Mitigating Information Security Risks of Virtualization Technologies



Similar documents
Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE

The growing importance of a secure Cloud environment

Virtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE

Network Segmentation in Virtualized Environments B E S T P R A C T I C E S

BEST PRACTICES. DMZ Virtualization with VMware Infrastructure

Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc.

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

HP Virtual Controller and Virtual Firewall for VMware vsphere 1-proc SW LTU

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

VMware vcloud Networking and Security Overview

5 Best Practices to Protect Your Virtual Environment

VMware Solution Guide for. Payment Card Industry (PCI) September v1.3

Security Compliance in a Virtual World

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Making Data Security The Foundation Of Your Virtualization Infrastructure

The Top 8 Questions to ask about Virtualization in a PCI Environment

STREAM FRBC

PICO Compliance Audit - A Quick Guide to Virtualization

Business Values of Network and Security Virtualization

Virtualization Impact on Compliance and Audit

Network Access Control in Virtual Environments. Technical Note

What is Virtualization and How Do I Audit It? Rick Schnierer and Chris Tennant

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;

Product Description. Product Overview

Presentation for ISACA Chapter NL. Auditing Virtual Servers. VMware: Security and Operations. Gert-Jan Timmer 3. September, 2012

Automating Cloud Security Control and Compliance Enforcement for PCI DSS 3.0

Sichere Virtualisierung mit VMware

Meeting the Challenges of Virtualization Security

VMware vsphere Design. 2nd Edition

Virtualization Security Checklist

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Preparing an RFI for. This RFI has been updated to reflect the new requirements in Version 3.0 of the PCI DSS, which took effect January 2015.

Potecting your business assets in The Cloud, with. Secure Multitency Environment from CloudHPT.

VMsources Group Inc

Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments

An overwhelming majority of IaaS clouds leverage virtualization for their foundation.

What s New with VMware Virtual Infrastructure

Overcoming Security Challenges to Virtualize Internet-facing Applications

VMware: Advanced Security

managing the risks of virtualization

End to End Security do Endpoint ao Datacenter

Solutions as a Service N.Konstantinidis Technical Director - MNG

How To Protect A Virtual Desktop From Attack

Securing the private cloud

Secure Cloud-Ready Data Centers Juniper Networks

Learn the Essentials of Virtualization Security

Virtualization, SDN and NFV

VirtualclientTechnology 2011 July

How To Protect Your Cloud From Attack

Virtualization System Security

White Paper. Protect Your Virtual. Realizing the Benefits of Virtualization Without Sacrificing Security. Copyright 2012, Juniper Networks, Inc.

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5

How To Build A Software Defined Data Center

VCE Addendum to VMware Solution Guide for Payment Card Industry Data Security Standard

Solving the Desktop Dilemma

VMware Virtual Infrastucture From the Virtualized to the Automated Data Center

vshield Quick Start Guide vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint 1.0

vshield Quick Start Guide

A Look at the New Converged Data Center

Cloud Security. Securing what you can t touch. Presentation to Malaysia Government Cloud Computing Forum HUAWEI TECHNOLOGIES CO., LTD.

Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.

H Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments

Virtualization Essentials

Expert Reference Series of White Papers. VMware vsphere Distributed Switches

Netzwerkvirtualisierung? Aber mit Sicherheit!

Table of Contents. vsphere 4 Suite 24. Chapter Format and Conventions 10. Why You Need Virtualization 15 Types. Why vsphere. Onward, Through the Fog!

Desktop Support Advanced Virtual Desktop Initiative

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

How Does Virtualization Change Your Approach to Enterprise Security and Compliance?

Citrix XenServer 7 Feature Matrix

Trend Micro Deep Security

Technology Insight Series

Network Segmentation

Data Center Manager (DCM)

The Virtualization Practice

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

Security in the Software Defined Data Center

Enterprise. ESXi in the. VMware ESX and. Planning Deployment of. Virtualization Servers. Edward L. Haletky

Network Troubleshooting & Configuration in vsphere VMware Inc. All rights reserved

Secure networks are crucial for IT systems and their

Secure Administration of Virtualization - A Checklist ofVRATECH

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

How Virtualization Affects PCI DSS

Securing the Physical, Virtual, Cloud Continuum

Networking for Caribbean Development

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Optimization, Business Continuity & Disaster Recovery in Virtual Environments. Darius Spaičys, Partner Business manager Baltic s

Securing the Service Desk in the Cloud

How to Achieve Operational Assurance in Your Private Cloud

Transcription:

Mitigating Information Security Risks of Virtualization Technologies Toon-Chwee, Wee VMWare (Hong Kong) 2009 VMware Inc. All rights reserved

Agenda Virtualization Overview Key Components of Secure Virtualization Technologies Achieving and Demonstrating Compliance Use Case: Securely Mixing Trust Zones

Virtualization Basics

Pools of Shared Resources Traditional View Virtual Infrastructure Exchange Operating VMware Infrastructure System PCI Operating VMware Infrastructure System VMware Infrastructure DNS Operating VMware Infrastructure System CRM Operating VMware Infrastructure System CPU Pool Memory Pool Storage Pool Interconnect Pool

How Virtualization Affects Security and Compliance Abstraction and Consolidation Capital and Operational Cost Savings New infrastructure layer to be secured Greater impact of attack or misconfiguration Collapse of switches and servers into one device Flexibility Cost-savings Lack of virtual network visibility No separation-by-default of administration 5

How Virtualization Affects Security and Compliance Faster deployment of servers IT responsiveness Lack of adequate planning Incomplete knowledge of current state of infrastructure Poorly Defined Procedures Inconsistent Configurations VM Mobility Improved Service Levels Identity divorced from physical location VM Encapsulation Ease of business continuity Consistency of deployment Hardware Independence Outdated offline systems Unauthorized copy 6

What not to worry about Hypervisor Rootkits Examples: Blue Pill, SubVirt, etc. These are ALL theoretical, highly complex attacks Widely recognized by security community as being only of academic interest Irrelevant Architectures Example: numerous reports claiming guest escape Apply only to hosted architecture (e.g. Workstation), not bare-metal (i.e. ESX) Hosted architecture deliberately include numerous channels for exchanging information between guest and host. Contrived Scenarios Example: VMotion intercept Involved exploits where Best practices around hardening, lockdown, design, for virtualization etc, not followed, or Poor general IT infrastructure security is assumed

Security Advantages of Virtualization Allows Automation of Many Manual Error Prone Processes Cleaner and Easier Disaster Recovery/Business Continuity Better Forensics Capabilities Faster Recovery After an Attack Patching is Safer and More Effective Better Control Over Desktop Resources More Cost Effective Security Devices App Virtualization Allows de-privileging of end users Better Lifecycle Controls Security Through VM Introspection

Primary Compliance Issue: Collocation of VMs on Same Physical Hardware Virtual Machines are dedicated and isolated entities abstracted from the physical hardware Isolation characteristics of VMs and virtual networks meet compliance requirements Configuration choices are key in meeting compliance requirements Misconfiguration is greatest risk to virtual infrastructure Virtual Infrastructure VMware Infrastructure CPU Pool Memory Pool Storage Pool Interconnect Pool

KEYS TO A SECURE VIRTUALIZED DEPLOYMENT

How do we secure our Virtual Infrastructure? Use the Principles of Information Security Hardening and Lockdown Defense in Depth Authorization, Authentication, and Accounting Separation of Duties and Least Privileges Administrative Controls For virtualization this means: Secure the Guests Harden the Virtualization layer Setup Access Controls Leverage Virtualization Specific Administrative Controls

Securing Virtual Machines Provide Same Protection as for Physical Servers Host Anti-Virus Patch Management Network Intrusion Detection/Prevention (IDS/IPS) Firewalls 12

vnic vnic vnic Isolation in the Architecture Production vswitch1 vmnic1 2 3 4 Prod Network Mgmt VMkernel Storage Mgmt Network vswitch2 Segment out all non-production networks Use VLAN tagging, or Use separate vswitch (see diagram) Strictly control access to management network, e.g. RDP to jump box, or VPN through firewall vcenter Other ESX/ESXi hosts IP-based Storage 13

Secure/Compliant Virtualization Platform Requirements Enterprise Features for Management Controls Strong Access Controls Centralized Authentication Granular Authorization Controls Configuration Management Audit and Logging A Flexible and Well Defined API

Enforce Strong Access Controls Joe Harry Security Principle Least Privileges Separation of Duties Implementation in Virtual Infrastructure Roles with only required privileges Roles applied only to required objects Administrator Operator Anne User

Maintain Tight Administrative Controls Requirement Configuration management, monitoring, auditing Track and Manage VM Updating of offline VMs Virtual network security

Achieving Regulatory Compliance Think Security First Design for Compliance Understand the Scope of the Requirements Ensure that Controls are Comprehensive Don t Rely on Technology Alone Assign the Right Project Manager Collaborate with the Auditor

Use Case: Securely Mixing Trust Zones Three Primary Configurations Physical Separation of Trust Zones Virtual Separation of Trust Zone with Physical Security Devices Fully collapsing all servers and security devices into a Virtual Infrastructure

Physical Separation of Trust Zones

Physical Separation of Trust Zones Advantages Simpler, less complex configuration Less change to physical environment Little change to separation of duties Less change in staff knowledge requirements Smaller chance of misconfiguration leading to a security issue Disadvantages Lower consolidation and utilization of resources Higher cost

Virtual Separation of Trust Zones with Physical Security Devices

Virtual Separation of Trust Zones with Physical Security Devices Advantages Better utilization of resources Take Full Advantage of Virtualization Benefits Lower cost Disadvantages (can be mitigated) More complexity Greater chance of misconfiguration

Fully Collapsed Trust Zones including Security Devices

Fully Collapsed Trust Zones including Security Devices Advantages Full utilization of resources, replacing physical security devices with virtual Lowest-cost option Management of entire DMZ and network from a single management workstation Disadvantages (can be mitigated) Greatest complexity, which in turn creates highest chance of misconfiguration Requirement for explicit configuration to define separation of duties to help mitigate risk of misconfiguration; also requires regular audits of configurations Potential loss of certain functionality, such as VMotion (Being mitigated by vendors and VMsafe)

Conclusion Understand Virtualization Technology Isolation Characteristics of VMs make Collocation of VMs Compliant Key Components of Secure Virtualization Technologies a Must Understand the Steps Necessary for Compliance

Questions? 2009 VMware Inc. All rights reserved