Overview
The Xloud Image Service security configuration covers three areas: image signature verification (preventing tampered images from being launched), property protections (preventing unauthorized modification of critical metadata fields), and public image access controls (restricting who can publish images to the global catalog).Image Signing and Verification
Xloud Image Service supports image signature verification using certificates stored in Xloud Key Management. When enabled, the compute service verifies the image signature before launching an instance, preventing tampered images from being used.Generate a signing key and certificate
Store the certificate in Xloud Key Management:Note the
Create a certificate container in Key Management
Secret href — this is the <CERT_UUID>.Enable verification in Compute
Configure the compute service to verify image signatures before launching:Deploy after configuring:
Compute service: enable image signature verification
Apply compute configuration
The compute service now rejects instances launched from images with invalid or
missing signatures when verification is enforced.
Property Protections
Property protections prevent unauthorized users from modifying sensitive image properties — such as signature fields or hardware requirements — after upload.Public Image Access Controls
Only users with theadmin role can mark images as public. Enforce this via policy to prevent
accidental or malicious exposure of proprietary images organization-wide.
Verify the policy is active:
Check publicize_image policy
/etc/xavs/glance/policy.yaml — restrict public image creation
Apply policy override
Security Checklist
Signature verification enabled
Signature verification enabled
Verify that image signature verification is enforced in the compute service
policy. Test by attempting to launch an unsigned image — it should be rejected.
Property protections configured
Property protections configured
Confirm that signature-related properties (
img_signature*) and platform properties
(xloud_base_image, hw_firmware_type) require admin to modify.Public image access restricted to admins
Public image access restricted to admins
Verify that non-admin users cannot set images to
public visibility.
Test with a project-member account: openstack image set --public <image-id>
should return a policy violation error.Audit public and community images
Audit public and community images
Regularly audit the public image catalog:Remove or deactivate any images that should not be publicly accessible.
List all public images
Next Steps
Admin Troubleshooting
Diagnose signature verification failures and policy enforcement issues.
Quotas
Combine security controls with quota enforcement for complete image governance.
Identity Admin Guide
Manage the authentication policies governing image service access.
Metadata
Define structured property schemas that work with property protection rules.