Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation



Similar documents
Virtualization System Security

Virtualization. Pradipta De

Compromise-as-a-Service

Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Satish Mohan. Head Engineering. AMD Developer Conference, Bangalore

Cloud Computing #6 - Virtualization

A Survey on Virtual Machine Security

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE

Stephen Coty Director, Threat Research

SCP - Strategic Infrastructure Security

Virtualization. Dr. Yingwu Zhu

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Security Considerations in Cloud Deployments Matthew Garrett

Basics of Virtualisation

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5

COS 318: Operating Systems. Virtual Machine Monitors

Security Advice for Instances in the HP Cloud

Virtualization. Jukka K. Nurminen

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM

Develop a process for applying updates to systems, including verifying properties of the update. Create File Systems

Virtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Enabling Technologies for Distributed Computing

STREAM FRBC

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

Mitigating Information Security Risks of Virtualization Technologies

VMware ESX Server 3 Configuration Guide

Virtualization. Introduction to Virtualization Virtual Appliances Benefits to Virtualization Example Virtualization Products

Virtualization System Vulnerability Discovery Framework. Speaker: Qinghao Tang Title:360 Marvel Team Leader

VMware: Advanced Security

managing the risks of virtualization

Distributed Systems. Virtualization. Paul Krzyzanowski

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;

Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments

Virtual Machine Security

Data Centers and Cloud Computing

Microkernels, virtualization, exokernels. Tutorial 1 CSC469

Before we can talk about virtualization security, we need to delineate the differences between the

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Enabling Technologies for Distributed and Cloud Computing

Virtual Computing and VMWare. Module 4

Security and Cloud Compunting - Security impacts, best practices and solutions -

Virtualization. Types of Interfaces

Security & Cloud Services IAN KAYNE

Full and Para Virtualization

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Penetration Testing Report Client: Business Solutions June 15 th 2015

October 2015 Issue No: 1.1. Security Procedures Windows Server 2012 Hyper-V

CIT 668: System Architecture

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

Securing the Journey to the Private Cloud. Dominique Dessy RSA, the Security Division of EMC

Google

Jukka Ylitalo Tik TKK, April 24, 2006

KVM: A Hypervisor for All Seasons. Avi Kivity avi@qumranet.com

KVM Security Comparison

THE BLUENOSE SECURITY FRAMEWORK

An overwhelming majority of IaaS clouds leverage virtualization for their foundation.

Overview. CMU/SEI Cyber Innovation Center. Dynamic On-Demand High-Performance Computing System. KVM and Hypervisor Security.

Cloud Computing with Red Hat Solutions. Sivaram Shunmugam Red Hat Asia Pacific Pte Ltd.

CS 695 Topics in Virtualization and Cloud Computing. More Introduction + Processor Virtualization

EECatalog SPECIAL FEATURE

Cloud Computing Governance & Security. Security Risks in the Cloud

UNCLASSIFIED Version 1.0 May 2012

FOR SERVERS 2.2: FEATURE matrix

SURVEY ON VIRTUALIZATION VULNERABILITIES

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.

PCI DSS Virtualization Guidelines. Information Supplement: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: June 2011

Windows Operating Systems. Basic Security

Building Energy Security Framework

EAaaS Cloud Security Best Practices

High-Availability Using Open Source Software

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

Nutanix NOS 4.0 vs. Scale Computing HC3

Best Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software

Operating Systems Virtualization mechanisms

Overcoming Security Challenges to Virtualize Internet-facing Applications

Distributed System Monitoring and Failure Diagnosis using Cooperative Virtual Backdoors

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

Enhancing Hypervisor and Cloud Solutions Using Embedded Linux Iisko Lappalainen MontaVista

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

Lecture 02b Cloud Computing II

CompTIA Cloud+ 9318; 5 Days, Instructor-led

Effective End-to-End Cloud Security

IOActive Security Advisory

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

How To Manage Web Content Management System (Wcm)

VIRTUALIZATION INTROSPECTION SYSTEM ON KVM-BASED CLOUD COMPUTING PLATFORMS. Advisor: Software Security Lab.

Virtualization Technologies. Embrace the new world of healthcare

How To Make A Virtual Machine Aware Of A Network On A Physical Server

Implementing Security on virtualized network storage environment

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:

Remote Administration

Digital evidence in virtual honeynets based on operating system level virtualization

Transcription:

Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation

Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization Recommendations for securing infrastructure may or may not fit in your environment If you have any questions there may be time after the talk, otherwise, please feel free to approach me after

Virtualization?

Why? Consolidation Most systems are under-utilized, especially the CPU is idle for much of the time Do more work with less hardware Reduced space and power requirements Management Snapshot/restore, cloning, migration Increased isolation between services

Servers...

Servers.

Where does the lock go?

Terminology The host is the physical machine running the virtual machine The guest is the emulated (virtual) machine One host could be running many guests Guest OS Guest OS Host (OS + Hypervisor)

Hypervisor Hypervisor emulates hardware for guest Hypervisor allocates some real system RAM to each VM, and shares the CPU time

Orchestrator APIs for administering guest operations Start / Stop Creation / Destruction Failover / Migration Examples Libvirt Ganeti

Visualizing the Virtualization Stack

Threat Model: What is possible? Privilege Escalation Exploit that allows unprivileged subject access to guests through hypervisor, orchestrator services Denial of Service Attacker denies other users access to shared resources

Example: Escalate User Privileges, Access Guests

Example: Guest Access Orchestrator API

VM Escape Breaking out of Guest and interacting with and/or executing code on the host. Spawn a shell Open a network backdoor...

Guests vs. Hypervisor

CVE-2015-3456, Venom Flaw in emulator's implementation of Floppy controller Doesn't require the presence of a floppy drive on the system, just access to send I/O to controller Allows Guest user to execute arbitrary code in user space on Host

Escape to User Space Attacker can execute code and access resources as the owner of the hypervisor process

CVE-2012-0217 kernel: x86_64 Affects Xen Hypervisor When a guest is run paravirtualized, it runs a modified kernel that passes some instructions directly to host kernel Flaw in system call in host kernel that allows guest to execute arbitrary code in kernel space on host

Escape to Kernel Space Attacker can execute code and access resources as the owner with Kernel privileges

Privilege Escalation Mitigation

Segregate Guest Execution Space Execute VM's as non-privileged, service users No home directories No password No Shell Allocate one user account per guest In the case of VM Escape, every guest is isolated

Segregate VM Execution Space

Patch your systems! Hypervisor vulnerabilities are mitigated by patches to the hypervisor software

Mind the Vulnerability Timeline http://blog.coresecurity.com/2013/02/27/a-world-of-vulnerabilities-guest-blog-post-from-infosec-institute/

Audit System Logs Audit privilege escalation Sudoers Root logins Audit orchestrator events Start / Stop / Restart Guest Attach / detach storage Changes to network interfaces

Segregate Services Apply the principle of least privilege: Which users need access to the host? Guests? What network communication is strictly necessary? What communication channels could jeopardize hypervisor? What communication channels could jeopardize data?

Harden Network Services Enable authentication and encryption for remote access protocols VNC Orchestrator APIs Isolate Guest network from Host network Scope the listening interfaces for network services where possible

Summary Virtualization has many benefits but it can be major privilege escalation vector if managed improperly Patching accompanied by strong access control around the hypervisor and orchestrator can limit the damage caused by privilege escalation Auditing and monitoring orchestrator and OS logs will help you know when and if you are being attacked and perhaps even if the attack was successful