CDM Migration Principles
Migration Principles
When a tenant uses CDM, the CDM system provisions a fully-managed CDM instance in the tenant's VPC. The instance allows only console and RESTful API access. Therefore the tenant cannot access the instance through other interfaces (such as SSH). This ensures data isolation between CDM tenants, prevents data leakage, and ensures transmission security during data migration between different cloud services in a VPC. Tenants can also use the VPN to migrate data from the on-premises data center to cloud services to ensure migration security.
CDM works in push-pull mode. CDM pulls data from the migration source and pushes the data to the migration destination. Data access operations are initiated by CDM. SSL will be used if the data source (such as RDS) supports it. During the migration, the usernames and passwords of the migration source and destination are required. Such information is stored in the database of the CDM instance. Protecting such information is critical to ensure CDM security.
Security Boundary and Risk Mitigation
As shown in Figure 2, CDM may have the following threats:
- Threats from the Internet: Malicious tenants may attack CDM through the CDM console.
- Threats from the data center: Malicious CDM administrators obtain tenants' data source access information (usernames and passwords).
- Threats from malicious tenants: Malicious tenants steal data from other tenants.
- Data exposure to the public network: Data is exposed when it is migrated from the public network.
CDM offers the following mechanisms to prevent potential security risks:
- Threats from the Internet: Tenants cannot log in to the CDM console through the public network. CDM provides a two-layer security mechanism.
- On the one hand, the cloud console framework requires user authentication when tenants access management consoles of cloud services.
- On the other hand, Web Application Firewall (WAF) filters requests from all consoles and stops request attack code or content.
- Threats from the data center: Tenants must provide the usernames and passwords of the migration source and destination to complete data migration. To prevent the CDM administrators from obtaining such information and attacking important data sources of tenants, CDM provides a three-level protection mechanism.
- CDM stores passwords encrypted by AES-256 in the database of the instance to ensure tenant isolation. The database is run by user Ruby and listens to only 127.0.0.1. Therefore, tenants cannot remotely access the database.
- After the instance is provisioned, CDM changes the passwords of users root and Ruby to random passwords and does not store them in any place. This prevents the CDM administrators from accessing tenants' instances and databases containing password information.
- CDM instances work in push-pull mode. Therefore, the instances do not have any listening port enabled in the VPC, and tenants cannot access the local database or operating system from the VPC.
- Threats from malicious tenants: CDM runs instances on independent VMs, so that tenants' instances are completely isolated and secure. Malicious tenants cannot access instances of other tenants.
- Data exposure to the public network: In push-pull mode, even if elastic IP addresses (EIPs) are bound to the CDM clusters, no port is enabled for the EIPs. In this way, attackers cannot access and attack CDM using the EIPs. However, when data is migrated from the public network, tenants' data sources are exposed to the public network and threatened by third-party attacks. Therefore, tenants are advised to use ACLs or firewalls on the data source server for security. In this case, for example, only the access requests from the EIPs bound to the CDM clusters are allowed.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot