Server Virtualization Controls
Server Virtualization Controls
Virtualization Controls
Hypervisor
Control Objective Control Activity Risk In-scope
Image and Snapshot The process for image and snapshot management (i.e. creation,
Management security, distribution, storage, use, retirement, destruction) is
documented, assigned, communicated to stakeholders and
consistently applied by the organization. Not relevant No
Not relevant No
Not relevant No
Server Virtualization Audit Work Program
Virtualization Controls
Hypervisor
Control Objective Control Activity Risk In-scope
Server implementation templates are stored on a separate partition
from Guest systems.
Not relevant No
Not relevant No
Not relevant No
Virtualization Controls
Hypervisor
Control Objective Control Activity Risk In-scope
The deactivation or suspension of images is approved by
management.
Not relevant No
Not relevant No
Not relevant No
Not relevant No
Server Virtualization Audit Work Program
Virtualization Controls
Hypervisor
Control Objective Control Activity Risk In-scope
Change The change management process for virtualization technologies is
Management documented, assigned, communicated to stakeholders and Hypervisor change management
consistently applied by the organization. procedures are performed
inconsistently which result in
unapproved or unexpected changes
to the Hypervisor. These unapproved Yes
changes could compromise the
security and integrity of the Guest
OS systems supported by the
Hypervisor.
Virtualization Controls
Hypervisor
Control Objective Control Activity Risk In-scope
Segregation of duties is maintained in the change management
Hypervisor support personnel have
process. Individuals with access to develop changes or request
access to develop changes or
patches from external parties do not have the ability to implement
request patches from external parties
these changes/patches.
and implement these
changes/patches into production Yes
which could result in unexpected or
unapproved modification to
Hypervisor functionality or key
system data.
Security patches installed on virtualization technologies are the most
current versions available, unless otherwise stated by organizational The latest security patches are not
policy. installed on the Hypervisor which
could result in exploitation of the
technology due to known security
weaknesses. This exploitation could
result in unexpected or unapproved
Yes
modification to Hypervisor
functionality or key system data.
These unapproved changes could
compromise the security and integrity
of the Guest OS systems supported
by the Hypervisor.
Virtualization Controls
Hypervisor
Control Objective Control Activity Risk In-scope
Security configuration hardening standards are documented,
communicated to stakeholders and implemented on virtualization Hypervisor security settings are not
technologies. configured according to approved
management hardening standards
which could result in exploitation of
the technology due to known security
weaknesses. This exploitation could
result in unexpected or unapproved Yes
modification to Hypervisor
functionality or key system data.
These unapproved changes could
compromise the security and integrity
of the Guest OS systems supported
by the Hypervisor.
Not relevant No
Server Virtualization Audit Work Program
Virtualization Controls
Hypervisor
Control Objective Control Activity Risk In-scope
Access to virtualization technologies is restricted by passwords, and
password configurations adhere to organization's password policy. The Hypervisor may be accessed
without password authentication or
existing accounts may be breached
via easily guessed passwords which
could result in unauthorized access
to the technology. This unauthorized
Yes
access could result in inappropriate
modifications to Hypervisor security
settings, which could compromise the
security and integrity of the Guest
OS systems supported by the
Hypervisor.
Virtualization Controls
Hypervisor
Control Objective Control Activity Risk In-scope
New access to virtualization technologies is approved prior to
provisioning by appropriate personnel. The access approved by Accounts are provisioned on the
management is provisioned appropriately by the IT administrator. Hypervisor without proper approval
or are provisioned with unapproved
access. This unauthorized access
could result in inappropriate
Yes
modifications to Hypervisor security
settings, which could compromise the
security and integrity of the Guest
OS systems supported by the
Hypervisor.
Virtualization Controls
Hypervisor
Control Objective Control Activity Risk In-scope
Physical access to the hardware supporting virtualization
technologies is restricted to authorized individuals. Unauthorized users have physical
access to the hardware supporting
the Hypervisor which could result in Data
damage to the underlying hardware Center
and cause a disruption of service to
the virtualized environments.
Virtualization Controls
Hypervisor
Control Objective Control Activity Risk In-scope
Remote administration capabilities, if used, are configured to restrict
access to authorized individuals. Hypervisor remote administration
capabilities are not restricted to
authorized individuals which could
result in unauthorized access to the
Hypervisor. This unauthorized access
could result in inappropriate Yes
modifications to Hypervisor security
settings, which could compromise the
security and integrity of the Guest
OS systems supported by the
Hypervisor.
Not relevant No
Server Virtualization Audit Work Program
Virtualization Controls
Hypervisor
Control Objective Control Activity Risk In-scope
Communications Virtualization technologies are synchronized to a trusted authoritative
Date and time stamps included on
Management time server.
system outputs cannot be relied
upon due to the lack of
synchronization to a trusted time
Yes
server. This lack of reliance can
hinder management reviews of
system activity or security
investigations.
Unnecessary services between virtualization technologies (i.e. file
sharing, clipboard) are disabled. Attacks on the Hypervisor are
launched via enabled
communications services. These
attacks could result in unauthorized
Yes
access to the Hypervisor which could
compromise the security and integrity
of the Guest OS systems supported
by the Hypervisor.
Networks internal to the hypervisor are partitioned in a similar way to Unauthorized access to portions of
physical network components. the Hypervisor could compromise the
security and integrity of the Guest Yes
OS systems supported by the
Hypervisor.
Communications between virtualization technologies are sent on Communications emanating from the
trusted networks or otherwise encrypted. Hypervisor are intercepted as a result
of weak or no encryption. Information
Yes
gleaned from the interception could
be used to exploit security
weaknesses.
Isolation The process for isolation management is documented, assigned,
Management communicated to stakeholders and consistently applied by the
organization. Not relevant No
Server Virtualization Audit Work Program
Legend:
Initially determined to be covered by the Infrastructure Review Audit
INF pending confirmation.
Initially determined to be covered by the Data Center Audit pending
Data Center confirmation.
Virtualization Technologies
Virtual machines are rolled backed Virtual machines are rolled backed
while still connected to the network, while still connected to the network,
which could result in the which could result in the
Not relevant No reintroduction of malicious code or No reintroduction of malicious code or No
protocols reusing TCP sequence protocols reusing TCP sequence
numbers or re-exposure of previously numbers or re-exposure of previously
patched vulnerabilities. patched vulnerabilities.
VMS support personnel have access VIT support personnel have access Guest OS support personnel have
to develop changes or request to develop changes or request access to develop changes or
patches from external parties and patches from external parties and request patches from external parties
implement these changes/patches implement these changes/patches and implement these
Yes Yes INF
into production which could result in into production which could result in changes/patches into production
unexpected or unapproved unexpected or unapproved which could result in unexpected or
modification to VMS functionality or modification to VIT functionality or unapproved modification to Guest
key system data. key system data. functionality or key system data.
Audit logs are not able for review to Audit logs are not able for review to Audit logs are not able for review to
support investigations of suspected Yes support investigations of suspected Yes support investigations of suspected INF
VMS security breaches. VIT security breaches. Guest OS security breaches.
Communications between Guest OS
systems are intercepted and not
detected by management.
Not relevant No Not relevant No Yes
Information gleaned from the
interception could be used to exploit
security weaknesses.
Virtualization Technologies
Communications emanating from the Communications emanating from the Communications emanating from the
VMS are intercepted as a result of VIT are intercepted as a result of Guest OS are intercepted as a result
weak or no encryption. Information weak or no encryption. Information of weak or no encryption. Information
Yes Yes Yes
gleaned from the interception could gleaned from the interception could gleaned from the interception could
be used to exploit security be used to exploit security be used to exploit security
weaknesses. weaknesses. weaknesses.
Isolation management procedures
are performed inconsistently which
Not relevant No Not relevant No No
result in Guest systems that are not
sufficiently isolated.
Virtualization Technologies
Note that sensitive data may be found nearly anywhere on a device because
of the nature of virtualization. An organization should strongly consider
erasing all storage devices completely.