Virtualization



          -By Mangesh Gunjal
Topics to be Covered:

Virtualization
Virtual Machine Monitor
Types of Virtualization
Why Virtualization..?
Virtualization Application Areas
Virtualization Risks
Virtualization Security
VM Sprawl
Miscellaneous
Virtualization
- Multiple Operating Systems on a Single Physical
  System

- Share the Underlying Hardware Resources.
- Multiple Execution Environments,

      - Hardware and Software Partitioning,

      - Time-Sharing,

      - Partial or Complete Machine Simulation/
        Emulation

- Separation of a Resource or Request for a service.
Source: Virtualization Overview
          whitepaper, By VMWare.
-   Virtual Machine Monitor (VMM)



-   Emulation or simulation



-   Virtual Machines


-   Isolated Environment
Source: Virtualization Overview
          whitepaper, By VMWare.
Para Virtualization




              Source: Virtualization Overview
                        whitepaper, By VMWare.
Why Virtualization..?
Server Consolidation.
Legacy Applications.
Sandbox.
Execution of Multiple Operating Systems.
Simulation of Hardware and Networking Devices.
Powerful Debugging and Performance Monitoring
Fault and Error Containment
Application and System Mobility
Shared Memory Multiprocessors
Business Continuity
Virtualization is FUN...and plenty other reasons.
Source: Virtualization Overview
          whitepaper, By VMWare.
Infrastructure is what connects resources to your
business.

Virtual Infrastructure is a dynamic mapping of your
resources to your business.

Result: decreased costs and increased efficiencies
      :
and responsiveness                  Source: Virtualization Overview
                                                     whitepaper, By VMWare.
Virtualization Application Areas




Desktop Virtualization   Application Virtualization
Virtualization Application Areas


                                Server Virtualization


                                Storage Virtualization


Infrastructure Virtualization   Network Virtualization
Virtualization Risks

-   Inexperience Involved.
-   Increased Channels for Attack.
-   Change Management Control.
-   IT Asset Tracking and Management.
-   Securing Dormant Virtual Machines.
-   Sharing Data between Virtual Machines.
Exploitation on Virtualization


- Malicious Code Activities through Detection of VM.


- Denial of Service on the Virtual Machine.


- Virtual Machine Escape
Historical Incident


- VMware Multiple Denial Of Service Vulnerabilities
       Some VMware products support storing configuration
  information in VMDB files. Under some circumstances, a
  malicious user could instruct the virtual machine process
  (VMX) to store malformed data, causing an error. This
  error could enable a successful Denial
                                   Denial-of-Service attack
  on guest operating systems.
Link:
http://www.Securiteam.com/cves/2007/CVE-2007-1877.html
http://www.Securiteam.com/cves/2007/CVE
Virtualization Security

Hypervisor Security
Host/Platform Security
Securing Communications
Security between Guests
Security between Hosts and Guests
Virtualized Infrastructure Security
Virtual Machine Sprawl
Hardening Steps to Secure Virtualisation
   Environment - Server Service Console
- Restriction to Internal Trusted Network
- Block all the incoming and outgoing traffic except for
  necessary ports.
- Monitor the integrity and modification of the configuration
  files
- Limit ssh based client communication to a discrete group
  of ip addresses
- Create separate partitions for /home, /tmp, and /var/log
Hardening Steps to Secure Virtualisation
   Environment - Virtual Network Layer



- Network breach by user error or omission.


- MAC Address spoofing (MAC address changes)


- MAC Address spoofing (Forged transmissions)
Hardening Steps to Secure Virtualisation
     Environment - Virtual Machine

- Apply standard infrastructure security
  measures into virtual infrastructure
- Set the resource reservation and limits
  for each virtual machine
Virtual Machine Sprawl
Unchecked creation of new Virtual Machines (Vms)
The VMs that are created for a short
                               short-term project are still
using CPU, RAM and network resources, and they
consume storage even if they are powered off.
VM sprawl could lead to a computing environment
running out of resources at a much quicker
                                   quicker-than-
expected rate, and it could skew wider capacity
                                       capacity-planning
exercises.
Miscellaneous
Kaspersky Lab has introduced Kaspersky Security for
Virtualization, a virtual security appliance that integrates with
VMware vShield Endpoint to provide agent less, anti malware
security.
VMware Source Code Leak Reveals Virtualization Security
Concerns.
Symantec has its own wide range of tools for Virtualization
Security:
      −    Symantec Critical System Protection
      −    Symantec DataLoss Prevention
      −    Symantec Control Compliance Suite
      −    Symantec Security Information Manager
      −    Symantec Managed Security Services
      −    Symantec Endpoint Solutions
References
- VMware.com
- Microsoft.com
- SANS.org
- Gartner.com
- Trendmicro.com
- Symantec.com
Thank You

Virtualization presentation

  • 1.
    Virtualization -By Mangesh Gunjal
  • 2.
    Topics to beCovered: Virtualization Virtual Machine Monitor Types of Virtualization Why Virtualization..? Virtualization Application Areas Virtualization Risks Virtualization Security VM Sprawl Miscellaneous
  • 3.
    Virtualization - Multiple OperatingSystems on a Single Physical System - Share the Underlying Hardware Resources. - Multiple Execution Environments, - Hardware and Software Partitioning, - Time-Sharing, - Partial or Complete Machine Simulation/ Emulation - Separation of a Resource or Request for a service.
  • 4.
    Source: Virtualization Overview whitepaper, By VMWare.
  • 5.
    - Virtual Machine Monitor (VMM) - Emulation or simulation - Virtual Machines - Isolated Environment
  • 6.
    Source: Virtualization Overview whitepaper, By VMWare.
  • 7.
    Para Virtualization Source: Virtualization Overview whitepaper, By VMWare.
  • 8.
    Why Virtualization..? Server Consolidation. LegacyApplications. Sandbox. Execution of Multiple Operating Systems. Simulation of Hardware and Networking Devices. Powerful Debugging and Performance Monitoring Fault and Error Containment Application and System Mobility Shared Memory Multiprocessors Business Continuity Virtualization is FUN...and plenty other reasons.
  • 9.
    Source: Virtualization Overview whitepaper, By VMWare.
  • 10.
    Infrastructure is whatconnects resources to your business. Virtual Infrastructure is a dynamic mapping of your resources to your business. Result: decreased costs and increased efficiencies : and responsiveness Source: Virtualization Overview whitepaper, By VMWare.
  • 11.
    Virtualization Application Areas DesktopVirtualization Application Virtualization
  • 12.
    Virtualization Application Areas Server Virtualization Storage Virtualization Infrastructure Virtualization Network Virtualization
  • 13.
    Virtualization Risks - Inexperience Involved. - Increased Channels for Attack. - Change Management Control. - IT Asset Tracking and Management. - Securing Dormant Virtual Machines. - Sharing Data between Virtual Machines.
  • 14.
    Exploitation on Virtualization -Malicious Code Activities through Detection of VM. - Denial of Service on the Virtual Machine. - Virtual Machine Escape
  • 15.
    Historical Incident - VMwareMultiple Denial Of Service Vulnerabilities Some VMware products support storing configuration information in VMDB files. Under some circumstances, a malicious user could instruct the virtual machine process (VMX) to store malformed data, causing an error. This error could enable a successful Denial Denial-of-Service attack on guest operating systems. Link: http://www.Securiteam.com/cves/2007/CVE-2007-1877.html http://www.Securiteam.com/cves/2007/CVE
  • 16.
    Virtualization Security Hypervisor Security Host/PlatformSecurity Securing Communications Security between Guests Security between Hosts and Guests Virtualized Infrastructure Security Virtual Machine Sprawl
  • 17.
    Hardening Steps toSecure Virtualisation Environment - Server Service Console - Restriction to Internal Trusted Network - Block all the incoming and outgoing traffic except for necessary ports. - Monitor the integrity and modification of the configuration files - Limit ssh based client communication to a discrete group of ip addresses - Create separate partitions for /home, /tmp, and /var/log
  • 18.
    Hardening Steps toSecure Virtualisation Environment - Virtual Network Layer - Network breach by user error or omission. - MAC Address spoofing (MAC address changes) - MAC Address spoofing (Forged transmissions)
  • 19.
    Hardening Steps toSecure Virtualisation Environment - Virtual Machine - Apply standard infrastructure security measures into virtual infrastructure - Set the resource reservation and limits for each virtual machine
  • 20.
    Virtual Machine Sprawl Uncheckedcreation of new Virtual Machines (Vms) The VMs that are created for a short short-term project are still using CPU, RAM and network resources, and they consume storage even if they are powered off. VM sprawl could lead to a computing environment running out of resources at a much quicker quicker-than- expected rate, and it could skew wider capacity capacity-planning exercises.
  • 21.
    Miscellaneous Kaspersky Lab hasintroduced Kaspersky Security for Virtualization, a virtual security appliance that integrates with VMware vShield Endpoint to provide agent less, anti malware security. VMware Source Code Leak Reveals Virtualization Security Concerns. Symantec has its own wide range of tools for Virtualization Security: − Symantec Critical System Protection − Symantec DataLoss Prevention − Symantec Control Compliance Suite − Symantec Security Information Manager − Symantec Managed Security Services − Symantec Endpoint Solutions
  • 22.
    References - VMware.com - Microsoft.com -SANS.org - Gartner.com - Trendmicro.com - Symantec.com
  • 23.