We recommend keeping up to date on security issues and advisories as they are published. The OpenStack Security Portal is the central portal where advisories, notices, meetings, and processes can be coordinated. Additionally, the OpenStack Vulnerability Management Team (VMT) portal coordinates remediation within OpenStack, as well as the process of investigating reported bugs which are responsibly disclosed (privately) to the VMT, by marking the bug as ‘This bug is a security vulnerability’. Further detail is outlined in the VMT process page and results in an OpenStack Security Advisory (OSSA). This OSSA outlines the issue and the fix, as well as linking to both the original bug, and the location where the where the patch is hosted.
Reported security bugs that are found to be the result of a misconfiguration, or are not strictly part of OpenStack, are drafted into OpenStack Security Notes (OSSNs). These include configuration issues such as ensuring identity provider mappings as well as non-OpenStack, but critical, issues such as the Bashbug/Ghost or Venom vulnerabilities that affect the platform OpenStack utilizes. The current set of OSSNs is in the Security Note wiki.
All bugs, OSSAs and OSSNs are publicly disseminated through the openstack-dev mailing list with the [security] topic in the subject line. We recommend subscribing to this list as well as mail filtering rules that ensure OSSNs, OSSAs, and other important advisories are not missed. The openstack-dev mailinglist is managed through http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev. The openstack-dev list has a high traffic rate, and filtering is discussed in the thread http://lists.openstack.org/pipermail/openstack-dev/2013-November/019233.html.
When implementing OpenStack, one of the core decisions is which hypervisor to utilize. We recommend being informed of advisories pertaining to the hypervisor(s) you have chosen. Several common hypervisor security lists are below: