SlideShare uma empresa Scribd logo
1 de 56
Virtually Secure
Uncovering the risks of virtualization
Virtual Insecurity
 Unknown Denial of Service on core servers




       IT can not identify root cause
                                        Copyright 2007 – Seccuris Inc.
Virtual Insecurity


                      Financial System
                      controls subverted
                     in unknown fashion


                     Audit systems and
                      forensic process
                       unable to assist

                                    Copyright 2007 – Seccuris Inc.
Virtual Insecurity

  Employees
  bypassing
   technical
  controls &
    policies




  Policies &
 processes fail
  to identify &
    respond
                     Copyright 2007 – Seccuris Inc.
Virtual Insecurity




  60% of production virtual machines
           will be less secure
    than their physical counterparts…

            …through 2009.

                                   Copyright 2007 – Seccuris Inc.
WELCOME TO THE REST OF YOUR LIFE




What do we need to understand regarding
   design, management and control
  to implement virtualization successfully
       in our critical environments?



                                       Copyright 2007 – Seccuris Inc.
What is virtualization? (Overview)

                Concept not new:
                  Done since the 1960’s

                   Physical Hardware = Host Machine
                       Operating System / Virtual
                           Appliance = Guest
                       VMs = Virtual Machine(s)
                      Hypervisor (VMM) = Virtual
                           Machine Monitor
                   Virtual Infrastructure = Composite
                            of VMM & Mgmt tools




                                             Copyright 2007 – Seccuris Inc.
Hybrid VMM
Type-2 VMM

Guest   Guest
  1       2

                                                           Guest           Guest
   VMM                                                       1               2


 Host OS                    Host OS                              VMM

Hardware                                    Hardware

                                                                                                              Examples:

                                                                                                               Windows
                                                                                                                 Server
                                                                                                             Virtualization

                                                                                                                  Xen

                                                                                                             VMWare ESX
                                                                                                                Copyright 2007 – Seccuris Inc.
                http://port25.technet.com/archive/2007/08/13/Interoperab-on-the-metal-and-on-the-wire.aspx
Virtualization Implementations




 Full Virtualization
  • Binary Translation – Privileged Instructions Rewritten
      • Hypervisor in “Ring 0”, Guest in “Ring -1”




                                                             Copyright 2007 – Seccuris Inc.
Virtualization Implementations




 Full Virtualization
  • Hardware Supported Virtualization
     (Accelerated Virtualization, Hardware Virtual Machine, Native
    Virtualization)
     • Hardware Hypervisor in “Privileged Level”, Guest in Ring 0

                                                            Copyright 2007 – Seccuris Inc.
Virtualization Implementations




Paravirtualization
   • System Call Proxy & Exception Trapping
      • Hypervisor in Ring 0, Guest in Ring 3




                                                Copyright 2007 – Seccuris Inc.
On-going development of Virtualization

Generational Development of Virtualization


  1. Development & Test


                  2. Consolidation


                          3. Virtualized Data Center


 Increased complexity, controls & management processes

                                                   Copyright 2007 – Seccuris Inc.
Players in the Virtualization Market



                                                                                                                                                                                                                                                                                      The image cannot be display ed. Your computer may not hav e enough memory to open the image, or the image may hav e been corrupted. Restart y our computer, and then open the file again. If the red x still appears, y ou may hav e to delete the image and then insert it again.




 The image cannot be display ed. Your computer may not hav e enough memory to open the image, or the image may hav e been corrupted. Restart y our computer, and then open the file again. If the red x still appears, y ou may hav e to delete the image and then insert it again.




                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                           Copyright 2007 – Seccuris Inc.
Players in the Virtualization Market




                                 Copyright 2007 – Seccuris Inc.
VMWare – How does it work?

              Binary Translation (System Call Proxy)


Like an emulator, VMware software provides a completely virtualized
   set of hardware to the guest operating system.


VMware software virtualizes the hardware for a video adapter, a
  network adapter, and hard disk adapters.


  The host provides pass-through drivers for guest USB, serial, and
  parallel devices.




                                                            Copyright 2007 – Seccuris Inc.
VMWare – How does it work?

                 The host provides
                 pass-through drivers for
                 guest USB, serial, and
                 parallel devices.


                 Video, Cache and other
                   hardware includes
                   pass-through as well…




                                     Copyright 2007 – Seccuris Inc.
VMWare Products:
What is the difference?

    Desktop Virtualization       On Host OS
    • VMWare Workstation         Hybrid VMM
    • VMWare Fusion
    • VMWare Player


    Server Virtualization        On Bare Metal
    • VMWare ESX Server          Type-1 VMM
    • VMWare Server - Freeware


    Management & Automation      Above it all
    • VMWare Virtual Center      Management Software




                                                Copyright 2007 – Seccuris Inc.
Technical Concepts –
VMWare Implementation
Datacenter Components


• Computing Servers (Bare metal)


• Management Server – Single
  Control point (Win 2k3)


• Desktop clients




                                   Copyright 2007 – Seccuris Inc.
Technical Concepts –
VMWare Implementation


Datacenter Architecture
• Hosts, Clusters &
  Resource Pools
• DRS and HA
   •   Dynamically Allocate System Resources

   •   High Availability


• VMotion
   •   Move guest between physical systems




                                               Copyright 2007 – Seccuris Inc.
Technical Concepts –
VMWare Implementation




                        Copyright 2007 – Seccuris Inc.
Technical Concepts –
VMWare Implementation



     Physical Security has become
           MORE important




                                    Copyright 2007 – Seccuris Inc.
Technical Concepts –
VMWare Implementation


Datacenter Architecture


• Networking Architecture
• vSwitch and Port groups
   • VLANS
   • Traffic Shaping
   • NIC Teaming



                            Copyright 2007 – Seccuris Inc.
Technical Concepts –
VMWare Implementation




                        Copyright 2007 – Seccuris Inc.
Technical Concepts –
VMWare Implementation



  Network security includes new layers
             of complexity




                                   Copyright 2007 – Seccuris Inc.
Technical Concepts

Storage Architecture


• Datastore
• Underlying technologies
   •   FiberChannel
   •   iSCSI
   •   SAN
   •   Direct Attached Storage, NAS

• Raw Device Mapping


                                      Copyright 2007 – Seccuris Inc.
Technical Concepts –
VMWare Implementation




                        Copyright 2007 – Seccuris Inc.
Technical Concepts –
VMWare Implementation



Data inventory & Information Classification
       becomes a prime time issue




                                     Copyright 2007 – Seccuris Inc.
Threats & Risks in Virtualization




• Technical Concerns


• Applied threats




                                    Copyright 2007 – Seccuris Inc.
Threats & Risks – Technical Concerns

                     Technical Concerns


                     •Denial of Service
                         • Load issues (Time / Period)
                         • Bottle Necks (Physical)
                         • Bottle Necks (Logical)


                            How well do you know your
                            application processing time
                                      cycles?




                                             Copyright 2007 – Seccuris Inc.
Threats & Risks – Technical Concerns


                     Technical Concerns


                     •Communication Between VMs or
                     Between VMs
                     and Host
                        • Shared Directories
                        • Open Services (FTP, DHCP)
                        • Misconfigured network cards


                         How well built are your legacy
                           and custom applications?




                                               Copyright 2007 – Seccuris Inc.
Threats & Risks – Technical Concerns


                     Technical Concerns


                     • VM Escape
                     • VM Monitoring from the Host
                     • VM Monitoring from Another VM
                     • VM Monitoring from network
                       based host
                       (Network / Storage)


                         “VM Escapes have happened”



                                          Copyright 2007 – Seccuris Inc.
Threats & Risks – Technical Concerns

                     Technical Concerns


                     • External Modification of a
                       VM


                     • External Modification of
                       the Hypervisor
                        • Sun Bing’s Example


                        How much trust do you put
                          in your administrators?


                                          Copyright 2007 – Seccuris Inc.
Threats & Risks in Virtualization




• Technical Concerns


• Applied threats




                                    Copyright 2007 – Seccuris Inc.
Threats & Risks – Applied Threats

VMBR – Virtual Machine Based
Root Kits
                                APP 1    APP 2
SubVirt: Implementing malware
with virtual machines


BluePill: VM “Rootkit”




                                  Before Attack



                                              Copyright 2007 – Seccuris Inc.
Threats & Risks – Applied Threats

VMBR – Virtual Machine Based
Root Kits
                                             APP 1      APP 2

SubVirt: Implementing malware
                                Evil
                                              Host OS
with virtual machines           App


                                 Evil OS     Evil VMM
BluePill: VM “Rootkit”

                                       Hardware
    Fundamental changes
      to forensic system
      investigation must               After Attack
             occur!


                                                      Copyright 2007 – Seccuris Inc.
Threats & Risks – Applied Threats

           VMWare DHCP Server Remote Code
             Execution Vulnerabilities


             CVE-2007-0061, CVE-2007-0062,
             CVE-2007-0063
             (http://www.iss.net/threats/275.html)


                  IMPACTS VMM and VMs!




                                            Copyright 2007 – Seccuris Inc.
Threats & Risks – Applied Threats

                     Hardware Visibility
                     (http://seclists.org/isn/2008/Mar/0055.html)




                     • Hardware segmentation
                       DOES NOT EXIST


                     • Race conditions, covert
                       channels, unknown
                       overflow issues are
                       possible!

                                                 Copyright 2007 – Seccuris Inc.
Security Controls for Virtualization

• Controls for Today


• Software & Appliances


• Controls in the future



                                 Copyright 2007 – Seccuris Inc.
Security Controls for Virtualization

Controls for Today             (CIS Best Practices)
      Configuration:

      • Limit Physical Access to Host
      • Harden Base Operating System


      • Configuration Maximums
      • Firewalling Virtual Machine Layer Service Ports


      • Use Encryption For Communication
      • Virtualization Server Authentication



                                                          Copyright 2007 – Seccuris Inc.
Security Controls for Virtualization

Controls for Today
      Configuration:


      • Disabling Features (Including Screensavers and Suspend)
      • File Sharing Between Host and Guests


      • Time Synchronization
      • Disconnect Unused Devices




                                                         Copyright 2007 – Seccuris Inc.
Security Controls for Virtualization

Controls for Today
      Architecture Requirements


      • Remote Management
      • Patching and Vulnerabilities
      • Logging & Auditing




                                       Copyright 2007 – Seccuris Inc.
Security Controls for Virtualization

Controls for Today
     Architecture & Configuration


     Host and Network Defences
     • File Integrity Checking
     • Strong Passwords
     • Disk Partitioning
     • Backups


                                    Copyright 2007 – Seccuris Inc.
Security Controls for Virtualization

Software & Appliances


  • Host Based IDS/IPS
  • Host Based Anti-Virus
  • Host Change Control
  • Host Logging




                                 Copyright 2007 – Seccuris Inc.
Security Controls for Virtualization

                Security Controls in the Future


                   • VMSafe – Hypervisor
                     Visibility & Control


                   • VMWare (aware) security
                     software


                   • Virtualizaiton (aware)
                     security hardware


                                         Copyright 2007 – Seccuris Inc.
Security Controls for Virtualization

                Is virtualization PCI
                   compliant?


                   “We are currently trying to
                    become PCI compliant,
                    but our auditor company
                    is saying that “in no shape
                    or form is virtualization PCI
                    compliant”. I disagree, but
                    I am not an auditor.”
                                      Greg Ryan



                                          Copyright 2007 – Seccuris Inc.
Obstacles to Success

The top obstacles to virtualization success include:


• Weak assignment of activities between
   virtual machine administrators and security staff.


• Inadequate control over patching and tamper protection of
   offline virtual machines other images.




                                                        Copyright 2007 – Seccuris Inc.
Obstacles to Success

The top obstacles to virtualization success include:


• Limited visibility to the host operating system and virtual
   network to control vulnerabilities.


• Inhibited visibility to inter-virtual machine traffic for
   intrusion prevention systems (IPSs).


• Deficient solution for mobile virtual machines that need
   security policy and settings to migrate with them.

                                                              Copyright 2007 – Seccuris Inc.
Business Environment improvements


Policy & Procedure - What to look for?


• Can the organization ensure that:


   • each virtual machine is appropriately configured and tested?


   • can support virtual machines within its computing environment?




                                                             Copyright 2007 – Seccuris Inc.
Business Environment improvements


Policy & Procedure - What to look for?


• Does the organization have a plan for
   assessing, monitoring and reporting on the
   state of its physical and virtual systems?


• How will deployment and compliance of new virtual
   machines be tracked?




                                                      Copyright 2007 – Seccuris Inc.
Technical Environment improvements


• Technology Selection


• Technical Architecture & Zoning


• Configuration & Tuning


• Change Control & Audit




                                    Copyright 2007 – Seccuris Inc.
Technical Environment improvements


Resources


  • Center for Internet Security
     • http://www.cisecurity.org/



  • VMware Security Center
     • http://www.vmware.com/security/




                                         Copyright 2007 – Seccuris Inc.
General Thoughts around Virtualization




       The fallacy* of cost reduction

                                        Copyright 2007 – Seccuris Inc.
General Thoughts around Virtualization


                 The fallacy of cost reduction
                   • Increased complexity


                   • Increase in exposure to:
                      • Technical misconfiguration
                      • Central points of access /
                        collusion for staff




                                              Copyright 2007 – Seccuris Inc.
Moving forward with Virtualization

 Understand how virtualization will change your
   security program, architecture and controls


 Make plans today for securing the virtualization
          roadmap in your environment


 Prepare for the inevitable impacts with design
    review, control improvements & incident
                     handling

                                            Copyright 2007 – Seccuris Inc.
How Seccuris assists your solution


      Security Architecture & Design for
              Virtual Environments


         Virtualization Environment
               Risk Assessment


       Managed Security Services for
           Virtual Environments



                                           Copyright 2007 – Seccuris Inc.
Thanks
Michael Legary, SCP, CISSP, CISM, CISA, CCSA, GCIH, CPP
  Founder & Chief Innovation Officer
  Seccuris Inc.

                                             This presentation contains reference
                                             material and direct content from
  Email:       Michael.Legary@seccuris.com
                                             multiple copyright holders.
  Direct:      204-255-4490
  Main:        204-255-4136                  References available on request /
  Fax:         204-942-6705                  within presentation slide notes.


Resources

   Center for Internet Security
      http://www.cisecurity.org/

   VMware Security Center
     http://www.vmware.com/sec
     urity/

                                                                       Copyright 2007 – Seccuris Inc.

Mais conteúdo relacionado

Mais procurados

Virtualization security for the cloud computing technology
Virtualization security for the cloud computing technologyVirtualization security for the cloud computing technology
Virtualization security for the cloud computing technologyDeep Ranjan Deb
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMwareJJDiGeronimo
 
vSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek BražinavSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek BražinaJaroslav Prodelal
 
20150311 NSX update 301
20150311 NSX update 30120150311 NSX update 301
20150311 NSX update 301Kevin Groat
 
Chap 2 virtulizatin
Chap 2 virtulizatinChap 2 virtulizatin
Chap 2 virtulizatinRaj Sarode
 
All About Virtualization
All About VirtualizationAll About Virtualization
All About VirtualizationEMC
 
VMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats newVMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats newVMware
 
An Implementation of Virtual Cluster on a Cloud
An Implementation of Virtual Cluster on a CloudAn Implementation of Virtual Cluster on a Cloud
An Implementation of Virtual Cluster on a CloudPongsakorn U-chupala
 
Case Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudCase Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudVMware
 
Modern Security for the Modern Data Center
Modern Security for the Modern Data CenterModern Security for the Modern Data Center
Modern Security for the Modern Data CenterVMware
 
Alexandru Catalin Cosoi
Alexandru Catalin CosoiAlexandru Catalin Cosoi
Alexandru Catalin Cosoiprincescorpio
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud EnvironmentDr. Sunil Kr. Pandey
 
Running and Managing Your Network Just Got Easier
Running and Managing Your Network Just Got EasierRunning and Managing Your Network Just Got Easier
Running and Managing Your Network Just Got EasierVMware
 
Microsoft Virtualization Overview
Microsoft Virtualization OverviewMicrosoft Virtualization Overview
Microsoft Virtualization Overviewwebhostingguy
 
NSX 9 Core Use Cases
NSX 9 Core Use CasesNSX 9 Core Use Cases
NSX 9 Core Use CasesKevin Groat
 

Mais procurados (19)

Virtualization security for the cloud computing technology
Virtualization security for the cloud computing technologyVirtualization security for the cloud computing technology
Virtualization security for the cloud computing technology
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMware
 
vSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek BražinavSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek Bražina
 
20150311 NSX update 301
20150311 NSX update 30120150311 NSX update 301
20150311 NSX update 301
 
Virtualization Security Risks
Virtualization Security RisksVirtualization Security Risks
Virtualization Security Risks
 
Chap 2 virtulizatin
Chap 2 virtulizatinChap 2 virtulizatin
Chap 2 virtulizatin
 
All About Virtualization
All About VirtualizationAll About Virtualization
All About Virtualization
 
VMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats newVMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats new
 
An Implementation of Virtual Cluster on a Cloud
An Implementation of Virtual Cluster on a CloudAn Implementation of Virtual Cluster on a Cloud
An Implementation of Virtual Cluster on a Cloud
 
Case Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudCase Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private Cloud
 
Modern Security for the Modern Data Center
Modern Security for the Modern Data CenterModern Security for the Modern Data Center
Modern Security for the Modern Data Center
 
Alexandru Catalin Cosoi
Alexandru Catalin CosoiAlexandru Catalin Cosoi
Alexandru Catalin Cosoi
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 
Running and Managing Your Network Just Got Easier
Running and Managing Your Network Just Got EasierRunning and Managing Your Network Just Got Easier
Running and Managing Your Network Just Got Easier
 
Microsoft Virtualization Overview
Microsoft Virtualization OverviewMicrosoft Virtualization Overview
Microsoft Virtualization Overview
 
Virtualization concepts in cloud computing
Virtualization concepts in cloud computingVirtualization concepts in cloud computing
Virtualization concepts in cloud computing
 
OneCloud-VMwareNSX
OneCloud-VMwareNSXOneCloud-VMwareNSX
OneCloud-VMwareNSX
 
Virtulaisation
VirtulaisationVirtulaisation
Virtulaisation
 
NSX 9 Core Use Cases
NSX 9 Core Use CasesNSX 9 Core Use Cases
NSX 9 Core Use Cases
 

Semelhante a Virtually Secure: Uncovering the risks of virtualization

Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentationMangesh Gunjal
 
CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2vivekbhat
 
Virtualization securityv2
Virtualization securityv2Virtualization securityv2
Virtualization securityv2vivekbhat
 
Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003bjhutt
 
Virtual Server Security for VMware: Installation Guide
Virtual Server Security for VMware: Installation GuideVirtual Server Security for VMware: Installation Guide
Virtual Server Security for VMware: Installation Guidewebhostingguy
 
Juniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next LevelJuniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next LevelJuniper Networks
 
Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003bjhutt
 
Windows 2008 R2 Virtualization
Windows 2008  R2  VirtualizationWindows 2008  R2  Virtualization
Windows 2008 R2 VirtualizationEduardo Castro
 
Virtual Insight 032609
Virtual Insight 032609Virtual Insight 032609
Virtual Insight 032609patriciafriar
 
Decrease TCO w/ Server-side App Virtualization
Decrease TCO w/ Server-side App VirtualizationDecrease TCO w/ Server-side App Virtualization
Decrease TCO w/ Server-side App VirtualizationAppZero
 
Virtualization
VirtualizationVirtualization
VirtualizationYansi Keim
 
All about virtualization spiceworks - slideshare
All about virtualization  spiceworks - slideshareAll about virtualization  spiceworks - slideshare
All about virtualization spiceworks - slideshareSpiceworks Ziff Davis
 
Security Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server VirtualizationSecurity Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server Virtualizationrsnarayanan
 
V Mware Workstation 6 Ivnua
V Mware Workstation 6 IvnuaV Mware Workstation 6 Ivnua
V Mware Workstation 6 Ivnua-
 
VMware And Avamar Backup
VMware And Avamar BackupVMware And Avamar Backup
VMware And Avamar Backupjpo1974
 
Build the foundation for Private Cloud
Build the foundation for Private CloudBuild the foundation for Private Cloud
Build the foundation for Private CloudAppZero
 
Verio Virtual Private Server (VPS)
Verio Virtual Private Server (VPS)Verio Virtual Private Server (VPS)
Verio Virtual Private Server (VPS)webhostingguy
 

Semelhante a Virtually Secure: Uncovering the risks of virtualization (20)

Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
 
CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2
 
Virtualization securityv2
Virtualization securityv2Virtualization securityv2
Virtualization securityv2
 
Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003
 
Virtual Server Security for VMware: Installation Guide
Virtual Server Security for VMware: Installation GuideVirtual Server Security for VMware: Installation Guide
Virtual Server Security for VMware: Installation Guide
 
Juniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next LevelJuniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next Level
 
Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003
 
Windows 2008 R2 Virtualization
Windows 2008  R2  VirtualizationWindows 2008  R2  Virtualization
Windows 2008 R2 Virtualization
 
Virtual Insight 032609
Virtual Insight 032609Virtual Insight 032609
Virtual Insight 032609
 
Ian Prattlinuxworld Xen Aug2008
Ian Prattlinuxworld Xen Aug2008Ian Prattlinuxworld Xen Aug2008
Ian Prattlinuxworld Xen Aug2008
 
Decrease TCO w/ Server-side App Virtualization
Decrease TCO w/ Server-side App VirtualizationDecrease TCO w/ Server-side App Virtualization
Decrease TCO w/ Server-side App Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
All about virtualization spiceworks - slideshare
All about virtualization  spiceworks - slideshareAll about virtualization  spiceworks - slideshare
All about virtualization spiceworks - slideshare
 
Usenix Invited Talk
Usenix Invited TalkUsenix Invited Talk
Usenix Invited Talk
 
Ian Pratt Usenix 08 Keynote
Ian Pratt Usenix 08 KeynoteIan Pratt Usenix 08 Keynote
Ian Pratt Usenix 08 Keynote
 
Security Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server VirtualizationSecurity Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server Virtualization
 
V Mware Workstation 6 Ivnua
V Mware Workstation 6 IvnuaV Mware Workstation 6 Ivnua
V Mware Workstation 6 Ivnua
 
VMware And Avamar Backup
VMware And Avamar BackupVMware And Avamar Backup
VMware And Avamar Backup
 
Build the foundation for Private Cloud
Build the foundation for Private CloudBuild the foundation for Private Cloud
Build the foundation for Private Cloud
 
Verio Virtual Private Server (VPS)
Verio Virtual Private Server (VPS)Verio Virtual Private Server (VPS)
Verio Virtual Private Server (VPS)
 

Mais de Seccuris Inc.

Building an enterprise forensics response service
Building an enterprise forensics response serviceBuilding an enterprise forensics response service
Building an enterprise forensics response serviceSeccuris Inc.
 
Digital Anti-Forensics: Emerging trends in data transformation techniques
Digital Anti-Forensics: Emerging trends in data transformation techniquesDigital Anti-Forensics: Emerging trends in data transformation techniques
Digital Anti-Forensics: Emerging trends in data transformation techniquesSeccuris Inc.
 
Compliance in Virtualized Environments
Compliance in Virtualized EnvironmentsCompliance in Virtualized Environments
Compliance in Virtualized EnvironmentsSeccuris Inc.
 
Outsourcing: A Security Perspective
Outsourcing: A Security PerspectiveOutsourcing: A Security Perspective
Outsourcing: A Security PerspectiveSeccuris Inc.
 
Security Information Management: An introduction
Security Information Management: An introductionSecurity Information Management: An introduction
Security Information Management: An introductionSeccuris Inc.
 
Anti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionAnti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionSeccuris Inc.
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
Building Critical Infrastructure For Business Recovery
Building Critical Infrastructure For Business RecoveryBuilding Critical Infrastructure For Business Recovery
Building Critical Infrastructure For Business RecoverySeccuris Inc.
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationSeccuris Inc.
 
Making Executives Accountable for IT Security
Making Executives Accountable for IT SecurityMaking Executives Accountable for IT Security
Making Executives Accountable for IT SecuritySeccuris Inc.
 
Improving Your Information Security Program
Improving Your Information Security ProgramImproving Your Information Security Program
Improving Your Information Security ProgramSeccuris Inc.
 

Mais de Seccuris Inc. (11)

Building an enterprise forensics response service
Building an enterprise forensics response serviceBuilding an enterprise forensics response service
Building an enterprise forensics response service
 
Digital Anti-Forensics: Emerging trends in data transformation techniques
Digital Anti-Forensics: Emerging trends in data transformation techniquesDigital Anti-Forensics: Emerging trends in data transformation techniques
Digital Anti-Forensics: Emerging trends in data transformation techniques
 
Compliance in Virtualized Environments
Compliance in Virtualized EnvironmentsCompliance in Virtualized Environments
Compliance in Virtualized Environments
 
Outsourcing: A Security Perspective
Outsourcing: A Security PerspectiveOutsourcing: A Security Perspective
Outsourcing: A Security Perspective
 
Security Information Management: An introduction
Security Information Management: An introductionSecurity Information Management: An introduction
Security Information Management: An introduction
 
Anti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionAnti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and prevention
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Building Critical Infrastructure For Business Recovery
Building Critical Infrastructure For Business RecoveryBuilding Critical Infrastructure For Business Recovery
Building Critical Infrastructure For Business Recovery
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your Organziation
 
Making Executives Accountable for IT Security
Making Executives Accountable for IT SecurityMaking Executives Accountable for IT Security
Making Executives Accountable for IT Security
 
Improving Your Information Security Program
Improving Your Information Security ProgramImproving Your Information Security Program
Improving Your Information Security Program
 

Último

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Último (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

Virtually Secure: Uncovering the risks of virtualization

  • 1. Virtually Secure Uncovering the risks of virtualization
  • 2. Virtual Insecurity Unknown Denial of Service on core servers IT can not identify root cause Copyright 2007 – Seccuris Inc.
  • 3. Virtual Insecurity Financial System controls subverted in unknown fashion Audit systems and forensic process unable to assist Copyright 2007 – Seccuris Inc.
  • 4. Virtual Insecurity Employees bypassing technical controls & policies Policies & processes fail to identify & respond Copyright 2007 – Seccuris Inc.
  • 5. Virtual Insecurity 60% of production virtual machines will be less secure than their physical counterparts… …through 2009. Copyright 2007 – Seccuris Inc.
  • 6. WELCOME TO THE REST OF YOUR LIFE What do we need to understand regarding design, management and control to implement virtualization successfully in our critical environments? Copyright 2007 – Seccuris Inc.
  • 7. What is virtualization? (Overview) Concept not new: Done since the 1960’s Physical Hardware = Host Machine Operating System / Virtual Appliance = Guest VMs = Virtual Machine(s) Hypervisor (VMM) = Virtual Machine Monitor Virtual Infrastructure = Composite of VMM & Mgmt tools Copyright 2007 – Seccuris Inc.
  • 8. Hybrid VMM Type-2 VMM Guest Guest 1 2 Guest Guest VMM 1 2 Host OS Host OS VMM Hardware Hardware Examples: Windows Server Virtualization Xen VMWare ESX Copyright 2007 – Seccuris Inc. http://port25.technet.com/archive/2007/08/13/Interoperab-on-the-metal-and-on-the-wire.aspx
  • 9. Virtualization Implementations Full Virtualization • Binary Translation – Privileged Instructions Rewritten • Hypervisor in “Ring 0”, Guest in “Ring -1” Copyright 2007 – Seccuris Inc.
  • 10. Virtualization Implementations Full Virtualization • Hardware Supported Virtualization (Accelerated Virtualization, Hardware Virtual Machine, Native Virtualization) • Hardware Hypervisor in “Privileged Level”, Guest in Ring 0 Copyright 2007 – Seccuris Inc.
  • 11. Virtualization Implementations Paravirtualization • System Call Proxy & Exception Trapping • Hypervisor in Ring 0, Guest in Ring 3 Copyright 2007 – Seccuris Inc.
  • 12. On-going development of Virtualization Generational Development of Virtualization 1. Development & Test 2. Consolidation 3. Virtualized Data Center Increased complexity, controls & management processes Copyright 2007 – Seccuris Inc.
  • 13. Players in the Virtualization Market The image cannot be display ed. Your computer may not hav e enough memory to open the image, or the image may hav e been corrupted. Restart y our computer, and then open the file again. If the red x still appears, y ou may hav e to delete the image and then insert it again. The image cannot be display ed. Your computer may not hav e enough memory to open the image, or the image may hav e been corrupted. Restart y our computer, and then open the file again. If the red x still appears, y ou may hav e to delete the image and then insert it again. Copyright 2007 – Seccuris Inc.
  • 14. Players in the Virtualization Market Copyright 2007 – Seccuris Inc.
  • 15. VMWare – How does it work? Binary Translation (System Call Proxy) Like an emulator, VMware software provides a completely virtualized set of hardware to the guest operating system. VMware software virtualizes the hardware for a video adapter, a network adapter, and hard disk adapters. The host provides pass-through drivers for guest USB, serial, and parallel devices. Copyright 2007 – Seccuris Inc.
  • 16. VMWare – How does it work? The host provides pass-through drivers for guest USB, serial, and parallel devices. Video, Cache and other hardware includes pass-through as well… Copyright 2007 – Seccuris Inc.
  • 17. VMWare Products: What is the difference? Desktop Virtualization On Host OS • VMWare Workstation Hybrid VMM • VMWare Fusion • VMWare Player Server Virtualization On Bare Metal • VMWare ESX Server Type-1 VMM • VMWare Server - Freeware Management & Automation Above it all • VMWare Virtual Center Management Software Copyright 2007 – Seccuris Inc.
  • 18. Technical Concepts – VMWare Implementation Datacenter Components • Computing Servers (Bare metal) • Management Server – Single Control point (Win 2k3) • Desktop clients Copyright 2007 – Seccuris Inc.
  • 19. Technical Concepts – VMWare Implementation Datacenter Architecture • Hosts, Clusters & Resource Pools • DRS and HA • Dynamically Allocate System Resources • High Availability • VMotion • Move guest between physical systems Copyright 2007 – Seccuris Inc.
  • 20. Technical Concepts – VMWare Implementation Copyright 2007 – Seccuris Inc.
  • 21. Technical Concepts – VMWare Implementation Physical Security has become MORE important Copyright 2007 – Seccuris Inc.
  • 22. Technical Concepts – VMWare Implementation Datacenter Architecture • Networking Architecture • vSwitch and Port groups • VLANS • Traffic Shaping • NIC Teaming Copyright 2007 – Seccuris Inc.
  • 23. Technical Concepts – VMWare Implementation Copyright 2007 – Seccuris Inc.
  • 24. Technical Concepts – VMWare Implementation Network security includes new layers of complexity Copyright 2007 – Seccuris Inc.
  • 25. Technical Concepts Storage Architecture • Datastore • Underlying technologies • FiberChannel • iSCSI • SAN • Direct Attached Storage, NAS • Raw Device Mapping Copyright 2007 – Seccuris Inc.
  • 26. Technical Concepts – VMWare Implementation Copyright 2007 – Seccuris Inc.
  • 27. Technical Concepts – VMWare Implementation Data inventory & Information Classification becomes a prime time issue Copyright 2007 – Seccuris Inc.
  • 28. Threats & Risks in Virtualization • Technical Concerns • Applied threats Copyright 2007 – Seccuris Inc.
  • 29. Threats & Risks – Technical Concerns Technical Concerns •Denial of Service • Load issues (Time / Period) • Bottle Necks (Physical) • Bottle Necks (Logical) How well do you know your application processing time cycles? Copyright 2007 – Seccuris Inc.
  • 30. Threats & Risks – Technical Concerns Technical Concerns •Communication Between VMs or Between VMs and Host • Shared Directories • Open Services (FTP, DHCP) • Misconfigured network cards How well built are your legacy and custom applications? Copyright 2007 – Seccuris Inc.
  • 31. Threats & Risks – Technical Concerns Technical Concerns • VM Escape • VM Monitoring from the Host • VM Monitoring from Another VM • VM Monitoring from network based host (Network / Storage) “VM Escapes have happened” Copyright 2007 – Seccuris Inc.
  • 32. Threats & Risks – Technical Concerns Technical Concerns • External Modification of a VM • External Modification of the Hypervisor • Sun Bing’s Example How much trust do you put in your administrators? Copyright 2007 – Seccuris Inc.
  • 33. Threats & Risks in Virtualization • Technical Concerns • Applied threats Copyright 2007 – Seccuris Inc.
  • 34. Threats & Risks – Applied Threats VMBR – Virtual Machine Based Root Kits APP 1 APP 2 SubVirt: Implementing malware with virtual machines BluePill: VM “Rootkit” Before Attack Copyright 2007 – Seccuris Inc.
  • 35. Threats & Risks – Applied Threats VMBR – Virtual Machine Based Root Kits APP 1 APP 2 SubVirt: Implementing malware Evil Host OS with virtual machines App Evil OS Evil VMM BluePill: VM “Rootkit” Hardware Fundamental changes to forensic system investigation must After Attack occur! Copyright 2007 – Seccuris Inc.
  • 36. Threats & Risks – Applied Threats VMWare DHCP Server Remote Code Execution Vulnerabilities CVE-2007-0061, CVE-2007-0062, CVE-2007-0063 (http://www.iss.net/threats/275.html) IMPACTS VMM and VMs! Copyright 2007 – Seccuris Inc.
  • 37. Threats & Risks – Applied Threats Hardware Visibility (http://seclists.org/isn/2008/Mar/0055.html) • Hardware segmentation DOES NOT EXIST • Race conditions, covert channels, unknown overflow issues are possible! Copyright 2007 – Seccuris Inc.
  • 38. Security Controls for Virtualization • Controls for Today • Software & Appliances • Controls in the future Copyright 2007 – Seccuris Inc.
  • 39. Security Controls for Virtualization Controls for Today (CIS Best Practices) Configuration: • Limit Physical Access to Host • Harden Base Operating System • Configuration Maximums • Firewalling Virtual Machine Layer Service Ports • Use Encryption For Communication • Virtualization Server Authentication Copyright 2007 – Seccuris Inc.
  • 40. Security Controls for Virtualization Controls for Today Configuration: • Disabling Features (Including Screensavers and Suspend) • File Sharing Between Host and Guests • Time Synchronization • Disconnect Unused Devices Copyright 2007 – Seccuris Inc.
  • 41. Security Controls for Virtualization Controls for Today Architecture Requirements • Remote Management • Patching and Vulnerabilities • Logging & Auditing Copyright 2007 – Seccuris Inc.
  • 42. Security Controls for Virtualization Controls for Today Architecture & Configuration Host and Network Defences • File Integrity Checking • Strong Passwords • Disk Partitioning • Backups Copyright 2007 – Seccuris Inc.
  • 43. Security Controls for Virtualization Software & Appliances • Host Based IDS/IPS • Host Based Anti-Virus • Host Change Control • Host Logging Copyright 2007 – Seccuris Inc.
  • 44. Security Controls for Virtualization Security Controls in the Future • VMSafe – Hypervisor Visibility & Control • VMWare (aware) security software • Virtualizaiton (aware) security hardware Copyright 2007 – Seccuris Inc.
  • 45. Security Controls for Virtualization Is virtualization PCI compliant? “We are currently trying to become PCI compliant, but our auditor company is saying that “in no shape or form is virtualization PCI compliant”. I disagree, but I am not an auditor.” Greg Ryan Copyright 2007 – Seccuris Inc.
  • 46. Obstacles to Success The top obstacles to virtualization success include: • Weak assignment of activities between virtual machine administrators and security staff. • Inadequate control over patching and tamper protection of offline virtual machines other images. Copyright 2007 – Seccuris Inc.
  • 47. Obstacles to Success The top obstacles to virtualization success include: • Limited visibility to the host operating system and virtual network to control vulnerabilities. • Inhibited visibility to inter-virtual machine traffic for intrusion prevention systems (IPSs). • Deficient solution for mobile virtual machines that need security policy and settings to migrate with them. Copyright 2007 – Seccuris Inc.
  • 48. Business Environment improvements Policy & Procedure - What to look for? • Can the organization ensure that: • each virtual machine is appropriately configured and tested? • can support virtual machines within its computing environment? Copyright 2007 – Seccuris Inc.
  • 49. Business Environment improvements Policy & Procedure - What to look for? • Does the organization have a plan for assessing, monitoring and reporting on the state of its physical and virtual systems? • How will deployment and compliance of new virtual machines be tracked? Copyright 2007 – Seccuris Inc.
  • 50. Technical Environment improvements • Technology Selection • Technical Architecture & Zoning • Configuration & Tuning • Change Control & Audit Copyright 2007 – Seccuris Inc.
  • 51. Technical Environment improvements Resources • Center for Internet Security • http://www.cisecurity.org/ • VMware Security Center • http://www.vmware.com/security/ Copyright 2007 – Seccuris Inc.
  • 52. General Thoughts around Virtualization The fallacy* of cost reduction Copyright 2007 – Seccuris Inc.
  • 53. General Thoughts around Virtualization The fallacy of cost reduction • Increased complexity • Increase in exposure to: • Technical misconfiguration • Central points of access / collusion for staff Copyright 2007 – Seccuris Inc.
  • 54. Moving forward with Virtualization Understand how virtualization will change your security program, architecture and controls Make plans today for securing the virtualization roadmap in your environment Prepare for the inevitable impacts with design review, control improvements & incident handling Copyright 2007 – Seccuris Inc.
  • 55. How Seccuris assists your solution Security Architecture & Design for Virtual Environments Virtualization Environment Risk Assessment Managed Security Services for Virtual Environments Copyright 2007 – Seccuris Inc.
  • 56. Thanks Michael Legary, SCP, CISSP, CISM, CISA, CCSA, GCIH, CPP Founder & Chief Innovation Officer Seccuris Inc. This presentation contains reference material and direct content from Email: Michael.Legary@seccuris.com multiple copyright holders. Direct: 204-255-4490 Main: 204-255-4136 References available on request / Fax: 204-942-6705 within presentation slide notes. Resources Center for Internet Security http://www.cisecurity.org/ VMware Security Center http://www.vmware.com/sec urity/ Copyright 2007 – Seccuris Inc.