IT Security Risk Mitigation Report
|
|
|
- Bathsheba Webster
- 10 years ago
- Views:
Transcription
1 IT Security Risk Mitigation Report Virtualization Security by Wilson Leung Nima Khamooshi Theodore Winograd
2
3 IT Security Risk Mitigation Report Virtualization Security Abstract Virtualization is the act of emulating individual computer systems within a single physical host system. Organizations have typically relied on the physical separation of servers (e.g., a separate machine for , one for Web Services, and another for the Domain Name Server [DNS]) to prevent a single server s compromise that then directly contributes to the subsequent compromise of other systems or network services within the enterprise. Although this practice has proven security benefits, it also adds a number of costs and obstacles to the information technology (IT) infrastructure. With the introduction of virtualization, organizations can now leverage processing power that would otherwise sit idle by deploying a separate virtual machine (VM) for each network service on one physical host while maintaining a level of separation between distinct servers. Although VM deployment has its own security risks (e.g., increased availability risks as result of a single point of failure), organizations have achieved practical benefits from virtualization. Cloud Computing takes virtualization to the next step. It allows multiple organizations to deploy all of their individual VMs on the same virtualization platform (e.g., one or more physical hosts) and leverage their hardware in previously impossible ways. Today s organizations are increasingly taking advantage of various forms of virtualization to leverage new capabilities, ranging from server consolidation and enhanced recovery to increased secure computing operations through support of virtual networks and sandboxing. Because of its ability to enable a single physical platform to host multiple isolated and unique computing environments, virtualization has emerged as a key technology for supporting Cloud Computing delivery models, such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Although virtualization has many benefits, it introduces a number of risks into the enterprise caused in part by the increased complexity brought by the virtualized environment management (the hypervisor ) and other new computing paradigms. For example, the hypervisor, which is the software that mediates all interaction between the VMs and the physical host, serves as the only separation between different VMs on a single host while maintaining communication channels to the individual VMs (see Figure 1). Any successful attack on these communication channels will successfully hijack the VM itself. Similarly, virtualization s support for server imaging increases the likelihood that a malicious agent can copy and send an image of an organizational system to a remote site for testing and analysis; it also enables the introduction of potentially malicious VM modifications while the VMs are at rest. This paper identifies the most prevalent risks of virtualization and describes selected countermeasures that are available to mitigate these risks. Introduction Virtualization decouples the operating system () from the physical hardware platform and the applications that run on it. As a result, organizations can achieve greater information technology (IT) resource utilization and flexibility. Virtualization allows multiple virtual machines (VM), often with heterogeneous s, to run in isolation side by side on the same physical machine. Each VM has its own set of virtual hardware upon which the and applications are loaded. Figure 1 Exhibit 1 Virtualization Overview Host 1
4 Virtualization has been gaining immense popularity with both IT professionals and executives because it represents an approach to data center consolidation, improved asset utilization, and improved control over systems and other IT assets. However, virtualization has actually been around for more than three decades in one form or another, maturing this past decade. Once only accessible by the large enterprise, virtualization technologies are now available for virtually every aspect of computing, including hardware, software, and communications. Although organizations can realize many benefits as they adopt and implement virtualization solutions, threats and risks are associated with these solutions. In the following sections, we address virtualization security benefits, threats to virtualized environments, attack vectors and security considerations, and attacker VM detection methods. Virtualization Security Benefits Virtualization is not just a compelling solution for server consolidation. It is becoming the most important security infrastructure element for security managers. Virtualization provides a wide range of security benefits spanning key items, such as environment sandboxing, data recovery, malware/ forensic analysis, virtual machine introspection (VMI), and virtual machine live migration (VMLM). 1 Environment Sandboxing A sandbox is a security mechanism for separating running programs. It is often used to execute and validate the operation of new or untested code or untrusted programs from unverified third parties, suppliers, and untrusted users. It offers a monitored and controlled environment so the unknown software cannot harm the real hosting computer system. Sandboxing is achievable simply by blocking some critical operations or implementing a complete virtual environment, wherein the processor, memory, and file system are simulated and the real system is inaccessible by the tested application. Virtualization is effective at providing a tightly controlled set of resources for guest programs to run in, such as scratch space on disk and memory. Network access, the ability to inspect the host system, and the ability to read from input devices are often disallowed or heavily restricted. Continuity of Operations and Data Recovery Business continuity of operations (COOP) and disaster recovery (DR) initiatives have gained recognition over the past few years. Customer demand and federal regulations, including civil and Department of Defense (DoD) regulations, have helped accelerate these efforts and give them the attention they have needed for some time. Virtualization is an ideal platform for most cases of data recovery because it eliminates the need to purchase an excessive amount of equipment. Most software vendors of backup/recovery products support the restoration of operational systems and applications of physical servers to virtual servers. Traditional recovery plans are often difficult to test and keep up to date, and they depend on exact execution of complex and often manual processes. They also require duplicating either the entire production infrastructure or the major or key portions of that infrastructure which, for reasons of surety, often equates to the total system. Although many organizations deploy total failover sites, smaller organizations may benefit from using a virtualized environment because more compact virtualized systems can be used for failover/backup and recovery purposes. Recovery testing is simpler because it allows for the execution of potentially disruptive tests using existing resources. Larger organizations may also benefit from virtualization by increasing the number of tests without straining the organization with a full system-wide test of recovery procedures. Hardware independence eliminates the complexity of recovery site maintenance by eliminating failures caused by hardware differences. Another area that increases costs and complexity in any organization is the deployment of standby and failover servers to maintain system availability during times of planned or unplanned outages. Although capable of hosting the targeted workloads, such equipment remains idle between those outages and in some cases is never used at all. Thus, the expense provides primarily psychological, emergency, and obligatory compliance value but little to no operational value to the organization. Virtualization helps solve this problem by allowing just-in-time or on-demand provisioning of additional VMs as needed. A VM that has been built and configured can be put into an inactive state, ready to be activated when a failure occurs. When needed, the VM becomes active without hardware procurement, installation, or configuration. In addition, modern virtualization solutions provide 1 In the following discussions, references are made to commercial products as examples of current tools. No endorsement is intended. 2
5 Exhibit 2 Sample Malware Infection Figure 2 A sample of malware infection 1 Hacker inserts malicious URL 2 Web User visits 3 Good Web site User is redirected to Bad Web site 4 Badsite sends obfuscated exploit for vulnerability on end user s system 6 Malware sends private data to hacker 5 Malware installed without User noticing mechanisms for ensuring trans-system synchronization, or VMLM, when performing hot-swapping or failover across multiple VMs. Unlike a physical system, hypervisors can communicate the state of VMs internal memory across the network ensuring two VMs are running in the identical configuration at the time of failover and thereby simplifying previously complex and sometimes unwieldy system synchronization for failover or hot-spare activation. Malware Analysis and Defeat As computers became more sophisticated, so did the malware problem. Workgroup networks were affected by viruses that could infect not only local (server, node, or workstation) files but also the files of other users in the network. Malware researchers need a way to truly see what malware does to a server or a host in the workgroup network to have any hope of finding a way to prevent and recover from malware infections. Virtualization can be used to quarantine malware in a controlled environment where it can be studied, observed, tested, and eventually defeated and eradicated, and future instances can be prevented. Figure 2 illustrates that traditional malware infection cycle. Using virtualization, the user s machine in Step 5 can be controlled and monitored to understand the malware itself while simultaneously preventing the compromised system from launching further attacks. Trusted Application Test and Deployment Most organizations do not have spare IT assets or the time to provision an application that is not associated with an approved project. As a result, most of the proof of concept applications and systems are either set up on inadequate equipment, such as desktops, or not established at all. This situation presents a significant risk if and when applications go to production status without appropriate testing. Virtualization helps resolve such problems. Rapid provisioning or minimal additional hardware investment, safety, security, and reliability are the computing environment qualities needed to quickly build a proof-of-concept environment. If proof of concept is successful, the VM application can be efficiently and effectively migrated from the test infrastructure to the production virtual infrastructure without additional cost. In addition, virtualization enables companies to streamline their software and/or system life-cycle development model. From development and testing through integration, staging, deployment, and management, virtualization offers a comprehensive framework for virtual software lifecycle automation that streamlines these adjacent yet sometimes disconnected processes and simultaneously closes the loops between them. By pushing a staged configuration into production after successful testing, virtualization can minimize errors associated with incorrect deployment and configuration of the production environment. 3
6 Virtual Machine Introspection The recent development of virtualization products has led to the evolution of VMI techniques and tools to monitor VM operations and behavior. VMI tools inspect a VM from the outside to assess what is happening on the inside, making it possible for security tools, such as virus scanners and intrusion detection and prevention systems (IDPS), to observe and respond to VM events from a safe location outside the monitored machine. A major advantage of VMI is knowledge capture of context and environment, which is critical to proper event interpretation. VMI allows event replay, which can determine whether analysis must be performed in real time as the target system executes or at a later time under the analyst s control. Threats to the Virtualized Network Environment Virtualization in a network environment complicates the enterprise s security needs. The standard threats and attacks to the enterprise infrastructure remain, and the introduction of the virtualization software simultaneously increases the surface area of attack. This situation creates a significant need to harden and secure the virtualization system and protect against the standard attack channels. The virtualization software itself is of particular concern. If an attacker can gain access to a virtualized environment, the attacker can potentially escape the VM and move up the chain to the virtualization host. Because this host runs, monitors, and administers the guest s contained under its purview, the host can be a jumping off point for additional system access by an attacker. In an environment where a single host can have numerous guest s running mission-critical network services, the problem is clear. If an attacker can gain access to the host, then it is an easy task for the attacker to gain access to the virtual guests controlled by that host. As mentioned earlier, the standard computing attacks are still present in the virtual environment. A system administrator must apply security patches, updates, service packs, hotfixes, etc., to secure and protect the against malicious attacks. The administrator must also ensure that any software installed on the VM (e.g., web server software or other client-side software) is up to date. Likewise, the system developers must use high-quality coding practices to ensure the system is not vulnerable to other forms of attacks, such as Structured Query Language (SQL) injection attacks wherein a hacker submits malicious SQL code into an online web application. The need to update the software installed on the host itself a result of the increasing trend in client-side software attacks. Administrators should also address direct attacks against services, such as Domain Name Server (DNS), Dynamic Host Configuration Protocol (DHCP), Active Directory, etc. As with any system, system administrators must ensure they have fully secured the system and all of its applications to provide the best protection profile. Although many of the standard attacks apply to any system virtual or physical virtualization-specific considerations also exist. Many of these virtualizationspecific attacks take advantage of the specific nature of the virtual environment and are not exploitable in non-virtualized systems. These attacks are known in the IT community as VMEscape, VMchat, VMcat, VMdrag-n-hack, VMdrag-n-sploit, and VMftp. 2 VMEscape One of the most critical attacks on the virtualization environment is the potential for a VM escape. In this attack, a malicious actor gains access to a VM guest using one of the standard threats mentioned earlier. Once the hacker has access, he or she will escape the VM guest to gain access to the host. As previously mentioned, the host has direct access to all guest s. By taking over the host, a hacker has increased potential to negatively affect all VMs managed under that host. Figure 3 illustrates a successful VMEscape attack. 3 Exhibit 3 VMEscape Figure 3 VMEscape Host 4 2 These names are based on the presentation from IntelGuardians at SANSFire 2007, which is referenced in the following web pages: and accessed June 15, Joab Jackson, Government Computer News, VMware vulnerability allows users to escape virtual environment, accessed June 15, 2009.
7 VMchat One of the benefits of utilizing virtualization in a network is the ability to separate machines logically, thereby placing each into its own separate sandbox free from external inputs. However, utilities like VMchat raise certain issues. VMchat is an administration utility in which the system administrator is able to send instant messages (IM) between VMs. This function gives system administrators the ability to communicate service interruptions or other administrative issues to pertinent staff. The problem, however, lies in the potential for a malicious actor to take advantage of this shared memory space and inject a malicious Dynamic-Link Library (DLL) into memory. When a hacker does this, he or she has effectively bridged the sandboxed memory space of each VM. VMcat VMcat is a netcat equivalent software for the virtualized environment. Netcat is popularly known as the hacker s Swiss Army Knife. 4 It allows a plethora of capabilities, including port scanning, file transfer, IM/chat, and command shell sending. Netcat is a hacker s tool of choice because of its numerous capabilities and small file size. The problems with VMcat are apparent. A system with VMcat installed can facilitate the exfiltration of files and data in the same way hackers use netcat. VMcat also supports secondary attacks and fingerprinting, thereby increasing its threat capabilities once installed. VMdrag-n-hack VMdrag-n-hack is an exploit where an attacker attempts to take advantage of an unsuspecting system administrator s ability to drag and drop files between VMs. As the administrator drags a file between the two systems, he or she is unknowingly executing malicious code. An attacker can determine the area of memory that is read and written to as the administrator moves the file between systems (see Figure 4). Because of this, the attacker can inject malicious code into memory that the secondary system will read, thereby allowing a hidden communication channel between the two systems. VMdrag-n-sploit VMdrag-n-sploit works very similarly to the VMdrag-nhack attack. In this attack, the malicious actor takes advantage of a user with system access who drags and drops a file between two VMs. When the innocent party performs this task, he or she unknowingly executes the Figure Exhibit 4 4 Memory in in a virtual a Virtual environment Environment Host Shared Memory VMdrag-n-sploit file in memory, which in turn executes on both of the VMs. The VMdrag-n-sploit file provides functionality to exploit VMchat or VMcat attacks. VMftp As seen with the other utilities, VMftp opens up yet another channel for communication between VMs. VMftp provides the ability to send files between VMs quickly and easily. It operates in much the same way as a traditional File Transfer Protocol (FTP) system. It presents problems because it can potentially allow a malicious actor to exfiltrate any file, as well as take advantage of the shared memory space issues described above. Security Considerations Although virtualization offers a number of benefits to organizations, like any new technology, virtualization increases the attack surface of systems within an organization. In many cases, the risks associated with virtualization can be mitigated in an effective manner; however, it is important to fully understand these risks before introducing virtualization into an organization s infrastructure. This section provides a full description of these risks, along with discussions of the countermeasures organizations may put in place to mitigate each of these risks. In general, the mitigation strategies for virtualizationrelated risks are very similar to the defense-in-depth strategies employed in any IT environment. Specifically, organizations should expand their security patching programs to include the hypervisor, the host system, and all VMs used in the organization. In the past, this wide coverage may have been difficult, but modern hypervisors provide capabilities for patching VMs even when they are 4 More information about Netcat is available at 5
8 offline, removing the need for organizations to launch all VMs to deploy security patches. Organizations should also ensure their hypervisors are configured and deployed using least privilege: the administrators and permissions on the hypervisor should have privileges no higher than necessary to complete their functions. In some instances, least privilege may extend to hosting different categories of VMs on separate physical hypervisors to prevent attacks against a single hypervisor from affecting the entire virtual infrastructure. In addition, organizations may take advantage of guidance for hardening hypervisors provided by virtualization vendors and other organizations (e.g., Center for Internet Security, Defense Information Systems Agency). VMEscape One of the most discussed attack vectors in virtualization security is the concept of VMEscape. VMEscape entails breaking out of the VM and directly interacting with the hypervisor. There are only a few instances of successful VMEscape occurrences. One of the most detailed writeups on this topic was published in 2007 by Google s Tavis Ormandy. 5 In his paper, Ormandy developed tools to perform fuzzing attacks (e.g., sending random data to the hypervisor to assess its security). He identified several vulnerabilities that could potentially lead to a successful VMEscape. VMEscape has been highlighted as one of the most dangerous attacks an organization deploying virtualization can face. To address this risk, virtualization vendors have begun developing thin hypervisors, with the goal of reducing the size of the code base and reducing the likelihood of exploitable defects. VMDetection With the advent of security researchers using virtualization to monitor malware, malware authors and attackers have begun performing detection routines to determine whether or not they are running in a virtualization sandbox. Although most organizations may not explicitly deploy virtualization in this manner, intrusion detection systems are increasingly offering sandboxing as an effective tool for detecting zero-day exploits in an organization. In their presentation On the Cutting Edge: Thwarting Virtual Machine Detection, 6 Tom Liston and Ed Skoudis identify a number of techniques malware uses to determine whether it is running in a virtual sandbox: Artifacts in processes, the file system, or registry Artifacts in memory Hardware that describes itself as provided by a virtualization vendor Artifacts in the instruction set architecture (ISA) that are accepted only by hypervisors. In light of these techniques, some virtualization vendors aim to reduce the number of fingerprints provided by their virtualization software. Using the virtualization extensions to the x86-64 instruction set, it is becoming increasingly difficult for malware to determine whether or not it is running in a VM. Although malware s ability to determine whether or not it is running in a virtual environment is becoming less of a concern (especially with the rise of Cloud services leveraging virtualization), the difficulty of determining which specific hypervisor is controlling a VM makes deploying effective malicious attacks against the hypervisor even harder adding to an organization s defense-in-depth posture. Communication Channels Virtualization increases the number of communication channels in a computing environment. These channels can range from virtual switches, networks, and firewalls to communication paths between VMs and the hypervisor. This section discusses these communication paths and mitigation strategies for securing them. Virtual Switches and Networks Virtual networking allows organizations to logically deploy their VMs in a manner consistent with the organization s physical network. Organizations may configure virtual local area networks (VLAN), take advantage of switched port analyzer (SPAN) ports, and integrate with any existing network management infrastructure. Important key points to consider when deploying virtual networks include Ensuring VMs in promiscuous mode (i.e., utilizing a network card configuration that makes the card pass all traffic it receives to the central processing unit rather than only packets addressed to it a feature normally used for packet sniffing) may access the necessary network traffic; this is necessary when deploying an IDPS within a VM 5 Tavis Ormandy, An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments, accessed on June 15, Tom Liston and Ed Skoudis, On the Cutting Edge: Thwarting Virtual Machine Detection, accessed June 15,
9 Ensuring the virtual network complies with appropriate policies and regulations regarding network security devices; some organizations may require an IDPS logically in front of the VM an IDPS alone in front of the virtual network may be insufficient Ensuring appropriate COOP procedures are in place; if an organization relies on the virtual network for its mission, a failure of the physical host may compromise the entire virtual network Ensuring malicious activity within the network cannot leave the virtual network and affect external systems. To support these activities, organizations should employ the same strategies they would in a physical network environment: taking full advantage of VLANs, firewalls, IDPS, and when necessary MAC locking. In most virtual environments, the virtual switches, routers, and firewalls behave in a manner similar to their physical counterparts possibly with additional capabilities. In addition, organizations should include their virtual networks in all network architecture documentation and security risk assessments. VM Introspection VMI is a powerful tool. It allows organizations to deploy security solutions that cannot be compromised by rootkits or other malicious software within the VM. However, this functionality can introduce privacy concerns in certain organizations. Although the hypervisor traditionally has physical access to all components within a VM, VMI allows the hypervisor to actively monitor and in some cases modify the activities within the VM itself. This monitoring may be inconsistent with an organization s security and privacy policies. In addition, organizations offering Cloud services may need to explicitly state that they are performing VMI to ensure customers are fully aware that some level of monitoring is occurring. 7 VMI tools can be configured to meet organizational policy. For example, some instances of VMI simply offer on-demand analysis of the processes running within the guest or the installed software; others may perform real-time anti-malware analysis of the running system. Software deployed within VMs may improve their level of security and privacy by ensuring their data is secure at rest and in transit minimizing the possibility that the hypervisor may unintentionally store any sensitive information outside of the VM. 8 VM State Because virtual machines exist as an abstraction on a hosted system, all state information is accessible to the host system. This scenario means the Basic Input/Output System (BI) does not reside within read-only memory (ROM) as it does on traditional computing systems. Instead, the hypervisor emulates the BI. In addition, most virtual machines are often represented as a file on the hard disk of the host, allowing any user with access to the file to view and potentially modify the VM, even when it is at rest. This file includes the current state of system memory for the VM, the state of the VM hard disk, and information stored in central processing unit (CPU) registers providing a wealth of information that may benefit a potential malicious user. Virtualization vendors offer solutions to mitigate the risks associated with VM files by limiting access to only the hypervisor and potential administrators. Organizations can also take advantage of disk encryption to ensure the VM and any backups cannot be viewed directly from the storage device (this is especially true for network-based storage). Organizations should also be aware that VM state information travels over the network whenever VMLM is implemented requiring assurance that the state transfer across the network is protected in transit as well. Hypervisor When introducing virtualization into an organization, it is important to understand the various communication mechanisms between an individual VM and the hypervisor. Although some of these communication channels depend on the functionality deployed, the majority of these channels are in use and often required for the hypervisor to function properly. A number of these direct channels are implemented as extensions to the ISA as machine instructions, meaning they may be accessible to any application on the system. It is important to note that in most cases, applications in user mode will receive a general protection fault when attempting to access these interfaces. Some common functions include Clipboard sharing Where the hypervisor shares the contents of the clipboard between the guest and the host 7 This would be a part of the agreement between the user and the supplier in a services contract model. 8 It is important to note that these privacy concerns are an inherent aspect of virtualization. Any information stored within RAM or on the VM s hard disk may be accessible often in plain text through the host system s RAM or on its hard disk as a snapshot of the running VM. 7
10 Memory management Where the guest communicates with the host to coordinate the amount of physical memory in use for the application Device management For some devices (e.g., processor, graphics card, network interface card), the hypervisor mediates all communication between VMs and physical devices 9 Others Depending on the vendor solution, additional communication channels exist; for example, when using paravirtualization solutions, all system calls are implemented as function calls to the hypervisor rather than as software interrupts. Because many of these interfaces are implemented as simple commands (e.g., as machine instructions), it is possible to minimize their accessibility to only those processes and applications on the VM that must have access to these systems. In addition, organizations deploying virtualization environments that do not need specific functionality (e.g., clipboard sharing) may simply disable the communication feature, preventing malicious users or software from taking advantage of it. Conclusion Virtualization security is a major area of concern for any organization deploying a virtual environment. As shown in this report, the introduction of VMs creates new and profound security considerations that were unheard of just a few years ago. Booz Allen is the one firm that can help clients solve their toughest IT security problems. Our experienced and proven staff works side by side with our clients, helping them achieve their missions every day. Our security experts have the experience and knowledge to help the Federal Government develop comprehensive and secure virtualization solutions. Booz Allen not only understands and implements the federal security standards that protect our homeland but also advises the policy organizations and contributes to thought leadership by helping them develop the policies on which those standards are created. Booz Allen is committed to delivering results that endure. Acronyms BI COOP CPU DHCP DLL DNS DoD DR FTP IaaS IDPS IM ISA IT PaaS ROM SaaS SPAN SQL VLAN VM VMI VMLM Basic Input/Output System Continuity of Operations Central Processing Unit Dynamic Host Configuration Protocol Dynamic-Link Library Domain Name Server Department of Defense Disaster Recovery File Transfer Protocol Infrastructure as a Service Intrusion Detection and Prevention System Instant Message Instruction Set Architecture Information Technology Operating System Platform as a Service Read-Only Memory Software as a Service Switched Port Analyzer Structured Query Language Virtual Local Area Network Virtual Machine Virtual Machine Introspection Virtual Machine Live Migration 9 Some devices (e.g., universal serial bus interface) have a channel-based architecture. With these devices, the hypervisor needs only to assign a specific channel to the VM and the majority of the interaction need not be mediated directly. 8
11 About Booz Allen Booz Allen Hamilton has been at the forefront of strategy and technology consulting for 95 years. Every day, government agencies, institutions, corporations, and not-for-profit organizations rely on the firm s expertise and objectivity, and on the combined capabilities and dedication of our exceptional people to find solutions and seize opportunities. We combine a consultant s unique problem-solving orientation with deep technical knowledge and strong execution to help clients achieve success in their most critical missions. Providing a broad range of services in strategy, operations, organization and change, information technology, systems engineering, and program management, Booz Allen is committed to delivering results that endure. With more than 22,000 people and $4.5 billion in annual revenue, Booz Allen is continually recognized for its quality work and corporate culture. In 2009, for the fifth consecutive year, Fortune magazine named Booz Allen one of The 100 Best Companies to Work For, and Working Mother magazine has ranked the firm among its 100 Best Companies for Working Mothers annually since Contact Information: Wilson Leung Nima Khamooshi Theodore Winograd Associate Associate Associate [email protected] [email protected] [email protected] 703/ / / To learn more about the firm and to download digital versions of this article and other Booz Allen Hamilton publications, visit
12 Principal Offices ALABAMA Huntsville CALIFORNIA Los Angeles San Diego San Francisco COLORADO Colorado Springs Denver FLORIDA Pensacola Sarasota Tampa GEORGIA Atlanta HAWAII Honolulu ILLINOIS O Fallon KANSAS Leavenworth MARYLAND Aberdeen Annapolis Junction Lexington Park Linthicum Rockville MICHIGAN Troy NEBRASKA Omaha NEW JERSEY Eatontown NEW YORK Rome OHIO Dayton PENNSYLVANIA Philadelphia SOUTH CAROLINA Charleston TEXAS Houston San Antonio VIRGINIA Arlington Chantilly Falls Church Herndon McLean Norfolk Stafford WASHINGTON, DC The most complete, recent list of offices and their and addresses and telephone numbers can be found on by clicking the Offices link under About Booz Allen Booz Allen Hamilton Inc A
Utilizing and Visualizing Geolocation Data for Powerful Analysis
Utilizing and Visualizing Geolocation Data for Powerful Analysis by Walton Smith [email protected] Timothy Ferro [email protected] Table of Contents Introduction... 1 Delivering Geolocation Data
How To Manage Security In A Federal System
Security Authorization An Approach for Community Cloud Computing Environments by Perry Bryden [email protected] Daniel C. Kirkpatrick [email protected] Farideh Moghadami [email protected]
Analytical Program Management
Analytical Program Management Integrating Cost, Schedule, and Risk MISSION Analytical Program Management Integrating Cost, Schedule, and Risk Analytical Program Management 1 One of the greatest challenges
Information Security Governance
Information Governance Government Considerations for the Cloud Computing Environment by Jamie Miller [email protected] Larry Candler [email protected] Hannah Wald [email protected] Table of Contents
Ascent to the Cloud. Four Focus Areas for a Successful Enterprise Migration. by Michael Farber [email protected]
Ascent to the Cloud Four Focus Areas for a Successful Enterprise Migration by Michael Farber [email protected] Kevin Winter [email protected] Munjeet Singh [email protected] Ascent to the
The Social Financial Advisor: A Path Forward
The Social Financial Advisor: A Path Forward Take the Right Route to Using Social Media by Chris Estes [email protected] Todd Inskeep [email protected] Getting Social Is It Time for Advisors to Face
by Christopher P. Bell [email protected] Elizabeth Conjar [email protected]
Organizational Network Analysis Improving Intelligence and Information Sharing Capability among Homeland Security and Emergency Management Stakeholders by Christopher P. Bell [email protected]
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Managing Risk in Global ICT Supply Chains
Managing Risk in Global ICT Supply Chains Best Practices and Standards for Acquiring ICT Ready for what s next. Managing Risk in Global ICT Supply Chains Emerging best practices and standards can significantly
Engaging Mobility in the Oil and Gas Sector
Engaging Mobility in the Oil and Gas Sector Engaging Mobility in the Oil and Gas Sector To open a dialogue about the impact of rapid mobile adoption in the energy industry, Booz Allen Hamilton, Bitzer
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Demystifying Virtualization for Small Businesses Executive Brief
Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................
Virtualization and Cloud Computing
Virtualization and Cloud Computing Security is a Process, not a Product Guillermo Macias CIP Security Auditor, Sr. Virtualization Purpose of Presentation: To inform entities about the importance of assessing
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Mitigating Information Security Risks of Virtualization Technologies
Mitigating Information Security Risks of Virtualization Technologies Toon-Chwee, Wee VMWare (Hong Kong) 2009 VMware Inc. All rights reserved Agenda Virtualization Overview Key Components of Secure Virtualization
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware
Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery
CA Cloud Overview Benefits of the Hyper-V Cloud
Benefits of the Hyper-V Cloud For more information, please contact: Email: [email protected] Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter
An overwhelming majority of IaaS clouds leverage virtualization for their foundation.
1 2 3 An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 4 With the use of virtualization comes the use of a hypervisor. Normally, the hypervisor simply provisions resources
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
Stephen Coty Director, Threat Research
Emerging threats facing Cloud Computing Stephen Coty Director, Threat Research Cloud Environments 101 Cloud Adoption is Gaining Momentum Cloud market revenue will increase at a 36% annual rate Analyst
A Survey on Virtual Machine Security
A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology [email protected] Abstract Virtualization plays a major role in helping the organizations to reduce the operational
How To Protect A Virtual Desktop From Attack
Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity
Top virtualization security risks and how to prevent them
E-Guide Top virtualization security risks and how to prevent them There are multiple attack avenues in virtual environments, but this tip highlights the most common threats that are likely to be experienced
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
Sygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Meeting the Challenges of the Modern CIO
Meeting the Challenges of the Modern CIO by Darrin London, PMP [email protected] Daniel E. Williams, PMP [email protected] Table of Contents Introduction...1 Challenges Faced by the Modern
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Driving Company Security is Challenging. Centralized Management Makes it Simple.
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
INTRODUCING isheriff CLOUD SECURITY
INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.
Virtualization s Evolution
Virtualization s Evolution Expect more from your IT solutions. Virtualization s Evolution In 2009, most Quebec businesses no longer question the relevancy of virtualizing their infrastructure. Rather,
Developing a Business Case for Cloud
Developing a Business Case for Cloud Analyzing Return on Investment for Cloud Alternatives May Yield Surprising Results by Paul Ingholt [email protected] Cynthia O Brien o [email protected] John
Securing Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
Network Access Control in Virtual Environments. Technical Note
Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved
Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.
Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects
International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January-2014 ISSN 2229-5518 1299
1299 TITLE Virtualization security in Data Centres & cloud Prof Sarita Dhawale. Ashoka Center for Business & Computer Studies,Nashik Head of Department of Computer Science University of Pune, Maharashtra.
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Cloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization
Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Duration: Three consecutive Saturdays About this Course This instructor led course teaches students how to implement and manage Windows
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations
Cisco Advanced Malware Protection
Solution Overview Cisco Advanced Malware Protection Breach Prevention, Detection, Response, and Remediation for the Real World BENEFITS Gain unmatched global threat intelligence to strengthen front-line
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Before we can talk about virtualization security, we need to delineate the differences between the
1 Before we can talk about virtualization security, we need to delineate the differences between the terms virtualization and cloud. Virtualization, at its core, is the ability to emulate hardware via
Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation
Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization
Secure your Virtual World with Cyberoam
White paper Secure your Virtual World with Cyberoam www.cyberoam.com Virtualization The Why and the What... Rising Data Center costs... Ever-increasing demand for data storage... Under-utilized processors...
Learn the Essentials of Virtualization Security
Learn the Essentials of Virtualization Security by Dave Shackleford by Dave Shackleford This paper is the first in a series about the essential security issues arising from virtualization and the adoption
Virtualization Technology
Virtualization Technology A Manifold Arms Race Michael H. Warfield Senior Researcher and Analyst [email protected] 2008 IBM Corporation Food for Thought Is Virtual Reality an oxymoron or is it the
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
NASCIO 2015 State IT Recognition Awards
NASCIO 2015 State IT Recognition Awards Title: State of Georgia Private Security Cloud Implementation Category: Cybersecurity Contact: Mr. Calvin Rhodes CIO, State of Georgia Executive Director, GTA [email protected]
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
Server Virtualization A Game-Changer For SMB Customers
Whitepaper Server Virtualization A Game-Changer For SMB Customers Introduction Everyone in the IT world has heard of server virtualization, and some stunning achievements by datacenter and Enterprise customers
Learn the essentials of virtualization security
Learn the essentials of virtualization security White Paper Table of Contents 3 Introduction 4 Hypervisor connectivity and risks 4 Multi-tenancy risks 5 Management and operational network risks 5 Storage
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
With Red Hat Enterprise Virtualization, you can: Take advantage of existing people skills and investments
RED HAT ENTERPRISE VIRTUALIZATION DATASHEET RED HAT ENTERPRISE VIRTUALIZATION AT A GLANCE Provides a complete end-toend enterprise virtualization solution for servers and desktop Provides an on-ramp to
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
DOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure [email protected] DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted
Virtualization Essentials
Virtualization Essentials Table of Contents Introduction What is Virtualization?.... 3 How Does Virtualization Work?... 4 Chapter 1 Delivering Real Business Benefits.... 5 Reduced Complexity....5 Dramatically
JUNIPER NETWORKS FIREFLY HOST ANTIVIRUS ARCHITECTURE
White Paper JUNIPER NETWORKS FIREFLY HOST ANTIVIRUS ARCHITECTURE Copyright 2012, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3 Typical Antivirus Use Cases...3 Use Case
HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments
HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments OVERVIEW This document explains the functionality of Security for Virtual and Cloud Environments (SVCE) - what
Cloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
SERVICE SCHEDULE MANAGED HOSTED APPLICATIONS
SERVICE SCHEDULE MANAGED HOSTED APPLICATIONS This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Quorum DR Report. Top 4 Types of Disasters: 55% Hardware Failure 22% Human Error 18% Software Failure 5% Natural Disasters
SAP High Availability in virtualized environments running on Windows Server 2012 Hyper-V Part 1: Overview Introduction Almost everyone is talking about virtualization and cloud computing these days. This
Windows Server 2008 R2 Hyper-V Live Migration
Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
Self-Service Provisioning and the Private Cloud
Self-Service Provisioning and the Private Cloud Using Microsoft Server Virtualization and Dell Compellent Storage Virtualization to Improve Delivery of Infrastructure as a Service Solution Overview Published:
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro [email protected] 26.03.2013
Guideline on Vulnerability and Patch Management
CMSGu2014-03 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Vulnerability and Patch Management National Computer Board
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Citrix XenServer Design: Designing XenServer Network Configurations
Citrix XenServer Design: Designing XenServer Network Configurations www.citrix.com Contents About... 5 Audience... 5 Purpose of the Guide... 6 Finding Configuration Instructions... 6 Visual Legend... 7
Double-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server
Double-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server Double-Take Software, Inc. 257 Turnpike Road; Suite 210 Southborough,
Virtualization for Security
Virtualization for Security t j Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting John Hoopes Technical Editor Aaron Bawcom Paul Kenealy Wesley J. Noonan Craig
Virtualisation. A newsletter for IT Professionals. Issue 2. I. Background of Virtualisation. Hardware
Virtualisation A newsletter for IT Professionals Issue 2 UEducation Sector Updates I. Background of Virtualisation Virtualisation is the separation of resource or request for a service from the underlying
Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.
Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc. Foundstone Labs October, 2003 Table of Contents Table of Contents...2 Introduction...3 Scope and Approach...3
How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
PCI DSS Virtualization Guidelines. Information Supplement: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: June 2011
Standard: Version: 2.0 Date: June 2011 Author: PCI Data Security Standard (PCI DSS) Virtualization Special Interest Group PCI Security Standards Council Information Supplement: PCI DSS Virtualization Guidelines
