Enterprises have adopted virtual desktop infrastructure (vdi) due to benefts. Cultural resistance among it organizations, increased bandwidth requirements and inability to work offine were some of the challenges related to Vdi deployment. Extending traditional security to virtual environments can be a mistake.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
74 views5 pages
Extending Traditional Security To VDI
Enterprises have adopted virtual desktop infrastructure (vdi) due to benefts. Cultural resistance among it organizations, increased bandwidth requirements and inability to work offine were some of the challenges related to Vdi deployment. Extending traditional security to virtual environments can be a mistake.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5
A Cloud Security Primer
ExtEnding traditional SEcurity to Vdi
ARE YOUR VIRTUALIZATION EFFORTS HURTING YOUR SECURITY? ExtEnding trAditionAl SECurity to Vdi 1 Deploying Physical Endpoint Security to Virtual Desktops Enterprises have adopted virtual desktop infrastructure (Vdi) due to benefts such as increasing overall utilization, reducing management costs, and enhancing security. 1 trend Micro surveyed enterprises worldwide in 2011 and found that the average Vdi adoption rate was around 52 percent (see Figure 1). 2 Vdi also supports consumerization and bring-your-own-device (Byod) strategies, as endpoint users can access applications and data on their desktops using any mobile device, resulting in better productivity. the pressure from line-of-business (loB) managers for it departments to immediately deploy Vdi forces the latter to treat security as a second priority. A study reported that cultural resistance among it organizations, increased bandwidth requirements, and inability to work offine were some of the challenges related to Vdi deployment. 3 When push comes to shove, however, it groups respond to the pressure by extending traditional security to virtual environments instead of evaluating security specifcally designed for Vdi to address the security and infrastructure needs of a virtual environment. What force it departments to migrate physical security to virtual desktops? Immediate need of the mobile workforce: demand from the mobile workforce infuences it departments to give in to rushed Vdi deployments. Aside from not modifying backup and software policies to avoid resource allocation issues, it departments may also employ the same security policies and procedures to both physical and virtualized desktops or, worse, consider security too late in the deployment stage. Unavoidable management of mixed environments: Most enterprises are in the stage of mixing both physical and virtual endpoints in production. According to the previously cited trend Micro study, 52 percent of companies worldwide have deployed or are piloting Vdi. As such, it departments end up using traditional endpoint security for virtual desktops as well. Overall projects fnancial intent: Certain organizations place operation expense reduction as the end goal of their virtualization efforts. instead of purchasing virtual-aware security software and/or tools, it departments stick with traditional security to avoid perceived incremental costs. Extending traditional security to virtualized environments opens up networks to a plethora of security challenges and threats that can lead to business disruption or, worse, data leakage. 1 http://www.trendmicro.com/cloud-content/us/pdfs/business/white-papers/wp_frost-sullivan- vdi.pdf 2 http://www.trendmicro.com/cloud-content/us/pdfs/about/presentation-global-cloud-survey_ exec-summary.pdf 3 http://www.esg-global.com/blogs/data-points-and-truths/cultural-resistance-tops-users-vdi- challenges/ Figure 1. 2011 Vdi adoption rates by region IT departments, in particular, have found themselves leading the charge for improving efciency in the organization, while also lowering costs. Frost & Sullivan, How the Right Security Can Help Justify and Accelerate Your VDI Investments, 2011 ExtEnding trAditionAl SECurity to Vdi 2 Security Risks of Extending Traditional Security one of the core benefts of implementing Vdi is the ability to quickly generate a virtual desktop image instead of installing each instance from scratch. if it departments simply extend traditional security to virtual desktops, duplicate images will inevitably update their security software or initiate full system scans at the same time, leading to a bandwidth problem known as resource contention or a security storm. Common but improper work-arounds include randomizing or disabling antivirus scanning and updating. When it administrators disable security functions at this level, they are, in effect, entrusting desktop security to network frewalls and intrusion detection systems (idSs). in such a situation, the unprecedented speed by which cybercriminals create malware3.5 new threats every secondrender virtual desktops vulnerable to attacks. unlike virtualized servers, virtual desktops comprise a broader attack surface because each instance is a potential entry point. user behaviors such as indiscriminately downloading programs and documents, surfng the Web, and clicking links do not help. Without protection for even a small amount of time, VM images can inadvertently introduce threats to corporate networks. Zero-Day Exploits and the Zero-Day Effect Zero-day exploits are deployed in the wild by cybercriminals or used in targeted attacks to exploit unpatched or unknown software vulnerabilities. resource contention work-arounds that turn off protection or delay security force it administrators to effectively face the same zero-day risks even if patches are already available and despite deploying security products. Widely used applications from Microsoft, Adobe, and even Apple have all been found to carry software vulnerabilities that are crucial to cybercrime attacks because these allow automatic command execution. 4 Customized Highly Targeted Attacks Advanced persistent threats (APts) target companies and organizations in order to steal confdential information. these campaigns frequently begin with social engineering attacks as mundane as sending out customized emails with exploit attachments. After monitoring APts for one month, trend Micro found that the most exploited Microsoft Offce software was Microsoft Word (see Figure 2). 5
Furthermore, both relatively new (e.g., CVE-2012-0158) 6 and old (e.g., CVE-2010-3333) 7 vulnerabilities have been leveraged. Exploits for vulnerabilities in Adobe Acrobat Reader and Flash Player have also been used in various APt campaigns such as lurid, 8 SyKiPot, 9 and ixESHE. 10 4 http://blog.trendmicro.com/2011-in-review-exploits-and-vulnerabilities/ 5 http://blog.trendmicro.com/snapshot-of-exploit-documents-for-april-2012/ 6 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0158 7 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3333 8 http://blog.trendmicro.com/trend-micro-exposes-lurid-apt/ 9 http://blog.trendmicro.com/the-sykipot-campaign/ 10 http://blog.trendmicro.com/taking-a-bite-out-of-ixeshe/ With VDI, numerous desktops share the hosts hardware resources, often at a ratio of 60 to 1 or higher. Trend Micro, Securing Your Virtual Desktop Infrastructure Figure 2. Most exploited Microsoft software by targeted attacks in April 2012 ExtEnding trAditionAl SECurity to Vdi 3 Figure 3. Security risks extending physical security to Vdi poses Responding to VDI Security Challenges with Agentless Security and Vulnerability Shielding For enterprises to realize the benefts Vdi offers, it administrators must use security tools or implement policies that can respond to the unique security challenges and threats that exist in virtualized environments. Enterprises that have begun virtualizing servers and foresee virtualization to be a core it strategy should already consider extending server virtualization strategies to Vdi. Specifcally, Vdi-aware security software that integrates well with hypervisors allows it administrators to free up the space in each virtual desktop previously taken up by security agents. Trend Micro Deep Security, for instance, employs agentless technology through a lightweight driver in each virtual desktop used by the virtualization platform to orchestrate staggered security scans and updates instead of requiring a separate traditional security agent in each virtual desktop. this protects virtual desktops in the most optimal manner against the risks illustrated in the previous section while preserving virtual desktop resources. this agentless technology optimizes performance and increases VM density. Moreover, it does not need a traditional security agent in each VM, as it leverages the driver used in virtualization. Furthermore, enterprises that use VM-aware security software such as Deep Security can also take advantage of vulnerability shielding, aka virtual patching, to address known patch management issues and, more specifcally, the threat zero-days attacks pose. 11 Plugging software holes with vulnerability shields at the network level enables enterprises to effciently and proactively protect their networks even before a patch is developed by the affected softwares vendor. 11 http://www.trendmicro.com/cloud-content/us/pdfs/business/white-papers/wp_vulnerability- shielding-primer.pdf Only extend traditional security to VDI if your security software can: Identify whether the agent is running on physical or virtual endpoints (i.e., a capability called virtualization awareness) Serialize scans and updates to prevent resource contention problems 2012 by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. TRENDLABS SM TrendLabs is a multinational research, development, and support center with an extensive regional presence committed to 24 x 7 threat surveillance, attack prevention, and timely and seamless solutions delivery. With more than 1,000 threat experts and support engineers deployed round-the-clock in labs located around the globe, TrendLabs enables Trend Micro to continuously monitor the threat landscape across the globe; deliver real-time data to detect, to preempt, and to eliminate threats; research on and analyze technologies to combat new threats; respond in real time to targeted threats; and help customers worldwide minimize damage, reduce costs, and ensure business continuity. TREND MICRO Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years experience, we deliver top-ranked client, server and cloud- based security that fts our customers and partners needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro Smart Protection Network cloud computing security infrastructure, our products and services stop threats where they emergefrom the Internet. They are supported by 1,000+ threat intelligence experts around the globe.