IBM Presentations: Blue Pearl Basic template

advertisement

Virtualization Security Best Practices

IBM Institute for Advanced Security

November, 2010

© 2010 IBM Corporation

IBM Internet Security Systems

Virtualization Security Best Practices

Moderator

 Charles Palmer, Director of the Institute for Advanced Security, IBM

Expert Panelists

 Edward L. Haletky, Analyst, The Virtualization Practice, LLC virtualizationpractice.com

 David Abercrombie, Senior Product Manager, Server Protection Solutions - IBM

 Ajay Dholakia, Senior Technical Staff Member, System x - IBM

© 2010 IBM Corporation

IBM Internet Security Systems

Agenda

 Introduction and Overview of Virtualization – Charles Palmer

 Virtualization: The Basics - Edward L. Haletky virtualizationpractice.com

 Virtualization Approaches – David Abercrombie

 Virtualization Requirements and Imperatives – Ajay Dholakia

 Questions & Answers

© 2010 IBM Corporation

IBM Internet Security Systems

The Virtualization Journey

4 10/04/10

Server

Storage Network

Increased Agility

Consolidate

Resources

Manage

Workloads

Automate

Processes

Optimize

Delivery

Consolidate Resources

• Improved efficiency and utilization of IT resources with simple virtualization tools

Manage Workloads

• Improved IT staff productivity with integrated systems management dashboard for physical and virtual resources

Automate Processes

• Consistent and repeatable processes based on best practices, business priorities and service level agreements with simple virtualization tools

Optimize Delivery

• Self provisioned by users based on business imperatives, unconstrained by physical barriers or location.

© 2010 IBM Corporation

Virtualization Security Review

Edward L. Haletky

© 2010 IBM Corporation

IBM Internet Security Systems

The Hypervisor

© 2010 IBM Corporation

IBM Internet Security Systems

Hardware Layer

The Hypervisor

© 2010 IBM Corporation

IBM Internet Security Systems

Driver/Module

Layer

Hardware Layer

The Hypervisor

© 2010 IBM Corporation

IBM Internet Security Systems

Kernel Layer

Driver/Module

Layer

Hardware Layer

The Hypervisor

© 2010 IBM Corporation

IBM Internet Security Systems

Virtual Machine

Manager

Kernel Layer

Driver/Module

Layer

Hardware Layer

The Hypervisor

© 2010 IBM Corporation

IBM Internet Security Systems

Guest OS Layer

Virtual Machine

Manager

Kernel Layer

Driver/Module

Layer

Hardware Layer

The Hypervisor

© 2010 IBM Corporation

IBM Internet Security Systems

Application

Layer

Guest OS Layer

Virtual Machine

Manager

Kernel Layer

Driver/Module

Layer

Hardware Layer

The Hypervisor

© 2010 IBM Corporation

IBM Internet Security Systems

Application

Layer

Guest OS Layer

Virtual Machine

Manager

Kernel Layer

Driver/Module

Layer

Hardware Layer

The Hypervisor

© 2010 IBM Corporation

IBM Internet Security Systems

Application

Layer

Guest OS Layer

Virtual Machine

Manager

Kernel Layer

Driver/Module

Layer

Hardware Layer

Hypervisor

The Hypervisor

© 2010 IBM Corporation

IBM Internet Security Systems

Hypervisor Basics

How the Hypervisor Protects Itself or

Internal Workings of a Hypervisor

© 2010 IBM Corporation

IBM Internet Security Systems

Hypervisor schedules

VMs on each physical

Core/CPU/Hyperthread

Complete control on how

Cores are assigned to vCPUs

CPU will be used for hypervisor, virtual switches, etc.

Hypervisor Controls CPU

Understand Hypervisor Security: Access to CPU

© 2010 IBM Corporation

IBM Internet Security Systems

Hypervisor schedules

VMs on each physical

Core/CPU/Hyperthread

Complete control on how

Cores are assigned to vCPUs

CPU will be used for hypervisor, virtual switches, etc.

Hypervisor Controls CPU

Understand Hypervisor Security: Access to CPU

© 2010 IBM Corporation

IBM Internet Security Systems

Hypervisor schedules

VMs on each physical

Core/CPU/Hyperthread

Complete control on how

Cores are assigned to vCPUs

CPU will be used for hypervisor, virtual switches, etc.

Hypervisor Controls CPU

Understand Hypervisor Security: Access to CPU

© 2010 IBM Corporation

IBM Internet Security Systems

Understand Hypervisor Security:

Access to Memory

Memory Assignment

Memory Ballooning – ESX vmkernel

Memory

Memory Compression

Memory Swapping

Content Based Page Sharing -

ESX

© 2010 IBM Corporation

IBM Internet Security Systems

Understand Hypervisor Security:

Access to Memory

Memory Assignment

Memory Ballooning – ESX vmkernel

Memory

Memory Compression

Memory Swapping

Content Based Page Sharing -

ESX

VM

VM

© 2010 IBM Corporation

IBM Internet Security Systems

Understand Hypervisor Security:

Access to Memory

Memory Assignment

Memory Ballooning – ESX vmkernel

Memory Compression

Memory Swapping

Content Based Page Sharing -

ESX

VM

Memory

VM

Memory

© 2010 IBM Corporation

IBM Internet Security Systems

Understand Hypervisor Security:

Access to Memory

Memory Assignment

Memory Ballooning – ESX vmkernel

Memory Compression

Memory Swapping

Content Based Page Sharing -

ESX

VM

VM

© 2010 IBM Corporation

IBM Internet Security Systems

Understand Hypervisor Security:

Access to Memory

Memory Assignment

Memory Ballooning – ESX vmkernel

Memory Compression

Memory Swapping

Content Based Page Sharing -

ESX

VM

VM

© 2010 IBM Corporation

IBM Internet Security Systems

Understand Hypervisor Security:

Access to Memory

Memory Assignment

Memory Ballooning – ESX vmkernel

Memory Compression

Memory Swapping

Content Based Page Sharing -

ESX

.vswp

VM

VM

© 2010 IBM Corporation

IBM Internet Security Systems

Understand Hypervisor Security:

Access to Memory

Memory Assignment

Memory Ballooning – ESX vmkernel

Memory Compression

Memory Swapping

Content Based Page Sharing -

ESX

VM

Page

VM

Page

© 2010 IBM Corporation

IBM Internet Security Systems

Understand Hypervisor Security:

Access to Memory

Memory Assignment

Memory Ballooning – ESX vmkernel

Memory Compression

Memory Swapping

Content Based Page Sharing -

ESX

.vswp

VM

Compare

VM

Page

Page

© 2010 IBM Corporation

IBM Internet Security Systems

Understand Hypervisor Security:

Access to Memory

Memory Assignment

Memory Ballooning – ESX vmkernel

Page

Memory Compression

Memory Swapping

Content Based Page Sharing -

ESX

.vswp

Compare

VM

VM

© 2010 IBM Corporation

IBM Internet Security Systems

Understand Hypervisor Security:

Access to Memory

Memory Assignment

Memory Ballooning – ESX vmkernel

Page

Memory Compression

Memory Swapping

Content Based Page Sharing -

ESX

.vswp

VM

VM

© 2010 IBM Corporation

IBM Internet Security Systems

Understanding Hypervisor Security: ESX Network Protections

MAC Flooding

802.1q and ISL Tagging Attacks

Double Encapsulation Attacks

Multicast Brute Force Attacks

Spanning Tree Attacks

Random Frame Attacks

L2-Switch

© 2010 IBM Corporation

IBM Internet Security Systems

Understanding Hypervisor Security: ESX Network Protections

MAC Flooding

802.1q and ISL Tagging Attacks

Double Encapsulation Attacks

Multicast Brute Force Attacks

Spanning Tree Attacks

Random Frame Attacks

L2-Switch CAM

© 2010 IBM Corporation

IBM Internet Security Systems

Understanding Hypervisor Security: ESX Network Protections

MAC Flooding

802.1q and ISL Tagging Attacks

Double Encapsulation Attacks

Multicast Brute Force Attacks

Spanning Tree Attacks

Random Frame Attacks

L2-Switch CAM

© 2010 IBM Corporation

IBM Internet Security Systems

Understanding Hypervisor Security: ESX Network Protections

MAC Flooding

802.1q and ISL Tagging Attacks

Double Encapsulation Attacks

Multicast Brute Force Attacks

Spanning Tree Attacks

Random Frame Attacks

L2-Switch CAM

© 2010 IBM Corporation

IBM Internet Security Systems

Understanding Hypervisor Security: ESX Network Protections

MAC Flooding

802.1q and ISL Tagging Attacks

Double Encapsulation Attacks

Multicast Brute Force Attacks

Spanning Tree Attacks

Random Frame Attacks

L2-Switch

© 2010 IBM Corporation

IBM Internet Security Systems

Understanding Hypervisor Security: ESX Network Protections

MAC Flooding

802.1q and ISL Tagging Attacks

Double Encapsulation Attacks

Multicast Brute Force Attacks

Spanning Tree Attacks

Random Frame Attacks

PG-100 PG-200

L2-Switch

© 2010 IBM Corporation

IBM Internet Security Systems

Understanding Hypervisor Security: ESX Network Protections

MAC Flooding

802.1q and ISL Tagging Attacks

Double Encapsulation Attacks

Multicast Brute Force Attacks

Spanning Tree Attacks

Random Frame Attacks

X

PG-100 PG-200

CAM

© 2010 IBM Corporation

IBM Internet Security Systems

Understanding Hypervisor Security: ESX Network Protections

MAC Flooding

802.1q and ISL Tagging Attacks

Double Encapsulation Attacks

Multicast Brute Force Attacks

Spanning Tree Attacks

Random Frame Attacks

PG-100 PG-200

CAM

© 2010 IBM Corporation

IBM Internet Security Systems

Understanding Hypervisor Security: ESX Network Protections

MAC Flooding

802.1q and ISL Tagging Attacks

Double Encapsulation Attacks

Multicast Brute Force Attacks

Spanning Tree Attacks

Random Frame Attacks

PG-100 PG-200

L2-Switch

© 2010 IBM Corporation

IBM Internet Security Systems

Understanding Hypervisor Security: ESX Network Protections

ARP Cache Poisoning still possible

Any Vulnerabilities in Replacement vSwitch

ESX vSwitch/Portgroup Protections - Reject

MAC Spoofing by GuestOS

ESX vSwitch/Portgroup Protections - Reject

Promiscuous Mode vNICs within GuestOS

ESX vSwitch/Portgroup Protections - Reject

Forged TX from GuestOS

VMDirectPath

L2-Switch

© 2010 IBM Corporation

IBM Internet Security Systems

Understanding Hypervisor Security: ESX Network Protections

ARP Cache Poisoning still possible

Any Vulnerabilities in Replacement vSwitch

ESX vSwitch/Portgroup Protections - Reject

MAC Spoofing by GuestOS

ESX vSwitch/Portgroup Protections - Reject

Promiscuous Mode vNICs within GuestOS

ESX vSwitch/Portgroup Protections - Reject

Forged TX from GuestOS

VMDirectPath

L2-Switch CAM

© 2010 IBM Corporation

IBM Internet Security Systems

Understanding Hypervisor Security: ESX Network Protections

ARP Cache Poisoning still possible

Any Vulnerabilities in Replacement vSwitch

ESX vSwitch/Portgroup Protections - Reject

MAC Spoofing by GuestOS

ESX vSwitch/Portgroup Protections - Reject

Promiscuous Mode vNICs within GuestOS

ESX vSwitch/Portgroup Protections - Reject

Forged TX from GuestOS

VMDirectPath

L2-Switch CAM

© 2010 IBM Corporation

IBM Internet Security Systems

Understanding Hypervisor Security: ESX Network Protections

ARP Cache Poisoning still possible

Any Vulnerabilities in Replacement vSwitch

ESX vSwitch/Portgroup Protections - Reject

MAC Spoofing by GuestOS

ESX vSwitch/Portgroup Protections - Reject

Promiscuous Mode vNICs within GuestOS

ESX vSwitch/Portgroup Protections - Reject

Forged TX from GuestOS

VMDirectPath

L2-Switch CAM

© 2010 IBM Corporation

IBM Internet Security Systems

Understanding Hypervisor Security: ESX Network Protections

ARP Cache Poisoning still possible

Any Vulnerabilities in Replacement vSwitch

ESX vSwitch/Portgroup Protections - Reject

MAC Spoofing by GuestOS

ESX vSwitch/Portgroup Protections - Reject

Promiscuous Mode vNICs within GuestOS

ESX vSwitch/Portgroup Protections - Reject

Forged TX from GuestOS

VMDirectPath

L2-Switch CAM

© 2010 IBM Corporation

IBM Internet Security Systems

Understanding Hypervisor Security: ESX Network Protections

ARP Cache Poisoning still possible

Any Vulnerabilities in Replacement vSwitch

ESX vSwitch/Portgroup Protections - Reject

MAC Spoofing by GuestOS

ESX vSwitch/Portgroup Protections - Reject

Promiscuous Mode vNICs within GuestOS

ESX vSwitch/Portgroup Protections - Reject

Forged TX from GuestOS

VMDirectPath

L2-Switch CAM

© 2010 IBM Corporation

IBM Internet Security Systems

Understanding Hypervisor Security: ESX Network Protections

ARP Cache Poisoning still possible

Any Vulnerabilities in Replacement vSwitch

ESX vSwitch/Portgroup Protections - Reject

MAC Spoofing by GuestOS

ESX vSwitch/Portgroup Protections - Reject

Promiscuous Mode vNICs within GuestOS

ESX vSwitch/Portgroup Protections - Reject

Forged TX from GuestOS

VMDirectPath

L2-Switch CAM

© 2010 IBM Corporation

IBM Internet Security Systems

Understanding Hypervisor Security: ESX Network Protections

ARP Cache Poisoning still possible

Any Vulnerabilities in Replacement vSwitch

ESX vSwitch/Portgroup Protections - Reject

MAC Spoofing by GuestOS

ESX vSwitch/Portgroup Protections - Reject

Promiscuous Mode vNICs within GuestOS

ESX vSwitch/Portgroup Protections - Reject

Forged TX from GuestOS

VMDirectPath

X

CAM

© 2010 IBM Corporation

IBM Internet Security Systems

Understanding Hypervisor Security: ESX Network Protections

ARP Cache Poisoning still possible

Any Vulnerabilities in Replacement vSwitch

ESX vSwitch/Portgroup Protections - Reject

MAC Spoofing by GuestOS

ESX vSwitch/Portgroup Protections - Reject

Promiscuous Mode vNICs within GuestOS

ESX vSwitch/Portgroup Protections - Reject

Forged TX from GuestOS

VMDirectPath

L2-Switch

X

© 2010 IBM Corporation

IBM Internet Security Systems

Understanding Hypervisor Security: ESX Network Protections

ARP Cache Poisoning still possible

Any Vulnerabilities in Replacement vSwitch

ESX vSwitch/Portgroup Protections - Reject

MAC Spoofing by GuestOS

ESX vSwitch/Portgroup Protections - Reject

Promiscuous Mode vNICs within GuestOS

ESX vSwitch/Portgroup Protections - Reject

Forged TX from GuestOS

VMDirectPath

X

L2-Switch CAM

© 2010 IBM Corporation

IBM Internet Security Systems

Understanding Hypervisor Security: ESX Network Protections

ARP Cache Poisoning still possible

Any Vulnerabilities in Replacement vSwitch

ESX vSwitch/Portgroup Protections - Reject

MAC Spoofing by GuestOS

ESX vSwitch/Portgroup Protections - Reject

Promiscuous Mode vNICs within GuestOS

ESX vSwitch/Portgroup Protections - Reject

Forged TX from GuestOS

VMDirectPath

L2-Switch CAM

© 2010 IBM Corporation

IBM Internet Security Systems

Virtual Environment

Threats

Two Sets

© 2010 IBM Corporation

IBM Internet Security Systems

Existing

Threat

Vectors

Worms

Trojans

Virus

Spam

DDoS

Virtual Environment Threats

© 2010 IBM Corporation

IBM Internet Security Systems

Existing

Threat

Vectors

Network

Attacks

Existing

Threat

Vectors

Worms

Trojans

Virus

Spam

DDoS

Virtual Environment Threats

© 2010 IBM Corporation

IBM Internet Security Systems

Existing

Threat

Vectors

Network

Attacks

Existing

Threat

Vectors

Worms

Trojans

Virus

Spam

DDoS

New

Threat

Vectors

Management

USB over IP

Backup

Server

Virtual Environment Threats

© 2010 IBM Corporation

IBM Internet Security Systems

Existing

Threat

Vectors

Network

Attacks

Existing

Threat

Vectors

Worms

Trojans

Virus

Spam

DDoS

New

Threat

Vectors

Management

USB over IP

Backup

Server

Virtual Environment Threats

© 2010 IBM Corporation

IBM Internet Security Systems

Existing

Threat

Vectors

Network

Attacks

Existing

Threat

Vectors

Worms

Trojans

Virus

Spam

DDoS

New

Threat

Vectors

Management

USB over IP

Backup

Server

Virtual Environment Threats

© 2010 IBM Corporation

IBM Internet Security Systems

Existing

Threat

Vectors

Network

Attacks

Existing

Threat

Vectors

Worms

Trojans

Virus

Spam

DDoS

New

Threat

Vectors

Management

USB over IP

Backup

Server

Virtual Environment Threats

© 2010 IBM Corporation

IBM Internet Security Systems

Existing

Threat

Vectors

Network

Attacks

Existing

Threat

Vectors

Worms

Trojans

Virus

Spam

DDoS

New

Threat

Vectors

Management

USB over IP

Backup

Server

Virtual Environment Threats

© 2010 IBM Corporation

IBM Internet Security Systems

Existing

Threat

Vectors

Network

Attacks

Existing

Threat

Vectors

Worms

Trojans

Virus

Spam

DDoS

New

Threat

Vectors

Management

USB over IP

Backup

Server

Virtual Environment Threats

© 2010 IBM Corporation

IBM Internet Security Systems

Existing

Threat

Vectors

Network

Attacks

Existing

Threat

Vectors

Worms

Trojans

Virus

Spam

DDoS

New

Threat

Vectors

Management

USB over IP

Backup

Server

New

Threat

Vectors

VM Escape

Introspection

APIs

Virtual Environment Threats

© 2010 IBM Corporation

IBM Internet Security Systems

Existing

Threat

Vectors

Network

Attacks

Existing

Threat

Vectors

Worms

Trojans

Virus

Spam

DDoS

New

Threat

Vectors

Management

USB over IP

Backup

Server

New

Threat

Vectors

VM Escape

Introspection

APIs

Virtual Environment Threats

© 2010 IBM Corporation

IBM Internet Security Systems

Existing

Threat

Vectors

Network

Attacks

Existing

Threat

Vectors

Worms

Trojans

Virus

Spam

DDoS

New

Threat

Vectors

Management

USB over IP

Backup

Server

New

Threat

Vectors

VM Escape

Introspection

APIs

Virtual Environment Threats

© 2010 IBM Corporation

Virtualization Security Best Practices

David Abercrombie

All information represents IBM's current intent, is subject to change or withdrawal without notice, and represents only IBM ISS ’ goals and objectives. By providing this information, IBM is not committing to provide this capability.

© 2010 IBM Corporation

IBM Internet Security Systems

Security Must Evolve

Physical

Network IPS

Server Protection

System Patching

Blocks threats and attacks at the perimeter

Secures each physical server with protection and reporting for a single agent

Patches critical vulnerabilities on individual servers

Security Policies

Policies are specific to critical applications in each network segment and server

Network IPS

Server Protection

System Patching

Virtualized

Should protect against threats at perimeter and between

VMs

Securing each VM as if it were a physical server adds time, cost and footprint

Needs to protect against vulnerabilities that result from

VM state changes

Security Policies

Policies must be able to move with the VMs

69

Static

SECURITY

Dynamic

© 2010 IBM Corporation

IBM Internet Security Systems

Integrated Protection vs. Host-based Protection

Host-Based Agent Virtual Server Protection

Isolation

Firewall functions only in the context of the VM

Isolation

Firewall enforces virtual network-wide policy

Attack Prevention Requires agent to be present

VM State

Security Policies

Security is impacted by VM state change

Policy is enforced only within the VM

Attack Prevention

Secures all virtual machines automatically

VM State

Security Policies

Security is not impacted by

VM state change

Policy is enforced outside of the VM and irrespective of the

VMs location

© 2010 IBM Corporation 70

71

IBM Internet Security Systems

Integrated Security Benefits

 Simplified deployment

Eliminates visibility gaps

– Inter-VM communication

– Discovery

– VM whitelisting/vNAC

 Automated protection

VM VM

ESX Server

VM

 Advanced security techniques

– Introspection-based malware detection

 Control of resources allocated to security

More flexible licensing

Firewall

Intrusion Prevention

Virtual Infrastructure Auditing

Rootkit detection

Discovery

VM SVM vSwitch vSwitch

IBM Confidential

VMSafe

© 2010 IBM Corporation

IBM Internet Security Systems

Regain Lost Visibility and Control

 Identify VMs that are invisible to traditional discovery tools

 Control unauthorized crossing of trust zones

 Ensure VMs that come online do not introduce vulnerabilities

 Quarantine unauthorized VMs

– VMs that are not considered trusted are given limited network access

Virtual

Network

72

IBM Confidential © 2010 IBM Corporation

IBM Internet Security Systems

Dynamic Environment Protection

 Maintain security posture irrespective of the physical server on which the VM resides

SiteProtector

Policy

Events

Updates

SVM

VM

ESX Server

VM

Abstraction from underlying physical servers provides dynamic security optimized for mobility

VM

ESX Server

VM

SVM

VMSafe vSwitch vSwitch vSwitch vSwitch

VMSafe

© 2010 IBM Corporation 73

IBM Internet Security Systems

Dynamic Environment Protection

 Maintain security posture irrespective of the physical server on which the VM resides

SiteProtector

Policy

Events

Updates

SVM

VM

ESX Server

VM VM

Abstraction from underlying physical servers provides dynamic security optimized for mobility

VM

ESX Server

VM

SVM

VMSafe vSwitch vSwitch vSwitch vSwitch

VMSafe

© 2010 IBM Corporation 74

IBM Internet Security Systems

Defense In Depth

Host-Based Agent

Access Management

Security/Configuration Management

Malware Detection/Prevention

File Integrity Monitoring

Encrypted Traffic Inspection

Security Virtual Machine

Firewall

Intrusion Prevention

Malware Detection/Prevention

Access Monitoring

Access Control

Firewall

Host-Based Agent

Intrusion Prevention

Access Management

Security/Configuration Management

Malware Detection/Prevention

File Integrity Monitoring

Encrypted Traffic Inspection

75

Network-Based Appliance

Firewall

Intrusion Prevention

Network Policy Enforcement

© 2010 IBM Corporation

IBM Internet Security Systems

Evolution of Secure Virtualization solutions

 Today…Security Virtual Machines take over some key functions from host-based agents

– Host-level firewall, IPS/IDS, guest security configuration, some anti-malware functions

– Fewer resources (CPU, memory) consumed

– Less intrusive (kernel drivers)

– Guest OS-independent

 More to come…

– Hardware-level root-of-trust (TPMs)

– Maturity of virtual machine introspection

– Security component collaboration & automated remediation

IBM Confidential © 2010 IBM Corporation

IBM Internet Security Systems

Summary

 Virtualization does impact security posture

 “Legacy” tools are still relevant

 New products adapted for virtual environments are available

 No single product provides adequate protection

77

IBM Confidential © 2010 IBM Corporation

Virtualization Security Best Practices

Ajay Dholakia

All information represents IBM's current intent, is subject to change or withdrawal without notice, and represents only IBM ISS ’ goals and objectives. By providing this information, IBM is not committing to provide this capability.

© 2010 IBM Corporation

IBM Internet Security Systems

Security complexities raised by virtualization

Complexities

 Dynamic relocation of VMs

 Increased infrastructure layers to manage and protect

Multiple operating systems and applications per server

 Elimination of physical boundaries between systems

Before Virtualization

 Manually tracking software and configurations of VMs

 Maintenance of virtual images

Image sprawl (proliferation)

 Virtual appliances (Trojan Horse)

 Public Cloud risks

• 1:1 ratio of OSs and applications per server

–“Black box” sharing in clouds reduces visibility and control

–Privacy and accountability regulations

After Virtualization

• 1:Many ratio of OSs and applications per server

• Additional layer to manage and secure

© 2010 IBM Corporation

IBM Internet Security Systems

Virtualization security – Driving requirements

Requirements

Secure platforms & engineering process

 Threat and vulnerability management

–Internal / external threat mitigation

 Privileged access

–Role segregation & access control

Data confidentiality and integrity

–Data @ rest ( storage ) data in transit (network)

Regulatory compliance

 Multi-tenancy / isolation

–Isolation management of Virtual Servers

 Image / virtual appliance security

 Consolidated systems security

–Consolidated server, storage, net. security mgmt.

 Systems Integrity Management

–Trusted software / firmware / hardware

© 2010 IBM Corporation

IBM Internet Security Systems

Virtualization security – Imperatives … The Low Hanging Fruit

Easy steps you can follow

7. Do not use Paravirtualized drivers within DMZ based VMs, or any that hold sensitive data unless there is an absolute performance requirement to do so, and then only use the specific driver instead of installing them all.

© 2010 IBM Corporation

IBM Internet Security Systems

Virtualization security – Imperatives … The Low Hanging Fruit

Easy steps you can follow

7. Do not use Paravirtualized drivers within DMZ based VMs, or any that hold sensitive data unless there is an absolute performance requirement to do so, and then only use the specific driver instead of installing them all.

6. Use a centralized directory service to provide authentication

5. Use a centralized tool to provide authorization.

4. Use a centralized syslog/log server for collecting audit and standard log data for analysis

3. Analyze/Review your log data daily for issues.

© 2010 IBM Corporation

IBM Internet Security Systems

Virtualization security – Imperatives … The Low Hanging Fruit

Easy steps you can follow

7. Do not use Paravirtualized drivers within DMZ based VMs, or any that hold sensitive data unless there is an absolute performance requirement to do so, and then only use the specific driver instead of installing them all.

6. Use a centralized directory service to provide authentication

5. Use a centralized tool to provide authorization.

4. Use a centralized syslog/log server for collecting audit and standard log data for analysis

3. Analyze/Review your log data daily for issues.

2. Ensure only the hypervisor can access any LUN assigned to a hypervisor.

© 2010 IBM Corporation

IBM Internet Security Systems

Virtualization security – Imperatives … The Low Hanging Fruit

Easy steps you can follow

7. Do not use Paravirtualized drivers within DMZ based VMs, or any that hold sensitive data unless there is an absolute performance requirement to do so, and then only use the specific driver instead of installing them all.

6. Use a centralized directory service to provide authentication

5. Use a centralized tool to provide authorization.

4. Use a centralized syslog/log server for collecting audit and standard log data for analysis

3. Analyze/Review your log data daily for issues.

2. Ensure only the hypervisor can access any LUN assigned to a hypervisor.

1. Firewall your virtualization management tools from the rest of your network

© 2010 IBM Corporation

IBM Internet Security Systems

Summary

Virtualization Security wrap up

• Important to understand the inner workings of a hypervisor and how it protects itself

• Type of threats that virtual environments are vulnerable to

• Security posture impacted by virtualization and no single product provide adequate protection but…

• Firewall tools are a good start to protect your virtual environment

© 2010 IBM Corporation

IBM Internet Security Systems

Questions & Answers

© 2010 IBM Corporation

Thank you!

For more information on Virtualization Security, visit,

IBM Institute for Advanced Security: www.instituteforadvancedsecurity.com

The Virtualization Practice http://www.virtualizationpractice.com/blog/?page_id=2

All information represents IBM's current intent, is subject to change or withdrawal without notice, and represents only IBM ISS ’ goals and objectives. By providing this information, IBM is not committing to provide this capability.

© 2010 IBM Corporation

IBM Internet Security Systems

Seed Questions

 Ed

– How do we handle antivirus, patching and malware?

– Should we be using VLANs? Are they secure?

– Do I have to worry about ‘ escaping VM ’ attacks?

– Can you virtualize a DMZ?

Dave

– Performance-wise, how do security virtual machines impact the virtual environment?

– Can security virtual machines be integrated with platforms other than VMware?

Ajay

– Does virtualization improve security or makes it more challenging?

– Does security of physical end-points interact with security for virtual end-points? Or does it remain separate?

© 2010 IBM Corporation

Download