Virtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE



Similar documents
VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE

Mitigating Information Security Risks of Virtualization Technologies

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

BEST PRACTICES. DMZ Virtualization with VMware Infrastructure

Network Segmentation in Virtualized Environments B E S T P R A C T I C E S

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

managing the risks of virtualization

Meeting the Challenges of Virtualization Security

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

PICO Compliance Audit - A Quick Guide to Virtualization

VMware vsphere 5.1 Advanced Administration

The growing importance of a secure Cloud environment

VMware ESXi 3.5 update 2

Virtualization System Security

STREAM FRBC

Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc.

Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

VMware vsphere 5.0 Boot Camp

What s New with VMware Virtual Infrastructure

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

TGL VMware Presentation. Guangzhou Macau Hong Kong Shanghai Beijing

Preparing an RFI for. This RFI has been updated to reflect the new requirements in Version 3.0 of the PCI DSS, which took effect January 2015.

VMware Virtual Infrastucture From the Virtualized to the Automated Data Center

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Auditing Virtualized Environments

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5

Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D

How To Protect Virtualized Data From Security Threats

Table of Contents. vsphere 4 Suite 24. Chapter Format and Conventions 10. Why You Need Virtualization 15 Types. Why vsphere. Onward, Through the Fog!

Netzwerkvirtualisierung? Aber mit Sicherheit!

VMware ESX Server 3 Configuration Guide

VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER

Khóa học dành cho các kỹ sư hệ thống, quản trị hệ thống, kỹ sư vận hành cho các hệ thống ảo hóa ESXi, ESX và vcenter Server

VMware vsphere: Install, Configure, Manage [V5.0]

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

H Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments

Database Security, Virtualization and Cloud Computing

FOR SERVERS 2.2: FEATURE matrix

The Top 8 Questions to ask about Virtualization in a PCI Environment

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments

Securing the Cloud. A Review of Cloud Computing, Security Implications and Best Practices W H I T E P A P E R

CompTIA Cloud+ 9318; 5 Days, Instructor-led

Virtualisation. A newsletter for IT Professionals. Issue 2. I. Background of Virtualisation. Hardware

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

Making Data Security The Foundation Of Your Virtualization Infrastructure

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

VMware vsphere 4.1 with ESXi and vcenter

E-SPIN's Virtualization Management, System Administration Technical Training with VMware vsphere Enterprise (7 Day)

Learn the Essentials of Virtualization Security

Networking for Caribbean Development

How Does Virtualization Change Your Approach to Enterprise Security and Compliance?

What is Virtualization and How Do I Audit It? Rick Schnierer and Chris Tennant

Agentless Security for VMware Virtual Data Centers and Cloud

Trend Micro Deep Security

9/26/2011. What is Virtualization? What are the different types of virtualization.

Server Virtualization A Game-Changer For SMB Customers

VMware vsphere-6.0 Administration Training

Securing the private cloud

Virtualization for Cloud Computing

VMware vsphere: Fast Track [V5.0]

Best Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software

Virtualization Security Checklist

Virtualization Overview

Solution Guide Parallels Virtualization for Linux

Building Docker Cloud Services with Virtuozzo

Stephen Coty Director, Threat Research

Solving the Desktop Dilemma

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

VMware: Advanced Security

Virtualization. Michael Tsai 2015/06/08

Virtualization Security

How To Protect Your Cloud From Attack

Addressing the Most Common Security Risks in Data Center Virtualization Projects

SQL Server Virtualization 101. David Klee, Group Principal and Practice Lead. SQL PASS Virtualization VC,

W H I T E P A P E R. Optimized Backup and Recovery for VMware Infrastructure with EMC Avamar

Enabling Technologies for Distributed Computing

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

IT Security Trends. A strategic overview featuring Gartner content. In this issue

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

Product Description. Product Overview

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Effective End-to-End Cloud Security

5 Steps to Advanced Threat Protection

Comparing Free Virtualization Products

How Virtualization Affects PCI DSS

Red Hat enterprise virtualization 3.0 feature comparison

Transcription:

Virtualization Security and Best Practices Rob Randell, CISSP Senior Security Specialist SE

Agenda General Virtualization Concepts Hardware Virtualization and Application Virtualization Types of Hardware Virtualization Virtualization Specific Security Issues and Advantages Security Concepts in Virtualization Architecture Operational Security Issues with Virtualization Other Concerns Security Advantages of Virtualization Security Best Practices Secure Design Secure Deployment Secure Operations Common Virtualization Security Concerns and Misconceptions Are there any Hypervisor Attack Vectors? Virtualizing the DMZ Common Misconceptions about Virtualization Security 2

Virtualization Concepts Hardware Virtualization Makes an OS think it is running on it own hardware Abstracts the hardware from the OS ware, MS Virtual PC, Xen are forms of hardware virtualization Application Virtualization Makes an application thinks it is running in its own OS Abstracts the services and kernel from an application Thinstall and Softgrid are forms of application virtualization 3

Bare Metal (Hypervisor) Virtualization Engine Installs Directly on Hardware No reliance on an underlying OS ware ESX Server, XEN, MS Hyper-V Bare Metal Hardware Virtualization 4

Hosted Relies on an underlying OS More security implications because of the reliance on the underlying OS ware Workstation, ware Server, ware Player, MS Virtual PC and Server Hosted Hardware Virtualization ware Confidential/Proprietary Copyright 2006 ware, Inc. All rights reserved. 5

Extended computing stack Security Concepts in Architecture New privileged layers (Hypervisor) exist underneath the operating system that need to be considered Guest isolation One guest cannot be allowed to access or even address the hardware resources of another guest or the host/hypervisor Host Visibility from the Guest Can the guest OS detect that it is virtualized and if so can it see anything on the host. Virtualized interfaces Physical connectivity between guests is recreated, e.g. IP network, file shares, may be more or less like true physical counterparts Management interfaces The protection of management interfaces (Console OS, VirtualCenter, etc ) very important. Root or Administrator Access to these interfaces provides keys to the kingdom. Greater co-location of data and assets on one box Concept of mixing of Trust/Security Zones on a single physical box 6

Operational Security Issues Most security issues arise not from the virtualization infrastructure itself but from operational issues Adapting existing security processes and solutions to work in the virtualized environment Most security solutions don t care whether a machine is physical or virtual The datacenter and its workloads just became a much more dynamic and flexible place The risk of misconfiguration requires use of best practices specific to virtualization 7

Security Advantages of Virtualization Better Forensics and Faster Recovery After an Attack A compromised machine can be cloned in it current compromised state for forensic analysis Once cloned the can be immediately restored to a known good snapshot which is much faster than a physical server, reducing the impact of a security-related event Patching is Safer and More Effective You can quickly revert to a previous state if a patch is unsuccessful, making you more likely to install security patches sooner You can create a clone of a production server easily, making you more likely to test security patches and more likely to install security patches ware Update Manager does patch scanning and compliance reporting, along with patch remediation for both online and offline s again, making it more likely that security patches will be installed More Cost Effective Security Devices You can put in place cost effective intrusion detection, vulnerability scanning, and other security related appliances, because you can put them in a instead of a physical server Future: Leveraging Virtualization to Provide Better Security Better Context Provide protection from outside the OS, from a trusted context New Capabilities view all interactions and contexts CPU Memory Network Storage 8

Security Best Practices

Secure Design Separate and Isolate Management Networks Service Console Vmkernel: Vmotion and NFS & iscsi datastores Plan for mobility: 3 options Partition trust zones Security Best Practices Combine trust zones using virtual network segmentation and virtual network management best practices Combine trust zones using portable protection with 3rd-party tools (Blue Lane, etc) 10

Secure Deployment Harden ware Infrastructure 3 according to guidelines ware-provided Security Best Practices 3rd-party: STIG, CIS, Xtravirt Security Risk Assessment template, etc. Always secure virtual machines like you would physical servers Anti-virus Patching Host-based intrusion detection/prevention Use Templates and Cloning to enforce conformity of virtual machines ware Confidential/Proprietary Copyright 2006 ware, Inc. All rights reserved. 11

Secure Operations Strictly control administrative access Security Best Practices Favor controlled management interfaces (VI Client, Web Access) over unstructured interfaces (Service Console) Avoid VI Console access except when absolutely necessary; favor OSbased access to (RDP, ssh, etc). Use roles-based access control to limit administrative capabilities and enforce separation of duties, and never use anonymous accounts (e.g. Administrator ) Allow powerful access only to small, privileged group; implement breakglass policy for top level administrative account 12

Secure Networking Restrict access to privileged networks Security Best Practices Closely restrict administrative access on any host with privileged network For less privileged users, only allow template-based provisioning on those hosts Guard against misconfiguration Clearly label sensitive virtual networks Generate audit reports that flag suspicious configurations Routinely inspect event and task logs ware Confidential/Proprietary Copyright 2006 ware, Inc. All rights reserved. 13

Detailed Prescriptive Guidance Security Design of the ware Infrastructure 3 Architecture (http://www.vmware.com/resources/techresources/727) ware Infrastructure 3 Security Hardening (http://www.vmware.com/vmtn/resources/726) Managing ware VirtualCenter Roles and Permissions (http://www.vmware.com/resources/techresources/826) STIG (Secure Technology Implementation Guide) draft (http://iase.disa.mil/stigs/draft-stigs/index.html) CIS (Center for Internet Security) Benchmark (http://www.cisecurity.org/bench_vm.html) Best Practices References Xtravirt Virtualization Security Risk Assessment (http://www.xtravirt.com/index.php?option=com_remository&itemid=75&func=fileinfo &id=15) 14

Common Virtualization Security Concerns

Are there any Hypervisor Attack Vectors? There are currently no known hypervisor attack vectors to date The ESX Server Hypervisor has not been known to be compromised to date. Concern is the potential for Escape Potential Vectors? Architectural Vulnerability Small Code Footprint of Hypervisor is Big Advantage Must be Designed specifically with Isolation in Mind Software Vulnerability Possible like with any code written by humans If a software vulnerability is found, exploit difficulty will be very high Depends on Vendor s Security Response and Patch Release Speed Configuration Risk Biggest Risk to Virtual Infrastructure Follow Best Practices to Avoid 16

Concern: Virtualizing the DMZ Multiple different configurations can be used depending on environment Collapsing of servers in each trust zone into their own cluster of ESX Servers Safer for those that won t or can t fully trust our isolation ability Small risk of misconfiguration creating a security hole Does not take full advantage of consolidation benefits. 17

Partial Collapse of DMZ Virtual Center Server Internet Production LAN Managem ent LAN Service Console Interface Service Console Interface Service Console Interface ID S/IPS vmkernel Service Console vmkernel Service Console vmkernel Service Console ESX Server(s) NIC Team ESX Server(s) NIC Team ESX Server(s) NIC Team Web Zone App Zone Datab ase Zone ware Confidential/Proprietary Copyright 2006 ware, Inc. All rights reserved. 18

Concern: Virtualizing the DMZ Multiple different configurations can be used depending on environment Collapsing of servers in each trust zone into their own cluster of ESX Servers Safer for those that won t or can t fully trust our isolation ability Small risk of misconfiguration creating a security hole Does not take full advantage of consolidation benefits. Collapsing all servers in multiple trust zones to a single cluster of ESX Servers using virtual networking and physical security devices to enforce isolation Takes full advantage of virtualization benefits so it is more cost effective. Bigger risk of misconfiguration creating a security hole. Not an option if an organization doesn t or can t trust our isolation ability 19

Hybrid of Partial and Full Collapse Virtual Center Server Internet Production LAN Management LAN Web Servers Application Servers Database Servers Service Console Interface IDS/IPS vmkernel Web Zone App Zone Database Zone Service Console NIC Team NIC Team ESX Server(s) NIC Team Web Zone App Zone Database Zone ware Confidential/Proprietary Copyright 2006 ware, Inc. All rights reserved. 20

Concern: Virtualizing the DMZ Multiple different configurations can be used depending on environment Collapsing of servers in each trust zone into their own cluster of ESX Servers Safer for those that won t or can t fully trust our isolation ability Small risk of misconfiguration creating a security hole Does not take full advantage of consolidation benefits. Collapsing all servers in multiple trust zones to a single cluster of ESX Servers using virtual networking and physical security devices to enforce isolation Takes full advantage of virtualization benefits so it is more cost effective. Bigger risk of misconfiguration creating a security hole. Not an option if an organization doesn t or can t trust our isolation ability Fully collapsing all servers and security devices into a Virtual Infrastructure Takes even more advantage of consolidation by virtualizing security devices, Lose some capabilities due to current limitations of those virtual security devices Future developments in virtual security devices will remove those limitations 21

Full Collapse Firewall/IDS/IPS Virtual Appliance(s) Web Servers Application Servers Database Servers vmkernel Internet Intranet Web App Database Service Console NIC Team NIC Team ESX Server(s) Virtual Center Server Internet Production LAN Management LAN ware Confidential/Proprietary Copyright 2006 ware, Inc. All rights reserved. 22

Common Misconceptions about ware Security Commonly cited: Blue Pill, SubVirt These are NOT hypervisor vulnerabilities, but use the concept of a hypervisor to embed themselves underneath an OS by leveraging hardware enabled virtualization (AMD Pacifica Chipset) These can only affect non-virtualized operating systems Therefore, you are safer running in a Various Claims of Guest Escape Don t affect Bare-Metal Platforms only hosted platforms Not exactly escape nor a hypervisor vulnerability Uses documented communication interface for hosted features such as drag-n-drop, cut n-paste, and shared folders. This communication interface can be disabled (on by default) 23

Other Concerns Restricted view into inter- traffic for inspection by intrusion detection/prevention systems (IDS/IPS). This is possible currently with the use of a helper or forcing traffic out to physical network Vendors need to address this and provide this capability Interesting issue to be brought up though because few organizations monitor traffic that deep in the network. Limited visibility into the host OS and virtual network to find vulnerabilities and assess correct configuration. ware is working closely with leading security vendors to help create virtualization specific security tools and give the needed visibility for these tools. Safe will provide APIs for Security Vendors for unparalleled visibility and security capabilities Patching, signature updates, and protection from tampering for offline images. Virtualization Vendor should provide capability for the patching of both online and offline s Patching s is safer than patching physical systems with the use of snapshot feature for testing and deployment of patches Some major security vendors are near release for the ability to update AV and HIPS signatures for offline s 24

Questions? Rob Randell, CISSP Senior Systems Engineer - Security Specialist