Top Virtualization Security Mistakes (And How To Avoid Them)
Top Virtualization Security Mistakes (And How To Avoid Them)
Top Virtualization Security Mistakes (And How To Avoid Them)
Top Virtualization
Security Mistakes
(and How to Avoid Them)
A SANS Whitepaper – August 2009
Written by Jim D. Hietala
Introduction
The flexibility and economy of IT resources enabled by virtualization is spawning the rapid
adoption of networked server virtualization, which IDC projects will grow to a $20 billion mar-
ket by 2010.1 In the past few years, use cases for virtualization have shifted away from early
adopters using the technology for software development and testing, toward server consoli-
dation for production environments and critical applications.
Gartner estimates that more than four million virtual servers will be deployed by 2009, and
that the number of virtualized PCs will grow from less than five million in 2007 to 660 million
by 2011. Gartner also describes virtualization as the highest-impact, trend-changing infrastruc-
ture and operation through 2012.2 Supporting these market projections, a recent SANS survey
of over 700 IT professionals that focused on log management issues found that 49 percent of
respondents are currently collecting log data from virtual machines, and 68 percent predicted
that by 2010, nearly 70 percent of their logs would be collected from virtual machines.3
As more virtual machines move into production, organizations are rightly concerned about
virtual machine technology being used as a new avenue of attack against them. Their concerns
range from finding exploits into important applications running on the virtual machines to the
virtual machines serving as a jumping off point into the larger network. Both were proven to
be possible at Black Hat in July, when researcher Kostya Kortchinsky demonstrated how to leap
from a virtual machine to the host OS and from the host to the virtual machine through two
separate memory leak exploits.
In addition to these emerging areas of concern, the foremost problem with virtualization is
configuration control. In physical servers, patching and vulnerability management controls are
limited to individual physical devices. In a world where IT resources are easily replicated and
spun up as virtual systems, there are more demands on configuration management, inventory
and capacity management, audit, and training/staffing processes. On the other hand, once we
have a solid default configuration and other risk management processes, the management of
virtual machine security could actually be carried out more easily in a virtual network than on
physical devices and networks because of the virtual network’s more centralized controls.
Misconfiguring virtual hosting platforms and guest operating systems is but one of the mis-
takes commonly made with virtualization. Other common mistakes include poor or lack of
patch management oversight for virtualized resources and failure to properly separate duties
(in violation of data protection regulations including PCI DSS). This paper explores prac-
tical security issues that can arise when virtualization technologies are deployed
without proper planning and controls and offers advice on how to avoid
making mistakes in critical areas of deployment and management.
1
Ken Cayton, IDC. “Choosing the Right Hardware for Server Virtualization,” April 2008,
www.intel.com/business/technologies/IDCchoosingvirthardware.pdf
2
Gartner Research. “Gartner Says Virtualization Will Be the Highest-Impact Trend in Infrastructure and
Operations Market Through 2012,” April, 2008, www.gartner.com/it/page.jsp?id=638207
3
Jerry Shenk. “SANS Annual 2009 Log Management Survey,” April, 2009,
www.sans.org/reading_room/analysts_program/logMgtSurvey_Apr09.pdf
SANS Analyst Program 1 Top Virtualization Security Mistakes
Virtualization Mistakes to Avoid
Virtualization of IT resources now spans production Web and database servers, storage, and
networking. Organizations also need to consider that users may be installing virtual machines
on their desktops, as well.
VM technology adds an additional layer to host operating systems that sits beneath the ker-
nel. This layer consists of a stripped down operating system—the virtual machine manager
(VMM), such as VMWare’s Hypervisor—that manage what can be dozens of virtual machines on
a single host. While there are risk areas in the VMMs themselves, most of the discussion in this
paper relates to server and networking virtualization security issues and suggestions because
that is what IT organizations can control. Beyond accepting vendor patches and keeping VMMs
hardened, these virtual machine managers are primarily reliant on vendor support to keep
them secure.
Virtual technologies are often used by many of the leading cloud computing platforms and
services to provide scalability and deliver cost-effective and dedicated virtual services. This
paper doesn’t go into detail on cloud security issues. However, the same rules for monitor-
ing, configuration and risk management apply in the cloud. Cloud computing customers must
adequately assess security risks (including virtualization issues) posed by cloud services and
ensure that necessary controls and access to security- and regulatory-related data within their
clouds is accessible when required.
Mistake #2: Failure to properly separate duties and deploy least privilege controls
Creating separation of duties and providing the least amount of privilege necessary for users to
perform their authorized tasks are basic tenets of information security that apply to both physi-
cal and virtual resources. Some virtualization platforms collapse the functions of system and
network administration so that separating these dutie, is difficult. As such, they give too much
privilege and capability to virtual administrators. This level of privilege conflicts with compli-
ance regulations including PCI DSS, FISMA, and others that require separation of duties and
least privilege to protect sensitive data. Moreover, high privilege access raises the risk of abuse
by privileged insiders, which accounted for 22 percent of breaches investigated by Verizon
Business last year, according to the Verizon 2009 Data Breach Investigations Report.6 Beyond
the insider issue, compromise of the virtual administrator’s login credentials would yield a pow-
erful set of capabilities for outside attackers.
Advice:
Use tried and true security mechanisms, such as requiring SSH for administrative console access.
Use firewall filter rules to limit administrative virtualization console access to predetermined, authorized, internal
network addresses to protect against an outside attacker gaining access to the virtualization administrative console.
Employ a system of checks and balances, with processes to split functions and enforce dual controls for critical tasks.
Set up approval processes for creating new virtual machines and moving new applications to new virtual machines.
Monitor and audit logs for virtual machine usage activity in the data center and on end points. Look to VM-
aware monitoring tools that can also monitor in non-virtual environments to compare and report per policy.
Security tools, such as host-based firewalls and host intrusion prevention, may also prove useful here.
4
www.cisecurity.com/benchmarks.html
5
iase.disa.mil
6
www.verizonbusiness.com/resources/security/reports/2009_databreach_rp.pdf
Advice:
The same processes used for events that might trigger patching requirements, including monitoring vendor
security advisories, apply in virtual systems. Test patches and follow a change control process.
Look to native management capabilities provided by virtualization vendors as well as third party tools that can
scan for vulnerabilities in virtual machines and work independent of and with the VMM (for example to see
VMs behind firewalled switches).
Use management agents that are part of default physical server configurations for your virtual servers as well,
so that existing change management systems and processes are provided, along with visibility into virtual
servers.
Advice:
Educate risk management and compliance groups about virtualization capabilities and limitations. Plan for
two-way dialogue regarding evidence collection, what sorts of audit records to create and capture, and other
audit and compliance concern areas.
Educate auditors on platform-provided audit/logging capabilities, as well as the ability to create point-in-time
system images and snapshots and end of life snapshots. Some third party tools are starting to provide addi-
tional capabilities.
Involve compliance staff in critically shaping security policies for the virtual infrastructure in accordance with
relevant regulations. An example here might be PCI DSS, where Requirement 7 requires that only authorized
users have access to cardholder data, which would require PCI assessors to access virtualization platform audit
logs and access control lists.
Review policies and the controls available in the virtualization platform so that compliance staff and auditors
fully understand access control capabilities and settings. Explain any additional third party controls as well.
Put these control areas in context of data types in the virtual systems that need audit and controls.
Assess and analyze risk at the onset of new virtualization projects, and keep risk management staff involved
with (and give possible sign off to) changes in the virtualization infrastructure that can affect the risk posture.
Be prepared for massive storage requirements!
Advice:
Emulate standard security software on your virtual machine instances, including anti-malware, host intrusion
prevention, endpoint security software, and host firewalls.
Don’t assume that all new tools are required to manage your virtual environment: Many traditional security
and management vendors are rapidly adding functionality that can address virtualized resources, so check
with your current vendor or reseller.
Evaluate options for deploying key security functions, including system and file integrity tools, intrusion pre-
vention systems, firewalls, and others, as virtual appliances. These tools provide the same control capabilities
as their physical counterparts, but in a virtual form factor.
Evaluate in-use security solutions for capability in virtualization scenarios. Check with your reseller or security
vendor partner about their roadmap; look for partnerships that would enable maximum coverage with mini-
mal change to your infrastructure.
Advice:
Existing security tools such as network mapping and scanning systems may be able to provide some asset dis-
covery for virtual machines, but may not be able to see past a virtual firewall switch. Look to virtual-aware
technologies that can do asset discovery, port mapping and application inventory for virtual machines and
network devices. It would be most helpful if these tools can also provide network mapping for interdepen-
dencies among virtual machine networks, their host, and VM network extensions to the physical network
(switches/routers and other such devices).
Integrate virtual machines into existing system lifecycle processes. This, too, may require new VM-aware
tools that work in conjunction with the management capabilities in the VMM to see beyond secure network
segments.
Advice:
Look for best of breed capabilities that have the best chance of meeting your risk management, audit, and
integration needs, while working with your existing infrastructure through partnerships and standards. An
example of an emerging standard that is worth following is SR-IOV (single root, I/O vector) from the PCI SIG .
This standard will enable binding of security policy to virtual machine images.
Look for complementary virtualization security tools that integrate or can be fashioned to work together or
as a part of a collaborative ecosystem. Standards will ultimately improve security capabilities and interoper-
ability.
Advice:
Use security policy management tools, along with processes governing the management of virtual machines,
to ensure that changing the location of VMs will trigger replication of required security functions to the new
location.
Ensure that physical infrastructure such as routers and switches, or their virtual environment equivalents,
are bound to virtual machines. Create policies that move network associations required for virtual machines
around with the virtual machines themselves. Seek virtualization-aware solutions that can help manage net-
work security policies and work with the VMM/Hypervisor for added visibility and control.
In the longer term, look for integrated and virtualization-aware solutions to more tightly couple security func-
tions to virtual machines. Standards such as SR-IOV, mentioned earlier, will help make this a reality because
they allow network security policy and capability to be bound to virtual machines.
Advice:
Study your requirements against your existing infrastructure and future virtualization plans to maximize your
investment. Work with partners and resellers to leverage their experience and knowledge of your network.
When adding VM security management tools and processes, consider soft cost elements such as training, inte-
gration time, internal support and maintenance.
Consider licensing costs, vendor-provided service agreements, roadmaps and partnership plans in relation to
the provider’s virtual coverage.
Advice:
Rootkit and malware installers already have VM-aware capabilities. At Black Hat in July, it was demonstrated
that a malicious or infected VM can be used to jump to the host operating system and own the host and all the
virtual machines on it, which could, then, lead spread out to the physical network. As a result, it is critical to
have an internal usage policy and network and endpoint security that is VM-aware enough to locate and iden-
tify virtual machines and report them.
A new set of management capabilities may be needed that allows IT desktop support, security operations,
and help desk staff to discover virtualization in use throughout the organization’s endpoints, set and monitor
policy, and have visibility into the status of virtual machines running on desktop systems. Asset discovery for
virtual systems running on endpoints is a capability that endpoint security management solutions will need
to develop to enable this visibility and control.
Jim Hietala, GSEC, CISSP, is vice president of security for The Open Group, where
he manages all security and risk management programs and standards activities.
He is also the research director and a principal of the Compliance Research Group,
providing research, analysis and consulting services in the areas of compliance,
risk management, and IT security. Hietala has provided research and consulting
services to numerous organizations. He is a frequent speaker at industry confer-
ences, and he recently authored a comprehensive course on IT risk management.
He is a regular contributor to the SANS Analyst/Expert program and to the Cloud
Security Alliance as a reviewer for the Governance and Enterprise Risk Manage-
ment domain (version 1 guidance) and as a leader of the Compliance sub-domain
(version 2). His articles have appeared in the ISSA Journal, Bank Accounting &
Finance, Risk Factor, The Compliance Authority, Cutter IT Journal, SC Magazine,
and others. An industry veteran with more than 20 years of IT security experience,
he has held leadership roles at ControlPath, Avail Networks, Alternative Technolo-
gies, eSoft, Qwest, Concentric Network, and Digital Pathways. He developed and
launched the industry’s first remote access VPN service (Concentric RemoteLink)
and encrypting ISDN router (Network Express), and he has launched two compli-
ance and risk management software startups into the IT-GRC market. He holds a
B.S. in Marketing from Southern Illinois University.