VMware Security Architecture and Best Practices Rob Randell, CISSP Senior Security Specialist SE.

Slides:



Advertisements
Similar presentations
Topics Networking Concepts Storage Concepts Presentation by Anand Mewalal Vmware VI3 Concepts On networking and Storage.
Advertisements

Capacity Planning in a Virtual Environment
Virtual Machine Technology Dr. Gregor von Laszewski Dr. Lizhe Wang.
The System Center Family Microsoft. Mobile Device Manager 2008.
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP, CCSK Principal Systems Engineer – Security.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Xen , Linux Vserver , Planet Lab
Introduction to Virtualization
Virtual techdays INDIA │ 9-11 February 2011 Cross Hypervisor Management Using SCVMM 2008 R2 Vikas Madan │ Partner Consultant II, Microsoft Corporation.
BETA!BETA! Building a secure private cloud on Microsoft technologies Private cloud security concerns Security & compliance in a Microsoft private cloud.
Lesson 9: Creating and Configuring Virtual Networks
Virtual Machine approach to Security Gautam Prasad and Sudeep Pradhan 10/05/2010 CS 239 UCLA.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Agenda Who needs an Architect? Cloud and Security Key Security Differences in Private Cloud Cloud Security Challenges Secondary to Essential Characteristics.
Virtualization for Cloud Computing
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
Virtualization Infrastructure Administration Cluster Jakub Yaghob.
Virtual Machine Security Summer 2013 Presented by: Rostislav Pogrebinsky.
Microsoft Virtual Academy Module 4 Creating and Configuring Virtual Machine Networks.
5205 – IT Service Delivery and Support
Virtualization Performance H. Reza Taheri Senior Staff Eng. VMware.
VMware vSphere 4 Introduction. Agenda VMware vSphere Virtualization Technology vMotion Storage vMotion Snapshot High Availability DRS Resource Pools Monitoring.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Yury Kissin Infrastructure Consultant Storage improvements Dynamic Memory Hyper-V Replica VM Mobility New and Improved Networking Capabilities.
Intranet, Extranet, Firewall. Intranet and Extranet.
Making the Virtualization Decision. Agenda The Virtualization Umbrella Server Virtualization Architectures The Players Getting Started.
Microkernels, virtualization, exokernels Tutorial 1 – CSC469.
COEN 252 Computer Forensics
How to Resolve Bottlenecks and Optimize your Virtual Environment Chris Chesley, Sr. Systems Engineer
ISA 562 Internet Security Theory & Practice
Virtualization Infrastructure Administration Network Jakub Yaghob.
1 Julius Davies Architectural Technology Specialist Microsoft.
Virtual Infrastructure 3 Best Practices for a secure installation. Jeff Mayrand.
Benefits: Increased server utilization Reduced IT TCO Improved IT agility.
Module 14: Configuring Server Security Compliance
Chapter 6 of the Executive Guide manual Technology.
Presented by: Sanketh Beerabbi University of Central Florida COP Cloud Computing.
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
MDC417 Follow me on Working as Practice Manager for Insight, he is a subject matter expert in cloud, virtualization and management.
How to Integrate Security Tools to Defend Data Assets Robert Lara Senior Enterprise Solutions Consultant, GTSI.
SAM-21 Fortress Model and Defense in Depth Some revision on Computer Architecture.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
VMware vSphere Configuration and Management v6
Virtual Machines Created within the Virtualization layer, such as a hypervisor Shares the physical computer's CPU, hard disk, memory, and network interfaces.
A. Frank - P. Weisberg Operating Systems Structure of Operating Systems.
Security Vulnerabilities in A Virtual Environment
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Take Confident Steps Towards Virtualization Phil Utschig Solutions Architect September 15, 2008 Springfield, IL.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Protection of Processes Security and privacy of data is challenging currently. Protecting information – Not limited to hardware. – Depends on innovation.
Capacity Planning in a Virtual Environment Chris Chesley, Sr. Systems Engineer
Module Objectives At the end of the module, you will be able to:
Unit 2 VIRTUALISATION. Unit 2 - Syllabus Basics of Virtualization Types of Virtualization Implementation Levels of Virtualization Virtualization Structures.
Chapter 6: Securing the Cloud
VSPHERE 6 FOUNDATIONS BETA Study Guide QUESTION ANSWER
Agenda Hardware Virtualization Concepts
Microsoft® System Center Virtual Machine Manager 2008
Oracle Solaris Zones Study Purpose Only
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
HC Hyper-V Module GUI Portal VPS Templates Web Console
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

VMware Security Architecture and Best Practices Rob Randell, CISSP Senior Security Specialist SE

Agenda  Virtualization Specific Security Issues Security Concepts in Virtualization Architecture Operational Security Issues with Virtualization  VMware Security Architecture Isolation and Containment Secure Management  Security Best Practices Primary Issues that Affect Virtualization Security Secure Design Secure Deployment Secure Operations

Security Concepts in Architecture  Extended computing stack New privileged layers (Hypervisor) exist underneath the operating system  Guest isolation One guest VM cannot access or even address the “hardware resources” of another guest VM or the host/hypervisor  Host visibility Difficult to see from the guest whether someone is monitoring from host or host even exists  Virtualized interfaces Physical connectivity between guests is recreated, e.g. IP network, file shares, may be more or less like true physical counterparts  Management interfaces The protection of mgmt interfaces (Console OS, VirtualCenter, etc…) very important  Greater co-location of data and assets on one box Potential single point of failure for not just availability, but also integrity/confidentiality Host access gives you “keys to the kingdom”

Operational Security Issues  Most security issues arise not from the virtualization infrastructure itself but from operational issues Adapting existing security processes and solutions to work in the virtualized environment Most security solutions don’t care whether a machine is physical or virtual The datacenter and its workloads just became a much more dynamic and flexible place The risk of misconfiguration requires use of best practices specific to virtualization

VMware Security Architecture

Hardware VM VMM ESX Server Service Console VMX Device Drivers I/O Stack SDK / VirtualCenter Agent Device Drivers VMkernel Hardware Interface Third- Party Agents Storage StackNetwork Stack Distributed Virtual Machine File System Virtual NIC and Switch Resource Management CPU Scheduling Memory Scheduling Storage Bandwidth Network Bandwidth VM VMware ESX Server Architecture  VMkernel designed for Hypervisor-based virtualization  VMkernel dedicated to run VMs only  No public interface to VMkernel  Device drivers qualified in-house as an integral part of the system

VM Isolation Design Privileged instructions within a VM are “de- privileged” and run within an isolated virtual memory space VMs have no direct access to hardware, only have visibility to virtual devices VMs can only communicate with each other through Virtual Switches Resource reservations and limits guarantees performance isolation OS and applications within a VM run as is with no modification (hence no recertification required) VMM Production Use Proof Points Passed security audit and put into production by the largest Financial Institutions Passed Defense and Security Agencies scrutiny and audit (NetTop and HAP) Large number of customers run mission critical and transaction processing applications CC EAL 2 certification (for ESX 2.5) CC EAL 4+ certification (for VI 3.0) expected in Q1 2008

Memory Management Memory Partitioning for VMs Each VM sees its own zero-based physical address space. ESX abstracts physical memory by adding a layer of memory address translation. Memory isolation is imposed by segmentation and paging in x86 (hardware enforced). Physical memory is zeroed out when allocated to a VM. No inter-VM memory leaks Transparent Page sharing – Copy on Write

Virtual Network Design Principles Port Groups Port groups are user named objects which contain configuration information to provide consistent network access for virtual NICs: vSwich Name VLAN ID(s) and tagging/filtering policy Layer 2 Security Options NOT VLAN Groups Virtual ports ignore any requests from the virtual NIC which would violate the L2 security policy Virtualization protects against specific types of network attacks Double-Encapsulation Attacks Spanning Tree Attacks Random Frame Attacks MAC Flooding Attacks 802.1g and ISL Tagging Attacks Multicast Brute-Force Attacks Virtual Switch Isolation vSwitches do not learn from the network. Independent forwarding tables for each vSwitch vSwitches makes private copy frame data used to make forwarding or filtering decisions No trust in user-accessible data No Spanning Tree support

Virtual Storage Isolation  VMs have no knowledge or understanding of SANs  Each VM is able to see only the virtual disks that are presented to it on its virtual SCSI adapters.  The VMware VMFS file system coordinates hosts in the cluster  File Locks are stored on the disk as part of the volume metadata Storage A.vmdk

Secure Management VirtualCenter: primary management tool Encrypted communication Integration with global security framework, e.g. Authentication via Active Directory Detailed auditing Extensive roles system for fine-grained separation-of-duties Operational Best Practices for maximum security, e.g. Dedicated management network Lock-down of Administrator access

Unmatched security and reliability: Compact 32MB footprint OS independence means minimal interfaces and a small attack profile Embedded in hardware --- reduces risk of tampering Unstructured Service Console management replaced by controlled API-based management ESX Server 3i: The next step in Virtualization Security

Security Best Practices

Primary issues that affect Virtualization Security 1.Control of administrative access 2.Risk of improper configuration 3.Lack of Virtual Network Visibility 4.Management of ever-growing environment

Primary issues that affect Virtualization Security  Control of administrative access Issue: Administrative interfaces become avenues of attack Mitigation: Follow Best Practices for Secure Design Secure Deployment Secure Operations Issue: Great amount of power in single administration console Mitigation Follow Best Practices for Secure Operations

Primary issues that affect Virtualization Security  Risk of improper configuration Issue: VMs placed on incorrect virtual network can break security Mitigation: Follow Best Practices for Secure Design Secure Deployment Secure Operations

Primary issues that affect Virtualization Security  Lack of Virtual Network Visibility Issue: Inter-VM traffic within one host not visible to Network- based IDS/IPS Mitigation: Forward all traffic to outside system for inspection using a special Promiscuous-mode forwarding VM Utilize 3 rd party NIPS/NIDS tools which run in VMs and sit directly on Virtual Switch

Primary issues that affect Virtualization Security  Management of ever-growing environment Issue: Security of offline VMs can go out of date Mitigation: Follow Best Practices for Secure Deployment Utilize 3 rd party tools for network-based IDS/IPS (Future) utilize tools for patching of offline VMs Issue: Difficult to keep track of virtual machine provenance and configuration Mitigation: Follow Best Practices for Secure Deployment Utilize 3 rd party tools for VM lifecycle management

Best Practices: Secure Design  Separate and Isolate Management Networks 1. Service Console 2. Vmkernel: Vmotion and NFS & iSCSI datastores  Plan for VM mobility: 3 options 1. Partition trust zones 2. Combine trust zones using virtual network segmentation and virtual network management best practices 3. Combine trust zones using portable VM protection with 3 rd -party tools (Blue Lane, etc)

Best Practices: Secure Deployment  Harden VMware Infrastructure 3 according to guidelines 1. VMware-provided 2. 3 rd -party: STIG (draft), CIS (draft), Xtravirt Security Risk Assessment template, etc.  Always secure virtual machines like you would physical servers 1. Anti-virus 2. Patching 3. Host-based intrusion detection/prevention  Use Templates and Cloning to enforce conformity of virtual machines

Best Practices: Secure Operations  Strictly control administrative access 1. Favor controlled management interfaces (VI Client, Web Access) over unstructured interfaces (Service Console) 2. Avoid VI Console access except when absolutely necessary; favor OS-based access to VM (RDP, ssh, etc). 3. Use roles-based access control to limit administrative capabilities and enforce separation of duties, and never use anonymous accounts (e.g. “Administrator”) 4. Allow powerful access only to small, privileged group; implement break-glass policy for top level administrative account

Best Practices: Secure Networking  Restrict access to privileged networks 1. Closely restrict administrative access on any host with privileged network 2. For less privileged users, only allow template-based provisioning on those hosts  Guard against misconfiguration 1. Clearly label sensitive virtual networks 2. Generate audit reports that flag suspicious configurations 3. Routinely inspect event and task logs

Best Practices References Detailed Prescriptive Guidance Security Design of the VMware Infrastructure 3 Architecture ( VMware Infrastructure 3 Security Hardening ( Managing VMware VirtualCenter Roles and Permissions ( STIG (Secure Technology Implementation Guide) draft ( CIS (Center for Internet Security) Benchmark ( Xtravirt Virtualization Security Risk Assessment ( func=fileinfo&id=15) func=fileinfo&id=15

Questions? Rob Randell, CISSP Senior Systems Engineer - Security Specialist