certificates are required. Furthermore, deep domain knowledge on cloud and security is required, especially on those components on which the hardening steps are to be performed. The security topics are, for example, cryptography, secure protocols (IPSec, TLS, SSH, and so on), security architecture, security operations management, firewall configuration, key management, security log analysis, user management, web server security, certificate management, OpenStack, Linux, LDAP and SNMP protocols.

2   Hardening Checklists

This section includes the checklists and provides information on their use.

2.1   Assess Hardening Activities

Table 1 is an assessment template for each hardening item described in section Hardening Activities in the System Hardening Guideline. During the assessment of each hardening activity, the following must be explained in the comment section of Table 1:

Table 1    Assessment of Hardening Activities

Assessed
as
Compulsory


[Y/N]

Hardening Activity

Comments


Detailed explanation: if not applied, why, decision made by, how to manage the risk

 

Configure initial system and administrator credentials.




 
 

Check the prehardening setup for system components (Compute OS, vCIC OS, Atlas OS, vFuel OS, Extreme switches,, and EMC ScaleIO).




 
 

Change the default passwords of the initial administrator credentials.




 
 

Configure the Data Center Firewall rules.




 
 

Authenticate the upstream NTP servers.




 
 

Change the predefined legal message shown before logon attempts.




 
 

Configure logs.




 
 

Configure ScaleIO management tools.




 
 

Create additional credentials. Each system administrator must use an individual personal account when logging in.




 
 

Change the root password for vCIC, compute, and Atlas.




 
 

Disable root access with password for vCIC, compute, and Atlas.




 
 

Lock root user access on vFuel, after the additional account is created.




 
 

Lock ceeadm user access on vFuel after the additional account is created.




 
 

Change passwords for all vFuel administrators on a regular basis.




 
 

Change the password for the Grand Unified Bootloader (GRUB) user.




 
 

Change the password for the local admin user in the Extreme switch.




 
 

Control ScaleIO access.




 
 

Control NeLS access.




 
 

Ensure that TLS certificates are available for ScaleIO services.




 

Provide the date when the assessment of the hardening activities were completed:

Provide the name of the personnel who performed the assessment:

2.2   Perform Hardening Activities

Table 2 lists the hardening activities as described in section Hardening Activities in the System Hardening Guideline, that must be performed during installation, based on the result of the assessment. If no assessment was performed, it is expected that all items are mandatory to be performed. If some items are assessed as not required in the assessment, and the why it is not needed, how to manage the risk, and who made the decision fields are filled, the activity may not need to be performed.

Fill the table for each activity that is already performed.

If there are comments, for example, "it was only possible to perform partially", or "there is an error in the process and a Trouble Report (TR) is raised to cover the issue", provide this information there.

Table 2    List of Hardening Activities

[Y/N]

Phase for the Hardening Activity

Hardening Activity

Reference(1)

Comments

 

Before installation

Configure initial system and administrator credentials.




Initial System and User Accounts

 
 

Before installation

Check the prehardening setup for system components (Compute OS, vCIC OS, Atlas OS, vFuel OS, Extreme switches, and EMC ScaleIO).




Prehardened System Components

 
 

During installation

Change the default passwords of the initial administrator credentials.




Initial Administrator Credentials

 
 

During installation

Configure the Data Center Firewall rules.




DC-FW Configuration

 
 

During installation

Authenticate the upstream NTP servers.




Authenticate NTP Server

 
 

During installation

Change the predefined legal message shown before logon attempts.




Change Legal Text Presented at Logon

 
 

During installation

Configure logs.




Location of Logs

 
 

During installation

Configure ScaleIO management tools.




ScaleIO Management Tools

 
 

After installation

Create additional credentials. Each system administrator must use an individual personal account when logging in.




Creating Additional Credentials

 
 

After installation

Change the root password for vCIC, compute, and Atlas.




vCIC Host OS Hardening
Atlas User Management
vFuel User Management

 
 

After installation

Disable root access with password for vCIC, compute, and Atlas.




vCIC Host OS Hardening
Atlas User Management
vFuel User Management

 
 

After installation

Lock root user access on vFuel, after the additional account is created.




vFuel User Management

 
 

After installation

Lock ceeadm user access on vFuel after the additional account is created.




vFuel User Management

 
 

After installation

Change passwords for all vFuel administrators on a regular basis.




vFuel User Management

 
 

After installation

Change the password for the GRUB user.




GRUB User Management

 
 

After installation

Change the password for the local admin user in the Extreme switch.




Extreme Switch User Management

 
 

After installation

Control ScaleIO access.




ScaleIO Access Control

 
 

After installation

Control NeLS access.




NeLS Access Control

 
 

After installation

Ensure that TLS certificates are available for ScaleIO services.




Certificates for ScaleIO

 

(1)  The corresponding section from the System Hardening Guideline


Provide the date when the listed hardening activities were completed:

Hardening performed by:


Reference List

Standards and Web Pages
[1] ISO27011: Information technology — Security techniques — Information security management guidelines for telecommunications organizations based on ISO/IEC 27002 ISO/IEC 27011 First edition 2008-12-15, http://www.iso.org.
[2] ISO27002: Information technology — Security techniques — Code of practice for information security controls ISO/IEC 27002 Second edition 2013-10-01, http://www.iso.org.