Burning question: How can security risks be mitigated in virtualised systems?

"Virtualisation is not inherently insecure. However, most virtualised workloads are being deployed insecurely."

"Virtualization is not inherently insecure. However, most virtualized workloads are being deployed insecurely."

That's what Gartner analyst Neil MacDonald wrote earlier this year in a report titled "Addressing the Most Common Security Risks in Data Center Virtualization Projects."

Planning for virtualization projects should always include the information security team, but according to Gartner survey data about 40 per cent of virtualization projects were undertaken without the security team's involvement in initial architecture and planning stages.

Burning question: How can VM sprawl be prevented?|Burning question: How can IT shops reduce server virtualization's impact on storage?

Because the hypervisor has oversight over all the workloads running on a physical server, a threat "could result in the compromise of all hosted workloads" MacDonald notes. Under legacy architectures, a threat to one server would only put one workload at risk, but that is not true in a virtualized data center.

The hypervisor itself also adds to the attack surface. VMware, for example, is revamping its own virtualization architecture to get rid of a Linux-based service console in order to reduce the attack surface from about 2GB to 100MB.

While this is an improvement, customers still have plenty to think about on the security front. Gartner recommends treating the virtualization platform "as the most important IT platform in your data center from a security and management perspective."

IT shops need to establish policies regarding the consolidation of workloads of different trust levels, and when evaluating new security and management tools "favor those that span physical and virtual environments with the same management, policy and reporting framework," Gartner says.

IT must be concerned about vulnerabilities in any code installed in the hypervisor layer, including drivers, plug-ins and third-party tools, and keep everything up to date and patched, the report continues.

Even if the virtualization layer is just as secure as previous physical architectures, the tendency to provision more VMs means your footprint is larger and "whenever your footprint grows your security risk expands," Turner notes.

Turner is looking at a few systems management tools, such as Cfengine, Puppet Labs and Chef, to automate the processes of verifying patching, removing old user accounts, and ensuring that configuration files haven't been tampered with.

Even relatively simple tasks like running antivirus software can be more complicated after servers have been virtualized.

Harper notes that his staff had to manually change the times of all the weekly scans on Windows Server instances, because otherwise they would all occur at once and cause a too-high I/O load.

Harper says customers need a combination of new products and procedures to prevent virtualization troubles, because managing VMs as if they were identical to bare-metal machines simply doesn't work.

However, Harper and Jim Brewster, a senior IT pro at Sabre, are optimistic about security in the virtual world. Physical separation of security zones is giving way to software-based security zones, and virtualization management tools could make it difficult for rogue IT admins to alter systems without their actions being logged, Brewster says.

Microsoft and VMware have argued over how many processes should remain in the operating system and how many should be pushed to the hypervisor layer. But Brewster, for one, looks forward to security functionality moving to the hypervisor.

"I think you have more visibility and more control over what's happening, and what's talking to what in the VM space," Brewster says.

Follow Jon Brodkin on Twitter: www.twitter.com/jbrodkin

Read more about data center in Network World's Data Center section.

Join the CSO newsletter!

Error: Please check your email address.

Tags Configuration / maintenancevirtualizationGartnerServer Virtualizationsecurityhardware systemsData CenterVMware

More about GartnerLinuxMicrosoftSabre CorpVMware Australia

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Jon Brodkin

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts