Files
openstack-ansible/doc/source/install-guide/overview-security.rst
Jesse Pretorius 57b2114d7d Doc: Remove 'indices and tables' and correctly spell OpenStack-Ansible
This updates the use of OpenStack-Ansible in various docs to ensure that they
are all correctly capitalised.

This also removes 'indices and tables' from the Dev Docs as none of the links
work.

Change-Id: I30a16a2d6d6ac355c794de563afd4b3f661a9b32
2016-01-22 16:58:51 +00:00

2.0 KiB

Home OpenStack-Ansible Installation Guide

Security

The OpenStack-Ansible project provides several security features for OpenStack deployments. This section of documentation covers some of those features and how they can benefit deployers of various sizes.

Security requirements will always differ between deployers. For deployers that need additional security measures in place, please refer to the official OpenStack Security Guide for additional resources.

AppArmor

The Linux kernel offers multiple security modules (LSMs) that that set mandatory access controls (MAC) on Linux systems. The OpenStack-Ansible project configures AppArmor, a Linux security module, to provide additional security on LXC container hosts. AppArmor allows administrators to set specific limits and policies around what resources a particular application can access. Any activity outside the allowed policies is denied at the kernel level.

In OpenStack-Ansible, AppArmor profiles are applied that limit the actions that each LXC container may take on a system. This is done within the lxc_hosts role.

Encrypted communication

Data is encrypted while in transit between some OpenStack services in OpenStack-Ansible deployments. Not all communication between all services is currently encrypted. For more details on what traffic is encrypted, and how to configure SSL certificates, refer to the documentation section titled Securing services with SSL certificates.