Virtual Desktop Security
Virtual Desktop Security
Security Considerations of
Virtual Desktops
Author: Professor:
Robert L. McPherson Scott O. Bradner
May 8, 2009
Abstract
Virtual desktop infrastructure (VDI) technology is becoming increas-
ingly popular for corporate enterprise use. One reason that is cited for
the growing use of VDI is increased security. With theft of data reaching
epidemic proportions, the idea of an environment that allows data to be
processed by employees without ever leaving the data center is appealing.
VDI enables the centralization of data storage, processing, and reporting
within the data center, obviating the need to move data out of the data
center to individual desktop and laptop computers.
However, VDI is a new technology, and much is still unknown as to se-
curity weaknesses that the technology may present. This paper examines
the security threats and benefits inherent in VDI, and considers alterna-
tives for threat mitigation.
1
Contents
1 Introduction 4
5 Conclusion 15
2
List of Figures
1 Number of Google Search Results for “virtual desktop” Increasing
Exponentially . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2 Number of Google Search Results Combining “security” with
“virtual desktop” . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3
Figure 1: Number of Google Search Results for “virtual desktop” Increasing
Exponentially
1 Introduction
New technologies can solve current computer security issues, but generally open
new security vulnerabilities as well. Virtual Desktop Infrastructures (VDI) are
no exception. As can be seen in the Google search results in figure 1, the number
of searches for the phrase, “virtual desktop”, have increased exponentially each
year since 2000. However, adding the term, “security” to the phrase indicates
that interest in seeking information on security issues related to virtual desktop
technology has increased at a much faster rate than interest in virtual desktops
in general.
4
Figure 2: Number of Google Search Results Combining “security” with “virtual
desktop”
5
Ironically, contrary to the apparent increased interest in virtual desktop secu-
rity, virtual desktops were supposed to provide a more secure environment for
data. VDI technology does indeed solve some traditional security challenges in-
herent with standard desktops. This paper evaluates both the security strengths
and vulnerabilities of VDI technology, and explores potential tactics for making
VDI environments more secure.
Users of personal computers are a weak link among potential desktop security
vulnerabilities. The move from the legacy mainframe environments to Desktops
and laptops has decentralized control of many important aspects of the protocol
stack. This has shifted some of the responsibility for security toward individual
users, and away from the data center. A lot is expected of desktop computer
users in a corporate environment to keep corporate IT assets safe. For example,
users must:
6
• be consistent in choosing secure passwords;
• be trusted to avoid or be very cautious with peer-to-peer file sharing;
• be relied upon to backup critical information;
• be trusted to follow company policy regarding the downloading of company
data onto local storage media, such as onto internal and external hard
drives, thumb drives, DVD, etc.;
• be knowledgeable about what software to avoid that may contain spy ware;
• be reliable in locking or turning off computer when it is not being used.
[23]
The previously listed user related vulnerabilities was based on a list of secu-
rity best practices as published by the University of Mississippi’s IT security
department. Most of these items can be categorized as being primarily related
to the application level. However, since desktops and laptops put access to lower
layers, such as physical equipment, closer to users, it is natural to consider ad-
ditional risks at the physical layer as well. The following are some examples.
Physical Layer
• Lock or turn-off computer when not in use
Data-Link Layer
• Deploy and properly configure network address transversal (NAT)
Network Layer
• Maintain proper network firewall (might also be categorized as application
layer)
7
Transport Layer
Application Layer
• Install operating system patches
• Maintain proper security settings within operating system, including desk-
top firewall
8
3.1 Security Strengths of VDI
May Offer Improved Recovery from Attacks A successful attack on a
traditional desktop environment can require a great deal of effort to clean up.
Measures must be taken to fix the problem on each individual desktop com-
puter. Administrators can set up automated processes, use remote login, or
make personal on site visits to each computer to remedy the issue.
With virtual technology, it can be much easier, and take far less resource to
recover from such an attack. For example, if any virtual desktops are infected
with a virus, worm, trojan, or other malware, an administrator may merely need
to re image the virtual machines from a central location overnight. The degree
of control administrators have over virtual machines, and the centralized nature
of these environments may speed response time and recover from such attacks,
and reduce the costs. [1]
9
and complexity inherent in virtual environments. More on this issue will be
discussed later.
Additionally, there are fewer points of entry for attacks to penetrate the VDI
environment [13]. Rather than having many decentralized physical desktops,
any of which can be an entry point for an attack, virtual desktops have a limited
number of entry points into the data center to contend with. Data centers
typically have a much greater opportunity to control, monitor, and protect
entry points than do individual users of desktops.
While there are clearly advantages to VDI technology, it does present new
security vulnerabilities that VDI vendors may not be quick to highlight.
10
3.2 Security Weaknesses of VDI
Whenever complexity is added to a system, new security vulnerabilities are often
introduced as well. Virtualization technology is no exception. Some argue that
security weaknesses have been a barrier to growth of virtualization technology in
general, and that new security products and architectures must be developed.
The topology of virtual environments is so unique, that traditional security
measures are not up to the task. [2]
If not properly configured or secured, the hypervisor can present a new plane
of attack, that does not exist in traditional desktop environments. For instance,
it has been suggested that a successful attack could be made against a virtual
configuration by swamping the interface between the guest software and the
hypervisor with random data [14]. Although there are no public reports of such
a breach of an actual virtual environment, a hypervisor was reported to have
been vulnerable to a staged attack at the Black Hat 2008 event, by Invisible
Things Lab. [10]
Malware Can Also Infect Virtual Machines Virtual desktops are poten-
tially vulnerable to the same malware attacks and operating system vulnerabil-
ities as any ordinary desktop would be. In fact, all of the vulnerabilities listed
previously in regard to traditional desktop environments apply to virtual desk-
tops as well. The primary difference, is that virtual environments provide an
opportunity for better coordinated, centralized control over these vulnerabili-
ties.
Layered, security in depth measures can protect virtual environments. How-
ever, each of these layers can still be attacked. It is likely that as virtual en-
vironments become more common, malware will be designed to escape from a
virtual layer, onto the operating system. Additionally, while virtual layers can
offer improved security, they can also provide innovative attackers with new
attack vectors. [13]
11
Centralization in Data Center Also Concentrates Risk Although cen-
tralized virtual systems offer the potential for greater control, they can also
make it easier to access and attack a greater number of systems in a single at-
tack, once the virtual environment has been compromised. Although physical
desktop systems may be lacking in control over the many individual users and
units scattered about, the decentralized nature of physical desktop environments
may reduce the number desktops that may be compromised in a single attack
1
.
The source of the attack could be internal or external. The risk of an internal
attack may be greater with virtual environments, due to the enormous amount
of control that administrators and other internal staff may have over virtual sys-
tems. External attacks can compromise the applications and operating systems
of virtual desktops in the same manner as physical desktops, once the virtual
platform has been compromised. However, having all the virtual desktops shar-
ing the same physical network in a centralized data center could allow for faster
spreading of attacks, such as worms and other malware.
Increased Number of Attack Surfaces It has been argued that the hyper-
visor adds to the potential attack surface of virtual environments [13]. On the
other hand, as previously noted, the attack surface may be reduced by the fact
that virtual environments afford greater control over drivers, and require fewer
drivers in general. The net effect is that it remains debatable as to whether
virtual environments truly have fewer attack surfaces than physical desktop en-
vironments. It is certain, however, that the nature of the attack surfaces is
quite different for virtual desktops, and they require different security policies
and protective measures.
Of course, all of the risks discussed in this section do not comprise a com-
prehensive list of the possibilities. One might conclude, therefore, that with all
these potential risks, it may not be worthwhile to consider implementing VDI.
Indeed, as was pointed out, there appears to have been a dramatic increase
1 It may not always be true that physical desktops limit the number of environments that
may be compromised in a single attack. This would also depend upon the nature of the attack.
For example, certain worms may be successful in infecting most machines on a compromised
network, whether the machines are virtual or physical.
12
in interest in the topic of security in relation to virtual desktop environments,
based on the number of Google references on the subject.
Yet, with all the apparent concern and potential threats, there is a lack pub-
licised successful and significant attacks. Of course, the technology is new, and
it would seem inevitable that there will be attacks as the technology grows in
popularity. Therefore, it can only be a healthy thing that there is an increasing
amount of attention toward ensuring that VDI and other virtual environments
remain secure. [10]
13
However, the tipping point as to whether a virtual environment is more secure or
less secure than a traditional physical environment may well be determined by
how the virtual environment is configured, particularly regarding the hypervisor.
[10]. Securing the also includes following best practices regarding restricting
and monitoring who has access, authentication, firewall protection, controlling
access points, as well as following manufacturer recommendations regarding
proper hypervisor configuration.
14
a trusted host, than a trusted virtual environment. This concept is congruous
with the general principal that vulnerabilities that are further down protocol
stack are a greater security risk. Virtual environments do not reduce the need for
security measures to protect data center components, such as physical servers,
network routers and switches, server software, the physical data center itself,
and all other security issues a data center would need to confront. If anything,
consolidating all desktops into the data center should be cause to increase the
level of security for all aspects of the data center where a VDI may be hosted.
5 Conclusion
There are a number of security trade offs and paradoxes related to the imple-
mentation of virtual environments. It cannot be concluded with any certainty
that virtual environments are inherently more or less secure than traditional
physical environments. However, virtual environments are certainly not a cure-
all for security concerns, as some vendors seem to advertise.
15
References
[1] AttackingAndDefendingVirtualEnvironments.pdf.
[2] Catbird - our services - V-Agent. http://www2.catbird.com/corp/vagent s.php?IsGoogle=1& kk=virtual%
78b5-40e8-9c99-d39f98a79b0c&gclid=CPitmsvZxJkCFc5L5QodZ1kMtg.
[3] Virtual desktop infrastructure (VDI) overview.
http://www.msterminalservices.org/articles/Virtual-Desktop-
Infrastructure-Overview.html.
[4] VMware announces virtual desktop infrastructure alliance - VMware.
http://www.vmware.com/company/news/releases/vdi.html.
[5] MXI security and unisys collaborate on secure
USB consolidated virtual desktop solution | reuters.
http://www.reuters.com/article/pressRelease/idUS146215+03-Feb-
2009+BW20090203, February 2009.
[6] RedCannon: solutions: Securing virtual desktop initiatives.
http://www.redcannon.com/solutions/vdi.html, 2009.
[7] Donna Bogatin. Google: Beware virtualization, GreenBorder NO secu-
rity panacea | digital markets | ZDNet.com. http://blogs.zdnet.com/micro-
markets/?p=1454, May 2007.
[8] Mark W. Bortle. Beware of hidden
costs in server consolidation or virtualization.
http://searchsystemschannel.techtarget.com/tip/0,289483,sid99 gci1337253,00.html,
October 2008.
[9] CIO Canada. Beware the rogue employee > secu-
rity products, practices and infrastructure > security.
http://www.itworldcanada.com/Pages/Docbase/ViewArticle.aspx?title=&ID=idgml-
965e5eee-d673-4bb0-92db-9e6a2270acd0&lid=, March 2008.
[10] Maxwell Cooter. Users warned of virtualization’s ’dark side’.
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9131353&sour
April 2009.
[11] David Doane. Today’s tip shoring up se-
curity with a virtual desktop - BusinessWeek.
http://www.businessweek.com/smallbiz/tips/archives/2007/07/shoring up secu.html,
July 2009.
[12] On-Demand Enterprise. On-Demand enterprise: Five im-
mutable laws of virtualization security. http://www.on-
demandenterprise.com/offthewire/26057424.html, 2008.
16
[13] Tom Espiner. Security expert: Beware virtualisation in 2008 - ZDNet.co.uk.
http://news.zdnet.co.uk/security/0,1000000189,39290926,00.htm, Novem-
ber 2007.
[14] Tom Espiner. Virtualisation vendors
warn of security challenges - ZDNet.co.uk.
http://news.zdnet.co.uk/security/0,1000000189,39386015,00.htm, April
2008.
[15] Edward L. Haletky. VMware ESX host security: Us-
ing TCP wrappers, PAM and iptables for defense in depth.
http://searchvmware.techtarget.com/tip/0,289483,sid179 gci1343951,00.html,
2009.
[16] Miya Knights. Reinsurer cuts costs with virtual desktop strategy | IT
PRO. http://www.itpro.co.uk/171897/reinsurer-cuts-costs-with-virtual-
desktop-strategy, February 2008.
[17] Markus G. Kuhn and Ross J. Anderson. Soft tempest:
Hidden data transmission using electromagnetic emanations.
http://www.cl.cam.ac.uk/˜mgk25/ih98-tempest.pdf, 1998.
[18] Pete Lindstrom. Attacking and defending virtual environments, 2008.
[19] Brian Madden. When to use VDI, when to use server-
based computing, and how the citrix ardence dynamic desk-
top fits into all this - brian madden - BrianMadden.com.
http://www.brianmadden.com/blogs/brianmadden/archive/2007/03/14/when-
to-use-vdi-when-to-use-server-based-computing-and-how-the-citrix-
ardence-dynamic-desktop-fits-into-all-this.aspx, March 2007.
[20] Brian Madden. How VMware is misleading everyone about
the cost savings of VDI - brian madden - BrianMadden.com.
http://www.brianmadden.com/blogs/brianmadden/archive/2009/02/23/how-
vmware-is-misleading-everyone-about-the-cost-savings-of-vdi.aspx, Febru-
ary 2009.
[21] Eric Maiwald. Protecting information in hostile environments.
http://srmsblog.burtongroup.com//.
[22] Timothy Prickett Morgan. SAS schemes $70m biz analytics cloud the
register. http://www.theregister.co.uk/2009/03/20/sas builds own cloud/,
March 2009.
[23] The University of Mississippi Information Technology Security. Desktop
security best practices. http://itsecurity.olemiss.edu/BestPractices.htm.
[24] Mark Tordoff. Burton group identifies the five immutable laws of virtual-
ization security. http://it.toolbox.com/blogs/security-compliance/burton-
group-identifies-the-five-immutable-laws-of-virtualization-security-21699,
2008.
17
[25] Vivian Yeo. Virtualisation ’next frontier’ for hackers - ZDNet.co.uk.
http://news.zdnet.co.uk/security/0,1000000189,39523006,00.htm, October
2008.
[]
18