Survey Results: Virtual Insecurity

Similar documents
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

Endpoint Security Can Be Much More Effective and Less Costly. Here s How

ABB Ability Cyber Security Services Protection against cyber threats takes ability

A Guide to Closing All Potential VDI Security Gaps

Gaps in Resources, Risk and Visibility Weaken Cybersecurity Posture

State of Cloud Survey GERMANY FINDINGS

That Set the Foundation for the Private Cloud

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals

security mindfulness dwayne.

Closing the Hybrid Cloud Security Gap with Cavirin

Cyber Hygiene: Uncool but necessary. Automate Endpoint Patching to Mitigate Security Risks

Securing Your Cloud Introduction Presentation

Tips for Effective Patch Management. A Wanstor Guide

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

SDN-Based Open Networking Building Momentum Among IT Decision Makers

8 Must Have. Features for Risk-Based Vulnerability Management and More

Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend

Risk Intelligence. Quick Start Guide - Data Breach Risk

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform

Annual Public Safety PSAP Survey results

White Paper Server. Five Reasons for Choosing SUSE Manager

Tripwire State of Cyber Hygiene Report

Inside the 6 principal layers of the cloud security ARMOR.COM PAGE PAGE 1 1

Data Center Automation: Automated Provisioning, Patching, and Compliance

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

10 FOCUS AREAS FOR BREACH PREVENTION

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

SDN HAS ARRIVED, BUT NEEDS COMPLEMENTARY MANAGEMENT TOOLS

ALIGNING CYBERSECURITY AND MISSION PLANNING WITH ADVANCED ANALYTICS AND HUMAN INSIGHT

MODERNIZE INFRASTRUCTURE

Server Hardening Title Author Contributors Date Reviewed By Document Version

How Security Policy Orchestration Extends to Hybrid Cloud Platforms

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Enabling Hybrid Cloud Transformation

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER

Virtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC

Endpoint Security. powered by HEAT Software. Patch and Remediation Best Practice Guide. Version 8.5 Update 2

HALO IN ACTION COMPLIANCE DON T LET LEGACY SECURITY TOOLS HOLD UP PCI COMPLIANCE IN THE CLOUD. Automated PCI compliance anytime, anywhere.

Device Discovery for Vulnerability Assessment: Automating the Handoff

Data Breach Risk Scanning and Reporting

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

ORACLE DEPLOYMENT DECISION GUIDE: COMPARING YOUR DEPLOYMENT OPTIONS

2018 Database DevOps Survey DBmaestro 1

SECURITY PRACTICES OVERVIEW

Spotlight Report. Information Security. Presented by. Group Partner

2018 Report The State of Securing Cloud Workloads

Preparing your network for the next wave of innovation

A comprehensive framework for securing virtualized data centers. Business white paper

How to Underpin Security Transformation With Complete Visibility of Your Attack Surface

Why Enterprises Need to Optimize Their Data Centers

Comprehensive Database Security

DOWNLOAD OR READ : THREAT AND VULNERABILITY MANAGEMENT COMPLETE SELF ASSESSMENT GUIDE PDF EBOOK EPUB MOBI

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

TECHNICAL WHITE PAPER. Secure messaging in Office 365: Four key considerations

Optimisation drives digital transformation

locuz.com SOC Services

10 Cloud Myths Demystified

IT infrastructure layers requiring Privileged Identity Management

Datacenter Security: Protection Beyond OS LifeCycle

IT SECURITY FOR NONPROFITS

Windows Server Security Best Practices

Project CIP Modifications

NINE MYTHS ABOUT. DDo S PROTECTION

RKNEAL Verve Security Center Supports Effective, Efficient Cybersecurity Management

WHITEPAPER. Security overview. podio.com

DIGITALGLOBE ENHANCES PRODUCTIVITY

Portnox CORE. On-Premise. Technology Introduction AT A GLANCE. Solution Overview

BUYER S GUIDE APPLICATION SECURITY BUYER S GUIDE:

The security challenge in a mobile world

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT

NEN The Education Network

Converged Infrastructure Matures And Proves Its Value

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

THE FOUR PILLARS OF MODERN VULNERABILITY MANAGEMENT

WHY LEGACY SECURITY ARCHITECTURES ARE INADEQUATE IN A MULTI-CLOUD WORLD

Cloud Computing: Making the Right Choice for Your Organization

The State of Data Center Health Management Strategy 2017

SIEM: Five Requirements that Solve the Bigger Business Issues

Ret h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s

As Enterprise Mobility Usage Escalates, So Does Security Risk

Comprehensive Mitigation

SEARCH ENGINE MARKETING (SEM)

THE IMPACT OF SECURITY ON APPLICATION DEVELOPMENT. August prevoty.com. August 2015

CREATING A CLOUD STRONGHOLD: Strategies and Methods to Manage and Secure Your Cloud

Watson Developer Cloud Security Overview

Transforming Security from Defense in Depth to Comprehensive Security Assurance

ORACLE DATABASE LIFECYCLE MANAGEMENT PACK

Oracle Applications in a Changing Business World. Legacy Oracle Applications Won't Be Around Forever. Will You?

Security Architecture

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

BACKUP TO THE FUTURE A SPICEWORKS SURVEY

Hello, and welcome to a searchsecurity.com. podcast: How Security is Well Suited for Agile Development.

BUYER S GUIDE EVALUATING VULNERABILITY ASSESSMENT SOLUTIONS

HyTrust government cloud adoption survey

IT Monitoring Tool Gaps are Impacting the Business A survey of IT Professionals and Executives

the SWIFT Customer Security

` 2017 CloudEndure 1

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

Transcription:

Best Practices SURVEY Survey Results: Virtual Insecurity May 2013

Executive Summary: Virtual Assets Could Bring Real Risk Virtualization technologies have reshaped how IT offers and delivers their services to end users. As it is often seen with emerging technologies like cloud and mobile and now virtualization, new risks are introduced to the environment as quickly as new virtual servers and applications are spun up. How can IT keep up, in the face of rapid adoption and demands of virtualization? We decided to pose some questions to the IT community at large to see how they were managing the security side of their virtualization deployments. Considering how easy it is to replicate and deploy virtual machines, the potential to also proliferate risk is something that should be managed very closely. We were especially interested in what steps virtualization administrators took on their own to verify the security and compliance of their hypervisors and images, as well as what types of tools they relied upon as part of their everyday processes. Lastly, we wanted to see if these virtualization administrators are willing participants in the security lifecycle, and if so, to what degree? Given the sophisticated attacks that corporate networks face on a daily basis, does this mean that IT should be asking everyone to do their part including virtualization administrators? Survey Information Survey Opened: April 4, 2013 Survey Closed: May 5, 2013 Total Survey Completions: 448 Survey Targets: Server (Linux, Unix, Windows) Administrators, IT Administrators, IT Architects, and Virtualization Administrators 2

Vendors and Technologies Leveraged Which virtualization technologies does your organization utilize today? 6 5 48% 3 21% 19% 1 3% 5% Not surprisingly, VMware leads the pack as the preferred virtualization technology leveraged, however responses do indicate there are several instances of multi-vendor environments, perhaps an indicator of best-of-breed capabilities amongst the vendors for for virtual workload types. 3

How many hypervisors are in use in your environment today? How many virtual guests are in use in your environment today? 5 3 1 46% 23% 17% 15% < 10 11-15 25-100 > 100 5 3 1 39% 21% 25% 15% < 10 11-25 25-100 > 100 From a resource management perspective, it appears that most virtualization administrators are managing 10 or fewer hypervisors; however the number of virtual guests is potentially much higher. Almost of respondents indicated they manage over 100 guests at a time. This is an interesting number to keep in mind as we look at the security best practices these administrators follow later in the survey. 4

Does your organization currently use any of the following Application Virtualization technologies? 6 56% 5 3 17% 21% 1 7% Microsoft App-V VMWare ThinApp No Application Virtualization Technology Other Application virtualization does have a foothold among those surveyed, but over half said it wasn t in use. One contributor to the lack of adoption here might be the fact that not all security scanners can scan virtualized applications for vulnerabilities, as Retina from BeyondTrust can. 5

Virtualization and the Security Lifecycle As part of your virtual systems administration, do you use any security tools regularly? 7 59% 6 5 41% What kinds of tools are in use today or are being considered? 35% 35% 3 27% 25% 21% 16% 15% 1 3 5% 2% 1 Yes No The fact that well over half of respondents said yes, we use security tools regularly is very encouraging, but the most often security technology cited was antivirus. Clearly, antivirus as a security technology is not going away any time soon, but in light of the recent successful, high profile attacks, it s been proven over and over again that AV is no longer a match for the sophisticated methods of attack being employed today. More encouraging is the almost 5 of combined responses that indicate security scanning and configuration management is in use. 6

How often are existing image templates used for new virtual images? 8 58% 6 35% 8% Often Rarely Never Are there any security controls in place that require a security sign off prior to releasing a new virtual image or template? 8 64% 6 36% Yes No These two questions tell an interesting story. Existing templates are often used when creating new virtual servers; however an overwhelming majority of respondents say there are no security controls in place when new templates are created. This could be an area for concern, as these templates could carry some risks with them, either by leveraging outdated unpatched software, or by proliferating mis-configured systems which could lead to security weaknesses.

Some Encouraging Findings How do you keep your hypervisors up to date with available patches and hotfixes? 6 5 49% 3 21% 1 I patch regularly I only apply critical patches 8% I don't patch regularly I'm not responsible for keeping the virtual machines up to date 2% Other Almost half of respondents patch their virtual systems regularly. Patching systems on a regular schedule is an effective way to reduce the risks associated with managing computing assets. 8

How often are security scans performed on virtual assets? 3 25% 29% 26% 24% 15% 1 5% 11% 6% Weekly Monthly Quarterly Annually Don't Know Almost half respondents indicated that security scans of virtual systems are taking place at least monthly, with almost 3 performing that critical task on a weekly basis. Interestingly enough, and probably a strong indicator that there still continues to be a division of labor (and quite possibly, communication) between Security and Operations, a quarter of those surveyed said they don t know how often scans are carried out on their assets. 9

Are virtual assets included as part of regulatory compliance audits and reporting? 6 5 53% 3 1 21% 15% 12% Yes No Sometimes Don't Know One driver for a heightened sense of urgency and visibility around security virtual systems is their inclusion into reporting for regulatory compliance. Virtual assets, at the end of the day, are still assets and must be accounted for and their risk measured for their part in the IT lifecycle. Over half said that yes, those assets were included in the reporting. Interestingly, roughly 12% said they didn t know not a good omen for their eventual audit results. 10

Have you followed any security hardening best practices on your virtual infrastructure? 7 65% 6 If you did follow security hardening best practices for your virtual infrastructure, what was the source of those best practices? 5 3 1 Yes 35% No 45% 35% 3 25% 15% 1 5% 33% 17% 1 It s encouraging that almost 65% of those surveyed did in fact follow some sort of hardening guidelines, either from the virtualization vendor themselves or from a security or networking vendor. Hardening guides are great resources for administrators, who while might not be full-fledged members of the security team, so that they can do their part to reduce risk on an ongoing basis. 11

Summary It s clear that virtualization is a technology which has impacted IT to the highest degree. The efficiency and cost gains realized are without question. Given it s pervasiveness within corporate networks today, it also has the potential to increase an organization s risk. Given the results of this survey, it s clear that there is more work to be done to ensure the ongoing security of virtual systems. One step in this direction is to enable (and hopefully inspire) the teams on the front lines the virtualization administrators themselves. It s for this very reason that we developed our Retina Network Security Scanner Plug-in for VMware vcenter (available for free download here: http://go.beyondtrust.com/vcenter). This security tool, based on the industry s most proven vulnerability management technology, identifies the risks that may be resident on the virtual assets in use by your organization today. Completely integrated with vcenter, it allows virtualization administrators to stay in their current workflow, and doesn t require them to learn any new security technologies. It was designed with a point and click approach to enabling any member of the IT staff to help identify and reduce the risk in virtual assets. 12