0% found this document useful (0 votes)
74 views5 pages

Extending Traditional Security To VDI

Enterprises have adopted virtual desktop infrastructure (vdi) due to benefts. Cultural resistance among it organizations, increased bandwidth requirements and inability to work offine were some of the challenges related to Vdi deployment. Extending traditional security to virtual environments can be a mistake.

Uploaded by

puscul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views5 pages

Extending Traditional Security To VDI

Enterprises have adopted virtual desktop infrastructure (vdi) due to benefts. Cultural resistance among it organizations, increased bandwidth requirements and inability to work offine were some of the challenges related to Vdi deployment. Extending traditional security to virtual environments can be a mistake.

Uploaded by

puscul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

A Cloud Security Primer

ExtEnding traditional SEcurity to Vdi


ARE YOUR
VIRTUALIZATION
EFFORTS HURTING YOUR
SECURITY?
ExtEnding trAditionAl SECurity to Vdi 1
Deploying Physical Endpoint Security to Virtual
Desktops
Enterprises have adopted virtual desktop infrastructure (Vdi) due to benefts
such as increasing overall utilization, reducing management costs, and
enhancing security.
1
trend Micro surveyed enterprises worldwide in 2011 and
found that the average Vdi adoption rate was around 52 percent (see
Figure 1).
2
Vdi also supports consumerization and bring-your-own-device (Byod)
strategies, as endpoint users can access applications and data on their
desktops using any mobile device, resulting in better productivity.
the pressure from line-of-business (loB) managers for it departments to
immediately deploy Vdi forces the latter to treat security as a second priority.
A study reported that cultural resistance among it organizations, increased
bandwidth requirements, and inability to work offine were some of the
challenges related to Vdi deployment.
3
When push comes to shove, however,
it groups respond to the pressure by extending traditional security to virtual
environments instead of evaluating security specifcally designed for Vdi to
address the security and infrastructure needs of a virtual environment.
What force it departments to migrate physical security to virtual desktops?
Immediate need of the mobile workforce: demand from the mobile
workforce infuences it departments to give in to rushed Vdi deployments.
Aside from not modifying backup and software policies to avoid resource
allocation issues, it departments may also employ the same security
policies and procedures to both physical and virtualized desktops or, worse,
consider security too late in the deployment stage.
Unavoidable management of mixed environments: Most enterprises
are in the stage of mixing both physical and virtual endpoints in
production. According to the previously cited trend Micro study, 52 percent
of companies worldwide have deployed or are piloting Vdi. As such, it
departments end up using traditional endpoint security for virtual desktops
as well.
Overall projects fnancial intent: Certain organizations place operation
expense reduction as the end goal of their virtualization efforts. instead of
purchasing virtual-aware security software and/or tools, it departments
stick with traditional security to avoid perceived incremental costs.
Extending traditional security to virtualized environments opens up
networks to a plethora of security challenges and threats that can lead
to business disruption or, worse, data leakage.
1 http://www.trendmicro.com/cloud-content/us/pdfs/business/white-papers/wp_frost-sullivan-
vdi.pdf
2 http://www.trendmicro.com/cloud-content/us/pdfs/about/presentation-global-cloud-survey_
exec-summary.pdf
3 http://www.esg-global.com/blogs/data-points-and-truths/cultural-resistance-tops-users-vdi-
challenges/
Figure 1. 2011 Vdi adoption rates by region
IT departments, in particular, have
found themselves leading the charge
for improving efciency in the
organization, while also lowering costs.
Frost & Sullivan,
How the Right
Security Can
Help Justify and
Accelerate Your
VDI Investments,
2011
ExtEnding trAditionAl SECurity to Vdi 2
Security Risks of Extending Traditional Security
one of the core benefts of implementing Vdi is the ability to quickly generate
a virtual desktop image instead of installing each instance from scratch. if it
departments simply extend traditional security to virtual desktops, duplicate
images will inevitably update their security software or initiate full system
scans at the same time, leading to a bandwidth problem known as resource
contention or a security storm.
Common but improper work-arounds include randomizing or disabling antivirus
scanning and updating. When it administrators disable security functions at
this level, they are, in effect, entrusting desktop security to network frewalls
and intrusion detection systems (idSs).
in such a situation, the unprecedented speed by which cybercriminals create
malware3.5 new threats every secondrender virtual desktops vulnerable to
attacks.
unlike virtualized servers, virtual desktops comprise a broader attack surface
because each instance is a potential entry point. user behaviors such as
indiscriminately downloading programs and documents, surfng the Web, and
clicking links do not help. Without protection for even a small amount of time,
VM images can inadvertently introduce threats to corporate networks.
Zero-Day Exploits and the Zero-Day Effect
Zero-day exploits are deployed in the wild by cybercriminals or used in targeted
attacks to exploit unpatched or unknown software vulnerabilities. resource
contention work-arounds that turn off protection or delay security force it
administrators to effectively face the same zero-day risks even if patches are
already available and despite deploying security products.
Widely used applications from Microsoft, Adobe, and even Apple have all been
found to carry software vulnerabilities that are crucial to cybercrime attacks
because these allow automatic command execution.
4
Customized Highly Targeted Attacks
Advanced persistent threats (APts) target companies and organizations in
order to steal confdential information. these campaigns frequently begin with
social engineering attacks as mundane as sending out customized emails with
exploit attachments.
After monitoring APts for one month, trend Micro found that the most
exploited Microsoft Offce software was Microsoft Word (see Figure 2).
5

Furthermore, both relatively new (e.g., CVE-2012-0158)
6
and old (e.g.,
CVE-2010-3333)
7
vulnerabilities have been leveraged.
Exploits for vulnerabilities in Adobe Acrobat Reader and Flash Player have also
been used in various APt campaigns such as lurid,
8
SyKiPot,
9
and ixESHE.
10
4 http://blog.trendmicro.com/2011-in-review-exploits-and-vulnerabilities/
5 http://blog.trendmicro.com/snapshot-of-exploit-documents-for-april-2012/
6 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0158
7 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3333
8 http://blog.trendmicro.com/trend-micro-exposes-lurid-apt/
9 http://blog.trendmicro.com/the-sykipot-campaign/
10 http://blog.trendmicro.com/taking-a-bite-out-of-ixeshe/
With VDI, numerous desktops share
the hosts hardware resources, often at
a ratio of 60 to 1 or higher.
Trend Micro,
Securing Your
Virtual Desktop
Infrastructure
Figure 2. Most exploited Microsoft
software by targeted attacks in April 2012
ExtEnding trAditionAl SECurity to Vdi 3
Figure 3. Security risks extending physical security to Vdi poses
Responding to VDI Security Challenges with Agentless
Security and Vulnerability Shielding
For enterprises to realize the benefts Vdi offers, it administrators must use
security tools or implement policies that can respond to the unique security
challenges and threats that exist in virtualized environments.
Enterprises that have begun virtualizing servers and foresee virtualization to
be a core it strategy should already consider extending server virtualization
strategies to Vdi. Specifcally, Vdi-aware security software that integrates well
with hypervisors allows it administrators to free up the space in each virtual
desktop previously taken up by security agents.
Trend Micro Deep Security, for instance, employs agentless technology
through a lightweight driver in each virtual desktop used by the virtualization
platform to orchestrate staggered security scans and updates instead of
requiring a separate traditional security agent in each virtual desktop. this
protects virtual desktops in the most optimal manner against the risks
illustrated in the previous section while preserving virtual desktop resources.
this agentless technology optimizes performance and increases VM density.
Moreover, it does not need a traditional security agent in each VM, as it
leverages the driver used in virtualization.
Furthermore, enterprises that use VM-aware security software such as Deep
Security can also take advantage of vulnerability shielding, aka virtual
patching, to address known patch management issues and, more specifcally,
the threat zero-days attacks pose.
11
Plugging software holes with vulnerability
shields at the network level enables enterprises to effciently and proactively
protect their networks even before a patch is developed by the affected
softwares vendor.
11 http://www.trendmicro.com/cloud-content/us/pdfs/business/white-papers/wp_vulnerability-
shielding-primer.pdf
Only extend traditional security to VDI if
your security software can:
Identify whether the agent is
running on physical or virtual
endpoints (i.e., a capability called
virtualization awareness)
Serialize scans and updates to
prevent resource contention
problems
2012 by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball
logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other product
or company names may be trademarks or registered trademarks of their owners.
TRENDLABS
SM
TrendLabs is a multinational research, development, and support
center with an extensive regional presence committed to 24 x 7 threat
surveillance, attack prevention, and timely and seamless solutions
delivery. With more than 1,000 threat experts and support engineers
deployed round-the-clock in labs located around the globe, TrendLabs
enables Trend Micro to continuously monitor the threat landscape
across the globe; deliver real-time data to detect, to preempt, and to
eliminate threats; research on and analyze technologies to combat new
threats; respond in real time to targeted threats; and help customers
worldwide minimize damage, reduce costs, and ensure business
continuity.
TREND MICRO
Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud
security leader, creates a world safe for exchanging digital information
with its Internet content security and threat management solutions for
businesses and consumers. A pioneer in server security with over
20 years experience, we deliver top-ranked client, server and cloud-
based security that fts our customers and partners needs, stops
new threats faster, and protects data in physical, virtualized and
cloud environments. Powered by the industry-leading Trend Micro
Smart Protection Network cloud computing security infrastructure,
our products and services stop threats where they emergefrom the
Internet. They are supported by 1,000+ threat intelligence experts
around the globe.

You might also like