Virtualization and Security

Similar documents
Windows Server Discussion with BCIU. Kevin Sullivan Management TSP US Education

W11 Hyper-V security. Jesper Krogh.

The Challenges of X86 Hardware Virtualization. GCC- Virtualization: Rajeev Wankar 36

Hyper-V Deployment and Best Practices. Satyen Pradhan Premier Field Engineer Microsoft (Malaysia)

Dr. K. Y. Srinivasan. Jason Goldschmidt. Technical Lead NetApp Principal Architect Microsoft Corp.

Hypervisor security. Evgeny Yakovlev, DEFCON NN, 2017

SERVE. -Priyal Lokhandwala

4.1. Virtualization. Virtualization provides the following benefits:

Virtual Machine Security

Better Security with Virtual Machines

COMP6511A: Large-Scale Distributed Systems. Windows Azure. Lin Gu. Hong Kong University of Science and Technology Spring, 2014

Virtualization (II) SPD Course 17/03/2010 Massimo Coppola

Virtual Machines. Part 2: starting 19 years ago. Operating Systems In Depth IX 1 Copyright 2018 Thomas W. Doeppner. All rights reserved.

Pasiruoškite ateičiai: modernus duomenų centras. Laurynas Dovydaitis Microsoft Azure MVP

Spring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand

System Center Virtual Machine Manager. Overblik Demo. Roadmap

Compromise-as-a-Service

CSE543 - Computer and Network Security Module: Virtualization

Introduction to SGX (Software Guard Extensions) and SGX Virtualization. Kai Huang, Jun Nakajima (Speaker) July 12, 2017

CIS 5373 Systems Security

Prashant Kumar Program Manager Microsoft Session Code:

Configure dynamic memory. Configure smart paging. Configure Resource Metering. Configure guest integration services. Configure remotefx

Operating System Security

Microsoft SDL 한국마이크로소프트보안프로그램매니저김홍석부장. Security Development Lifecycle and Building Secure Applications

Operating system hardening

CSE543 - Computer and Network Security Module: Virtualization

Virtualization And High Availability. Howard Chow Microsoft MVP

CSE543 - Computer and Network Security Module: Virtualization

Using a Separation Kernel to Protect against the Remote Exploitation of Unaltered Passenger Vehicles

CS 571 Operating Systems. Final Review. Angelos Stavrou, George Mason University

Virtualization. Virtualization

Securing your Virtualized Datacenter. Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008

Microsoft System Center Virtual Machine Manager Microsoft

OS Security IV: Virtualization and Trusted Computing

CS 550 Operating Systems Spring Introduction to Virtual Machines

CSE Computer Security

Operating Systems 4/27/2015

Virtualization. Pradipta De

Virtualization. Michael Tsai 2018/4/16

CS 356 Operating System Security. Fall 2013

COMPUTER ARCHITECTURE. Virtualization and Memory Hierarchy

6.033 Spring Lecture #6. Monolithic kernels vs. Microkernels Virtual Machines spring 2018 Katrina LaCurts

CSC 5930/9010 Cloud S & P: Virtualization

Distributed Systems COMP 212. Lecture 18 Othon Michail

Integrate Microsoft Hyper-V Server

Cyber Essentials Questionnaire Guidance

Virtual machines (e.g., VMware)

Module 1: Virtualization. Types of Interfaces

Virtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC

No Country for Old Security Compliance in the Cloud. Joel Sloss, CDSA Board of Directors May 2017

Intel Virtualization Technology Roadmap and VT-d Support in Xen

CS 350 Winter 2011 Current Topics: Virtual Machines + Solid State Drives

OPERATING SYSTEMS Chapter 13 Virtual Machines. CS3502 Spring 2017

Security Architecture

Virtualization and memory hierarchy

Agenda. Future Sessions: Azure VMs, Backup/DR Strategies, Azure Networking, Storage, How to move

CprE Virtualization. Dr. Yong Guan. Department of Electrical and Computer Engineering & Information Assurance Center Iowa State University

CS-580K/480K Advanced Topics in Cloud Computing. VM Virtualization II

INFLUENTIAL OPERATING SYSTEM RESEARCH: SECURITY MECHANISMS AND HOW TO USE THEM CARSTEN WEINHOLD

Project management - integrated into Outlook

Security Enhancements

SUSE Linux Enterprise Server: Supported Virtualization Technologies

Achieving high availability for Hyper-V

CS370: Operating Systems [Spring 2017] Dept. Of Computer Science, Colorado State University

Agenda. This Session: Azure Networking Basics, On-prem connectivity options DEMO Create VNET/Gateway Cost-estimation for VNET/Gateways

Hyper-V Top performance and capacity tips

Circle IT: Microsoft Update 2016

Scalable Architectural Support for Trusted Software

COS 318: Operating Systems

Multi-Aspect Profiling of Kernel Rootkit Behavior

1 Virtualization Recap

Virtual Appliance Deployment Guide

Creating a Practical Security Architecture Based on sel4

Symantec Reference Architecture for Business Critical Virtualization

Karthik Bharathy Program Manager, SQL Server Microsoft

Confinement. Steven M. Bellovin November 1,

Gavin Payne Senior Consultant.

Deploying Windows 10

Using Virtualization to Improve Security. Jay Judkowitz Product Manager, ESX Server VMware, Inc.

CS 470 Spring Virtualization and Cloud Computing. Mike Lam, Professor. Content taken from the following:

Module 2a. Part 1 Deploying Microsoft Lync Server 2010

CHAPTER 16 - VIRTUAL MACHINES

Towards Application Security on Untrusted Operating Systems

Advanced Systems Security: Virtual Machine Systems

Virtual Machines. Jinkyu Jeong Computer Systems Laboratory Sungkyunkwan University

This video is part of the Microsoft Virtual Academy.

Virtual Machines. Part 1: 54 years ago. Operating Systems In Depth VIII 1 Copyright 2018 Thomas W. Doeppner. All rights reserved.

The vsphere 6.0 Advantages Over Hyper- V

Virtualization Introduction

Hardening with Hardware

Name : Bobby Davasia Title : Technology Specialist Company : Microsoft India

Address new markets with new services

Xen and the Art of Virtualization

Services in the Virtualization Plane. Andrew Warfield Adjunct Professor, UBC Technical Director, Citrix Systems

VMware Mirage Getting Started Guide

AMD Pacifica Virtualization Technology

Implementing and Supporting Windows Intune

Learning Outcomes. Extended OS. Observations Operating systems provide well defined interfaces. Virtual Machines. Interface Levels

Originally prepared by Lehigh graduate Greg Bosch; last modified April 2016 by B. Davison

Advanced Systems Security: Virtual Machine Systems

Transcription:

Virtualization and Security Steve Riley Senior Security Strategist Microsoft Trustworthy Computing steve.riley@microsoft.com http://blogs.technet.com/steriley 1

2 New!

Evolution Usage scenarios 1. One OS, one app, one human using hardware resources 2. One OS, multiple apps, one human sharing hardware resources 3. One OS, multiple apps, multiple humans sharing hardware resources 4. Multiple OSes, multiple apps, multiple humans sharing hardware resources Trust boundaries 1. None 2. Applications 3. Users 4. Operating systems 3

Enforcing trust boundaries Emulation Controlled access to a privileged state Single OS attacker can access hardware Multiple OSes must keep attacker away from hardware This is one function of the virtual machine monitor 4

5 Virtualization Review

Hosted virtualization Application Application Application Application Application Application Application Application Application Application Application Application Operating System Operating System Operating System Hardware 6

Virtual PC 2007/Server 2005 Host Guests Provided by: Virtual Server WebApp IIS Virtual Server Service Ring 3: User Mode Guest Applications Ring 1: Guest Kernel Mode Windows Virtualization ISV Provides resources VM Additions Windows (NT4, 2000, 2003) Windows Server 2003 or Windows XP Kernel Device Drivers Ring 0: Kernel Mode VMM Kernel Same privilege level Server Hardware 7

Hypervisor virtualization: hardware Application Application Application Application Application Application Application Application Application Application Application Application Operating System Operating System Operating System Hypervisor Hardware 8

Hypervisor virtualization: services Application Application Application Application Application Application Application Application Application Application Application Application Operating System System Services Operating System System Operating System Services Kernel Operating System Hypervisor Hardware 9

Hypervisor design options Monolithic Microkernelized VM 1 (Admin) Hypervisor VM 2 VM 3 VM 1 ( Parent ) Virtualization Stack Drivers Drivers VM 2 ( Child ) Drivers Drivers VM 3 ( Child ) Drivers Drivers Drivers Drivers Hypervisor Hardware Hardware Simpler Cheaper Use existing drivers 10

Windows Hyper-V virtualization Root Virtualization Stack WMI Provider VM Service Partition VM Worker Processes Child Partitions Ring 3: User ModeManages guest partitions Handles intercepts Guest Applications Emulates devices (Most traditional hypervisor functions) Provided by: Windows Virtualization ISV Server Core Windows Kernel Device Drivers Virtualization Service Providers (VSPs) Virtualization Service Clients Enforces partition as isolation boundary (VSCs) Most virtualization functions moved out Enlightenments No device drivers Well-defined interface for creating guest OSes VMBus Ring 0: Kernel Mode OS Kernel Ring -1 Windows hypervisor Server Hardware 11

12 Virtualization For Security

Things I hope you will do Sandboxing High availability and disaster recovery Forensic analysis of virtualized attackers Honeypotting 13

14

15

16

17?

18 0day

19

20

21!

22 Here's a thought

23 Here's a controversial thought

24 Virtualization Security

Common VM security myths I only have to patch my host OS or kernel. If I protect my host machine, it will protect my VMs..VHD files are secure by default. If I expose one virtual machine, I have to expose all virtual machines and the host. All virtual machines can see each other. 25

26 Before virtualization

27 After virtualization

Virtualization attacks Root Partition Virtualization Stack Ring 3: User Mode Guest Partitions Provided by: Windows WMI Provider VM Service VM Worker Processes Guest Applications Virtualization ISV Attackers Server Core Windows Kernel Device Drivers Virtualization Service Providers (VSPs) Virtualization Service Clients (VSCs) VMBus OS Kernel Enlightenments Ring 0: Kernel Mode Windows hypervisor Server Hardware 28

Security assumptions Root Trusted by guests Trusted by hypervisor All modes All rings All segments? Guests Don t trust each other Trust root All modes All rings All segments 1.04 Hypercalls Documented Available Attempted Hypervisor Trusts root 29

Security goals and fortifications Root Guest Guest Guest Hypervisor 30

Security non-goals Root Guest Guest Guest Hypervisor 31

Hypervisor security Stack canaries (/GX) NoExecute (NX) Code pages marked read-only Limited exception handling Digitally signed SDL Threat modeling Static analysis Fuzz testing Penetration testing 32

Hypervisor security Memory protection Mapping of physical memory to partition memory Can supersede R/W/X guest page table access rights I/O protection HV enforces parent policy for guest access to I/O v.1: guests have no access HV interface Parent sets policy for guess access to hypercalls, instructions v.1: guests have no access to privileged instructions 33

Hypervisor security Integrates with AzMan Department- and role-based administration Segregate who can manage groups of VMs Definable functions: Start, stop, create, add hardware, change image None require server or domain admin Shared resources are protected ISO disk images always read-only Write functions invoke copy (differencing disks) 34

Hyperjacking Get a Nigerian mortgage for your body part! Root Guest Guest Guest Hyper-jackor Hypervisor Hyper-jackor 35

Should you worry? Malware must start from host or root Is there malware on my system? 100% certain: no malware that I can detect >100% certain: there is no malware at all So nothing new here, move along 36

37 Deployment Considerations

38?

System Center Virtual Machine Manager Root Guest Guest Guest ManageNet Hypervisor 39

40

Patching a virtual machine Use snapshot or backup features to create working copy of operating system Start copy in an isolated test environment Test patches and updates Create snapshot of live system Apply patches and updates to live system Use snapshot for disaster recovery in case of failure Update backup image 41

Keep trust levels similar = 42

Thanks very much! Steve Riley Senior Security Strategist Microsoft Trustworthy Computing steve.riley@microsoft.com http://blogs.technet.com/steriley 43

44 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.