SlideShare una empresa de Scribd logo
1 de 40
Descargar para leer sin conexión
Security in a Virtualised Environment

         An Ethical Hacker’s View




                            Peter Wood
                         Chief Executive Officer
                      First•Base Technologies LLP
Agenda




          • Overview and Introduction to Virtualisation
          • Security Risks in Virtualised Environments
          • Controls in Virtualised Environments
          • Summary and Conclusions




Slide 2                                        © First Base Technologies 2011
Overview and Introduction
               to Virtualisation




Slide 3                          © First Base Technologies 2011
Types of Virtualisation



          • Servers
          • Operating systems
          • Desktops
          • Applications
          • Storage
          • Networks
          • … etc.


Slide 4                             © First Base Technologies 2011
Server Virtualisation (1)


          • Abstraction layer between software and hardware
          • Hypervisor (or Virtual Machine Monitor) manages
            interaction of virtual machines and hardware
          • The most common application of virtualisation




Slide 5                                              © First Base Technologies 2011
Server Virtualisation (2)


          Logical rather than a physical view:
          • Group of servers seen as a single pool of resources
          • A single machine running multiple operating systems




Slide 6                                             © First Base Technologies 2011
Network Virtualisation (1)

    • External network virtualisation
    • Networks combined or divided into VLANs to improve efficiency




Slide 7                                            © First Base Technologies 2011
Network Virtualisation (2)



                       • “Network in a box”
                       • Migrate security and traffic
                         management policies from
                         physical to virtual
                         infrastructures
                       • Cost savings from reduction
                         in physical network
                         infrastructure and optimal
                         use of servers
                       • Securely connect physically
                         separate datacentres and
                         cloud networks
                       • Simplify migration of
                         applications to the cloud
Slide 8                                 © First Base Technologies 2011
Virtual Private Servers


          • Cloud providers can offer “virtual private servers”
          • Each VPS:
              - has its own processes, users, files and provides full
                 root access
              - can have its own IP addresses, port numbers,
                 tables, filtering and routing rules
              - can have its own system configuration files and can
                 house an application
              - can have its own versions of system libraries or
                 modify existing ones
          • A VPS is not a Virtual Machine – it runs the same OS as
            the root OS - Linux on Linux, etc.
          • Also known as operating system-level virtualization


Slide 9                                                  © First Base Technologies 2011
VPS Example




Slide 10                 © First Base Technologies 2011
Traditional E-Commerce Architecture




Slide 11                                 © First Base Technologies 2011
Virtualisation Within Trust Zones




Slide 12                                 © First Base Technologies 2011
Virtualisation Across Trust Zones




Slide 13                                 © First Base Technologies 2011
Fully Virtualised




Slide 14                       © First Base Technologies 2011
Security Concerns in
           Virtualised Environments




Slide 15                          © First Base Technologies 2011
Hyperjacking


           • Injecting a rogue hypervisor between the
             target system and the hardware
           • Proofs of concept: Blue Pill, SubVirt 2 and
             Vitriol
           • Regular security measures are ineffective
             against these threats because the OS, running
             above the rogue hypervisor, is unaware that
             the machine has been compromised
           • Hyperjacking is still only a theoretical attack
             scenario, but it has garnered considerable
             press attention due to the potential damage it
             could cause

Slide 16                                                   © First Base Technologies 2011
VM jumping (guest hopping)



           • Exploits vulnerabilities in hypervisors that allow
             malware or remote attacks to compromise VM
             separation protections and gain access to other VMs,
             hosts or even the hypervisor itself
           • These attacks are often accomplished once an attacker
             has gained access to a low-value, thus less secure, VM
             on the host, which is then used as a launch point for
             further attacks on the system
           • Some examples have used two or more compromised
             VMs in collusion to enable a successful attack against
             secured VMs or the hypervisor itself


Slide 17                                                 © First Base Technologies 2011
Vulnerability Disclosure Trend


                                     IBM X-Force ®
                                     2010 Mid-Year
                                     Trend and Risk
                                     Report

                                     373 vulnerabilities
                                     disclosed 1999 to
                                     2009

                                     A small fraction of
                                     all disclosures,
                                     having exceeded
                                     1% only in 2007
                                     through 2009.

Slide 18                                 © First Base Technologies 2011
Virtualisation Vulnerabilities by Type

       Type                           Description                    Workstation        Server

                    Affect host operating system without the
       Host                                                            30.8%              0%
                    involvement of any executing virtual machines
                    Affect a guest virtual machine without
       Guest        affecting the hypervisor or host operating         26.3%              15%
                    system
                    Allow an attacker to “escape” from a guest
  Escape to host    virtual machine to affect the host operating       24.1%              0%
                    system
                    Affect the system on which the client browser
     Web app                                                            9.8%              10%
                    is running

   Virtualisation   Affect the entire virtualised environment, but
                                                                        4.5%            37.5%
      system        do not arise from guest virtual machines

    Escape to       Allow an attacker to “escape” from a guest VM
                                                                        3.8%              35%
    hypervisor      to affect other VMs or the hypervisor itself

      Console       Affect custom management consoles                   0.8%              0%

                    Affect a web server that implements a web
      Web server                                                        0%First Base Technologies 2011
                                                                                         2.5%
Slide 19            application used by the virtualisation system        ©
‘Escape to Hypervisor’


           • Many believe there are no escape-to-hypervisor
             vulnerabilities affecting server-class systems (and
             therefore it is acceptable to run virtual servers with
             different security sensitivities on the same physical
             hardware)
           • The IBM X-Force 2010 Mid-Year Report results show
             that these vulnerabilities do exist for server class
             systems, calling into question whether virtual servers
             with different levels of security sensitivity should run on
             the same physical machine
           • This observation emphasises the importance of timely
             patch management for virtualisation systems


Slide 20                                                    © First Base Technologies 2011
Security Concerns




           • VM sprawl
             -   Failure to patch
             -   Problems with patching
             -   Licensing issues
             -   PCI compliance




           • Segregation of duties
             - Hypervisor vs guest operating systems


Slide 21                                               © First Base Technologies 2011
Security Concerns




           • Infected VM can infect other VMs in same
             server
           • Virtual networks may not use firewalls
           • VM migration can introduce many
             vulnerabilities




Slide 22                                         © First Base Technologies 2011
Management issues


           Each virtual machine requires
             (including suspended and offline):
           • Vulnerability analysis
           • Security updates
           • Patch management
           • Network interface hardening and segmentation




Slide 23                                              © First Base Technologies 2011
Management issues


           Each hypervisor requires:
           • Prevention of single point of failure
           • Regular software updates
           • Controlled access to VMs
           • Security of host OS
           • Security policy




Slide 24                                             © First Base Technologies 2011
Management issues


           • Configuration assessment
           • Hypervisor configuration checks
           • Change authorisation and documentation
           • Configuration audit and control
           • Approved templates for deployment
           • Event monitoring




Slide 25                                              © First Base Technologies 2011
Controls and Standards in
           Virtualised Environments




Slide 26                          © First Base Technologies 2011
Control Considerations



           • Critical servers on a single machine
              - Risk increases if VMs can talk to each other
              - Do not run public-facing servers with LAN servers

           • Hypervisor vulnerabilities
              - Patching is the highest priority
              - Protection of management console is critical

           • Segregation of duties


Slide 27                                                  © First Base Technologies 2011
Control Considerations




           • Patch management & configuration
             - Offline VMs must be kept up to date
             - VM appliance images
             - Protection from tampering




Slide 28                                             © First Base Technologies 2011
Policies and Standards

           • Patch management
           • Change management
           • Backup
           • Audit and monitoring
           • Firewalls
           • Incident response and forensics
           • Intrusion detection / prevention
           • Network access control
           • BCP
           • Antivirus

Slide 29                                        © First Base Technologies 2011
Policies and Standards




           Remember:
           • Perimeter security appliances cannot see inter-VM
             traffic
           • Traffic flows in virtualised environments are different
           • Associate security policy with VM identities




Slide 30                                                    © First Base Technologies 2011
Securing the VM



           Secure the host OS, but also …
           • Secure guest OS as if it were a physical host
           • Consider strong authentication
           • Use segmentation – group applications of similar
             value or sensitivity




Slide 31                                               © First Base Technologies 2011
Securing the VM




           • Secure the kernel
           • Secure network traffic at all layers
           • Protect the console (and thus access to the
             hypervisor)




Slide 32                                            © First Base Technologies 2011
Securing the VM



           Securing virtualised environments requires:
           • Understanding where and how virtualisation is used
           • Creation and enforcement of policy and standards
           • Selection of controls using defence in depth
           • Integration of virtualisation into change and
             vulnerability management
           • Auditing and enforcement




Slide 33                                                 © First Base Technologies 2011
Summary and Conclusions




Slide 34                        © First Base Technologies 2011
Summary


           • Harden VMs, host OS and hypervisor
           • Patch VMs, host OS and hypervisor
           • Offline VMs must be kept up to date
           • Risk increases if VMs can talk to each other
           • Don’t mix VMs of different sensitivity
           • Protection of management console is critical
           • Protection from tampering
           • Segregation of duties
           • Informed, educated audit!


Slide 35                                              © First Base Technologies 2011
PCI DSS Virtualisation Guidelines




           • If a VM is in scope so is the hypervisor (2.2.1)
           • An entire VM is in scope if it stores, processes or
             transmits cardholder data (2.2.2)
           • Virtual appliances are in scope (2.2.3)
           • Virtual switches and routers are in scope (2.2.4)
           • Virtual applications & desktops are in scope (2.2.5)


       https://www.pcisecuritystandards.org/documents/Virtualization_InfoSupp_v2.pdf



Slide 36                                                                © First Base Technologies 2011
Conclusions




           It’s happening now:
                almost 50 percent of servers will be
                virtualised by 2012 (Gartner)
           We have to study:
              security depends on knowledge of
              virtualisation technology for both
              installation and audit




Slide 37                                       © First Base Technologies 2011
References (1)


Chan, Jason; ‘Virtualization: IT Audit and Security Perspectives’ ISACA-SV
  Spring 2010 Conference
  (jchan-isaca-sv-spring2010.pdf)
Chaudhuri, Abhik; von Solms, SH (Basie); Chaudhuri, Dipanwita; ‘Auditing
  Security Risks in Virtual IT Systems’, ISACA Journal volume 1, 2011
  (jpdf11v1-auditing-security-risks.pdf)
Dai Zovi, Dino A.; ‘Hardware Virtualization Rootkits’, Black Hat USA 2006
   (HVM_Rootkits_ddz_bh-usa-06.pdf)
Kirch, Joel; ‘Virtual Machine Security Guidelines Version 1.0’, September
   2007, http://www.cisecurity.org/
   (CIS_VM_Benchmark_v1.0.pdf)
Schreck, Galen; ‘Server Virtualization Security: 90% Process, 10%
  Technology’, Forrester Research, 30 July 2008


Slide 38                                                   © First Base Technologies 2011
References (2)



           Schultz, Eugene; ‘Virtualization, Cloud Computing and Security’,
             ISSA-Puget Sound, Bellevue, Washington, April 15, 2010
           Williams, Brian; Cross, Tom; ‘Virtualisation System Security’,
              2010, IBM (VirtualizationSecurity.pdf)
           ‘IBM X-Force 2010 Mid-Year Trend and Risk Report’
              (2010_XForce_Midyear_Report.pdf)
           ‘ISACA Virtualization Security Checklist’
              (Virtualization-Security-Checklist-26Oct2010-Research.pdf)
           ‘Virtualization: Benefits and Challenges’, 2010, ISACA
               (Virtulization-WP-27Oct2010-Research.pdf)




Slide 39                                                         © First Base Technologies 2011
Need more information?



       Peter Wood
    Chief Executive Officer
First•Base Technologies LLP

  peterw@firstbase.co.uk

     http://firstbase.co.uk
    http://white-hats.co.uk
     http://peterwood.com

    Blog: fpws.blogspot.com
      Twitter: peterwoodx

Más contenido relacionado

La actualidad más candente

Virtualization security
Virtualization securityVirtualization security
Virtualization securityAhmed Nour
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentationMangesh Gunjal
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloudAshok Kumar
 
Fullandparavirtualization.ppt
Fullandparavirtualization.pptFullandparavirtualization.ppt
Fullandparavirtualization.pptImXaib
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage VirtualizationMehul Jariwala
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualizationAhmad Hafeezi
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology Ravindra Dastikop
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMvwchu
 
Implementation levels of virtualization
Implementation levels of virtualizationImplementation levels of virtualization
Implementation levels of virtualizationGokulnath S
 
Virtualization
VirtualizationVirtualization
Virtualizationvishnurk
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security PresentationAjay p
 
Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud ComputingPyingkodi Maran
 

La actualidad más candente (20)

Virtualization security
Virtualization securityVirtualization security
Virtualization security
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloud
 
Fullandparavirtualization.ppt
Fullandparavirtualization.pptFullandparavirtualization.ppt
Fullandparavirtualization.ppt
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
 
Hypervisor
HypervisorHypervisor
Hypervisor
 
Implementation levels of virtualization
Implementation levels of virtualizationImplementation levels of virtualization
Implementation levels of virtualization
 
Virtualization
Virtualization Virtualization
Virtualization
 
Virtualization basics
Virtualization basics Virtualization basics
Virtualization basics
 
Information Security Engineering
Information Security EngineeringInformation Security Engineering
Information Security Engineering
 
Virtualization security and threat
Virtualization security and threatVirtualization security and threat
Virtualization security and threat
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud Computing
 

Similar a Security in a Virtualised Environment

Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2fadielmoussa
 
663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf
663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf
663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdfpivanon243
 
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Digicomp Academy AG
 
Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003bjhutt
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Novell
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2JD Sherry
 
Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011chaucheckpoint
 
End-point Management
End-point ManagementEnd-point Management
End-point ManagementIBM Danmark
 
Introduction to Cloud Security.pptx
Introduction to Cloud Security.pptxIntroduction to Cloud Security.pptx
Introduction to Cloud Security.pptxssuser0fc2211
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesHyTrust
 
ITIL Virtualization - ITSM Academy Webinar
ITIL Virtualization - ITSM Academy WebinarITIL Virtualization - ITSM Academy Webinar
ITIL Virtualization - ITSM Academy WebinarITSM Academy, Inc.
 
Virtual Insight 032609
Virtual Insight 032609Virtual Insight 032609
Virtual Insight 032609patriciafriar
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec
 
Monitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsMonitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsIBM India Smarter Computing
 
Identifying and analyzing security threats to virtualized cloud computing inf...
Identifying and analyzing security threats to virtualized cloud computing inf...Identifying and analyzing security threats to virtualized cloud computing inf...
Identifying and analyzing security threats to virtualized cloud computing inf...IBM222
 
Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003bjhutt
 
Virtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the CloudVirtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the CloudTjylen Veselyj
 

Similar a Security in a Virtualised Environment (20)

Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2
 
663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf
663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf
663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf
 
Campus jueves
Campus juevesCampus jueves
Campus jueves
 
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
 
Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
 
Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011
 
End-point Management
End-point ManagementEnd-point Management
End-point Management
 
Introduction to Cloud Security.pptx
Introduction to Cloud Security.pptxIntroduction to Cloud Security.pptx
Introduction to Cloud Security.pptx
 
Keeping IT Real Webinar
Keeping IT Real WebinarKeeping IT Real Webinar
Keeping IT Real Webinar
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
 
ITIL Virtualization - ITSM Academy Webinar
ITIL Virtualization - ITSM Academy WebinarITIL Virtualization - ITSM Academy Webinar
ITIL Virtualization - ITSM Academy Webinar
 
Virtual Insight 032609
Virtual Insight 032609Virtual Insight 032609
Virtual Insight 032609
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012
 
Monitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsMonitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring Options
 
Identifying and analyzing security threats to virtualized cloud computing inf...
Identifying and analyzing security threats to virtualized cloud computing inf...Identifying and analyzing security threats to virtualized cloud computing inf...
Identifying and analyzing security threats to virtualized cloud computing inf...
 
Ibm security virtual server protection
Ibm security virtual server protectionIbm security virtual server protection
Ibm security virtual server protection
 
Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003
 
Virtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the CloudVirtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the Cloud
 

Más de Peter Wood

Hacking is easy: understanding your vulnerabilities
Hacking is easy: understanding your vulnerabilitiesHacking is easy: understanding your vulnerabilities
Hacking is easy: understanding your vulnerabilitiesPeter Wood
 
The future of cloud security
The future of cloud securityThe future of cloud security
The future of cloud securityPeter Wood
 
The 2018 Threatscape
The 2018 ThreatscapeThe 2018 Threatscape
The 2018 ThreatscapePeter Wood
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber ResiliencePeter Wood
 
Network security, seriously?
Network security, seriously?Network security, seriously?
Network security, seriously?Peter Wood
 
Lessons from a Red Team Exercise
Lessons from a Red Team ExerciseLessons from a Red Team Exercise
Lessons from a Red Team ExercisePeter Wood
 
Red teaming in the cloud
Red teaming in the cloudRed teaming in the cloud
Red teaming in the cloudPeter Wood
 
All your files now belong to us
All your files now belong to usAll your files now belong to us
All your files now belong to usPeter Wood
 
Network Security - Real and Present Dangers
Network Security - Real and Present DangersNetwork Security - Real and Present Dangers
Network Security - Real and Present DangersPeter Wood
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 
Advanced Threat Protection: Lessons from a Red Team Exercise
Advanced Threat Protection: Lessons from a Red Team ExerciseAdvanced Threat Protection: Lessons from a Red Team Exercise
Advanced Threat Protection: Lessons from a Red Team ExercisePeter Wood
 
Pragmatic Network Security - Avoiding Real-World Vulnerabilities
Pragmatic Network Security - Avoiding Real-World VulnerabilitiesPragmatic Network Security - Avoiding Real-World Vulnerabilities
Pragmatic Network Security - Avoiding Real-World VulnerabilitiesPeter Wood
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineeringPeter Wood
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big dataPeter Wood
 
Cloud, social networking and BYOD collide!
Cloud, social networking and BYOD collide!Cloud, social networking and BYOD collide!
Cloud, social networking and BYOD collide!Peter Wood
 
Unpatched Systems: An Ethical Hacker's View
Unpatched Systems: An Ethical Hacker's ViewUnpatched Systems: An Ethical Hacker's View
Unpatched Systems: An Ethical Hacker's ViewPeter Wood
 
Prime Targets in Network Infrastructure
Prime Targets in Network InfrastructurePrime Targets in Network Infrastructure
Prime Targets in Network InfrastructurePeter Wood
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsPeter Wood
 
Emerging Threats and Attack Surfaces
Emerging Threats and Attack SurfacesEmerging Threats and Attack Surfaces
Emerging Threats and Attack SurfacesPeter Wood
 
Out of the Blue: Responding to New Zero-Day Threats
Out of the Blue: Responding to New Zero-Day ThreatsOut of the Blue: Responding to New Zero-Day Threats
Out of the Blue: Responding to New Zero-Day ThreatsPeter Wood
 

Más de Peter Wood (20)

Hacking is easy: understanding your vulnerabilities
Hacking is easy: understanding your vulnerabilitiesHacking is easy: understanding your vulnerabilities
Hacking is easy: understanding your vulnerabilities
 
The future of cloud security
The future of cloud securityThe future of cloud security
The future of cloud security
 
The 2018 Threatscape
The 2018 ThreatscapeThe 2018 Threatscape
The 2018 Threatscape
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
Network security, seriously?
Network security, seriously?Network security, seriously?
Network security, seriously?
 
Lessons from a Red Team Exercise
Lessons from a Red Team ExerciseLessons from a Red Team Exercise
Lessons from a Red Team Exercise
 
Red teaming in the cloud
Red teaming in the cloudRed teaming in the cloud
Red teaming in the cloud
 
All your files now belong to us
All your files now belong to usAll your files now belong to us
All your files now belong to us
 
Network Security - Real and Present Dangers
Network Security - Real and Present DangersNetwork Security - Real and Present Dangers
Network Security - Real and Present Dangers
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Advanced Threat Protection: Lessons from a Red Team Exercise
Advanced Threat Protection: Lessons from a Red Team ExerciseAdvanced Threat Protection: Lessons from a Red Team Exercise
Advanced Threat Protection: Lessons from a Red Team Exercise
 
Pragmatic Network Security - Avoiding Real-World Vulnerabilities
Pragmatic Network Security - Avoiding Real-World VulnerabilitiesPragmatic Network Security - Avoiding Real-World Vulnerabilities
Pragmatic Network Security - Avoiding Real-World Vulnerabilities
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineering
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
Cloud, social networking and BYOD collide!
Cloud, social networking and BYOD collide!Cloud, social networking and BYOD collide!
Cloud, social networking and BYOD collide!
 
Unpatched Systems: An Ethical Hacker's View
Unpatched Systems: An Ethical Hacker's ViewUnpatched Systems: An Ethical Hacker's View
Unpatched Systems: An Ethical Hacker's View
 
Prime Targets in Network Infrastructure
Prime Targets in Network InfrastructurePrime Targets in Network Infrastructure
Prime Targets in Network Infrastructure
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
 
Emerging Threats and Attack Surfaces
Emerging Threats and Attack SurfacesEmerging Threats and Attack Surfaces
Emerging Threats and Attack Surfaces
 
Out of the Blue: Responding to New Zero-Day Threats
Out of the Blue: Responding to New Zero-Day ThreatsOut of the Blue: Responding to New Zero-Day Threats
Out of the Blue: Responding to New Zero-Day Threats
 

Último

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Último (20)

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Security in a Virtualised Environment

  • 1. Security in a Virtualised Environment An Ethical Hacker’s View Peter Wood Chief Executive Officer First•Base Technologies LLP
  • 2. Agenda • Overview and Introduction to Virtualisation • Security Risks in Virtualised Environments • Controls in Virtualised Environments • Summary and Conclusions Slide 2 © First Base Technologies 2011
  • 3. Overview and Introduction to Virtualisation Slide 3 © First Base Technologies 2011
  • 4. Types of Virtualisation • Servers • Operating systems • Desktops • Applications • Storage • Networks • … etc. Slide 4 © First Base Technologies 2011
  • 5. Server Virtualisation (1) • Abstraction layer between software and hardware • Hypervisor (or Virtual Machine Monitor) manages interaction of virtual machines and hardware • The most common application of virtualisation Slide 5 © First Base Technologies 2011
  • 6. Server Virtualisation (2) Logical rather than a physical view: • Group of servers seen as a single pool of resources • A single machine running multiple operating systems Slide 6 © First Base Technologies 2011
  • 7. Network Virtualisation (1) • External network virtualisation • Networks combined or divided into VLANs to improve efficiency Slide 7 © First Base Technologies 2011
  • 8. Network Virtualisation (2) • “Network in a box” • Migrate security and traffic management policies from physical to virtual infrastructures • Cost savings from reduction in physical network infrastructure and optimal use of servers • Securely connect physically separate datacentres and cloud networks • Simplify migration of applications to the cloud Slide 8 © First Base Technologies 2011
  • 9. Virtual Private Servers • Cloud providers can offer “virtual private servers” • Each VPS: - has its own processes, users, files and provides full root access - can have its own IP addresses, port numbers, tables, filtering and routing rules - can have its own system configuration files and can house an application - can have its own versions of system libraries or modify existing ones • A VPS is not a Virtual Machine – it runs the same OS as the root OS - Linux on Linux, etc. • Also known as operating system-level virtualization Slide 9 © First Base Technologies 2011
  • 10. VPS Example Slide 10 © First Base Technologies 2011
  • 11. Traditional E-Commerce Architecture Slide 11 © First Base Technologies 2011
  • 12. Virtualisation Within Trust Zones Slide 12 © First Base Technologies 2011
  • 13. Virtualisation Across Trust Zones Slide 13 © First Base Technologies 2011
  • 14. Fully Virtualised Slide 14 © First Base Technologies 2011
  • 15. Security Concerns in Virtualised Environments Slide 15 © First Base Technologies 2011
  • 16. Hyperjacking • Injecting a rogue hypervisor between the target system and the hardware • Proofs of concept: Blue Pill, SubVirt 2 and Vitriol • Regular security measures are ineffective against these threats because the OS, running above the rogue hypervisor, is unaware that the machine has been compromised • Hyperjacking is still only a theoretical attack scenario, but it has garnered considerable press attention due to the potential damage it could cause Slide 16 © First Base Technologies 2011
  • 17. VM jumping (guest hopping) • Exploits vulnerabilities in hypervisors that allow malware or remote attacks to compromise VM separation protections and gain access to other VMs, hosts or even the hypervisor itself • These attacks are often accomplished once an attacker has gained access to a low-value, thus less secure, VM on the host, which is then used as a launch point for further attacks on the system • Some examples have used two or more compromised VMs in collusion to enable a successful attack against secured VMs or the hypervisor itself Slide 17 © First Base Technologies 2011
  • 18. Vulnerability Disclosure Trend IBM X-Force ® 2010 Mid-Year Trend and Risk Report 373 vulnerabilities disclosed 1999 to 2009 A small fraction of all disclosures, having exceeded 1% only in 2007 through 2009. Slide 18 © First Base Technologies 2011
  • 19. Virtualisation Vulnerabilities by Type Type Description Workstation Server Affect host operating system without the Host 30.8% 0% involvement of any executing virtual machines Affect a guest virtual machine without Guest affecting the hypervisor or host operating 26.3% 15% system Allow an attacker to “escape” from a guest Escape to host virtual machine to affect the host operating 24.1% 0% system Affect the system on which the client browser Web app 9.8% 10% is running Virtualisation Affect the entire virtualised environment, but 4.5% 37.5% system do not arise from guest virtual machines Escape to Allow an attacker to “escape” from a guest VM 3.8% 35% hypervisor to affect other VMs or the hypervisor itself Console Affect custom management consoles 0.8% 0% Affect a web server that implements a web Web server 0%First Base Technologies 2011 2.5% Slide 19 application used by the virtualisation system ©
  • 20. ‘Escape to Hypervisor’ • Many believe there are no escape-to-hypervisor vulnerabilities affecting server-class systems (and therefore it is acceptable to run virtual servers with different security sensitivities on the same physical hardware) • The IBM X-Force 2010 Mid-Year Report results show that these vulnerabilities do exist for server class systems, calling into question whether virtual servers with different levels of security sensitivity should run on the same physical machine • This observation emphasises the importance of timely patch management for virtualisation systems Slide 20 © First Base Technologies 2011
  • 21. Security Concerns • VM sprawl - Failure to patch - Problems with patching - Licensing issues - PCI compliance • Segregation of duties - Hypervisor vs guest operating systems Slide 21 © First Base Technologies 2011
  • 22. Security Concerns • Infected VM can infect other VMs in same server • Virtual networks may not use firewalls • VM migration can introduce many vulnerabilities Slide 22 © First Base Technologies 2011
  • 23. Management issues Each virtual machine requires (including suspended and offline): • Vulnerability analysis • Security updates • Patch management • Network interface hardening and segmentation Slide 23 © First Base Technologies 2011
  • 24. Management issues Each hypervisor requires: • Prevention of single point of failure • Regular software updates • Controlled access to VMs • Security of host OS • Security policy Slide 24 © First Base Technologies 2011
  • 25. Management issues • Configuration assessment • Hypervisor configuration checks • Change authorisation and documentation • Configuration audit and control • Approved templates for deployment • Event monitoring Slide 25 © First Base Technologies 2011
  • 26. Controls and Standards in Virtualised Environments Slide 26 © First Base Technologies 2011
  • 27. Control Considerations • Critical servers on a single machine - Risk increases if VMs can talk to each other - Do not run public-facing servers with LAN servers • Hypervisor vulnerabilities - Patching is the highest priority - Protection of management console is critical • Segregation of duties Slide 27 © First Base Technologies 2011
  • 28. Control Considerations • Patch management & configuration - Offline VMs must be kept up to date - VM appliance images - Protection from tampering Slide 28 © First Base Technologies 2011
  • 29. Policies and Standards • Patch management • Change management • Backup • Audit and monitoring • Firewalls • Incident response and forensics • Intrusion detection / prevention • Network access control • BCP • Antivirus Slide 29 © First Base Technologies 2011
  • 30. Policies and Standards Remember: • Perimeter security appliances cannot see inter-VM traffic • Traffic flows in virtualised environments are different • Associate security policy with VM identities Slide 30 © First Base Technologies 2011
  • 31. Securing the VM Secure the host OS, but also … • Secure guest OS as if it were a physical host • Consider strong authentication • Use segmentation – group applications of similar value or sensitivity Slide 31 © First Base Technologies 2011
  • 32. Securing the VM • Secure the kernel • Secure network traffic at all layers • Protect the console (and thus access to the hypervisor) Slide 32 © First Base Technologies 2011
  • 33. Securing the VM Securing virtualised environments requires: • Understanding where and how virtualisation is used • Creation and enforcement of policy and standards • Selection of controls using defence in depth • Integration of virtualisation into change and vulnerability management • Auditing and enforcement Slide 33 © First Base Technologies 2011
  • 34. Summary and Conclusions Slide 34 © First Base Technologies 2011
  • 35. Summary • Harden VMs, host OS and hypervisor • Patch VMs, host OS and hypervisor • Offline VMs must be kept up to date • Risk increases if VMs can talk to each other • Don’t mix VMs of different sensitivity • Protection of management console is critical • Protection from tampering • Segregation of duties • Informed, educated audit! Slide 35 © First Base Technologies 2011
  • 36. PCI DSS Virtualisation Guidelines • If a VM is in scope so is the hypervisor (2.2.1) • An entire VM is in scope if it stores, processes or transmits cardholder data (2.2.2) • Virtual appliances are in scope (2.2.3) • Virtual switches and routers are in scope (2.2.4) • Virtual applications & desktops are in scope (2.2.5) https://www.pcisecuritystandards.org/documents/Virtualization_InfoSupp_v2.pdf Slide 36 © First Base Technologies 2011
  • 37. Conclusions It’s happening now: almost 50 percent of servers will be virtualised by 2012 (Gartner) We have to study: security depends on knowledge of virtualisation technology for both installation and audit Slide 37 © First Base Technologies 2011
  • 38. References (1) Chan, Jason; ‘Virtualization: IT Audit and Security Perspectives’ ISACA-SV Spring 2010 Conference (jchan-isaca-sv-spring2010.pdf) Chaudhuri, Abhik; von Solms, SH (Basie); Chaudhuri, Dipanwita; ‘Auditing Security Risks in Virtual IT Systems’, ISACA Journal volume 1, 2011 (jpdf11v1-auditing-security-risks.pdf) Dai Zovi, Dino A.; ‘Hardware Virtualization Rootkits’, Black Hat USA 2006 (HVM_Rootkits_ddz_bh-usa-06.pdf) Kirch, Joel; ‘Virtual Machine Security Guidelines Version 1.0’, September 2007, http://www.cisecurity.org/ (CIS_VM_Benchmark_v1.0.pdf) Schreck, Galen; ‘Server Virtualization Security: 90% Process, 10% Technology’, Forrester Research, 30 July 2008 Slide 38 © First Base Technologies 2011
  • 39. References (2) Schultz, Eugene; ‘Virtualization, Cloud Computing and Security’, ISSA-Puget Sound, Bellevue, Washington, April 15, 2010 Williams, Brian; Cross, Tom; ‘Virtualisation System Security’, 2010, IBM (VirtualizationSecurity.pdf) ‘IBM X-Force 2010 Mid-Year Trend and Risk Report’ (2010_XForce_Midyear_Report.pdf) ‘ISACA Virtualization Security Checklist’ (Virtualization-Security-Checklist-26Oct2010-Research.pdf) ‘Virtualization: Benefits and Challenges’, 2010, ISACA (Virtulization-WP-27Oct2010-Research.pdf) Slide 39 © First Base Technologies 2011
  • 40. Need more information? Peter Wood Chief Executive Officer First•Base Technologies LLP peterw@firstbase.co.uk http://firstbase.co.uk http://white-hats.co.uk http://peterwood.com Blog: fpws.blogspot.com Twitter: peterwoodx