Next Generation of Virtualization Technology Part 7 of 8
Next Generation of Virtualization Technology Part 7 of 8
Technology
Part 7 of 8
https://virtualizationweb.wordpress.com/
www.k7cloud.in
Part 7
Typical Cloud
m m m m m
1 2 3 4 5
m m m m m
1 2 3 4 5
m m m m m
1 2 3 4 5
hypervisor
m m m m m
1 2 3 4 5
Cloud
API
hypervisor
hypervisor
hw
hw
hw
m m m m m
1 2 3 4 5
hypervisor
hypervisor
hw
m m m m m
1 2 3 4 5
hypervisor
m m m m m
1 2 3 4 5
hypervisor
hypervisor
hw
hw
m m m m m
1 2 3 4 5
hw
hw
M
a
n
a
g
e
m
e
n
t
Win 2008
Ubuntu
Redhat
A
p
p
A
p
p
A
p
p
A
p
p
A
p
p
A
p
p
A
p
p
A
p
p
A
p
p
A
p
p
A
p
p
A
p
p
A
p
p
A
p
p
A
p
p
A
p
p
A
p
p
A
p
p
A
p
p
A
p
p
A
p
p
A
p
p
A
p
p
A
p
p
OS
OS
OS
Hypervisor
Hardware
OS
desktop
desktop
desktop
desktop
desktop
Dom0
OS
OS
OS
OS
OS
OS
Enterprise Hypervisor
Hardware
Thin client
Thin client
Thin client
Thin client
Thin client
Thin client
Security Issues
Hypervisor is the underlying component of all these
architectures. It is a new layer which needs to be protected
Scale of deployments Just the sheer scale of deployments
make this a security nightmare. Imagine 150 machines
running a simultaneous scheduled AV scan on the same
physical host. Chokes IO/Disk bandwidth.
Isolation - Machines of a company and its competitor could
be running on the same physical machine. Insufficient
isolation could lead to disaster
New APIs to access Virtualization/Cloud services. Bugs in
these could lead to compromise of entire infrastructure.
Security Solutions
Trusted hypervisor
Hyperguard Phoenix Technologies A hypervisor
integrity scanner in SMM.
Deepwatch Intel project Virtualization rootkit
scanner
Security Opportunities
New breed of security products is now
possible to protect guest OSs from being
hijacked
Hypervisor based security suites cannot be
detected by malware running in the guest
Hypervisors allow introspection of very early
boot sequences of the guest, thereby making
possible an entire need breed of BIOS rootkit
and kernel rootkit scanners
Security Opportunities
APIs like VMSAFE from VMWare allow
introspection of interesting system events in
the guests
These events can then be processed on a
dedicated security appliance
These events include CPU state monitoring,
page faults, memory/register accesses, Filesystem events, network events etc.
For Quiz :
https://virtualization.moodlecloud.com/login/index.php