Download presentation
Presentation is loading. Please wait.
Published byVanessa Wood Modified over 8 years ago
1
© 2009 Pittsburgh Supercomputing Center Server Virtualization and Security Kevin Sullivan ksulliva@psc.edu Copyright Kevin Sullivan, Pittsburgh Supercomputing Center 2009. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author
2
© 2009 Pittsburgh Supercomputing Center –Full Virtualization vs Paravirtualization –Major products Xen VMware Hyper-V –Virtualization is new Security is not well understood, yet. Virtualization overview
3
© 2009 Pittsburgh Supercomputing Center Hardware Kernel App Hardware Kernel App Hypervisor Kernel App Virtualization Diagram Non-virtual Virtual
4
© 2009 Pittsburgh Supercomputing Center Virtualization is GOOD for security Run one service per (virtual) server Easily test updates Rebuild compromised machines quickly Manage lots of machines
5
© 2009 Pittsburgh Supercomputing Center Virtualization is BAD for security More attack surfaces Information leakage DOSs can spread New, rapidly developing field
6
© 2009 Pittsburgh Supercomputing Center VM control Who allocates VMs and resources Who can manage a VM VM Sprawl
7
© 2009 Pittsburgh Supercomputing Center New attack vectors Hypervisor vulnerabilities: plan for them Shared hardware Shared networks
8
© 2009 Pittsburgh Supercomputing Center Appropriate Separation Physical > virtual > process Group services with similar security properties
9
© 2009 Pittsburgh Supercomputing Center Virtualization for a better tomorrow Security updates: test, deploy, roll back Standardized OS configurations Add redundancy
10
© 2009 Pittsburgh Supercomputing Center Discussion How do you manage your virtual infrastructure? What are the dangers? How can we mitigate those dangers?
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.