Network Segmentation in Virtualized Environments B E S T P R A C T I C E S



Similar documents
BEST PRACTICES. DMZ Virtualization with VMware Infrastructure

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Mitigating Information Security Risks of Virtualization Technologies

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Secure Segmentation of Tier 1 Applications in the DMZ

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

Virtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE

End Your Data Center Logging Chaos with VMware vcenter Log Insight

Virtual Networking Features of the VMware vnetwork Distributed Switch and Cisco Nexus 1000V Series Switches

Meeting the Challenges of Virtualization Security

VMware vshield App Design Guide TECHNICAL WHITE PAPER

VMware vcloud Networking and Security Overview

WHITE PAPER. VMware vsphere 4 Pricing, Packaging and Licensing Overview

VMware vsphere 4. Pricing, Packaging and Licensing Overview W H I T E P A P E R

VMware vcloud Networking and Security

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE

The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

VMware Virtual Desktop Manager User Authentication Guide

The growing importance of a secure Cloud environment

Cisco Advanced Services for Network Security

Analysis of Virtualization Technology in the DMZ

Study Shows Businesses Experience Significant Operational and Business Benefits from VMware vrealize Operations

vsphere Security ESXi 6.0 vcenter Server 6.0 EN

Top 10 Reasons to Virtualize VMware Zimbra Collaboration Server with VMware vsphere. white PAPER

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Best Practices for PCI DSS V3.0 Network Security Compliance

VMware vsphere 4.1. Pricing, Packaging and Licensing Overview. E f f e c t i v e A u g u s t 1, W H I T E P A P E R

Network Access Control in Virtual Environments. Technical Note

W H I T E P A P E R. Optimized Backup and Recovery for VMware Infrastructure with EMC Avamar

Management of VMware ESXi. on HP ProLiant Servers

Public Cloud Service Definition

Devising a Server Protection Strategy with Trend Micro

Securing the Cloud. A Review of Cloud Computing, Security Implications and Best Practices W H I T E P A P E R

Devising a Server Protection Strategy with Trend Micro

Running VirtualCenter in a Virtual Machine

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Overcoming Security Challenges to Virtualize Internet-facing Applications

Microsegmentation Using NSX Distributed Firewall: Getting Started

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Securing the private cloud

W H I T E P A P E R. Understanding VMware Consolidated Backup

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

Product Description. Product Overview

Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for

vsphere Security Update 1 ESXi 5.1 vcenter Server 5.1 EN

vshield Quick Start Guide vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint 1.0

VMware vcloud Air Security TECHNICAL WHITE PAPER

Security Compliance in a Virtual World

Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER

Netzwerkvirtualisierung? Aber mit Sicherheit!

VMware Solutions for Small and Midsize Business

Analysis of Network Segmentation Techniques in Cloud Data Centers

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

What s New in VMware vsphere 5.0 Networking TECHNICAL MARKETING DOCUMENTATION

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Mobile Secure Desktop Maximum Scalability, Security and Availability for View with F5 Networks HOW-TO GUIDE

vsphere Upgrade vsphere 6.0 EN

VMware: Advanced Security

Virtualization Essentials

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware

Payment Card Industry (PCI) Data Security Standard

Virtualisation. A newsletter for IT Professionals. Issue 2. I. Background of Virtualisation. Hardware

SCADA SYSTEMS AND SECURITY WHITEPAPER

Securing Virtualization with Check Point and Consolidation with Virtualized Security

How to Achieve Operational Assurance in Your Private Cloud

vsphere Host Profiles

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

VMware Consolidated Backup

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Preparing an RFI for. This RFI has been updated to reflect the new requirements in Version 3.0 of the PCI DSS, which took effect January 2015.

Securing the Service Desk in the Cloud

VMware vcloud Air. Enterprise IT Hybrid Data Center TECHNICAL MARKETING DOCUMENTATION

VMware vsphere with Operations Management and VMware vsphere

Guideline on Firewall

Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER

PCI Requirements Coverage Summary Table

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

INTRUSION DETECTION SYSTEMS and Network Security

vshield Quick Start Guide

vshield Administration Guide

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

NETWORK PENETRATION TESTING

VMware Integrated Partner Solutions for Networking and Security

Overview. Firewall Security. Perimeter Security Devices. Routers

CMPT 471 Networking II

VMware Solution Guide for. Payment Card Industry (PCI) September v1.3

Virtualized Security: The Next Generation of Consolidation

VMware vcenter Log Insight Security Guide

Understanding Oracle Certification, Support and Licensing for VMware Environments

Basics of Internet Security

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

Network/Cyber Security

Transcription:

Network Segmentation in Virtualized Environments B E S T P R A C T I C E S

ware BEST PRAC TICES Table of Contents Introduction... 3 Three Typical Virtualized Trust Zone Configurations... 4 Partially Collapsed with Separate Physical Trust Zones... 4 Partially Collapsed with Virtual Separation of Trust Zones... 5 Fully Collapsed Trust Zones... 6 Best Practices for Achieving a Secure Virtualized Trust Zone Deployment... 7 Harden and Isolate the Service Console and Network... 7 Enforce Consistency of Network Configuration Across All Hosts... 7 Set Layer 2 Security Options on Virtual Switches... 8 Enforce Separation of Duties... 8 Use ESX Resource Capabilities... 8 Regularly Audit the Virtualized Configuration... 8 Conclusion... 8 References... 8 2

ware BEST PRAC TICES Network Segmentation in Virtualized Environments Introduction As virtualization becomes the standard infrastructure for server deployments, a growing number of organizations want to consolidate servers that belong to different trust zones. A trust zone is loosely defined as a segment within which data flows relatively freely, whereas data flowing in and out of the trust zone is subject to stronger restrictions. Examples of trust zones include: Demilitarized zones (DMZs) Payment card industry (PCI) cardholder data environment Site-specific zones, such as segmentation according to department or function Application-defined zones, such as the three tiers of a Web application The introduction of virtual technology does not have to significantly change the topology. As with other parts of the, virtual technology merely enables server consolidation by replacing physical servers with virtual servers that function exactly the same way and need to be configured in much the same way as their physical equivalents. You can consolidate servers using virtual technology without mixing trust zones and continue to rely on your existing security infrastructure. However, replicating a purely physical topology with virtual machines can greatly limit the benefits that virtualization can provide. If you do not run virtual machines of different trust zones together on one host, the degree of consolidation you achieve can remain low. In addition, you might not realize operational benefits from more advanced virtualization capabilities, such as live migration and high availability. ware customer experience and independent analyst research demonstrate that a virtualized trust zone configuration option can be secured. However, some security professionals are concerned that trust zone virtualization might decrease security. This is understandable, because virtualization involves new terminology and technology. Fortunately, as a security professional, you already have the critical knowledge necessary to ensure the proper configuration of virtual s with a segmented infrastructure. Enforcement policies on a virtual are the same as those on a physical. The difference is that the way in which these policies are enforced can be different in a virtual environment. Gartner research supports this view by suggesting that security risks primarily emanate from administrative misconfiguration and not from the virtual infrastructure. (See the Resources section for information on this Gartner report.) This paper provides information that will enable you to configure virtualized trust zones correctly and deploy them seamlessly. It provides detailed descriptions of three different virtualized trust zone configurations and identifies best practice approaches that enable secure deployment. It is very important to understand that the biggest risk to the virtual environment is misconfiguration, not the technology. Thus you need strong audit controls to ensure that you avoid misconfiguration, either accidental or malicious. Production IDS/IPS Web zone Figure 1 Example of trust zones in a physical environment Application zone Database zone 3

ware BEST PRAC TICES Three Typical Virtualized Trust Zone Configurations A virtualized can fully support and enforce a wide range of configurations to separate trust zones. The three options described in this section are typical. Partially Collapsed with Separate Physical Trust Zones Organizations that want to keep trust zones physically separated tend to choose this method, shown in figure 2. In this configuration, each zone uses separate ware ESX hosts or clusters. Zone isolation is achieved with air-gap separation of servers and physical security devices. The physical does not require any change. The only difference between this configuration and a purely physical datacenter is that the servers within the trust zone are virtualized. This configuration limits the benefits you can achieve from virtualization because it does not maximize consolidation ratios, but this approach is a good way to introduce virtual technology into a. Because it has minimal impact on an existing physical, this configuration avoids certain risks. For instance, it minimizes the impact of the potential loss of separation of duties. This, in turn, greatly reduces the chance that an unqualified individual might be in a position to introduce a vulnerability through misconfiguration. In this configuration, you do not need to configure dedicated virtual switches or use 802.1q Vs within the virtual infrastructure. You perform all ing isolation on the physical, not within the virtual infrastructure. Advantages Simpler, less complex configuration Less change to physical environment, and thus less change to separation of duties and less change in staff knowledge requirements Less chance for misconfiguration because of lower complexity Disadvantages Lower consolidation and utilization of resources Higher costs because of need for more ESX hosts and additional cooling and power Incomplete utilization of the operational efficiencies virtualization can provide ware vcenter server Production IDS/IPS kernel kernel kernel ware ESX ware ESX ware ESX Web zone Figure 2 Partially collapsed with separate physical trust zones Application zone Database zone 4

ware BEST PRAC TICES Partially Collapsed with Virtual Separation of Trust Zones In this configuration, shown in Figure 3, you use virtual technology to enforce trust zone separation. As a result, you can locate virtual servers with different trust levels on the same ESX host. Although physical security devices are part of the configuration, this approach consolidates all virtual machines on the same hosts, thus requiring substantially fewer physical servers. By achieving full server consolidation, you generate significant cost savings for your IT organization. Enforcement of the security zones at the level takes place in both virtual and physical realms. You use virtual switches to enforce which virtual servers are connected to which zone, but you use physical hardware to enforce the security between the zones. For this reason, virtual servers must use the physical and pass through physical security devices to communicate between trust zones. The impact of the potential loss of separation of duties and the associated risk that an unqualified individual might be in a position to introduce vulnerabilities through misconfiguration is greater in this case than when you have separate physical trust zones, but the potential impact is minimized by the fact that security is still physically enforced. In this configuration, you should create and enforce access controls that allow only privileged administrators to assign virtual machines to highly sensitive trust zones, and restrict less privileged administrators to less sensitive zones. Because the trust zones in this configuration are enforced in the virtualization layer, you should audit virtual switches regularly for consistent policy and settings to mitigate the potential for a virtual machine to be placed on the wrong. Although Figure 3 shows separate virtual switches for each zone, you can accomplish the same goal by using 802.1q Vs. The most important factor in determining which configuration option to choose is typically the number of physical s present in the hardware. You should always dedicate at least one physical to the virtualization management. If possible, use two physical s for the virtualization management to provide redundancy. Advantages Full utilization of resources Full utilization of the advantages of virtualization Lower cost Disadvantages More complexity Greater chance of misconfiguration requires explicit configuration of separation of duties to help mitigate risk of misconfiguration; also requires regular audits of configurations ware vcenter server Production Web servers Application servers Database servers IDS/IPS kernel Web zone Application zone Database zone ware ESX Web zone Application zone Database zone Figure 3 Partially collapsed with virtual separation of trust zones 5

ware BEST PRAC TICES Fully Collapsed Trust Zones Taking full advantage of ware technology, this approach, shown in Figure 5, virtualizes the entire datacenter including all and security devices. For DMZs, this is sometimes described as a DMZ in a box. This configuration enables you to maximize server consolidation and realize significant cost reductions. This configuration fully leverages consolidation benefits. All servers and security devices are virtualized in this configuration, enabling you to isolate the virtual servers and the s while managing communications between the zones with virtual security appliances. This completely virtual infrastructure can fully enforce the isolation and security between zones. You can collocate virtual machines of different security levels on the same physical server or servers and bring security devices into the virtual infrastructure. You can choose from an increasing number of virtual security devices to manage and secure the communication between virtual trust zones. For example, you can use ware vshield Zones to bridge trust zones and allow only selective communication between them, while monitoring both allowed and disallowed traffic. If trust zones reside on different segments, Layer 3 routing between trust zones still takes place in the physical part of the, unless you use a virtual routing device. However, you do not need to use a virtual router to enjoy the consolidation and operational benefits of a fully collapsed trust zone. This is the most complex configuration of the three. Therefore, risks associated with misconfiguration are higher and you need to take care when planning this configuration. Enforcing separation of duties through the use of roles and permissions is very important. Also, when you plan and deploy your virtual s, you must make sure that the isolation of those s is enforced and that any communications between virtual machines on separate s are properly routed through the virtual firewalls as well as any other in-line security devices you are using. It is especially important in this configuration to audit the configurations of virtual firewalls and virtual switches for consistent policy and settings, because all of the zone enforcement is performed in the virtual environment. If the policy is different on any of the virtual firewalls or virtual switches, you can encounter such issues as dropped connections for example, when a virtual machine is moved to a new host using otion You can use 802.1q Vs in this configuration, but Vs are not required as they are in the configuration using partially collapsed trust zones with virtual separation. With a fully collapsed trust zone, you need a minimum of three s per ESX host one to connect to the, a second to connect to Firewall IDS/IPS virtual appliance(s) Web servers Application servers Database servers Kernel Intranet Web Application Database ware ESX Production Figure 4 Fully collapsed trust zones ware vcenter server 6

ware BEST PRAC TICES the internal, and a third for the management. ware strongly encourages ing for redundancy, so you should consider using enough physical s to allow for redundancy of all s. Advantages Full utilization of resources, replacing physical security devices with virtual Lowest-cost option of entire from a single management workstation Disadvantages Greatest complexity, which in turn creates highest chance of misconfiguration Requirement for explicit configuration of separation of duties to help mitigate risk of misconfiguration; also requires regular audits of configurations Loss of certain functionality, such as otion, if current virtual security appliances are not properly configured and audited Best Practices for Achieving a Secure Virtualized Mixed Trust Zone Deployment Most security issues do not arise from the virtualization infrastructure itself but from administrative and operational challenges. The primary risks are caused by a loss of separation of duties. When this occurs, individuals who lack the necessary experience and capabilities are given an opportunity to introduce vulnerabilities through misconfiguration. For instance, they can accidentally place the virtual of a virtual machine in the wrong trust zone. This risk which also can also occur in purely physical environments can breach the isolation between s and virtual machines of different trust levels. Although best practice security policies and procedures for introducing virtualization into mixed trust zone environments are not overly complex, you should be aware of the critical challenges and best practice methods in order to mitigate risk. At every stage, you must remember that virtual machines need the same type of protections as their physical counterparts including antivirus software, host intrusion protection, configuration management, and patching in a timely manner. In short, virtual machines need to be secured in the same manner as physical machines. After you decide to either partially or completely collapse trust zones, your first step should be to map out which virtual servers will reside on which physical servers and to establish the level of trust that is required for each system. Afterwards, you should follow the guidelines in this section. Virtualized Trust Zone Security Checklist Harden and isolate the service console and management Enforce consistency of configuration across all hosts Set Layer 2 security options on virtual switches Enforce separation of duties Use ESX resource management capabilities Regularly audit virtualized configuration Harden and Isolate the Service Console and Network This step is especially important because access to the service console of an ESX host gives a user with root privileges full control over the virtual machines on that host. Although access to the service console is secured through authentication, you can provide additional security against unauthorized access by creating additional layers of security. In addition, you should isolate the service console. To do so, make sure that the to which the service console is isolated is firewalled and accessible only to authorized administrators. You can use a VPN or other access control methods to restrict access to the management. Although ware ESXi does not have a service console, you should nonetheless isolate the management, which provides access to the ESXi APIs, and you should harden the server. For details on how to harden both ESX and ESXi, read ware Infrastructure 3 Security Hardening (see Resources for a link). Enforce Consistency of Network Configuration Across All Hosts Ensuring that the virtual is configured in a consistent manner across all hosts is particularly critical because accidentally connecting virtual servers to the wrong s can undermine all other security efforts. By clearly labeling the s, you make it less likely that a virtual machine can be connected to an unauthorized accidentally. 7

ware BEST PRAC TICES You can use automated tools, such as ware Host Profiles or other third-party tools, to enforce and monitor configuration consistency. Another approach is to use distributed switch technology, such as the ware vnetwork Distributed Switch, or a third-party switch such as the Nexus 1000V. This enables you to manage and configure virtual ing on a cluster of ESX or ESXi hosts in a single place, thus avoiding the possibility of configuration inconsistency altogether. Set Layer 2 Security Options on Virtual Switches Protect against attacks such as data snooping, sniffing, and MAC spoofing by disabling the promiscuous mode, MAC address changes, and forged transmissions capabilities on the virtual s. These capabilities are very rarely needed and create opportunities for exploitation. Fortunately, in the ware virtual layer you have full control over these options, something that is not the case in purely physical environments. Enforce Separation of Duties Mitigate configuration mistakes by using vcenter to define roles and responsibilities for each administrator of the vsphere infrastructure. By distributing rights based on skills and responsibilities, you can significantly reduce the chance of misconfiguration. As an added benefit, this method also limits the amount of authority any one administrator has over the system as a whole. In particular, you should restrict privileges for performing the following actions: Reconfiguring virtual s Assigning virtual machines to sensitive s Changing firewall or other security policies Best practice also dictates that you use administrator or root access only in emergency situations. This practice mitigates the potential for accidental or malicious misconfiguration by an administrator. It also helps further limit the number of people who know the password for this type of account, which provides full control. Regularly Audit the Virtualized Configuration Regular audit of configurations is essential in both physical and virtual environments. When virtualizing any part of your infrastructure, it is important to audit the configurations of all of the components including vcenter, es, virtual and physical firewalls, and any other security devices regularly. You must conduct these audits to make sure that changes to configurations can be controlled and that the changes do not cause a security hole in the configuration. The use of configuration management and compliance tools can greatly assist with the audit process. Audits are especially important for the second and third options discussed in this paper because the risk of misconfiguration is much higher in those topologies. Conclusion You can take advantage of the benefits of virtualization in setting up mixed trust zones, and you can do so securely, maintaining compliance with your organization s policies. There are a number of configurations you can use to achieve this goal. As part of continuing efforts to keep customers informed of best practice approaches to security, ware has generated a number of technology briefs that enable you to further harden ESX hosts and vcenter and to ensure the overall security of your vsphere Infrastructure. For a list of technical documents that fully detail insights gained from deploying virtual technology at over 20,000 IT organizations worldwide, go to the ware Security Center on the Web (see References for a link). Resources Server Virtualization Can Break DMZ Security, by Neil MacDonald and Greg Young, Gartner Research ware Infrastructure 3 Security Hardening http://www.vmware.com/resources/techresources/726 ware Security Center http://www.vmware.com/security Use ESX Resource Capabilities Denial of service within a virtual environment can occur if an individual virtual machine is allowed to use a disproportionate share of ESX host resources. In so doing, it starves other virtual machines running on the same ESX host. Such denial of service can occur as the result of malicious intent or accidentally, but you can guard against this possibility by setting resource reservations and limits for virtual machines using vcenter. You should use the same resource controls to ensure that sufficient resources are available to virtual security devices. 8

Revision: 20090519 Item: BP-059-INF-02-01 ware, Inc. 3401 Hillview Ave. Palo Alto CA 94304 USA Tel 650-475-5000 Fax 650-475-5001 www.vmware.com 2009 ware, Inc. All rights reserved. Protected by one or more of U.S. Patent Nos. 6,397,242, 6,496,847, 6,704,925, 6,711,672, 6,725,289, 6,735,601, 6,785,886, 6,789,156, 6,795,966, 6,880,022, 6,961,941, 6,961,806, 6,944,699, 7,069,413; 7,082,598, 7,089,377, 7,111,086, 7,111,145, 7,117,481, 7,149, 843, 7,155,558, 7,222,221, 7,260,815, 7,260,820, 7,269,683, 7,275,136, 7,277,998, 7,277,999, 7,278,030, 7,281,102, and 7,356,679; patents pending. ware, the ware boxes logo and design, Virtual SMP and otion are registered trademarks or trademarks of ware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.