SlideShare a Scribd company logo
VMware and TAM Customer Confidential │ ©2018 VMware, Inc.
Spectre/Meltdown security
vulnerabilities FAQ
Typical questions and practical
answers for IT Infrastructure
Practitioners and vSphere
Administrators
David Pasek, VMware, Staff TAM
June 4, 2018
v.04
‹#› 2VMware and TAM Customer Confidential │ ©2018 VMware, Inc.
What is
Spectre/Meltdown?
Security vulnerabilities referenced as following CVE’s:
CVE-2017-5753 (Spectre Variant 1) - Branch target injection
CVE-2017-5715 (Spectre Variant 2) - Bounds check bypass
CVE-2017-5754 (Variant 3 - Meltdown) - Rogue data cache load
CVE-2018-3640 (Spectre Variant 3a) - Rogue System Register Read
CVE-2018-3639 (Spectre Variant 4) - Speculative Store Bypass
Sources: https://www.us-cert.gov/ncas/alerts/TA18-004A and
https://www.us-cert.gov/ncas/alerts/TA18-141A
3VMware and TAM Customer Confidential │ ©2018 VMware, Inc.
Q: Do exist all ESXi patches for Spectre/Meltdown vulnerabilities?
A: VMware released ESXi patches for Spectre variants 1, 2 but patches for new Spectre
variants 3a and 4, as of June 4th, 2018, are on hold until Intel has released updated
microcode which has been tested by VMware. Meltdown (Variant 3) vulnerability
remediation is done only at Guest OS level, therefore it does not need ESXi patches.
Details:
• VMware patches for Spectre variant 1 (CVE-2017-5753) exist. See. VMSA-2018-0002.
• VMware patches for Spectre variant 2 (CVE-2017-5715) exist. See. VMSA-2018-0002 and
VMSA-2018-0004.
• VMware patches for Variant 3 aka Meltdown (CVE-2017-5754) are not required. This
remediation is dependent solely on Operating System patches.
• VMware patches for Spectre variant 3a (CVE-2018-3640) and variant 4 (CVE-2018-3639)
are, as of June 4th, 2018, on hold until Intel has released updated microcode which has been
tested by VMware. See VMSA-2018-0012.
4VMware and TAM Customer Confidential │ ©2018 VMware, Inc.
Q: What does this all mean for vSphere administrators?
A: Well, actually nothing new. It is, “just” a security update of the infrastructure. However,
the update process is more complicated than usual because the infrastructure has to be
patched end-to-end.
VMware vSphere administrator must apply following update procedure.
1. Update vCenter. Note: Patches add new CPU feature masks (IBRS, IBPB, STIBP) into the
existing EVC baselines and only enable them when all ESXi hosts within vSphere Cluster have
updated their CPU microcode.
2. (optional) Enable EVC on vSphere Clusters if you will need a long time to upgrade hosts / need
to vMotion VMs after power cycle across different version hosts. Note, this is not necessary if
you won’t power cycle VMs while you bring up the cluster to the same patch level.
3. Update to the latest BIOS with patched CPU microcode. Note: VMware delivers updated CPU
microcode for most CPU models with an ESXi patch but most HW vendors recommend to
update the BIOS, refer to their requirements.
4. Apply ESXi security patches
Steps continue on next slide.
5VMware and TAM Customer Confidential │ ©2018 VMware, Inc.
Q: What does this all mean for vSphere administrators?
5. Validate VM hardware is at least in version 9 (for Spectre 2 OS mitigation). For better
performance (Meltdown mitigation), VM hardware 11 is recommended (enables INVPCID,
Haswell CPU required). There are some performance improvements for VM hardware 9 with
Linux (PCID), not for Windows though.
6. Apply all applicable security patches for your Guest OS which have been made available from
the OS vendor (not critical to do this last but it makes sense to align the required reboot with
the power cycle). Note: Power Off / Power On of VM is required. VM restart is not sufficient.
… continuing from the previous slide
6VMware and TAM Customer Confidential │ ©2018 VMware, Inc.
Q: What is the reason to consider enablement of EVC within vSphere Cluster?
A: When EVC is not enabled, vCenter Spectre specific patches are not in use and you can
experience vMotion issues. The issue would not occur on running VMs but on Power
Cycled or newly deployed VMs as the new CPU features would be exposed into VM thus
identified as VM running on vMotion not compatible ESXi host.
Details:
• An ESXi host that is running a patched vSphere hypervisor with updated microcode will see
new CPU features that were not previously available. These new features will be exposed to all
Virtual Hardware Version 9+ VMs that are powered-on by that host. Because these virtual
machines now see additional CPU features, vMotion to an ESXi host lacking the microcode or
hypervisor patches applied will be prevented.
• The vCenter patches enable vMotion compatibility to be retained within an EVC cluster. In
order to maintain this compatibility the new features are hidden from guests within the cluster
until all hosts in the cluster are properly updated.
• At that time, the cluster will automatically upgrade its capabilities to expose the new features.
Unpatched ESXi hosts will no longer be admitted into the EVC cluster.
Source: https://kb.vmware.com/kb/52085
7VMware and TAM Customer Confidential │ ©2018 VMware, Inc.
Q: What is the reason to consider enablement of EVC within vSphere Cluster?
Supplemental screenshot
You would see this vMotion issue when EVC is not enabled, the source ESXi host is patched thus new
CPU features are exposed to VM, and the target ESXi host is not patched.
8VMware and TAM Customer Confidential │ ©2018 VMware, Inc.
Q: What is the reason to consider enablement of EVC within vSphere Cluster?
Supplemental screenshot
When EVC is enabled, vMotion works perfectly even from patched to unpatched ESXi host because
new features are hidden from guests within the cluster until all hosts in the cluster are properly updated.
9VMware and TAM Customer Confidential │ ©2018 VMware, Inc.
Q: Why have a lot of VMware customers still not applied patches?
A: Well, there are usually two main reasons.
1. Security update requires huge update effort especially in large environments
2. Security update has performance impact on applications
Details:
• First things first, the performance impact is the same or similar on bare metal. The
hypervisor performance overhead is negligible (below 2%)
• The negative performance impact is hard to predict as it is workload specific. That’s the
reason the application owners should evaluate the specific impact on their application.
• IT management is afraid of the unpredictable performance impact, lack of computing
resources and tremendous impact on capacity planning.
• In case a VM hardware upgrade is required, a maintenance window with application owners
has to be planned. Note: A Virtual Machine hardware upgrade can bring a certain risk
because you are practically changing the motherboard.
• Power Off / Power On VMs is required, which is another reason the maintenance window
must be planned with or by application owners.
10VMware and TAM Customer Confidential │ ©2018 VMware, Inc.
Q: Is it necessary to update VMware Tools to remediate Spectre vulnerabilities?
A: No. VMware Tools are irrelevant to Spectre remediation. VM hardware (aka
Compatibility) is what matters. You should manage VMware Tools as usual. The best
practice is to use the latest VMware Tools version but it is not a strict requirement.
Details:
• Even though VMware Tools are irrelevant to Spectre, here are some details:
• If you use VMTools 10.x then it is independent of the ESXi version thus independent of
VM hardware.
• If you use VMTools 9.x then you should use the latest release for your particular ESXi
version.*
• VM hardware 9+ is the only requirement to mitigate Spectre 2 (OS). Minimal requirement is
VM hardware version 9 as it is necessary to pass-through IBRS,IBPB and STIBP.
• For better Meltdown mitigation performance, VM hardware version 11 is recommended as it
supports INVPCID (Invalidate Process-Context Identifier, requires Haswell or newer CPU).
• Some improvements on Linux are already available for VM hardware 9 (PCID), 11 (INVPCID)
further improves on that whereas for Windows, 11 is the minimum for any HW assisted
performance improvement
11VMware and TAM Customer Confidential │ ©2018 VMware, Inc.
Q: A Guest OS reboot is not sufficient. How can vSphere Admin schedule an
automated VM Power Cycle during Guest OS reboot?
A: As a vSphere Admin, you cannot schedule a VM Power Cycle during a regular Guest
OS reboot. The only exception is when you schedule a VM Compatibility Upgrade (aka
VM hardware upgrade). This special use case is covered on the next slide.
Details:
• If you have only basic vSphere, you have to schedule specific app maintenance windows
with the application owners and work with them in tandem. This can be a very time
consuming effort especially in environments with thousands of VMs. Alternatively, you can
consider a scheduled VM Compatibility Upgrade. Please, note that it cannot be used for VMs
that are already on the latest VM hardware version which is supported on your ESXi release.
• If you have Cloud Management Platforms like vRealize Automation or vCloud Director then a
Power Cycle can be done by server/application owners by themselves.
12VMware and TAM Customer Confidential │ ©2018 VMware, Inc.
Q: Do I need Power Cycle VM after scheduled VM hardware upgrade on
Guest OS Reboot?
A: No. If you schedule a VM Compatibility Upgrade (aka VM Hardware Upgrade) for your
VMs, it will actually Power-Off/Power-On VM on next Guest OS reboot as it is a part of the
VM hardware upgrade workflow.
Details:
• Cannot be used for VMs already using the latest VM hardware version supported by your
ESXi version.
• Please note that a VM hardware upgrade is the same operation as changing the
motherboard in physical computer. It is a significant change for the guest OS which may or
may not be successful, therefore there are some associated risks.
• You should have a backup of your VMs to recover from in case of any issues.
• The full procedure is documented in VMware documentation “Schedule a Compatibility
Upgrade for Virtual Machines”.
• You or the app owner should test if new CPU capabilities are exposed inside the Guest OS
and that the security mitigations will work.
• The final decision, if you want to use this feature (scheduled VM hardware upgrade) is up to
you and you have to understand all potential impacts and associated risks. It usually works
without issues, but as discussed, you change the motherboard for an already installed and
configured OS.
13VMware and TAM Customer Confidential │ ©2018 VMware, Inc.
Q: Do I need Power Cycle VM after scheduled VM hardware upgrade on
Guest OS Reboot?
Supplemental screen shots
14VMware and TAM Customer Confidential │ ©2018 VMware, Inc.
Q: How can I check new CPUs capabilities exposure in to Guest OS?
A: The best is to test it by Spectre/Meltdown checkers within Guest OS.
Details:
• To use MS-Windows checker read Microsoft Article at https://support.microsoft.com/en-
us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in.
• PowerShell 5.0 is required
• Install-Module SpeculationControl
• Set-ExecutionPolicy RemoteSigned -Scope Currentuser
• Get-SpeculationControlSettings
• To use Linux checker read the article at https://github.com/speed47/spectre-meltdown-checker
where is a shell script to tell if your system is vulnerable.
• If you want “Verify Hypervisor-Assisted Guest Mitigation (Spectre) patches using PowerCLI” read
William Lam’s blog post at https://www.virtuallyghetto.com/2018/01/verify-hypervisor-assisted-
guest-mitigation-spectre-patches-using-powercli.html and leverage PowerCLI script available at
https://github.com/lamw/vghetto-scripts/blob/master/powershell/VerifyESXiMicrocodePatch.ps1
15VMware and TAM Customer Confidential │ ©2018 VMware, Inc.
Q: How I can check new CPUs capabilities exposure in to Guest OS?
Supplemental screen shots – MS-Windows and Linux vulnerabilities checkers
MS-Windows checker
Linux checker
16VMware and TAM Customer Confidential │ ©2018 VMware, Inc.
Q: How I can check new CPUs capabilities exposure in to Guest OS?
Supplemental screen shots – William Lam’s PowerCLI functions
Verify-ESXiMicrocodePatchAndVM
Verify-ESXiMicrocodePatch
17VMware and TAM Customer Confidential │ ©2018 VMware, Inc.
Conclusion
• All patches for Spectre variants 1,2 and meltdown are released and the update process
should be well understood.
• Patches for Spectre variants 3a and 4 are on hold until Intel has released updated
microcode.
• Spectre/Meltdown patching is definitely not a simple project, especially in large
organizations where collaboration among multiple teams and departments is required.
• OS Patches have negative performance impact on certain applications.
• Some of these OS remediations can be disabled in operating systems, therefore
hardware and vSphere layers can be patched and application owner can choose
between security or performance.
• Please note that depending on the vector and OS, it might not be possible to disable all
remediations. Contact your OS vendor for further information.
VMware and TAM Customer Confidential │ ©2018 VMware, Inc.
Other questions?
Contact your TAM or
E-mail dpasek@vmware.com

More Related Content

What's hot

VMworld Europe 2014: What’s New in End User Computing: Full Desktop Automatio...
VMworld Europe 2014: What’s New in End User Computing: Full Desktop Automatio...VMworld Europe 2014: What’s New in End User Computing: Full Desktop Automatio...
VMworld Europe 2014: What’s New in End User Computing: Full Desktop Automatio...
VMworld
 
EVO-RAIL 2.0 Overview Deck
EVO-RAIL 2.0 Overview DeckEVO-RAIL 2.0 Overview Deck
EVO-RAIL 2.0 Overview DeckErik Bussink
 
VMworld Europe 2014: A DevOps Story - Unlocking the Power of Docker with the ...
VMworld Europe 2014: A DevOps Story - Unlocking the Power of Docker with the ...VMworld Europe 2014: A DevOps Story - Unlocking the Power of Docker with the ...
VMworld Europe 2014: A DevOps Story - Unlocking the Power of Docker with the ...
VMworld
 
Veeam Availability Suite version 10
Veeam Availability Suite version 10Veeam Availability Suite version 10
Veeam Availability Suite version 10
Tanawit Chansuchai
 
VMware 2015: Next Horizon for Cloud Networking and Security
VMware 2015: Next Horizon for Cloud Networking and SecurityVMware 2015: Next Horizon for Cloud Networking and Security
VMware 2015: Next Horizon for Cloud Networking and Security
VMworld
 
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphere
VMworld
 
VSAN – Architettura e Design
VSAN – Architettura e DesignVSAN – Architettura e Design
VSAN – Architettura e Design
VMUG IT
 
VMworld Europe 2014: A Blueprint for Disaster Recovery of Business Critical A...
VMworld Europe 2014: A Blueprint for Disaster Recovery of Business Critical A...VMworld Europe 2014: A Blueprint for Disaster Recovery of Business Critical A...
VMworld Europe 2014: A Blueprint for Disaster Recovery of Business Critical A...
VMworld
 
VMware vSphere vMotion: 5.4 times faster than Hyper-V Live Migration
VMware vSphere vMotion: 5.4 times faster than Hyper-V Live MigrationVMware vSphere vMotion: 5.4 times faster than Hyper-V Live Migration
VMware vSphere vMotion: 5.4 times faster than Hyper-V Live Migration
VMware
 
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld
 
VMworld Europe 2014: Virtual SAN Architecture Deep Dive
VMworld Europe 2014: Virtual SAN Architecture Deep DiveVMworld Europe 2014: Virtual SAN Architecture Deep Dive
VMworld Europe 2014: Virtual SAN Architecture Deep Dive
VMworld
 
SAP and VMware (Virtualizing SAP)
SAP and VMware (Virtualizing SAP)SAP and VMware (Virtualizing SAP)
SAP and VMware (Virtualizing SAP)
Cenk Ersoy
 
VMware Vsan vtug 2014
VMware Vsan vtug 2014VMware Vsan vtug 2014
VMware Vsan vtug 2014csharney
 
Rearchitecting Storage for Server Virtualization
Rearchitecting Storage for Server VirtualizationRearchitecting Storage for Server Virtualization
Rearchitecting Storage for Server VirtualizationStephen Foskett
 
VMworld Europe 2014: Virtualizing Databases Doing IT Right – The Sequel
VMworld Europe 2014: Virtualizing Databases Doing IT Right – The SequelVMworld Europe 2014: Virtualizing Databases Doing IT Right – The Sequel
VMworld Europe 2014: Virtualizing Databases Doing IT Right – The Sequel
VMworld
 
VMworld 2013: VMware vSphere High Availability - What's New and Best Practices
VMworld 2013: VMware vSphere High Availability - What's New and Best PracticesVMworld 2013: VMware vSphere High Availability - What's New and Best Practices
VMworld 2013: VMware vSphere High Availability - What's New and Best Practices
VMworld
 
VMworld Europe 2014: Taking Reporting and Command Line Automation to the Next...
VMworld Europe 2014: Taking Reporting and Command Line Automation to the Next...VMworld Europe 2014: Taking Reporting and Command Line Automation to the Next...
VMworld Europe 2014: Taking Reporting and Command Line Automation to the Next...
VMworld
 
VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...
VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...
VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...
VMworld
 
Virtual san hardware guidance & best practices
Virtual san hardware guidance & best practicesVirtual san hardware guidance & best practices
Virtual san hardware guidance & best practices
solarisyougood
 

What's hot (20)

VMworld Europe 2014: What’s New in End User Computing: Full Desktop Automatio...
VMworld Europe 2014: What’s New in End User Computing: Full Desktop Automatio...VMworld Europe 2014: What’s New in End User Computing: Full Desktop Automatio...
VMworld Europe 2014: What’s New in End User Computing: Full Desktop Automatio...
 
EVO-RAIL 2.0 Overview Deck
EVO-RAIL 2.0 Overview DeckEVO-RAIL 2.0 Overview Deck
EVO-RAIL 2.0 Overview Deck
 
VMworld Europe 2014: A DevOps Story - Unlocking the Power of Docker with the ...
VMworld Europe 2014: A DevOps Story - Unlocking the Power of Docker with the ...VMworld Europe 2014: A DevOps Story - Unlocking the Power of Docker with the ...
VMworld Europe 2014: A DevOps Story - Unlocking the Power of Docker with the ...
 
Veeam Availability Suite version 10
Veeam Availability Suite version 10Veeam Availability Suite version 10
Veeam Availability Suite version 10
 
VMware 2015: Next Horizon for Cloud Networking and Security
VMware 2015: Next Horizon for Cloud Networking and SecurityVMware 2015: Next Horizon for Cloud Networking and Security
VMware 2015: Next Horizon for Cloud Networking and Security
 
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphere
 
VSAN – Architettura e Design
VSAN – Architettura e DesignVSAN – Architettura e Design
VSAN – Architettura e Design
 
VMworld Europe 2014: A Blueprint for Disaster Recovery of Business Critical A...
VMworld Europe 2014: A Blueprint for Disaster Recovery of Business Critical A...VMworld Europe 2014: A Blueprint for Disaster Recovery of Business Critical A...
VMworld Europe 2014: A Blueprint for Disaster Recovery of Business Critical A...
 
VMware vSphere vMotion: 5.4 times faster than Hyper-V Live Migration
VMware vSphere vMotion: 5.4 times faster than Hyper-V Live MigrationVMware vSphere vMotion: 5.4 times faster than Hyper-V Live Migration
VMware vSphere vMotion: 5.4 times faster than Hyper-V Live Migration
 
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
 
VMworld Europe 2014: Virtual SAN Architecture Deep Dive
VMworld Europe 2014: Virtual SAN Architecture Deep DiveVMworld Europe 2014: Virtual SAN Architecture Deep Dive
VMworld Europe 2014: Virtual SAN Architecture Deep Dive
 
SAP and VMware (Virtualizing SAP)
SAP and VMware (Virtualizing SAP)SAP and VMware (Virtualizing SAP)
SAP and VMware (Virtualizing SAP)
 
ebk EVO-RAIL v104
ebk EVO-RAIL v104ebk EVO-RAIL v104
ebk EVO-RAIL v104
 
VMware Vsan vtug 2014
VMware Vsan vtug 2014VMware Vsan vtug 2014
VMware Vsan vtug 2014
 
Rearchitecting Storage for Server Virtualization
Rearchitecting Storage for Server VirtualizationRearchitecting Storage for Server Virtualization
Rearchitecting Storage for Server Virtualization
 
VMworld Europe 2014: Virtualizing Databases Doing IT Right – The Sequel
VMworld Europe 2014: Virtualizing Databases Doing IT Right – The SequelVMworld Europe 2014: Virtualizing Databases Doing IT Right – The Sequel
VMworld Europe 2014: Virtualizing Databases Doing IT Right – The Sequel
 
VMworld 2013: VMware vSphere High Availability - What's New and Best Practices
VMworld 2013: VMware vSphere High Availability - What's New and Best PracticesVMworld 2013: VMware vSphere High Availability - What's New and Best Practices
VMworld 2013: VMware vSphere High Availability - What's New and Best Practices
 
VMworld Europe 2014: Taking Reporting and Command Line Automation to the Next...
VMworld Europe 2014: Taking Reporting and Command Line Automation to the Next...VMworld Europe 2014: Taking Reporting and Command Line Automation to the Next...
VMworld Europe 2014: Taking Reporting and Command Line Automation to the Next...
 
VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...
VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...
VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...
 
Virtual san hardware guidance & best practices
Virtual san hardware guidance & best practicesVirtual san hardware guidance & best practices
Virtual san hardware guidance & best practices
 

Similar to Spectre/Meltdown security vulnerabilities FAQ

VMware vSphere 6 & Horizon View 6.1 – What's New ?
VMware vSphere 6 & Horizon View 6.1 – What's New ?VMware vSphere 6 & Horizon View 6.1 – What's New ?
VMware vSphere 6 & Horizon View 6.1 – What's New ?
Digicomp Academy Suisse Romande SA
 
Vsicm51 m02 virtualization_intro_
Vsicm51 m02 virtualization_intro_Vsicm51 m02 virtualization_intro_
Vsicm51 m02 virtualization_intro_VCAP5_wordpress
 
Tudor Damian - Comparing Microsoft Cloud with VMware Cloud
Tudor Damian - Comparing Microsoft Cloud with VMware CloudTudor Damian - Comparing Microsoft Cloud with VMware Cloud
Tudor Damian - Comparing Microsoft Cloud with VMware Cloud
ITSpark Community
 
TECHNICAL WHITE PAPER▸ NetBackup 7.6 Plugin for VMware vCenter
TECHNICAL WHITE PAPER▸ NetBackup 7.6 Plugin for VMware vCenterTECHNICAL WHITE PAPER▸ NetBackup 7.6 Plugin for VMware vCenter
TECHNICAL WHITE PAPER▸ NetBackup 7.6 Plugin for VMware vCenter
Symantec
 
VMworld 2015: Managing vSphere 6 Deployments and Upgrades
VMworld 2015: Managing vSphere 6 Deployments and Upgrades VMworld 2015: Managing vSphere 6 Deployments and Upgrades
VMworld 2015: Managing vSphere 6 Deployments and Upgrades
VMworld
 
01 v mware overview
01  v mware overview01  v mware overview
01 v mware overview
AlyTyyYElSenousy
 
Virtualization meisen 042811
Virtualization meisen 042811Virtualization meisen 042811
Virtualization meisen 042811
Morty Eisen
 
Virtual Infrastructure Overview
Virtual Infrastructure OverviewVirtual Infrastructure Overview
Virtual Infrastructure Overview
valerian_ceaus
 
Virtualize Your Disaster! Introduction & Update
Virtualize Your Disaster! Introduction & UpdateVirtualize Your Disaster! Introduction & Update
Virtualize Your Disaster! Introduction & UpdateEmirates Computers
 
VMWARE ESX
VMWARE ESXVMWARE ESX
VMWARE ESX
Yogeshwaran R
 
V mware v sphere 5 fundamentals services kit
V mware v sphere 5 fundamentals services kitV mware v sphere 5 fundamentals services kit
V mware v sphere 5 fundamentals services kit
solarisyougood
 
White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...
White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...
White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...
EMC
 
30 important-virtualization-vmware-interview-questions-with-answers
30 important-virtualization-vmware-interview-questions-with-answers30 important-virtualization-vmware-interview-questions-with-answers
30 important-virtualization-vmware-interview-questions-with-answersLatif Siddiqui
 
Emc recoverpoint technical
Emc recoverpoint technicalEmc recoverpoint technical
Emc recoverpoint technical
solarisyougood
 
VMware vSphere 6.0 - Troubleshooting Training - Day 5
VMware vSphere 6.0 - Troubleshooting Training - Day 5VMware vSphere 6.0 - Troubleshooting Training - Day 5
VMware vSphere 6.0 - Troubleshooting Training - Day 5
Sanjeev Kumar
 
VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5
Vepsun Technologies
 
Networker integration for optimal performance
Networker integration for optimal performanceNetworker integration for optimal performance
Networker integration for optimal performance
Mohamed Sohail
 
Vsc 71-se-presentation-training
Vsc 71-se-presentation-trainingVsc 71-se-presentation-training
Vsc 71-se-presentation-training
narit_ton
 
VMware Tanzu Introduction
VMware Tanzu IntroductionVMware Tanzu Introduction
VMware Tanzu Introduction
VMware Tanzu
 

Similar to Spectre/Meltdown security vulnerabilities FAQ (20)

VMware vSphere 6 & Horizon View 6.1 – What's New ?
VMware vSphere 6 & Horizon View 6.1 – What's New ?VMware vSphere 6 & Horizon View 6.1 – What's New ?
VMware vSphere 6 & Horizon View 6.1 – What's New ?
 
Vsicm51 m02 virtualization_intro_
Vsicm51 m02 virtualization_intro_Vsicm51 m02 virtualization_intro_
Vsicm51 m02 virtualization_intro_
 
Tudor Damian - Comparing Microsoft Cloud with VMware Cloud
Tudor Damian - Comparing Microsoft Cloud with VMware CloudTudor Damian - Comparing Microsoft Cloud with VMware Cloud
Tudor Damian - Comparing Microsoft Cloud with VMware Cloud
 
TECHNICAL WHITE PAPER▸ NetBackup 7.6 Plugin for VMware vCenter
TECHNICAL WHITE PAPER▸ NetBackup 7.6 Plugin for VMware vCenterTECHNICAL WHITE PAPER▸ NetBackup 7.6 Plugin for VMware vCenter
TECHNICAL WHITE PAPER▸ NetBackup 7.6 Plugin for VMware vCenter
 
VMworld 2015: Managing vSphere 6 Deployments and Upgrades
VMworld 2015: Managing vSphere 6 Deployments and Upgrades VMworld 2015: Managing vSphere 6 Deployments and Upgrades
VMworld 2015: Managing vSphere 6 Deployments and Upgrades
 
01 v mware overview
01  v mware overview01  v mware overview
01 v mware overview
 
Virtualization meisen 042811
Virtualization meisen 042811Virtualization meisen 042811
Virtualization meisen 042811
 
Virtual Infrastructure Overview
Virtual Infrastructure OverviewVirtual Infrastructure Overview
Virtual Infrastructure Overview
 
Virtualize Your Disaster! Introduction & Update
Virtualize Your Disaster! Introduction & UpdateVirtualize Your Disaster! Introduction & Update
Virtualize Your Disaster! Introduction & Update
 
VMWARE ESX
VMWARE ESXVMWARE ESX
VMWARE ESX
 
Whitepaper
WhitepaperWhitepaper
Whitepaper
 
V mware v sphere 5 fundamentals services kit
V mware v sphere 5 fundamentals services kitV mware v sphere 5 fundamentals services kit
V mware v sphere 5 fundamentals services kit
 
White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...
White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...
White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...
 
30 important-virtualization-vmware-interview-questions-with-answers
30 important-virtualization-vmware-interview-questions-with-answers30 important-virtualization-vmware-interview-questions-with-answers
30 important-virtualization-vmware-interview-questions-with-answers
 
Emc recoverpoint technical
Emc recoverpoint technicalEmc recoverpoint technical
Emc recoverpoint technical
 
VMware vSphere 6.0 - Troubleshooting Training - Day 5
VMware vSphere 6.0 - Troubleshooting Training - Day 5VMware vSphere 6.0 - Troubleshooting Training - Day 5
VMware vSphere 6.0 - Troubleshooting Training - Day 5
 
VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5
 
Networker integration for optimal performance
Networker integration for optimal performanceNetworker integration for optimal performance
Networker integration for optimal performance
 
Vsc 71-se-presentation-training
Vsc 71-se-presentation-trainingVsc 71-se-presentation-training
Vsc 71-se-presentation-training
 
VMware Tanzu Introduction
VMware Tanzu IntroductionVMware Tanzu Introduction
VMware Tanzu Introduction
 

More from David Pasek

FlexBook Software - Conceptual Architecture
FlexBook Software - Conceptual ArchitectureFlexBook Software - Conceptual Architecture
FlexBook Software - Conceptual Architecture
David Pasek
 
Flex Cloud - Conceptual Design - ver 0.2
Flex Cloud - Conceptual Design - ver 0.2Flex Cloud - Conceptual Design - ver 0.2
Flex Cloud - Conceptual Design - ver 0.2
David Pasek
 
E tourism v oblasti cestovního ruchu
E tourism v oblasti cestovního ruchuE tourism v oblasti cestovního ruchu
E tourism v oblasti cestovního ruchu
David Pasek
 
Architektura a implementace digitálních knihoven v prostředí sítě Internet
Architektura a implementace digitálních knihoven v prostředí sítě InternetArchitektura a implementace digitálních knihoven v prostředí sítě Internet
Architektura a implementace digitálních knihoven v prostředí sítě Internet
David Pasek
 
VMware ESXi - Intel and Qlogic NIC throughput difference v0.6
VMware ESXi - Intel and Qlogic NIC throughput difference v0.6VMware ESXi - Intel and Qlogic NIC throughput difference v0.6
VMware ESXi - Intel and Qlogic NIC throughput difference v0.6
David Pasek
 
Exchange office 3.0 - Stanovisko Státní banky československé
Exchange office 3.0 - Stanovisko Státní banky československéExchange office 3.0 - Stanovisko Státní banky československé
Exchange office 3.0 - Stanovisko Státní banky československé
David Pasek
 
Network performance test plan_v0.3
Network performance test plan_v0.3Network performance test plan_v0.3
Network performance test plan_v0.3
David Pasek
 
vSAN architecture components
vSAN architecture componentsvSAN architecture components
vSAN architecture components
David Pasek
 
FlexBook overview - v2.4
FlexBook overview - v2.4FlexBook overview - v2.4
FlexBook overview - v2.4
David Pasek
 
FlexBook Basic Overview - v2.0
FlexBook Basic Overview - v2.0FlexBook Basic Overview - v2.0
FlexBook Basic Overview - v2.0
David Pasek
 
Spectre meltdown performance_tests - v0.3
Spectre meltdown performance_tests - v0.3Spectre meltdown performance_tests - v0.3
Spectre meltdown performance_tests - v0.3
David Pasek
 
FlexBook basic overview v2.0
FlexBook basic overview v2.0FlexBook basic overview v2.0
FlexBook basic overview v2.0
David Pasek
 
FlexBook - reservation system basic overview v1.1
FlexBook - reservation system basic overview v1.1FlexBook - reservation system basic overview v1.1
FlexBook - reservation system basic overview v1.1
David Pasek
 
CLI for VMware Distributed Switch (Community project)
CLI for VMware Distributed Switch (Community project)CLI for VMware Distributed Switch (Community project)
CLI for VMware Distributed Switch (Community project)
David Pasek
 
Dell VLT reference architecture v2 0
Dell VLT reference architecture v2 0Dell VLT reference architecture v2 0
Dell VLT reference architecture v2 0
David Pasek
 
Metro Cluster High Availability or SRM Disaster Recovery?
Metro Cluster High Availability or SRM Disaster Recovery?Metro Cluster High Availability or SRM Disaster Recovery?
Metro Cluster High Availability or SRM Disaster Recovery?
David Pasek
 
Rezervační systém Flexbook - stručný přehled v.0.8
Rezervační systém Flexbook - stručný přehled v.0.8Rezervační systém Flexbook - stručný přehled v.0.8
Rezervační systém Flexbook - stručný přehled v.0.8
David Pasek
 
Creating content packs in VMware LogInsight
Creating content packs in VMware LogInsightCreating content packs in VMware LogInsight
Creating content packs in VMware LogInsight
David Pasek
 
What's new in log insight 3.3 presentation
What's new in log insight 3.3 presentationWhat's new in log insight 3.3 presentation
What's new in log insight 3.3 presentation
David Pasek
 
Log insight technical overview customer facing (based on 3.x)
Log insight technical overview customer facing (based on 3.x)Log insight technical overview customer facing (based on 3.x)
Log insight technical overview customer facing (based on 3.x)
David Pasek
 

More from David Pasek (20)

FlexBook Software - Conceptual Architecture
FlexBook Software - Conceptual ArchitectureFlexBook Software - Conceptual Architecture
FlexBook Software - Conceptual Architecture
 
Flex Cloud - Conceptual Design - ver 0.2
Flex Cloud - Conceptual Design - ver 0.2Flex Cloud - Conceptual Design - ver 0.2
Flex Cloud - Conceptual Design - ver 0.2
 
E tourism v oblasti cestovního ruchu
E tourism v oblasti cestovního ruchuE tourism v oblasti cestovního ruchu
E tourism v oblasti cestovního ruchu
 
Architektura a implementace digitálních knihoven v prostředí sítě Internet
Architektura a implementace digitálních knihoven v prostředí sítě InternetArchitektura a implementace digitálních knihoven v prostředí sítě Internet
Architektura a implementace digitálních knihoven v prostředí sítě Internet
 
VMware ESXi - Intel and Qlogic NIC throughput difference v0.6
VMware ESXi - Intel and Qlogic NIC throughput difference v0.6VMware ESXi - Intel and Qlogic NIC throughput difference v0.6
VMware ESXi - Intel and Qlogic NIC throughput difference v0.6
 
Exchange office 3.0 - Stanovisko Státní banky československé
Exchange office 3.0 - Stanovisko Státní banky československéExchange office 3.0 - Stanovisko Státní banky československé
Exchange office 3.0 - Stanovisko Státní banky československé
 
Network performance test plan_v0.3
Network performance test plan_v0.3Network performance test plan_v0.3
Network performance test plan_v0.3
 
vSAN architecture components
vSAN architecture componentsvSAN architecture components
vSAN architecture components
 
FlexBook overview - v2.4
FlexBook overview - v2.4FlexBook overview - v2.4
FlexBook overview - v2.4
 
FlexBook Basic Overview - v2.0
FlexBook Basic Overview - v2.0FlexBook Basic Overview - v2.0
FlexBook Basic Overview - v2.0
 
Spectre meltdown performance_tests - v0.3
Spectre meltdown performance_tests - v0.3Spectre meltdown performance_tests - v0.3
Spectre meltdown performance_tests - v0.3
 
FlexBook basic overview v2.0
FlexBook basic overview v2.0FlexBook basic overview v2.0
FlexBook basic overview v2.0
 
FlexBook - reservation system basic overview v1.1
FlexBook - reservation system basic overview v1.1FlexBook - reservation system basic overview v1.1
FlexBook - reservation system basic overview v1.1
 
CLI for VMware Distributed Switch (Community project)
CLI for VMware Distributed Switch (Community project)CLI for VMware Distributed Switch (Community project)
CLI for VMware Distributed Switch (Community project)
 
Dell VLT reference architecture v2 0
Dell VLT reference architecture v2 0Dell VLT reference architecture v2 0
Dell VLT reference architecture v2 0
 
Metro Cluster High Availability or SRM Disaster Recovery?
Metro Cluster High Availability or SRM Disaster Recovery?Metro Cluster High Availability or SRM Disaster Recovery?
Metro Cluster High Availability or SRM Disaster Recovery?
 
Rezervační systém Flexbook - stručný přehled v.0.8
Rezervační systém Flexbook - stručný přehled v.0.8Rezervační systém Flexbook - stručný přehled v.0.8
Rezervační systém Flexbook - stručný přehled v.0.8
 
Creating content packs in VMware LogInsight
Creating content packs in VMware LogInsightCreating content packs in VMware LogInsight
Creating content packs in VMware LogInsight
 
What's new in log insight 3.3 presentation
What's new in log insight 3.3 presentationWhat's new in log insight 3.3 presentation
What's new in log insight 3.3 presentation
 
Log insight technical overview customer facing (based on 3.x)
Log insight technical overview customer facing (based on 3.x)Log insight technical overview customer facing (based on 3.x)
Log insight technical overview customer facing (based on 3.x)
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

Spectre/Meltdown security vulnerabilities FAQ

  • 1. VMware and TAM Customer Confidential │ ©2018 VMware, Inc. Spectre/Meltdown security vulnerabilities FAQ Typical questions and practical answers for IT Infrastructure Practitioners and vSphere Administrators David Pasek, VMware, Staff TAM June 4, 2018 v.04
  • 2. ‹#› 2VMware and TAM Customer Confidential │ ©2018 VMware, Inc. What is Spectre/Meltdown? Security vulnerabilities referenced as following CVE’s: CVE-2017-5753 (Spectre Variant 1) - Branch target injection CVE-2017-5715 (Spectre Variant 2) - Bounds check bypass CVE-2017-5754 (Variant 3 - Meltdown) - Rogue data cache load CVE-2018-3640 (Spectre Variant 3a) - Rogue System Register Read CVE-2018-3639 (Spectre Variant 4) - Speculative Store Bypass Sources: https://www.us-cert.gov/ncas/alerts/TA18-004A and https://www.us-cert.gov/ncas/alerts/TA18-141A
  • 3. 3VMware and TAM Customer Confidential │ ©2018 VMware, Inc. Q: Do exist all ESXi patches for Spectre/Meltdown vulnerabilities? A: VMware released ESXi patches for Spectre variants 1, 2 but patches for new Spectre variants 3a and 4, as of June 4th, 2018, are on hold until Intel has released updated microcode which has been tested by VMware. Meltdown (Variant 3) vulnerability remediation is done only at Guest OS level, therefore it does not need ESXi patches. Details: • VMware patches for Spectre variant 1 (CVE-2017-5753) exist. See. VMSA-2018-0002. • VMware patches for Spectre variant 2 (CVE-2017-5715) exist. See. VMSA-2018-0002 and VMSA-2018-0004. • VMware patches for Variant 3 aka Meltdown (CVE-2017-5754) are not required. This remediation is dependent solely on Operating System patches. • VMware patches for Spectre variant 3a (CVE-2018-3640) and variant 4 (CVE-2018-3639) are, as of June 4th, 2018, on hold until Intel has released updated microcode which has been tested by VMware. See VMSA-2018-0012.
  • 4. 4VMware and TAM Customer Confidential │ ©2018 VMware, Inc. Q: What does this all mean for vSphere administrators? A: Well, actually nothing new. It is, “just” a security update of the infrastructure. However, the update process is more complicated than usual because the infrastructure has to be patched end-to-end. VMware vSphere administrator must apply following update procedure. 1. Update vCenter. Note: Patches add new CPU feature masks (IBRS, IBPB, STIBP) into the existing EVC baselines and only enable them when all ESXi hosts within vSphere Cluster have updated their CPU microcode. 2. (optional) Enable EVC on vSphere Clusters if you will need a long time to upgrade hosts / need to vMotion VMs after power cycle across different version hosts. Note, this is not necessary if you won’t power cycle VMs while you bring up the cluster to the same patch level. 3. Update to the latest BIOS with patched CPU microcode. Note: VMware delivers updated CPU microcode for most CPU models with an ESXi patch but most HW vendors recommend to update the BIOS, refer to their requirements. 4. Apply ESXi security patches Steps continue on next slide.
  • 5. 5VMware and TAM Customer Confidential │ ©2018 VMware, Inc. Q: What does this all mean for vSphere administrators? 5. Validate VM hardware is at least in version 9 (for Spectre 2 OS mitigation). For better performance (Meltdown mitigation), VM hardware 11 is recommended (enables INVPCID, Haswell CPU required). There are some performance improvements for VM hardware 9 with Linux (PCID), not for Windows though. 6. Apply all applicable security patches for your Guest OS which have been made available from the OS vendor (not critical to do this last but it makes sense to align the required reboot with the power cycle). Note: Power Off / Power On of VM is required. VM restart is not sufficient. … continuing from the previous slide
  • 6. 6VMware and TAM Customer Confidential │ ©2018 VMware, Inc. Q: What is the reason to consider enablement of EVC within vSphere Cluster? A: When EVC is not enabled, vCenter Spectre specific patches are not in use and you can experience vMotion issues. The issue would not occur on running VMs but on Power Cycled or newly deployed VMs as the new CPU features would be exposed into VM thus identified as VM running on vMotion not compatible ESXi host. Details: • An ESXi host that is running a patched vSphere hypervisor with updated microcode will see new CPU features that were not previously available. These new features will be exposed to all Virtual Hardware Version 9+ VMs that are powered-on by that host. Because these virtual machines now see additional CPU features, vMotion to an ESXi host lacking the microcode or hypervisor patches applied will be prevented. • The vCenter patches enable vMotion compatibility to be retained within an EVC cluster. In order to maintain this compatibility the new features are hidden from guests within the cluster until all hosts in the cluster are properly updated. • At that time, the cluster will automatically upgrade its capabilities to expose the new features. Unpatched ESXi hosts will no longer be admitted into the EVC cluster. Source: https://kb.vmware.com/kb/52085
  • 7. 7VMware and TAM Customer Confidential │ ©2018 VMware, Inc. Q: What is the reason to consider enablement of EVC within vSphere Cluster? Supplemental screenshot You would see this vMotion issue when EVC is not enabled, the source ESXi host is patched thus new CPU features are exposed to VM, and the target ESXi host is not patched.
  • 8. 8VMware and TAM Customer Confidential │ ©2018 VMware, Inc. Q: What is the reason to consider enablement of EVC within vSphere Cluster? Supplemental screenshot When EVC is enabled, vMotion works perfectly even from patched to unpatched ESXi host because new features are hidden from guests within the cluster until all hosts in the cluster are properly updated.
  • 9. 9VMware and TAM Customer Confidential │ ©2018 VMware, Inc. Q: Why have a lot of VMware customers still not applied patches? A: Well, there are usually two main reasons. 1. Security update requires huge update effort especially in large environments 2. Security update has performance impact on applications Details: • First things first, the performance impact is the same or similar on bare metal. The hypervisor performance overhead is negligible (below 2%) • The negative performance impact is hard to predict as it is workload specific. That’s the reason the application owners should evaluate the specific impact on their application. • IT management is afraid of the unpredictable performance impact, lack of computing resources and tremendous impact on capacity planning. • In case a VM hardware upgrade is required, a maintenance window with application owners has to be planned. Note: A Virtual Machine hardware upgrade can bring a certain risk because you are practically changing the motherboard. • Power Off / Power On VMs is required, which is another reason the maintenance window must be planned with or by application owners.
  • 10. 10VMware and TAM Customer Confidential │ ©2018 VMware, Inc. Q: Is it necessary to update VMware Tools to remediate Spectre vulnerabilities? A: No. VMware Tools are irrelevant to Spectre remediation. VM hardware (aka Compatibility) is what matters. You should manage VMware Tools as usual. The best practice is to use the latest VMware Tools version but it is not a strict requirement. Details: • Even though VMware Tools are irrelevant to Spectre, here are some details: • If you use VMTools 10.x then it is independent of the ESXi version thus independent of VM hardware. • If you use VMTools 9.x then you should use the latest release for your particular ESXi version.* • VM hardware 9+ is the only requirement to mitigate Spectre 2 (OS). Minimal requirement is VM hardware version 9 as it is necessary to pass-through IBRS,IBPB and STIBP. • For better Meltdown mitigation performance, VM hardware version 11 is recommended as it supports INVPCID (Invalidate Process-Context Identifier, requires Haswell or newer CPU). • Some improvements on Linux are already available for VM hardware 9 (PCID), 11 (INVPCID) further improves on that whereas for Windows, 11 is the minimum for any HW assisted performance improvement
  • 11. 11VMware and TAM Customer Confidential │ ©2018 VMware, Inc. Q: A Guest OS reboot is not sufficient. How can vSphere Admin schedule an automated VM Power Cycle during Guest OS reboot? A: As a vSphere Admin, you cannot schedule a VM Power Cycle during a regular Guest OS reboot. The only exception is when you schedule a VM Compatibility Upgrade (aka VM hardware upgrade). This special use case is covered on the next slide. Details: • If you have only basic vSphere, you have to schedule specific app maintenance windows with the application owners and work with them in tandem. This can be a very time consuming effort especially in environments with thousands of VMs. Alternatively, you can consider a scheduled VM Compatibility Upgrade. Please, note that it cannot be used for VMs that are already on the latest VM hardware version which is supported on your ESXi release. • If you have Cloud Management Platforms like vRealize Automation or vCloud Director then a Power Cycle can be done by server/application owners by themselves.
  • 12. 12VMware and TAM Customer Confidential │ ©2018 VMware, Inc. Q: Do I need Power Cycle VM after scheduled VM hardware upgrade on Guest OS Reboot? A: No. If you schedule a VM Compatibility Upgrade (aka VM Hardware Upgrade) for your VMs, it will actually Power-Off/Power-On VM on next Guest OS reboot as it is a part of the VM hardware upgrade workflow. Details: • Cannot be used for VMs already using the latest VM hardware version supported by your ESXi version. • Please note that a VM hardware upgrade is the same operation as changing the motherboard in physical computer. It is a significant change for the guest OS which may or may not be successful, therefore there are some associated risks. • You should have a backup of your VMs to recover from in case of any issues. • The full procedure is documented in VMware documentation “Schedule a Compatibility Upgrade for Virtual Machines”. • You or the app owner should test if new CPU capabilities are exposed inside the Guest OS and that the security mitigations will work. • The final decision, if you want to use this feature (scheduled VM hardware upgrade) is up to you and you have to understand all potential impacts and associated risks. It usually works without issues, but as discussed, you change the motherboard for an already installed and configured OS.
  • 13. 13VMware and TAM Customer Confidential │ ©2018 VMware, Inc. Q: Do I need Power Cycle VM after scheduled VM hardware upgrade on Guest OS Reboot? Supplemental screen shots
  • 14. 14VMware and TAM Customer Confidential │ ©2018 VMware, Inc. Q: How can I check new CPUs capabilities exposure in to Guest OS? A: The best is to test it by Spectre/Meltdown checkers within Guest OS. Details: • To use MS-Windows checker read Microsoft Article at https://support.microsoft.com/en- us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in. • PowerShell 5.0 is required • Install-Module SpeculationControl • Set-ExecutionPolicy RemoteSigned -Scope Currentuser • Get-SpeculationControlSettings • To use Linux checker read the article at https://github.com/speed47/spectre-meltdown-checker where is a shell script to tell if your system is vulnerable. • If you want “Verify Hypervisor-Assisted Guest Mitigation (Spectre) patches using PowerCLI” read William Lam’s blog post at https://www.virtuallyghetto.com/2018/01/verify-hypervisor-assisted- guest-mitigation-spectre-patches-using-powercli.html and leverage PowerCLI script available at https://github.com/lamw/vghetto-scripts/blob/master/powershell/VerifyESXiMicrocodePatch.ps1
  • 15. 15VMware and TAM Customer Confidential │ ©2018 VMware, Inc. Q: How I can check new CPUs capabilities exposure in to Guest OS? Supplemental screen shots – MS-Windows and Linux vulnerabilities checkers MS-Windows checker Linux checker
  • 16. 16VMware and TAM Customer Confidential │ ©2018 VMware, Inc. Q: How I can check new CPUs capabilities exposure in to Guest OS? Supplemental screen shots – William Lam’s PowerCLI functions Verify-ESXiMicrocodePatchAndVM Verify-ESXiMicrocodePatch
  • 17. 17VMware and TAM Customer Confidential │ ©2018 VMware, Inc. Conclusion • All patches for Spectre variants 1,2 and meltdown are released and the update process should be well understood. • Patches for Spectre variants 3a and 4 are on hold until Intel has released updated microcode. • Spectre/Meltdown patching is definitely not a simple project, especially in large organizations where collaboration among multiple teams and departments is required. • OS Patches have negative performance impact on certain applications. • Some of these OS remediations can be disabled in operating systems, therefore hardware and vSphere layers can be patched and application owner can choose between security or performance. • Please note that depending on the vector and OS, it might not be possible to disable all remediations. Contact your OS vendor for further information.
  • 18. VMware and TAM Customer Confidential │ ©2018 VMware, Inc. Other questions? Contact your TAM or E-mail dpasek@vmware.com