learn linux and unix commands - unix shell scripting

Identifying and Reducing Attack Vectors in Virtualized Environment - Part1

 
Thread Tools Search this Thread
# 1  
Old 05-03-2010
Identifying and Reducing Attack Vectors in Virtualized Environment - Part1

Everybody wants to go to heaven but no one wants to die to reach there. Because Heaven is a myth but death is real.  Companies want to enjoy the benefits from Cloud and Virtualization technologies but are afraid of adopting the cloud/Virtualization infrastructure because of security concerns. In real world, (Absolute) security is a myth. Virtualization is the cloud enabler. Virtualization as a technology is a complex, dynamic and off course an evolving technology. It is not a fully mature technology (No technology is fully matured). But it is not insecure as many believe. Instead it is a business enabler which makes organizations to reduce cost, competitive and sometimes even more secure.  Why Virtual Environment is different from the Physical Environment?

Virtualization become insecure and complex when those who manage and protect the virtual environment do not understand the under laying technology.

We are not in the same Information Technology era where we protected our information assets by protecting the Physical IT Infrastructure.

Virtualization opens few additional layers (entry points).
  • Hypervisor <li class="MsoNormal" style="MARGIN: 0in 0in 10pt; mso-list: l0 level1 lfo1; tab-stops: list .5in">Virtual Networks <li class="MsoNormal" style="MARGIN: 0in 0in 10pt; mso-list: l0 level1 lfo1; tab-stops: list .5in">Virtual Machines <li class="MsoNormal" style="MARGIN: 0in 0in 10pt; mso-list: l0 level1 lfo1; tab-stops: list .5in">Virtual Storage
Is there anything wrong with these additional layers?

Nothing really...  But these additional layers give us (security people) an opportunity to perform additional monitoring and protection capabilities at these layers which are not available in the physical environment.

There is no significant increase in the number of entry points to a Virtual Infrastructure but if administrators fail to identify and secure the entry points then that would result in increased attack vectors.

Virtualized data centers are less secure internally than from outside.

The key problem that we can find in the Virtual Infrastructure is the lack separation of duties.

The privileged insiders are the greatest threat to the Virtual Infrastructure (This is true even for Physical Infrastructure). If not implements properly, the SA's get access to the Virtual Networks and make unauthorized changes in the network policies.

But these issues can be overcome by implementing roles based access controls at the Hypervisor layer.

Adding more security controls into the Virtual Infrastructure would make virtualization solutions more expensive and less attractive.

Since not many people see security as a business enabling service we generally consider ROI before a security control is put in place.



 

Keep in mind - security is always risk driven.

I will talk further about reducing attack vectors in Virtualized Data centers in a future post.



















Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

6 More Discussions You Might Find Interesting

1. Linux

Unique Linux ID in virtualized environment

Hi I need to know what is the unique identifier for Linux OS even in a virtualized environment? eg like Machine GUID for windows. I need to know something similar for linux, AIX, Solaris in virtualized environment. Thanks (6 Replies)
Discussion started by: skyineyes
6 Replies

2. UNIX for Dummies Questions & Answers

Sort and vectors on awk

Well, i have a script and it makes a txt like this : Caps 12 cans 9 cols 10 my print line is something like this for(i in a) print i, a; i have to order the txt from higher to low like: (6 Replies)
Discussion started by: matius_88
6 Replies

3. Shell Programming and Scripting

Using Awk to efficiently substitute values using 3 vectors

I'm trying to efficiently combine the fields of two vectors (vectors b and c) into a new vector (vector d) as defined by instructions from a 3rd vector (vector a). So vector a has either a 1 or 2 in each field specifying which vector (b or c respectively) should go into that field. Vector a is... (4 Replies)
Discussion started by: LaTortuga
4 Replies

4. Solaris

Can SunOS be virtualized?

As the title reads; is it possible to virtualize a Sun server running the sparc processor? I know VMWare can do SunOS with the x86 processor, but we have several Sun Servers with the Sparc processor and I would like to move it to a virtual environment. (11 Replies)
Discussion started by: bbbngowc
11 Replies

5. Virtualization and Cloud Computing

Facebook Meets the Virtualized Enterprise

HPL-2008-72 Facebook Meets the Virtualized Enterprise - Curry, Roger; Kiddie, Cameron; Markatchev, Nayden; Simmonds, Rob; Tan, Tingxi; Arlitt, Martin; Walker, Bruce Keyword(s): social networking, Web 2.0, cloud computing Abstract: "Web 2.0" and "cloud computing" are revolutionizing the... (0 Replies)
Discussion started by: Linux Bot
0 Replies

6. Solaris

Sun Certified Systems Admin - Part1

Hey guys, I am taking the SCSA Part 1 next week in London. Any advise as to what I should gen up on, and as to which parts I should focus on? (What will be in the exam etc?) Cheers Jamie (2 Replies)
Discussion started by: JayC89
2 Replies
Login or Register to Ask a Question