Rules Parent topic

Before an instance can access an encrypted data storage device, you can specify that the instance, along with the device, image, and request, first meet certain conditions. You can also specify the conditions for certain cloud environment. These conditions are expressed in SecureCloud as rules. SecureCloud supports advanced policy fields where Boolean operators and compound rules are used. A set of basic and advanced rules are evaluated against a subset of criteria to determine if the environment is safe enough to receive the encryption key.
The following are possible data types you can use in rules:
  • String
  • Number
  • IP address or IP address range
  • Date
Conditions for Policy Matching lists all the rules available in this release.
Note
Note
There is no limit to the number of rules you can create. However, for manageability, limit the rules to 15—as there are 15 rule types.

Conditions for Policy Matching

Rule Type
Description
Example
Multiple Condition
Device Access Type
The requested access type, either read/write or read-only.
  • Read-only
  • Read/Write
Yes
Device Mount Point
The mounting point for the data storage device if keys are approved.
  • /mnt/secure
  • X
Yes
Key Request Date
Date when the key request was received.
01/21/2011
Yes
Request Source IP Address (IPv4)
IPv4 IP address from which the key request originated.
  • 192.168.1.1
  • 192.168.0.0/16
Yes
Request Source IP Address (IPv6)
IPv6 IP address from which the key request originated.
  • 2001:0DB8::1428:57ab
  • 2001:0DB8::1428:57ab/96
Yes
Instance First Seen
Date when SecureCloud first processed any data related to an instance. Based on this timestamp, SecureCloud can determine if the time period has lapsed to grant the instance encryption keys.
01/21/2012
No
Instance User Data
Data packet provided to the instance at start up.
DataKey=MySecret­Key
Yes
Instance Location
Location of the server farm running the machine instance.
Us-east-1c
Yes
OSSEC Version
The version of OSSEC that is present in the machine instance.
2.5.1
Yes
Trend Micro Software
The Trend Micro security software installed on the running instance.
OfficeScan
Yes
Trend Micro Virus Scan Engine Version
The version of the Trend Micro virus scan engine available in the running instance.
9.500.1008
No
Trend Micro Virus Scan Pattern Version
The version of the Trend Micro virus scan pattern file available in the running instance.
9.297.00
No
Guest OS Information
Operating system and architecture used by the machine image to run the Runtime Agent.
  • OS: Linux or Windows
  • Architecture: 32- or 64-bit
Yes
Deep Security Status
The status of the key-requesting environment as determined by the Deep Security Management (DSM).
  • Anti-malware
  • Web Reputation
  • Firewall
  • DPI
  • Integrity monitoring
  • Log inspection
  • Status
No
Network Services
Listening ports on the system running the SecureCloud Runtime Agent—both TCP and UDP ports are included.
  • 80
  • 25
  • 8080
Yes