📜 ⬆️ ⬇️

Security Virtualization. Part 2

Continuing to translate the article "Virtualization Security" by Terry Komperda.

Security Virtualization. Part 1

7. RECOMMENDATIONS AND OPTIMAL METHODS FOR SAFE VIRTUALIZATION
')
7.1 Administrator Access and Separation of Duties


7.2 Desktop Virtualization and Security
The following five effective measures will ensure that there is no unauthorized and insecure virtualization in the environment:
  1. Update your valid usage policy.
    State the exact conditions under which you can install virtualization software and determine what confirmations are required for this. Specify which programs can be run and how they should be protected. Clearly define the consequences that employees will face if they do not follow the rules.
  2. Limit the use of virtual machines only to users who need them.
    Most users do not need VMs on their computers. Prevent the installation of free downloadable software for corporate desktops and laptops. Restrict rights to a small group of developers and testers of virtual tools and VMs, and help them understand that they still need to adhere to corporate security policies.
  3. Always make sure your virtualization and antivirus software is up to date.
    Make sure that all VMs have the same firewalls, antivirus, and IDS / IPS as on desktops and laptops.
  4. Choose a security policy that supports virtualization
    Ensure that there are no known security policy conflicts with existing virtualization platforms.
  5. Create and update a secure VM build library
    Create a VM build repository containing all the configuration settings, security software and patches that users can download for their own use.


7.3 Network Security


7.4 Data Storage Networks


7.5 Disaster Recovery


7.6 Audit and logging


7.7 Virtual Machine Security


7.8 Management Systems


7.9 Hypervisor Security


7.10 Snapshots and images


7.1 Time Synchronization


7.12 Remote Access


7.13 Backup


7.14 Customizing and Managing Changes


7.15 Server Pools and Virtual Service Offers


8. ADDITIONAL QUESTIONS, RECOMMENDATIONS AND ADVICE FOR VIRTUALIZED CLOUD
Many of the above recommendations and tips are effective for the data center, corporate and cloud environments, but the Cloud itself differs from the two above mentioned environments and requires other means of protection due to its size, multi-tenancy and the fact that the VM does not always stay within cozy physical perimeter around which you can create a security system. The following are some of the important points to take into account:

9. CONCLUSION
Virtualization introduces new security challenges for businesses. Virtual components and environments cannot be protected only by existing security mechanisms and processes. Virtualization creates another network, which is a hybrid between a physically centered network created and a new virtual or logical environment. To make sure that security is at the proper level, many factors and additional degrees of protection should be considered along with additional planning and training, as well as personnel training. Virtualization security should not be what you think of after creating a new virtual infrastructure and all components are in place. Security in this area will improve with the development of virtualization technology. In this area it is necessary to apply standards so that firms have rules to follow in the new environment.

Source: https://habr.com/ru/post/243895/


All Articles