📜 ⬆️ ⬇️

Security Virtualization. Part 1

Translation of the article "Virtualization Security" by Terry Komperda.

Security Virtualization. Part 2

1. OVERVIEW
')
In a short time, virtualization has had a tremendous impact on IT and network technologies; it has already contributed to tremendous cost savings and return on investment for data centers, enterprises and the Cloud. What seems less significant and lags far behind reality is an understanding of security and virtualization environments. Some people believe that virtualization is more secure than traditional environments, because they have heard about isolation between virtual machines (VMs) and because they have not heard of any successful attacks on hypervisors before. Others believe that new virtual environments need security just like traditional physical environments, so they use the same multi-year approach to security. The most important factor is that the new environment is more complex. Virtual approaches added to existing networks create a new network that requires a different approach to security. In addition to the usual measures should be applied and special security measures for virtualization. In this document, we will look at the differences, problems, difficulties, risks caused by the use of virtualization, and also provide practical recommendations and practical tips to make sure that after applying virtualization, the network remains as secure.

2. INTRODUCTION

Virtualization is evolving and plans to stay here for a long time. Although its concept has been known for more than fifty years, this technology will continue to grow and improve in areas that exist everywhere and plan to develop themselves further. Moreover, half of all servers today are running on Virtual Machines. IDC predicts that 70% of all workloads will work on VM by 2014. What really needs to keep up with technological progress due to large-scale use is to ensure the security of virtualization components and virtual environments. Let's look at some of the security benefits that come from using virtualization.



3. ADVANTAGES IN THE SAFETY SPHERE WHEN USING VIRTUALIZATION

The following are some security benefits after using virtualization:


4. PROBLEMS AND RISKS IN THE FIELD OF SAFETY WHEN USING VIRTUALIZATION

Now that we are familiar with the benefits of virtualization, we can look at some of the problems and risks.

4.1 File Sharing Between Hosts and Guests

4.2 Snapshots

4.3 Network Storage

4.4. Hypervisor

4.5 Virtual Machines

4.6 Separation of Duties and Administrator Access Rights

4.8 VLANs

4.9 Sections
It is believed that when several virtual machines are running on the same host, they are isolated from each other and one VM cannot be used to attack another. Technically, VMs can be divided, but partitions on VMs share memory, processor, and bandwidth resources. If a particular partition consumes too much of one of the above resources, for example, because of a virus, a DoS error may appear on other partitions.

4.10 Other Issues


Despite the many problems described above, virtualization is not necessarily considered insecure - it all depends on the deployment and the security measures applied. Weak security policies, as well as lack of training, can be a far more weighty cause of problems and vulnerabilities, which in turn will lead to a greater risk. Now that we know about security issues when using virtualization, it's time to look at the typical attacks.

5.TYPICAL ATTACKS

Below are some of the types of attacks typical of virtualization:
5.1 Refusal of Service (DoS)
A successful DoS attack can cause the hypervisor to shut down. This may lead to the possibility of adding a loophole for accessing the VM, bypassing the hypervisor.
5.2 Uncontrolled Movement between VMs
If a security hole is formed in the hypervisor and it is found, the user logged into the VM can jump to another VM and get access to the information stored on it.
5.3 Capturing Host Traffic
Vulnerabilities on the hypervisor allow you to monitor system calls, paging files and monitor memory and disk activity.

6. APPLICATION OF TRADITIONAL APPROACHES TO THE SAFETY OF PHYSICAL ENVIRONMENTS TO VIRTUALIZATION

Many of the problems and attacks that can be encountered during virtualization can be solved by using existing employees, processes and technologies. But what cannot be protected with the help of existing solutions is virtual matrices consisting of hypervisors, control systems and virtual switches. The following are some traditional approaches to virtualization and the associated disadvantages:

6.1 Firewalls
Some IT groups send traffic between VMs to standard firewalls, which will inspect the traffic and send it back to the virtual machines. Traditional firewalls were created before virtualization and were installed in data centers and enterprises, and, therefore, they were not created taking into account the virtual infrastructure and associated management systems. This can lead to manual installation and administration, which can then lead to errors. Standard firewalls also do not provide adequate security when moving a VM.

6.2 Network Based Intrusion Detection / Intrusion Prevention Systems
These devices do not work when there are several virtual machines on the host. This is mainly due to the fact that IDS / IPS systems cannot control traffic between virtual machines. Also, they can not access any information when transferring applications.

6.3 Limiting the number of VMs per host / Assignment to physical NICs
This approach not only limits the number of virtual machines on a host, but also assigns a physical network adapter to each virtual machine. While this may be a safe approach and has good security intentions, this approach does not allow a company to get all the benefits and return on investment from a virtualization technology.

6.4 VLANs
VLANs are widely used: whether it is in non-virtualized environments or environments with a good degree of virtualization. The problem here is that the number of VLANs is increasing, it is becoming increasingly difficult to manage the complexities associated with access to checklists, as well as to manage issues of compatibility of network security policy between non-virtual and virtual aspects of the environment.

6.5 Agent Antivirus Approaches
This entails downloading a complete copy of the antivirus software on each VM. Such an approach can provide good protection, but it will cause huge costs for all copies of antivirus software for all virtual machines in the environment. This full-featured software can also adversely affect the memory, storage and activity of the processor, because it increases the use of equipment, and therefore leads to a decrease in performance.
Despite the above disadvantages of using a traditional security model, 60% of respondents indicated that they use traditional solutions to ensure the security and protection of virtual environments. Virtual environments are dynamic and changing rapidly. It will be difficult for traditional approaches to cope with everything alone, to move and change properly. Another approach is to preserve the good aspects of the current approach to security, and at the same time look at the following tips and tricks for virtualization.

Source: https://habr.com/ru/post/243845/


All Articles