Securing the Virtual Environment January 13, 2012 Nathaniel C. - - PowerPoint PPT Presentation

securing the virtual environment
SMART_READER_LITE
LIVE PREVIEW

Securing the Virtual Environment January 13, 2012 Nathaniel C. - - PowerPoint PPT Presentation

Securing the Virtual Environment January 13, 2012 Nathaniel C. Gravel, CISA, CISM, CRISC Director Information Security Practice GraVoc Associates, Inc. Founded in 1994 Located in Peabody, MA Organized into 5 Practices


slide-1
SLIDE 1

Securing the Virtual Environment

Nathaniel C. Gravel, CISA, CISM, CRISC Director – Information Security Practice

January 13, 2012

slide-2
SLIDE 2
  • Founded in 1994
  • Located in Peabody, MA
  • Organized into 5 Practices
  • Information Security Practice:

1)

Risk Management & Compliance

2)

IT Assurance

3)

Audit

GraVoc Associates, Inc.

slide-3
SLIDE 3
  • Introduction
  • Key Components & Challenges
  • Applying Existing Security Strategies
  • Challenges and Control Considerations by Component
  • Top Five Areas of Impact
  • Question & Answer
  • Conclusion

Today’s Agenda

slide-4
SLIDE 4

1)

Develop an understanding of the security challenges posed by virtualization.

2)

Provide control considerations and recommendations for securing the virtual environment.

3)

Provide criteria for future risk assessment and risk management activities.

Introduction: Presentation Objectives

slide-5
SLIDE 5
  • Today’s Discussion:

1)

Non-Platform Specific

2)

Full Virtualization

3)

Server Virtualization

  • Hypervisor – Control Panel
  • Host OS – Pertains to Hypervisor
  • Guest OS – Pertains to Virtual Machine

Introduction: Disclaimers & Definitions

slide-6
SLIDE 6

Full Virtualization Architectures

slide-7
SLIDE 7

Full Virtualization Architectures

slide-8
SLIDE 8
  • Hypervisor
  • Host System & Host OS (Type 2)
  • Guest OSs (Virtualized Hardware)
  • Installed Applications
  • Virtualized Storage
  • Virtualized Networking

Securing the Virtual Environment: Key Components

slide-9
SLIDE 9

Securing the Virtual Environment: Three Principal Challenges

Complexity of Administration

– Learning Curve for IT Staff – Another Network to Manage – Connecting Physical and Virtual Assets

slide-10
SLIDE 10

Securing the Virtual Environment: Three Principal Challenges

Lack of Visibility

– Limitations of Audit and Monitoring Capabilities – Rogue VMs – Configuration Management

slide-11
SLIDE 11

Securing the Virtual Environment: Three Principal Challenges

Non-Compliance with Established Policy/ `Procedure

– Network Administration, Auditing, and Monitoring – SDLC and Change Management – Patch Management, Anti-virus, Anti-spyware,

Malware

slide-12
SLIDE 12
  • Physical Security
  • Policies & Procedures
  • System Hardening
  • Access Controls
  • Data Loss Prevention
  • System Auditing & Monitoring
  • Configuration & Resource Management

Applying Existing Security Strategies

slide-13
SLIDE 13
  • Single Point of Failure
  • Increased Impact of Loss/Compromise
  • Local and Remote Administration
  • Networking & Communications
  • Patch Management
  • Data Storage

Challenge: Hypervisor Security

slide-14
SLIDE 14
  • Restrict physical access to host system
  • Disconnect unused physical hardware

and NICs from host system

  • Install all necessary patches to

hypervisor and host OS (if applicable)

Hypervisor Control Considerations

slide-15
SLIDE 15
  • Restrict administrative access and

establish administrative access levels

  • Establish a dedicated management

network or encrypt management network communications

  • Disable unnecessary services such as

clipboard and file sharing

Hypervisor Control Considerations

slide-16
SLIDE 16
  • Enable introspection capabilities to

monitor security of each guest OS

  • Enable introspection capabilities to

monitor security of activity occurring between guest OSs

  • Monitor hypervisor itself and enable self-

integrity monitoring capabilities.

Hypervisor Control Considerations

slide-17
SLIDE 17
  • For host OS, minimize the number of

applications installed other than hypervisor

  • For host OS, take measures to secure

and ensure integrity of other applications

Hypervisor Control Considerations Type 2 (Host OS)

slide-18
SLIDE 18
  • Sharing (Guest Tools)
  • Side-Channel Attacks
  • Escape
  • Time Synchronization
  • Software Licensing
  • Access to Storage
  • System Development Lifecycle (SDLC)

Challenge: Guest OS Security

slide-19
SLIDE 19
  • Group guests of similar risk-level on

the same hypervisor or host

  • Isolate each guest OS through

physical and/or logical partitioning (sandboxing)

  • Enable introspection capabilities to

facilitate guest OS monitoring.

Guest OS Control Considerations

slide-20
SLIDE 20
  • Duplication of Sensitive Data
  • Accessibility and Portability
  • Patching and Configuration Changes
  • Tracking
  • Proliferation of Images (Sprawl)

Challenge: Images & Snapshots

slide-21
SLIDE 21
  • Configure permissions to limit the number
  • f administrators and end-users who can

create images (no access, read-only, write)

  • Implement formal image and snapshot

management policies and procedures that govern image creation, security, distribution, storage, use, retirement, and destruction

  • Restrict guest OS access to virtual

hardware

Control Considerations for Images & Snapshots

slide-22
SLIDE 22
  • Schema and Design
  • Switching and Balancing Traffic
  • Integration with Physical (Wired) Network
  • Consistency with Established Protocols

Challenge: Virtual Networking

slide-23
SLIDE 23
  • Consider establishing a virtual LAN (VLAN)

and investigate VLAN monitoring tools.

  • Consider the use of APIs on the hypervisor
  • Consider establishing a separate set of

network management or monitoring policies for the virtual network

Virtual Network Control Considerations

slide-24
SLIDE 24

1)

Policies & Procedures

– Network Administration, Auditing, and Monitoring – Patch Management, Anti-virus, Anti-spyware, Malware – SDLC and Change Management – Disaster Recovery/Business Continuity Plan

2)

IT Asset Inventory & Network Diagrams

3)

Risk Assessment and IT Assurance Testing

4)

Vendor Contracts and SLAs

5)

Budget & IT Strategic Planning

Virtualization: Top Five Areas of Impact

slide-25
SLIDE 25

Question & Answer

slide-26
SLIDE 26
  • NIST Special Publication 800-125: Guide

to Security for Full Virtualization Technologies

  • ISACA Whitepaper (October 2010):

Virtualization: Benefits and Challenges

  • Platform-Specific User Manuals &

Security Guides

Suggested Reading

slide-27
SLIDE 27

Nathaniel C. Gravel Director – Information Security Practice GraVoc Associates, Inc. nateg@gravoc.com 978-538-9055 ext. 129

Thank You!