SlideShare a Scribd company logo
Bryan Nairn, CISSP
Senior Manager, Trustworthy Computing
Microsoft Corporation
bryan.nairn@microsoft.com
Why should I care?
 Server virtualization is now a given in the majority of
  enterprise datacenters – source IDC

 The virtual server and virtual server management
  software market is forecast to reach a market opportunity
  of approximately $4.1 billion by 2014. This represents a
  CAGR of 13.1%. – source IDC

 Over 40% of production virtual machines will be less
  secure than their physical counterparts through 2014 –
  source Gartner
Virtualization powers the cloud
    Private Cloud            Public Cloud

• Mimics public cloud   • Available to anyone
• Benefits enterprise     with a network
  users                   connection
• Highly virtualized    • Pay-as-you-go
• Strings together IT   • Multi-tenant and
  infrastructure into     virtualized
  resources pools       • Self-service portals
Virtualization is a good thing!
Some Common VM Security Myths
 “I only have to patch my host OS / Kernel”
 “If I protect my Host machine, it will protect my
  VMs.”
 “Virtual Hard Disk files are secure by default.”
 “If you expose the virtual machine, you have to
  expose all virtual machines and the host.”
 “All virtual machines can see each other.”
 “I don’t need Anti-Virus with Virtualization”
Protection Rings
Virtualization Architecture- Hypervisor
 Primary Partition                         Child Partitions
 Virtualization Stack
  WMI Provider
                                             Applications
  VM                    VM Worker
  Service               Processes

                                                                               Ring 3
 MinWin                   Virtualization     Virtualization
                                Service      Service
                              Providers      Clients
  Windows                         (VSPs)     (VSCs)                 Guest OS
  Kernel         IHV                                                Kernel
                 Drivers       VMBus         VMBus            Enlightenments
                                                                               Ring 0

 Windows hypervisor                                                            Ring “-1”

                           Server Hardware
Hypervisor Security Assumptions
 Guests are untrusted
 Trust relationships
   Parent must be trusted by hypervisor
   Parent must be trusted by children
 Hypercall interface will be well documented and widely
  available to attackers
 All hypercalls can be attempted by guests
 Can detect you are running on a hypervisor + version
 The internal design of the hypervisor will be well understood
Hypervisor Security Goals
 Strong isolation between partitions
 Protect confidentiality and integrity of guest data
 Separation
        Unique hypervisor resource pools per guest
        Separate worker processes per guest
        Guest-to-parent communications over unique channels

 Non-interference
        Guests cannot affect the contents of other guests, parent, hypervisor
        Guest computations protected from other guests
        Guest-to-guest communications not allowed through VM interfaces
Hyper-V Isolation
 No sharing of virtualized devices
 Separate VMBus per VM to the parent
 No sharing of memory
    Each has its own address space
 VMs cannot communicate with each other, except through
  traditional networking
 Guests can’t perform DMA attacks because they’re never
  mapped to physical devices
 Guests cannot write to the hypervisor
 Parent partition cannot write to the hypervisor
Hyper-V Security Hardening
 Hypervisor has separate address space
   Guest addresses != Hypervisor addresses
 No 3rd party code in the Hypervisor
 Limited number of channels from guests to
  hypervisor
   No “IOCTL”-like things
 Guest to guest communication through hypervisor is
  prohibited
 No shared memory mapped between guests
 Guests never touch real hardware I/O
Hyper-V Security Model
 Uses Authorization Manager
  (AzMan)
    Fine grained authorization and access
     control
    Department and role based
    Segregate who can manage groups of
     VMs
 Define specific functions for
  individuals or roles
    Start, stop, create, add hardware,
      change drive image
 VM administrators don’t have to be
  Server 2008 administrators
 Guest resources are controlled by
  per VM configuration files
 Shared resources are protected
    Read-only (CD ISO file)
    Copy on write (differencing disks)
Virtualization Attack Vectors
 Host Hardware
 Virtual Machine Host OS
 Virtual Machine Hard Disk Files
 Virtual Machine Configuration Files
 Remote Management/Control interfaces
 Guest Operating System
 Virtual Networks
Common Attacks: Host
  Host Compromise for
    Deployment, Duplication and Deletion
    Control of Virtual Machines
    Direct Code / File injection to Virtualization File
     Structure
        Virtual Hard Disks
        Virtual Configuration Files
    Time Sync
  Hardware
    Rootkits / Malware
    Drivers (Attack Surface / Stability)
It’s all about the what’s underneath…
Use Remote Management
 All Virtualization Solutions include some form of remote
  control.
    Access to these tools should be limited.
    Limit scope of access / control


 Protect the remote control mechanisms!
    Use limited use accounts for control
    Make sure the connections are encrypted / authenticated (SSL, RDP
     over SSL)
    Use logging
                                                                        VM
                                                                     VM VM
                                                                  VM
                                                                VM VMVM VM
                                                              VM VM VMVM VM
                                                                         VM VM
                                                               VM VM
                                                                V VMVM VM
                                                                 VM VM VM
                                                                M
File Types and Locations
    .vhd disk file
        – In folder you specify
          in settings
    .vhdd disk file
        – In folder you specify
          in settings
    .vud disk file
        – In vmc-file folder


    .vsv disk file
        – In vmc-file folder
Common Attacks: Guest
 Unpatched Virtual Machines
 Older Operating Systems
 Test or Development machines (these often are not
  managed in the same way as production machines)
 Un-managed or user deployed virtual machines
 Backups and archives
Guest Attacks
  The Virtualization File Structure
     Virtual Hard Disks
         File / Code Injection
         Can be Directly Mounted / accessed
     Virtual Configuration Files
         Base Configuration changes
         Redirection / addition of Virtual drives / Resoures
  BIOS
                        <hardware>
                           <memory>
                              <ram_size type="integer">256</ram_size>
                           </memory>
                           ...
                           <pci_bus>
                              <ethernet_adapter>
                                 <controller_count type="integer">2</controller_count>
                              </ethernet_adapter>
                           </pci_bus>
                        </hardware>
VHD Redirection
Threat Landscape: Virtualized Attackers?
 Is this is one of the next big attack vectors on the horizon?


 The VM industry is focused on securing the VMs from attack.
  Very little thought of VMs being used as the attacker.

 Cases are starting to appear where people use VMs to attack,
  then shutdown the VM to remove any trace of evidence.
Threat Landscape: Virtualized Attackers?
 But we do write all events to the SysLog
 Things that go into drive slack are recoverable using
  forensics tools
 We still have network traces…
 …and audit logs
 …and firewall and router logs
 …not to mention video cameras in the server room.
Defending Yourself
Host Attacks: Potential Solutions
  Harden the Host Servers
     Where a Hypervisor or Specialist Kernel is used, the Host attack surface is
       smaller, however updating and patching is still required.
      Use single role servers and remove unwanted and un-necessary services /
       attack vectors
      Use a local firewall and only allow limited host control / management ports
       over encrypted and authenticated channels.
      Use limited scope admin accounts with strong passwords
  Protect the Virtual Machine files
      Access Control Lists (limited to the security context for the users who manage
       them and the services that control them.
      Encryption
           Disk / Volume / Folder / File
      Auditing
           file access, creation, deletion …
      Don’t forget the backup files / archives
Guest Attacks: Potential Solutions
  Harden the Guest Operating Systems
     Treat the guest OS as if it was a physical machine
  Isolate the machine with Virtual Networks / VLANs
     Local Only Access
     NAT
     Segmented networks
         IPSec Isolation
         Physical Isolation (Separate NICs)
Use Access Control Lists

     Deny           Read-only        Read/Write

• Cannot         • See the VM in   • See the VM in
  modify VMC       web console       web console
  file             and VRMC          and VMRC
• Will not       • Can interact    • Can interact
  appear in        with VM           with the VM
  web console    • Cannot start,   • Can start,
  or VMRC          stop, pause       stop, pause,
                   or resume         resume VMs
                   VMs
Deployment Considerations
 Minimize risk to the Parent Partition
   Use Server Core
   Don’t run arbitrary apps, no web surfing
        Run your apps and services in guests
 Moving VMs from Virtual Server to Hyper-V
    FIRST: Uninstall the VM Additions
 Two physical network adapters at minimum
    One for management (use a VLAN too)
    One (or more) for vm networking
    Dedicated iSCSI
    Connect to back-end management network
        Only expose guests to internet traffic
Anti-Virus & BitLocker…
 Parent partition
    Run AV software and exclude .vhd
 Child partitions
    Run AV software within each VM
 BitLocker
    Great for branch office
    Can be used within a VM
        http://blogs.technet.com/virtualworld/archive/2008/02/16/using-
         bitlocker-under-virtual-pc-virtual-server.aspx
Conclusions
 Reduce the attack surface on the Host
 Use least privilege access
 Audit the deployment, maintenance, control and access to
  virtual machines
 Leverage backups, snapshots and redundancy to reduce
  impact of Host / Guest maintenance
 Secure your Virtual Machine Hard Disk and configuration files,
  including backups and archives
 Use Virtual Networks / VLANs / IPSec to Isolate machines,
  especially before they are exposed to the network.
Resources
 Step-by-Step Guide to Getting Started with Hyper-V
    http://technet2.microsoft.com/windowsserver2008/en/library/c513e254-
     adf1-400e-8fcb-c1aec8a029311033.mspx?mfr=true
 Virtualization Team Blog
    http://blogs.technet.com/virtualization

 Microsoft Virtualization Website
    http://www.microsoft.com/virtualization

 Using BitLocker under Virtual PC / Virtual Server
    http://blogs.technet.com/virtualworld/archive/2008/02/16/using-bitlocker-
     under-virtual-pc-virtual-server.aspx
We would all rather be doing
something else..
CSA Presentation 26th May Virtualization securityv2

More Related Content

What's hot

Virtualization Technology Overview
Virtualization Technology OverviewVirtualization Technology Overview
Virtualization Technology Overview
OpenCity Community
 
VMware vSphere 5.1 Overview
VMware vSphere 5.1 OverviewVMware vSphere 5.1 Overview
VMware vSphere 5.1 Overview
ESXLab
 
How to Optimize Microsoft Hyper-V Failover Cluster and Double Performance
How to Optimize Microsoft Hyper-V Failover Cluster and Double PerformanceHow to Optimize Microsoft Hyper-V Failover Cluster and Double Performance
How to Optimize Microsoft Hyper-V Failover Cluster and Double Performance
StarWind Software
 
Linux On V Mware ESXi
Linux On V Mware ESXiLinux On V Mware ESXi
Linux On V Mware ESXi
Masafumi Ohta
 
Virtualization security
Virtualization securityVirtualization security
Virtualization security
Ahmed Nour
 
Juniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next LevelJuniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next Level
Juniper Networks
 
Hypervisors
HypervisorsHypervisors
Hypervisors
Inzemamul Haque
 
Esx Server 3i Presentation[1]
Esx Server 3i Presentation[1]Esx Server 3i Presentation[1]
Esx Server 3i Presentation[1]
Rishi Sharma
 
Hyper-V Best Practices & Tips and Tricks
Hyper-V Best Practices & Tips and TricksHyper-V Best Practices & Tips and Tricks
Hyper-V Best Practices & Tips and Tricks
Amit Gatenyo
 
Virtualization basics
Virtualization basics Virtualization basics
Virtualization basics
Chandrani Ray Chowdhury
 
Open source hypervisors in cloud
Open source hypervisors in cloudOpen source hypervisors in cloud
Open source hypervisors in cloud
Chetna Purohit
 
XS Boston 2008 OVF
XS Boston 2008 OVFXS Boston 2008 OVF
XS Boston 2008 OVF
The Linux Foundation
 
6420 a 15
6420 a 156420 a 15
6420 a 15
Akemokwe Jafaru
 
Hyper V And Scvmm Best Practis
Hyper V And Scvmm Best PractisHyper V And Scvmm Best Practis
Hyper V And Scvmm Best Practis
Blauge
 
Hypervisor comparison 201212
Hypervisor comparison 201212Hypervisor comparison 201212
Hypervisor comparison 201212
Chang kil Lee
 
Virtualization Questions
Virtualization QuestionsVirtualization Questions
Virtualization Questions
Trupti Jethva
 
XS Boston 2008 Fault Tolerance
XS Boston 2008 Fault ToleranceXS Boston 2008 Fault Tolerance
XS Boston 2008 Fault Tolerance
The Linux Foundation
 
XS Boston 2008 Malware & Training
XS Boston 2008 Malware & TrainingXS Boston 2008 Malware & Training
XS Boston 2008 Malware & Training
The Linux Foundation
 
TSM og virtualisering
 TSM og virtualisering TSM og virtualisering
TSM og virtualisering
Solv AS
 
Virtualization
VirtualizationVirtualization
Virtualization
Edris Nasihat Kon
 

What's hot (20)

Virtualization Technology Overview
Virtualization Technology OverviewVirtualization Technology Overview
Virtualization Technology Overview
 
VMware vSphere 5.1 Overview
VMware vSphere 5.1 OverviewVMware vSphere 5.1 Overview
VMware vSphere 5.1 Overview
 
How to Optimize Microsoft Hyper-V Failover Cluster and Double Performance
How to Optimize Microsoft Hyper-V Failover Cluster and Double PerformanceHow to Optimize Microsoft Hyper-V Failover Cluster and Double Performance
How to Optimize Microsoft Hyper-V Failover Cluster and Double Performance
 
Linux On V Mware ESXi
Linux On V Mware ESXiLinux On V Mware ESXi
Linux On V Mware ESXi
 
Virtualization security
Virtualization securityVirtualization security
Virtualization security
 
Juniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next LevelJuniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next Level
 
Hypervisors
HypervisorsHypervisors
Hypervisors
 
Esx Server 3i Presentation[1]
Esx Server 3i Presentation[1]Esx Server 3i Presentation[1]
Esx Server 3i Presentation[1]
 
Hyper-V Best Practices & Tips and Tricks
Hyper-V Best Practices & Tips and TricksHyper-V Best Practices & Tips and Tricks
Hyper-V Best Practices & Tips and Tricks
 
Virtualization basics
Virtualization basics Virtualization basics
Virtualization basics
 
Open source hypervisors in cloud
Open source hypervisors in cloudOpen source hypervisors in cloud
Open source hypervisors in cloud
 
XS Boston 2008 OVF
XS Boston 2008 OVFXS Boston 2008 OVF
XS Boston 2008 OVF
 
6420 a 15
6420 a 156420 a 15
6420 a 15
 
Hyper V And Scvmm Best Practis
Hyper V And Scvmm Best PractisHyper V And Scvmm Best Practis
Hyper V And Scvmm Best Practis
 
Hypervisor comparison 201212
Hypervisor comparison 201212Hypervisor comparison 201212
Hypervisor comparison 201212
 
Virtualization Questions
Virtualization QuestionsVirtualization Questions
Virtualization Questions
 
XS Boston 2008 Fault Tolerance
XS Boston 2008 Fault ToleranceXS Boston 2008 Fault Tolerance
XS Boston 2008 Fault Tolerance
 
XS Boston 2008 Malware & Training
XS Boston 2008 Malware & TrainingXS Boston 2008 Malware & Training
XS Boston 2008 Malware & Training
 
TSM og virtualisering
 TSM og virtualisering TSM og virtualisering
TSM og virtualisering
 
Virtualization
VirtualizationVirtualization
Virtualization
 

Viewers also liked

Securing a public cloud infrastructure : Windows Azure
Securing a public cloud infrastructure : Windows AzureSecuring a public cloud infrastructure : Windows Azure
Securing a public cloud infrastructure : Windows Azure
vivekbhat
 
What is ud demographics-w-notes - adopted for dis stud class
What is ud   demographics-w-notes - adopted for dis stud classWhat is ud   demographics-w-notes - adopted for dis stud class
What is ud demographics-w-notes - adopted for dis stud class
Howard Kramer
 
Wordpress & accessibility
Wordpress & accessibilityWordpress & accessibility
Wordpress & accessibility
Howard Kramer
 
A web standards & ud approach for access (bps public)
A web standards & ud approach for access (bps   public)A web standards & ud approach for access (bps   public)
A web standards & ud approach for access (bps public)
Howard Kramer
 
Teaching web accessibility at the source
Teaching web accessibility at the sourceTeaching web accessibility at the source
Teaching web accessibility at the source
Howard Kramer
 
Ud 4 curriculum (hk segment of panel)
Ud 4 curriculum (hk segment of panel)Ud 4 curriculum (hk segment of panel)
Ud 4 curriculum (hk segment of panel)
Howard Kramer
 
Ud in curriculum ahead 2013
Ud in curriculum   ahead 2013Ud in curriculum   ahead 2013
Ud in curriculum ahead 2013
Howard Kramer
 
Webinar azuretalk
Webinar azuretalkWebinar azuretalk
Webinar azuretalk
QS-360training
 
Ud in curriculum csun 2013
Ud in curriculum   csun 2013Ud in curriculum   csun 2013
Ud in curriculum csun 2013
Howard Kramer
 
Windows Azure Security & Compliance
Windows Azure Security & ComplianceWindows Azure Security & Compliance
Windows Azure Security & Compliance
Nuno Godinho
 

Viewers also liked (11)

Securing a public cloud infrastructure : Windows Azure
Securing a public cloud infrastructure : Windows AzureSecuring a public cloud infrastructure : Windows Azure
Securing a public cloud infrastructure : Windows Azure
 
What is ud demographics-w-notes - adopted for dis stud class
What is ud   demographics-w-notes - adopted for dis stud classWhat is ud   demographics-w-notes - adopted for dis stud class
What is ud demographics-w-notes - adopted for dis stud class
 
Wordpress & accessibility
Wordpress & accessibilityWordpress & accessibility
Wordpress & accessibility
 
03色彩學
03色彩學03色彩學
03色彩學
 
A web standards & ud approach for access (bps public)
A web standards & ud approach for access (bps   public)A web standards & ud approach for access (bps   public)
A web standards & ud approach for access (bps public)
 
Teaching web accessibility at the source
Teaching web accessibility at the sourceTeaching web accessibility at the source
Teaching web accessibility at the source
 
Ud 4 curriculum (hk segment of panel)
Ud 4 curriculum (hk segment of panel)Ud 4 curriculum (hk segment of panel)
Ud 4 curriculum (hk segment of panel)
 
Ud in curriculum ahead 2013
Ud in curriculum   ahead 2013Ud in curriculum   ahead 2013
Ud in curriculum ahead 2013
 
Webinar azuretalk
Webinar azuretalkWebinar azuretalk
Webinar azuretalk
 
Ud in curriculum csun 2013
Ud in curriculum   csun 2013Ud in curriculum   csun 2013
Ud in curriculum csun 2013
 
Windows Azure Security & Compliance
Windows Azure Security & ComplianceWindows Azure Security & Compliance
Windows Azure Security & Compliance
 

Similar to CSA Presentation 26th May Virtualization securityv2

Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
Mangesh Gunjal
 
Virtualization: Hyper-V, VMM, App-V and MED-V.
Virtualization: Hyper-V, VMM, App-V and MED-V.Virtualization: Hyper-V, VMM, App-V and MED-V.
Virtualization: Hyper-V, VMM, App-V and MED-V.
Microsoft Iceland
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The Cloud
Graeme Wood
 
Windows 2008 R2 Virtualization
Windows 2008  R2  VirtualizationWindows 2008  R2  Virtualization
Windows 2008 R2 Virtualization
Eduardo Castro
 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisors
Gaurav Suri
 
Usenix Invited Talk
Usenix Invited TalkUsenix Invited Talk
Usenix Invited Talk
webhostingguy
 
Virtualization Primer for Java Developers
Virtualization Primer for Java DevelopersVirtualization Primer for Java Developers
Virtualization Primer for Java Developers
Richard McDougall
 
All about virtualization spiceworks - slideshare
All about virtualization  spiceworks - slideshareAll about virtualization  spiceworks - slideshare
All about virtualization spiceworks - slideshare
Spiceworks Ziff Davis
 
Virtualizare si SCVMM2008
Virtualizare si SCVMM2008Virtualizare si SCVMM2008
Virtualizare si SCVMM2008
Tudor Damian
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]
Louis Göhl
 
Virtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualizationVirtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualization
Seccuris Inc.
 
Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-V
Mark Wilson
 
663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf
663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf
663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf
pivanon243
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server Virtualisation
Alan McSweeney
 
Virtualization
VirtualizationVirtualization
Virtualization
preethipreethi35
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
Israel Marcus
 
12th Japan CloudStack User Group Meetup MidoNet with scalable virtual router
12th Japan CloudStack User Group Meetup   MidoNet with scalable virtual router12th Japan CloudStack User Group Meetup   MidoNet with scalable virtual router
12th Japan CloudStack User Group Meetup MidoNet with scalable virtual router
Takeshi Nakajima
 
12th Japan CloudStack User Group Meetup
12th Japan CloudStack User Group Meetup12th Japan CloudStack User Group Meetup
12th Japan CloudStack User Group Meetup
Midokura
 
Virtual Pc Seminar
Virtual Pc SeminarVirtual Pc Seminar
Virtual Pc Seminar
guest5b5549
 
Xen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XTXen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XT
The Linux Foundation
 

Similar to CSA Presentation 26th May Virtualization securityv2 (20)

Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
 
Virtualization: Hyper-V, VMM, App-V and MED-V.
Virtualization: Hyper-V, VMM, App-V and MED-V.Virtualization: Hyper-V, VMM, App-V and MED-V.
Virtualization: Hyper-V, VMM, App-V and MED-V.
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The Cloud
 
Windows 2008 R2 Virtualization
Windows 2008  R2  VirtualizationWindows 2008  R2  Virtualization
Windows 2008 R2 Virtualization
 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisors
 
Usenix Invited Talk
Usenix Invited TalkUsenix Invited Talk
Usenix Invited Talk
 
Virtualization Primer for Java Developers
Virtualization Primer for Java DevelopersVirtualization Primer for Java Developers
Virtualization Primer for Java Developers
 
All about virtualization spiceworks - slideshare
All about virtualization  spiceworks - slideshareAll about virtualization  spiceworks - slideshare
All about virtualization spiceworks - slideshare
 
Virtualizare si SCVMM2008
Virtualizare si SCVMM2008Virtualizare si SCVMM2008
Virtualizare si SCVMM2008
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]
 
Virtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualizationVirtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualization
 
Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-V
 
663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf
663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf
663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server Virtualisation
 
Virtualization
VirtualizationVirtualization
Virtualization
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
 
12th Japan CloudStack User Group Meetup MidoNet with scalable virtual router
12th Japan CloudStack User Group Meetup   MidoNet with scalable virtual router12th Japan CloudStack User Group Meetup   MidoNet with scalable virtual router
12th Japan CloudStack User Group Meetup MidoNet with scalable virtual router
 
12th Japan CloudStack User Group Meetup
12th Japan CloudStack User Group Meetup12th Japan CloudStack User Group Meetup
12th Japan CloudStack User Group Meetup
 
Virtual Pc Seminar
Virtual Pc SeminarVirtual Pc Seminar
Virtual Pc Seminar
 
Xen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XTXen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XT
 

Recently uploaded

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 

Recently uploaded (20)

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 

CSA Presentation 26th May Virtualization securityv2

  • 1. Bryan Nairn, CISSP Senior Manager, Trustworthy Computing Microsoft Corporation bryan.nairn@microsoft.com
  • 2. Why should I care?  Server virtualization is now a given in the majority of enterprise datacenters – source IDC  The virtual server and virtual server management software market is forecast to reach a market opportunity of approximately $4.1 billion by 2014. This represents a CAGR of 13.1%. – source IDC  Over 40% of production virtual machines will be less secure than their physical counterparts through 2014 – source Gartner
  • 3. Virtualization powers the cloud Private Cloud Public Cloud • Mimics public cloud • Available to anyone • Benefits enterprise with a network users connection • Highly virtualized • Pay-as-you-go • Strings together IT • Multi-tenant and infrastructure into virtualized resources pools • Self-service portals
  • 4. Virtualization is a good thing!
  • 5. Some Common VM Security Myths  “I only have to patch my host OS / Kernel”  “If I protect my Host machine, it will protect my VMs.”  “Virtual Hard Disk files are secure by default.”  “If you expose the virtual machine, you have to expose all virtual machines and the host.”  “All virtual machines can see each other.”  “I don’t need Anti-Virus with Virtualization”
  • 7. Virtualization Architecture- Hypervisor Primary Partition Child Partitions Virtualization Stack WMI Provider Applications VM VM Worker Service Processes Ring 3 MinWin Virtualization Virtualization Service Service Providers Clients Windows (VSPs) (VSCs) Guest OS Kernel IHV Kernel Drivers VMBus VMBus Enlightenments Ring 0 Windows hypervisor Ring “-1” Server Hardware
  • 8. Hypervisor Security Assumptions  Guests are untrusted  Trust relationships  Parent must be trusted by hypervisor  Parent must be trusted by children  Hypercall interface will be well documented and widely available to attackers  All hypercalls can be attempted by guests  Can detect you are running on a hypervisor + version  The internal design of the hypervisor will be well understood
  • 9. Hypervisor Security Goals  Strong isolation between partitions  Protect confidentiality and integrity of guest data  Separation  Unique hypervisor resource pools per guest  Separate worker processes per guest  Guest-to-parent communications over unique channels  Non-interference  Guests cannot affect the contents of other guests, parent, hypervisor  Guest computations protected from other guests  Guest-to-guest communications not allowed through VM interfaces
  • 10. Hyper-V Isolation  No sharing of virtualized devices  Separate VMBus per VM to the parent  No sharing of memory  Each has its own address space  VMs cannot communicate with each other, except through traditional networking  Guests can’t perform DMA attacks because they’re never mapped to physical devices  Guests cannot write to the hypervisor  Parent partition cannot write to the hypervisor
  • 11. Hyper-V Security Hardening  Hypervisor has separate address space  Guest addresses != Hypervisor addresses  No 3rd party code in the Hypervisor  Limited number of channels from guests to hypervisor  No “IOCTL”-like things  Guest to guest communication through hypervisor is prohibited  No shared memory mapped between guests  Guests never touch real hardware I/O
  • 12. Hyper-V Security Model  Uses Authorization Manager (AzMan)  Fine grained authorization and access control  Department and role based  Segregate who can manage groups of VMs  Define specific functions for individuals or roles  Start, stop, create, add hardware, change drive image  VM administrators don’t have to be Server 2008 administrators  Guest resources are controlled by per VM configuration files  Shared resources are protected  Read-only (CD ISO file)  Copy on write (differencing disks)
  • 13. Virtualization Attack Vectors Host Hardware Virtual Machine Host OS Virtual Machine Hard Disk Files Virtual Machine Configuration Files Remote Management/Control interfaces Guest Operating System Virtual Networks
  • 14. Common Attacks: Host  Host Compromise for  Deployment, Duplication and Deletion  Control of Virtual Machines  Direct Code / File injection to Virtualization File Structure  Virtual Hard Disks  Virtual Configuration Files  Time Sync  Hardware  Rootkits / Malware  Drivers (Attack Surface / Stability)
  • 15. It’s all about the what’s underneath…
  • 16. Use Remote Management  All Virtualization Solutions include some form of remote control.  Access to these tools should be limited.  Limit scope of access / control  Protect the remote control mechanisms!  Use limited use accounts for control  Make sure the connections are encrypted / authenticated (SSL, RDP over SSL)  Use logging VM VM VM VM VM VMVM VM VM VM VMVM VM VM VM VM VM V VMVM VM VM VM VM M
  • 17. File Types and Locations .vhd disk file – In folder you specify in settings .vhdd disk file – In folder you specify in settings .vud disk file – In vmc-file folder .vsv disk file – In vmc-file folder
  • 18. Common Attacks: Guest  Unpatched Virtual Machines  Older Operating Systems  Test or Development machines (these often are not managed in the same way as production machines)  Un-managed or user deployed virtual machines  Backups and archives
  • 19. Guest Attacks  The Virtualization File Structure  Virtual Hard Disks  File / Code Injection  Can be Directly Mounted / accessed  Virtual Configuration Files  Base Configuration changes  Redirection / addition of Virtual drives / Resoures  BIOS <hardware> <memory> <ram_size type="integer">256</ram_size> </memory> ... <pci_bus> <ethernet_adapter> <controller_count type="integer">2</controller_count> </ethernet_adapter> </pci_bus> </hardware>
  • 21. Threat Landscape: Virtualized Attackers?  Is this is one of the next big attack vectors on the horizon?  The VM industry is focused on securing the VMs from attack. Very little thought of VMs being used as the attacker.  Cases are starting to appear where people use VMs to attack, then shutdown the VM to remove any trace of evidence.
  • 22. Threat Landscape: Virtualized Attackers?  But we do write all events to the SysLog  Things that go into drive slack are recoverable using forensics tools  We still have network traces…  …and audit logs  …and firewall and router logs  …not to mention video cameras in the server room.
  • 24. Host Attacks: Potential Solutions  Harden the Host Servers  Where a Hypervisor or Specialist Kernel is used, the Host attack surface is smaller, however updating and patching is still required.  Use single role servers and remove unwanted and un-necessary services / attack vectors  Use a local firewall and only allow limited host control / management ports over encrypted and authenticated channels.  Use limited scope admin accounts with strong passwords  Protect the Virtual Machine files  Access Control Lists (limited to the security context for the users who manage them and the services that control them.  Encryption  Disk / Volume / Folder / File  Auditing  file access, creation, deletion …  Don’t forget the backup files / archives
  • 25. Guest Attacks: Potential Solutions  Harden the Guest Operating Systems  Treat the guest OS as if it was a physical machine  Isolate the machine with Virtual Networks / VLANs  Local Only Access  NAT  Segmented networks  IPSec Isolation  Physical Isolation (Separate NICs)
  • 26. Use Access Control Lists Deny Read-only Read/Write • Cannot • See the VM in • See the VM in modify VMC web console web console file and VRMC and VMRC • Will not • Can interact • Can interact appear in with VM with the VM web console • Cannot start, • Can start, or VMRC stop, pause stop, pause, or resume resume VMs VMs
  • 27. Deployment Considerations  Minimize risk to the Parent Partition  Use Server Core  Don’t run arbitrary apps, no web surfing  Run your apps and services in guests  Moving VMs from Virtual Server to Hyper-V  FIRST: Uninstall the VM Additions  Two physical network adapters at minimum  One for management (use a VLAN too)  One (or more) for vm networking  Dedicated iSCSI  Connect to back-end management network  Only expose guests to internet traffic
  • 28. Anti-Virus & BitLocker…  Parent partition  Run AV software and exclude .vhd  Child partitions  Run AV software within each VM  BitLocker  Great for branch office  Can be used within a VM  http://blogs.technet.com/virtualworld/archive/2008/02/16/using- bitlocker-under-virtual-pc-virtual-server.aspx
  • 29. Conclusions  Reduce the attack surface on the Host  Use least privilege access  Audit the deployment, maintenance, control and access to virtual machines  Leverage backups, snapshots and redundancy to reduce impact of Host / Guest maintenance  Secure your Virtual Machine Hard Disk and configuration files, including backups and archives  Use Virtual Networks / VLANs / IPSec to Isolate machines, especially before they are exposed to the network.
  • 30. Resources  Step-by-Step Guide to Getting Started with Hyper-V  http://technet2.microsoft.com/windowsserver2008/en/library/c513e254- adf1-400e-8fcb-c1aec8a029311033.mspx?mfr=true  Virtualization Team Blog  http://blogs.technet.com/virtualization  Microsoft Virtualization Website  http://www.microsoft.com/virtualization  Using BitLocker under Virtual PC / Virtual Server  http://blogs.technet.com/virtualworld/archive/2008/02/16/using-bitlocker- under-virtual-pc-virtual-server.aspx
  • 31. We would all rather be doing something else..