T12: Virtualization: IT Audit and Security Perspectives Jason Chan, VMware

Similar documents
The vsphere 6.0 Advantages Over Hyper- V

Securing the Data Center against

SYMANTEC DATA CENTER SECURITY

T14 - Network, Storage and Virtualization Technologies for Industrial Automation. Copyright 2012 Rockwell Automation, Inc. All rights reserved.

Better Security with Virtual Machines

The Evolution of Data Center Security, Risk and Compliance

Symantec Reference Architecture for Business Critical Virtualization

Securing your Virtualized Datacenter. Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008

Directions in Data Centre Virtualization and Management

Enabling Red Hat Virtualization for the Hybrid Cloud

Agenda. Today s IT Challenges. Symantec s Collaborative Architecture. Symantec TM Endpoint Management Suite. Connecting Symantec Technologies Today

CS 356 Operating System Security. Fall 2013

IBM Cloud for VMware Solutions

Cisco Enterprise Cloud Suite Overview Cisco and/or its affiliates. All rights reserved.

ORACLE DATABASE LIFECYCLE MANAGEMENT PACK

W11 Hyper-V security. Jesper Krogh.

BUILDING A PRIVATE CLOUD. By Mark Black Jay Muelhoefer Parviz Peiravi Marco Righini

Paul Hodge Virtualization Solutions: Improving Efficiency, Availability and Performance

I D C T E C H N O L O G Y S P O T L I G H T. V i r t u a l and Cloud D a t a Center Management

The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec

When (and how) to move applications from VMware to Cisco Metacloud

DELL EMC VSCALE FABRIC

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. reserved. Insert Information Protection Policy Classification from Slide 8

Deploying VMware Mirage : Tips and Tricks for Success

DC: Le Converged Infrastructure per Software Defined e Cloud Cisco NetApp - Softway. Luigi MARCOCCHIA SOFTWAY

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer

Datacenter Security: Protection Beyond OS LifeCycle

[TITLE] Virtualization 360: Microsoft Virtualization Strategy, Products, and Solutions for the New Economy

CLOUD SECURITY: THE CHALLENGES FOR THE DATA CENTRE AND IT ENVIRONMENT NOVEMBER 2016

70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure

VMware vsphere with ESX 4.1 and vcenter 4.1

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

CLOUD COMPUTING IT0530. G.JEYA BHARATHI Asst.Prof.(O.G) Department of IT SRM University

Automating the Software-Defined Data Center with vcloud Automation Center

The Business Value of Virtualizing Oracle ebusiness Suite. Haroon Qureshi QSolve, Inc.

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

That Set the Foundation for the Private Cloud

VMware Join the Virtual Revolution! Brian McNeil VMware National Partner Business Manager

Transform to Your Cloud

Enterprise X-Architecture 5th Generation And VMware Virtualization Solutions

Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Availability & Resource

Transforming your IT infrastructure Journey to the Cloud Mike Sladin

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Traditional Desktop Deployment. Desktop Delivery Vision. End to End desktop virtualization. virtualization. virtualization

Improving Blade Economics with Virtualization

A comprehensive framework for securing virtualized data centers. Business white paper

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Title DC Automation: It s a MARVEL!

The threat landscape is constantly

What s New in VMware vsphere 5.1 Platform

IBM Europe, Middle East, and Africa Services Announcement ZS , dated October 6, 2009

Private Cloud Database Consolidation Name, Title

Reference Architecture for Dell VIS Self-Service Creator and VMware vsphere 4

VMware Overview VMware Infrastructure 3: Install and Configure Rev C Copyright 2007 VMware, Inc. All rights reserved.

Automating the Software-Defined Data Center with vcloud Automation Center

VMware vcloud Networking and Security Overview

Oracle Corporation 1

Making MCP more agile for ING Best of both worlds

Kaspersky Security for Virtualization Frequently Asked Questions

Accelerate Your Enterprise Private Cloud Initiative

Trust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved

Why the cloud matters?

Acronis Hybrid Cloud Architecture Unified Centralized Data Protection Web-based User Interface Deployed On-premises or in the Cloud.

Managing Security While Driving Digital Transformation

VMware HA: Overview & Technical Best Practices

Dynamic Datacenter Security Solidex, November 2009

Speeding Up Infrastructure Provisioning with CloudForms. Jason Dillaman Principal Architect, Red Hat Nick Lane Consultant, Red Hat

Stellar performance for a virtualized world

Virtualization. Michael Tsai 2018/4/16

Automating the Software-Defined Data Center with vcloud Automation Center

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Virtualization Overview

V.I.B.E. Virtual. Integrated. Blade. Environment. Harveenpal Singh. System-x PLM

Javaentwicklung in der Oracle Cloud

VMware ESX Server 3i. December 2007

Fujitsu World Tour 2018

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

Back To The Future: A Radical Insecure Design of KVM on ARM

VMware vcloud Architecture Toolkit Hybrid VMware vcloud Use Case

IRTURLIZRTI LRW5 DF SECURITY

<Insert Picture Here> Oracle VM October 20, 2010

Open Hybrid Cloud & Red Hat Products Announcements

Virtual SAN and vsphere w/ Operations Management

Dell EMC Hyper-Converged Infrastructure

VMWARE CLOUD FOUNDATION: THE SIMPLEST PATH TO THE HYBRID CLOUD WHITE PAPER AUGUST 2018

Virtuozzo Hyperconverged Platform Uses Intel Optane SSDs to Accelerate Performance for Containers and VMs

Oracle Real Application Clusters One Node

MICRO-SEGMENTATION FOR CLOUD-SCALE SECURITY TECHNICAL WHITE PAPER

EMC Data Protection for Microsoft

VMware vsphere: Taking Virtualization to the Next Level

Stopping Advanced Persistent Threats In Cloud and DataCenters

HCX SERVER PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY

VMware vsphere 4.0 The best platform for building cloud infrastructures

Vision of the Software Defined Data Center (SDDC)

Copyright 2012 EMC Corporation. All rights reserved.

Virtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC

Parallels Virtuozzo Containers

ENTERPRISE-GRADE MANAGEMENT FOR OPENSTACK WITH RED HAT CLOUDFORMS

The Road to a Secure, Compliant Cloud

Transcription:

T12: Virtualization: IT Audit and Security Perspectives Jason Chan, VMware

Virtualization: IT Audit and Security Perspectives Jason Chan Director of Security, VMware Agenda o Background and Disclaimers o Virtualization Basics and Business Drivers o Audit and Security Topics of Interest o New Attack Vectors o Architectural Options and Opportunities o Summary 2 1

Background and Disclaimers o I work at VMware In IT (not R&D or Marketing) o Security consulting and audit background @stake, Symantec, isec Partners Presentation Focus o x86 server virtualization Application, desktop, storage virtualization (while interesting) are not covered o Not VMware-specific o Not comprehensive o What is interesting about server virtualization from a security and IT audit perspective? 4 2

Virtualization Basics and Business Drivers 5 Server Virtualization in 30 secs Virtualization: Separation of the service request from the underlying physical service delivery Abstraction of hardware to allow multiple virtual machines to co-exist on single physical system The hypervisor manages VM & hardware interaction 6 3

Common Virtualization Terminology o Host o Guest o Hypervisor Types Type 1/Bare Metal/Non-Hosted/Native Type 2/Hosted o Paravirtualization ti o VM Migration 7 Server Virtualization in the Real World o General implementation order: Dev and Test LOB Production/Mission Critical o Overall workload virtualization is estimated around 16% as of 10/2009 o Expected to be ~50% by 2012 8 4

Business Drivers: Cost o Do more with less Centralize administration Drive a higher server/admin ratio o Hardware, space, and power Consolidate and contain infrastructure Less hardware, fewer racks Lower power and cooling costs Business Drivers: Agility o Flexibility and ease of deployment and change Simple provisioning Multiple OS on a single server Easily scale up, down, in, and out o High availability Simple clustering Location-independent i d t agility for DR 10 5

Mapping Business Drivers to Security and Audit Concerns o Or, there s no such thing as a free lunch Business Benefit Security and Audit Issues 11 Mapping Business Drivers to Security and Audit Concerns Business Drivers o Server consolidation o Centralized administration o Higher server/admin ratio o Quick provisioning o Simple reconfiguration o Multiple OS on single platform o Agility across locations Concerns o Management infrastructure o SoD/RBAC o Physical access o Licensing compliance o Change management o Capacity/SLA planning o Platform security, hardening & isolation 12 6

Audit and Security Topics 13 Segregation of Duties o Hypervisor and virtualization infrastructure are new components to manage o Server, storage, network, and security duties are collapsed o Critical considerations: Role-mapping within IT RBAC capabilities of virtualization platform Layered controls (prevent, detect, t respond) o Unfortunately, often given short shrift because of deployment patterns 14 7

Physical Security?!? o Consider traditional data center controls in a virtual it context t Cameras prevent theft, monitor physical access Biometrics, guards, man traps control physical access Locked racks prevent theft of physical assets 15 Virtual Corollaries to Physical Security o Virtual console Accessible without respect to physical location Protect with idle timeouts, access control o Storage of virtual disks Theft of a system possible without physical access Maintain control of virtual machine files (including templates and backups) o Rack and stack Rogue provisioning without data center access Emphasize management infrastructure access controls and monitoring 16 8

Change and Configuration Management o Virtualization enables fast and highly automated provisioning and change Responsibilities may be consolidated o Licensing compliance can become an issue without adequate controls o Process needs to keep pace to leverage advantages while managing risk Ramifications for CMDB? o Emphasize both preventative and detective controls 17 Capacity Management o Virtual capacity is a new discipline for capacity and scalability engineers Power, network, CPU, etc. o Dynamic capabilities of virtual workloads puts increased importance on planning o HA, DR and planned maintenance can cause capacity issues if not properly addressed at design-time 9

Infrastructure Hardening o Hypervisor/VMM system hardening o Security of administrative i ti and support infrastructure Service accounts, networking o Management network isolation Consolidation of functions makes this even more critical o Virtual network configuration Platform Security o Security characteristics and capabilities of your virtualization it ti platforms and vendors o Software security quality o Resource isolation across VMs Memory, disk, CPU, network o Resource limits it and reservations o Management infrastructure RBAC, monitoring, remote administration, APIs 10

Security Advantages and Opportunities o Interesting options for control placement and implementation Patching, firewalls, IPS, DLP, etc. o Centralized view of resources Management, monitoring, etc. o Full system lifecycle management and visibility Actions on system state are traceable Decommissioning is auditable o Templates provide new opportunities for configuration management and refresh New Attack Vectors 22 11

VM Escape o Considered holy grail of virtualization exploits o Escaping through the virtualization layer to attack: The host Other virtual machines (out of band) o Cloudburst Presented at Black Hat 2009 23 Hyperjacking o VMBRs (Virtual Machine Based Rootkits) o Inserting a hypervisor underneath a running OS o Can target a physical or virtual system o Relies on hardware virtualization extensions o Blue Pill, SubVirt, Vitriol 24 12

VM Migration Attacks o HA/DR/maintenance feature o Involves moving a VM across hardware Server, cluster, storage o Attacks involve sniffing, capturing, and/or modifying VM traffic during migration 25 Virtualization and Security Architecture 26 13

Traditional Architectural Drivers Populations Hi to Lo Trust Employees Contractors/Consultants Partners Public Competitors Environments Hi to Lo Trust Mission Critical Intranet Extranet DMZ Internet These considerations are key drivers for: Security policy and standards Network design and segmentation Access controls Etc... 27 All Physical (Traditional) 28 14

Virtualization Within Trust Zones 29 Virtualization Across Trust Zones 30 15

Fully Virtualized 31 What Considerations Arise? o Degree of resource utilization o Cost to acquire and operate o Complexity of design o Reliance on virtualization o Manageability of environment o The right answers depend on organizational capabilities and risk management approach 32 16

Comparison of Approaches * For discussion purposes only not to scale 33 Recommendations o Understand: Virtualization security concerns and possibilities How existing processes and controls can be leveraged and will need to be enhanced Security controls offered by your virtualization platforms o Have the architectural conversations Determine what s organizationally appropriate 17

References o http://www.gartner.com/it/page.jsp?id=1211813 o http://www2.catbird.com/pdf/press/catbird_computertechnol ogyreview_feb4,2009%5b1%5d.pdf o http://www.vmware.com/files/pdf/dmz_virtualization_vmware_ infra_wp.pdf o http://www.virtualizationpractice.com/blog/?p=5726 o http://www.blackhat.com/presentations/bh-usa- 09/KORTCHINSKY/BHUSA09-Kortchinsky-Cloudburst-PAPER.pdf o http://www.eecs.umich.edu/virtual/papers/king06.pdf o http://www.vmware.com/files/pdf/vmware_paravirtualization.p paravirtualization p df o Martin Carbone, Wenke Lee, Diego Zamboni. Taming Virtualization. IEEE Security & Privacy. Jan/Feb 2008. 18