P.O. Box 2972, San Ramon, CA 94583 - Non-profit organization - EIN# 83-3507638

Introduction

As Secure Cloud Data Center becomes the standard infrastructure for virtualized server deployments, Rimici “ONE Source” has consolidate servers that belong to different trust zones. A trust zone is loosely defined as a network segment within which data flows relatively freely, whereas data flowing in and out of the trust zone is subject to stronger restrictions. Examples of trust zones include:
  • Demilitarized zones (DMZs)
  • Payment card industry (PCI) cardholder data environment
  • Site-specific zones, such as segmentation according to department or function
  • Application-defined zones, such as the three tiers of a Web Application
  • Rimici Private Cloud Security Operations Center
Rimici “ONE Source” Private Virtualized Trust Zone Security Checklist
  • Harden and isolate the service console and management network
  • Enforce consistency of network configuration across all hosts
  • Set Layer 2 security options on cloud switches
  • Enforce separation of duties
  • Use Rimici cloud resource management capabilities
  • Regularly audit virtualized configuration

Rimici “ONE Source” Secure Cloud Best Practices for Achieving a Secure Virtualized Mixed Trust Zone Deployment

Most security issues do not arise from the cloud virtualization infrastructure itself but from cloud administrative and operational challenges. The primary risks are caused by a loss of separation of duties. When this occurs, individuals who lack the necessary experience and capabilities are given an opportunity to introduce vulnerabilities through misconfiguration. For instance, they can accidentally place the virtual NIC of a virtual machine in the wrong trust zone.

This risk — which also can also occur in purely physical environments — can breach the isolation between networks and virtual machines of different trust levels. Rimici “ONE Source” Secure Cloud Data Center and infrastructure is designed by a team of secure cloud senior architectures, administrators and security operations center experts from Silicon Valley. The architecture is built with resiliency, high availability, scalability and elastic network, storage and operations. We ensured that the Rimici “ONE Source” Secure cloud is built from the ground up to implement and meet ISO 27002. We have then implemented ISO 27001 Cloud Information Security Management System to manage the cloud security operations and risk management meeting privacy and security requirements.


Harden and Isolate the Service Console and Management Network

This step is especially important because access to the service console of an RIMICI “ONE SOURCE” secure cloud host gives a user with root privileges full control over the virtual machines on that host. Although access to the service console is secured through authentication, you can provide additional security against unauthorized access by creating additional layers of security.

In addition, you should isolate the service console. To do so, make sure that the network to which the service console is isolated is firewalled and accessible only to authorized administrators.

You can use a VPN or other access control methods to restrict access to the management network.


Enforce Consistency of Network Configuration Across All Hosts

Ensuring that the virtual network is configured in a consistent manner across all hosts is particularly critical because accidentally connecting virtual servers to the wrong networks can undermine all other security efforts. By clearly labeling the networks, you make it less likely that a virtual machine can be connected to an unauthorized network accidentally.


Set Layer 2 Security Options on Virtual Switches

Protect against attacks such as data snooping, sniffing, and MAC spoofing by disabling the promiscuous mode, MAC address changes, and forged transmissions capabilities on the virtual network interfaces. These capabilities are very rarely needed and create opportunities for exploitation.

Fortunately, in the VMware virtual network layer you have full control over these options, something that is not the case in purely physical environments.


Enforce Separation of Duties

Mitigate configuration mistakes by using cloud operations Center to define roles and responsibilities for each administrator of the vSphere infrastructure. By distributing rights based on skills and responsibilities, you can significantly reduce the chance of misconfiguration.

As an added benefit, this method also limits the amount of authority any one administrator has over the system as a whole. In particular, you should restrict privileges for performing the following actions:

  • Reconfiguring virtual networks
  • Assigning virtual machines to sensitive networks
  • Changing firewall or other network security policies


Use Rimici Secure Cloud Resource Management Capabilities

Denial of service within a virtual environment can occur if an individual virtual machine is allowed to use a disproportionate share of RIMICI “ONE SOURCE” secure cloud host resources. In so doing, it starves other virtual machines running on the same RIMICI “ONE SOURCE” secure cloud host. Such denial of service can occur as the result of malicious intent or accidentally, but you can guard against this possibility by setting resource reservations and limits for virtual machines using cloud operations Center. You should use the same resource controls to ensure that sufficient resources are available to virtual network security devices.


Regularly Audit the Virtualized Configuration

Regular audit of configurations is essential in both physical and virtual environments. When virtualizing any part of your infrastructure, it is important to audit the configurations of all of the components — including cloud operations Center, cloud Switches, virtual and physical firewalls, and any other security devices —regularly. You must conduct these audits to make sure that changes to configurations can be controlled and that the changes do not cause a security hole in the configuration. The use of configuration management and compliance tools can greatly assist with the audit process. Audits are especially important for the second and third options discussed in this paper because the risk of misconfiguration is much higher in those topologies.


Conclusion

Our families and businesses can take advantage of the benefits of Rimici “ONE Source” secure cloud data center and resources in setting up mixed trust zones, and we can do so securely, maintaining compliance with our organization’s policies. There are a number of configurations you can use to achieve this goal.

 

 

Humanity Together! For
Champa Society, Culture, Language and Programs

 

Champa Culture

Revival and protection of Champa Language, Culture, History, Arts and Buildings

A platform to present and learn about the Champa Culture, History, Arts, Fashion, Celebrations and important community events. Blogs with images and significant cultural values will be shared in this platform.

Champa Genocide

Champa Genocide Awareness

The Cham community suffered a major blow during the Khmer Rouge rule of Cambodia. The Khmer Rouge targeted ethnic minorities like Chinese, Thai, Lao, Vietnamese and Cham people, though the Cham suffered the largest death toll in proportion to their population. Around 100,000 to 500,000 Cham out of a total Cham population of 250,000 to 650,000 died in the genocide

Source: Wikipedia https://en.wikipedia.org/wiki/Chams

Champa Society

Champa Society Governance Programs for Families, Women , Children, Orphans and Elderly

Syed Family has designed the SICHAM Governance Framework for the operation and effectiveness of Champa Society Programs helping families with important needs such as:

  • Clean Water & Wells
  • Children and Orphan Care and Education
  • Family and Women Vocational Trainings
  • Small Business Resources for Women & Families
  • Mobile Health Clinics
  • Vegetables & Fruits Farming & More!



Champa Society Current Projects Need Donation & Sponsorship

 


Support Champa Families during COVID Lock-Down – Food and Healthcare calamity

SICHAM identified through interviews that the two greatest challenges faced by poor families in the villages under the current lockdown:

  • Scarcity and difficulty to purchase food
  • Shortage and difficulty to access cash

Lack of food was found to be the most prominent issue Over 80% of families reported having insufficient food over the past 7 days.

Small Children food, milk and medicine needs

Corona virus spread has closed schools, exacerbated child poverty and risks to halt development opportunities for children across Vietnam and Cambodia.

Impact of the crisis is immediate, as many families are not able to pay for their basic needs, such as food, water, medicine and access to health care and education. In crises like this, children suffer the most, not only are their immediate needs unmet but the risk of neglect, child labor, violence, abuse and child marriage is heightened and can have a long-lasting impact on their lives.

Widow care program

The shrinking economy, hit hard by the COVID-19 pandemic, has affected all population groups, but particularly the most vulnerable i.e., widows and single parents. poverty is forecast to almost double.

SICHAM is making efforts to provide food, medicine and small business startup donations to the widows and single parents so they can take care of the children and elderly.

Elderly Medicine and Food Service

Data from the World Health Organization shows that more than 95% of COVID-19 deaths around the world have been among people over the age of 60, with more than half of all deaths being people aged 80 and older.

SICHAM is making concerted efforts to provide medical care and food distribution with our volunteers. This is our on-going program to support elderly in poor families and villages.

Global Organizations & Leaders Message of Care

for Champa Society & Recognition of Champa as Indigenous People of Cambodia and Vietnam

100x100

Afghanistan

100x100

Bangladesh

100x100

India

100x100

Indonesia

100x100

Pakistan

100x100

Vietnam