SlideShare a Scribd company logo
VM WARE SECURITY
SARAH ALEXANDER
C8A
50
VMs
A self-contained operating
environment that behaves as if it is a
separate computer. For example, Java
applets run in a Java virtual machine (VM)
that has no access to the host OS.
This design has two advantages:
• System Independence
• Security
• VMs do not require specialized hypervisor-
specific hardware. Virtualization does
however require more bandwidth, storage
and processing capacity than a
traditional server.
• VMs can easily move, be copied and
reassigned between host servers to
optimize hardware resource utilization.
Because VMs on a physical host can
consume unequal resource quantities
(one may hog the available physical
storage while another stores little), IT
professionals must balance VMs with
VMware SECURITY
• It is strongly recommended that each
virtual machine be treated as if it was a
physical machine for most activities.
• VMs are vulnerable to most of the same
things as physical machines including
data loss/corruption, hardware failures,
viruses, and hackers.
• Install and use virus scanning software.
• Take regular updates to your operating
system, preferably via an automatic
update system.
• Make regular backups of important
data. Follow the recommended best
practices for your guest operating
system.
• In most cases, simply treat your virtual
workstation as you would any other
machine.
SECURITY RECOMMENDATIONS
• Treat each virtual machine as though
it is a real machine for the purposes of
security.
• Install Anti-Virus Software
• Choose Strong Passwords
• Keep your Operating Systems Updated
• Maintain Like Risk Postures for All
Machines
• Limit Host Access (firewalled off).
BEST PRACTICES
• Don't register a virtual machine for DHCP
on wireless.
• When copying or backing up a VM
image:
–Make sure the virtual machine is
powered off.
–Do not copy the lock file directory (the
only subdirectory that ends in ".lck").
• When restoring from backup, use move,
not copy. This prevents issues with
duplicate MAC Addresses on the same
• Treat each VM as a standalone
computer for security purposes. Install
virus scanning software. Take regular OS
updates.
• Enable "Time synchronization between
the virtual machine and the host
operating system" via the VMware Tools
installed on the virtual machine.
• Networking: use NAT. This should be the
default setting for your VMs.
• Carefully plan your disk allocations. Do
not over-allocate your disk. It is
dangerous to tell VMware to make
images that, if they all grew to their full
size, would take up more disk space
than you have free. If this happens,
VMware may pop up an alert, warning
you when you're about to use up more
space than you have. That would give
you a chance to free up disk space or
exit cleanly.
BACKUP
• VMs are at just as much risk for data loss,
, if not more, for data loss due to
hardware failure, file corruption, system
compromise, and other events.
• If data loss happens, a backup can
make a world of difference in recovering
from such an event. How you use your
virtual machine (VM) will determine the
best way to do backups for your VMs.
• You have important software/data in the
VM (research, data, etc): Install software
that runs regular backups of the data within
within your VM. This method doesn’t
preserve your VM , just the data within it.
it.
• Your VM is an appliance: We recommend
that the system administrator manually
makes backups. This preserves both the VM
VM and your data within it. Simply, drag
and copy the VM somewhere (e.g., an
external drive). Exclude your VM files from
from regular backups.
Things to note regarding virtual machine
backups:
• A VM image is actually comprised of
several files. All of those have to be in
sync or behavior is erratic.
• From outside the VM (host machine), if
a backup is made when the VM is
running, the results are inconsistent.
Backup your VM files on the host
machine when the VM is not running.
SECURITY RISKS SPECIFIC TO VMS
While VMs are at risk of all the same
things as any other machine, you should
be aware of a few additional issues.
• If a host is compromised, scripts can
be run on the host that can interact
with the guest at whatever privilege
level the guest is logged in as. This can
result in malicious Trojans being
installed on the host and guest
machines.
• A VM that is not virus protected,
compromised, and in a shared
networking configuration can be used
by an attacker to scan both the private
and public address spaces. The other
VMs on the host (if not patched) can
also be exploited via the network, so a
software firewall on each of the guests
is recommended.
• (Enterprise version) When turning on
shared folders, they can be accessed
through a compromised guest. Files
can then be placed on the host and
attackers can access other guests' file
Reference
http://kb.mit.edu/confluence/display/ist
contrib/VMware+Security+Recommend
ations+and+Best+Practices
http://www.webopedia.com/TERM/V/vir
tual_machine.html
THANK YOU

More Related Content

What's hot

Virtualization
VirtualizationVirtualization
Virtualization
Chandan Varadaraj
 
Onsite Vs Hosted Desktop Security
Onsite Vs Hosted Desktop SecurityOnsite Vs Hosted Desktop Security
Onsite Vs Hosted Desktop Security
James Hegarty
 
2015.09.23 - CHIVMUG UserCon Small Business & Virtualization
2015.09.23 - CHIVMUG UserCon Small Business & Virtualization2015.09.23 - CHIVMUG UserCon Small Business & Virtualization
2015.09.23 - CHIVMUG UserCon Small Business & Virtualization
Paul Woodward Jr
 
Virtual Machines - Virtual Box
Virtual Machines  - Virtual BoxVirtual Machines  - Virtual Box
Virtual Machines - Virtual Box
Lahiru Danushka
 
Modern Data Protection
Modern Data ProtectionModern Data Protection
Modern Data Protection
subtitle
 
EVault Endpoint Protection
EVault Endpoint Protection EVault Endpoint Protection
EVault Endpoint Protection
EVault
 
SYSAD323 Virtualization Basics
SYSAD323 Virtualization BasicsSYSAD323 Virtualization Basics
SYSAD323 Virtualization Basics
Don Bosco BSIT
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
Nikunj Dhameliya
 
Virtualization
VirtualizationVirtualization
Virtualization
raulverma
 
Virtual Machine Concept
Virtual Machine ConceptVirtual Machine Concept
Virtual Machine Concept
fatimaanique1
 
Exploring Stretched Clusters
Exploring Stretched ClustersExploring Stretched Clusters
Exploring Stretched Clusters
Scott Lowe
 
Virtualization basics
Virtualization basics Virtualization basics
Virtualization basics
Chandrani Ray Chowdhury
 
Computer Architecture - Software - Lesson 10 - Hard Drive Management / Logica...
Computer Architecture - Software - Lesson 10 - Hard Drive Management / Logica...Computer Architecture - Software - Lesson 10 - Hard Drive Management / Logica...
Computer Architecture - Software - Lesson 10 - Hard Drive Management / Logica...
Eric Vanderburg
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
Rishikese MR
 
SRM versus Stretched Clusters: Choosing the Right Solution
SRM versus Stretched Clusters: Choosing the Right SolutionSRM versus Stretched Clusters: Choosing the Right Solution
SRM versus Stretched Clusters: Choosing the Right Solution
Scott Lowe
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
Dr.Neeraj Kumar Pandey
 
Virtual Machine
Virtual MachineVirtual Machine
Virtual Machine
Prakhar Maurya
 
Virtualization
VirtualizationVirtualization
Virtualization
preethipreethi35
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
hktripathy
 
Server Virtualization Concepts & Features
Server Virtualization Concepts & FeaturesServer Virtualization Concepts & Features
Server Virtualization Concepts & Features
Ragesh R Nair
 

What's hot (20)

Virtualization
VirtualizationVirtualization
Virtualization
 
Onsite Vs Hosted Desktop Security
Onsite Vs Hosted Desktop SecurityOnsite Vs Hosted Desktop Security
Onsite Vs Hosted Desktop Security
 
2015.09.23 - CHIVMUG UserCon Small Business & Virtualization
2015.09.23 - CHIVMUG UserCon Small Business & Virtualization2015.09.23 - CHIVMUG UserCon Small Business & Virtualization
2015.09.23 - CHIVMUG UserCon Small Business & Virtualization
 
Virtual Machines - Virtual Box
Virtual Machines  - Virtual BoxVirtual Machines  - Virtual Box
Virtual Machines - Virtual Box
 
Modern Data Protection
Modern Data ProtectionModern Data Protection
Modern Data Protection
 
EVault Endpoint Protection
EVault Endpoint Protection EVault Endpoint Protection
EVault Endpoint Protection
 
SYSAD323 Virtualization Basics
SYSAD323 Virtualization BasicsSYSAD323 Virtualization Basics
SYSAD323 Virtualization Basics
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtual Machine Concept
Virtual Machine ConceptVirtual Machine Concept
Virtual Machine Concept
 
Exploring Stretched Clusters
Exploring Stretched ClustersExploring Stretched Clusters
Exploring Stretched Clusters
 
Virtualization basics
Virtualization basics Virtualization basics
Virtualization basics
 
Computer Architecture - Software - Lesson 10 - Hard Drive Management / Logica...
Computer Architecture - Software - Lesson 10 - Hard Drive Management / Logica...Computer Architecture - Software - Lesson 10 - Hard Drive Management / Logica...
Computer Architecture - Software - Lesson 10 - Hard Drive Management / Logica...
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
 
SRM versus Stretched Clusters: Choosing the Right Solution
SRM versus Stretched Clusters: Choosing the Right SolutionSRM versus Stretched Clusters: Choosing the Right Solution
SRM versus Stretched Clusters: Choosing the Right Solution
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
Virtual Machine
Virtual MachineVirtual Machine
Virtual Machine
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
 
Server Virtualization Concepts & Features
Server Virtualization Concepts & FeaturesServer Virtualization Concepts & Features
Server Virtualization Concepts & Features
 

Viewers also liked

Smarter Commerce Day 2015 - Per Schlingmann
Smarter Commerce Day 2015 - Per SchlingmannSmarter Commerce Day 2015 - Per Schlingmann
Smarter Commerce Day 2015 - Per Schlingmann
FiweSystems
 
R mateos cabezas e1
R mateos cabezas e1R mateos cabezas e1
R mateos cabezas e1
rafaelarmateos
 
Lecture network programming
Lecture network programmingLecture network programming
Lecture network programming
ganzorigb
 
Qué es netiqueta
Qué es netiquetaQué es netiqueta
Qué es netiqueta
Maria Fernanda
 
Menyemai Benih (Bhg 2) Mengaku
Menyemai Benih (Bhg 2) MengakuMenyemai Benih (Bhg 2) Mengaku
Menyemai Benih (Bhg 2) Mengaku
Peter De Run
 
Prévention 2020 club ImP'act PREVENTION
Prévention 2020 club ImP'act PREVENTIONPrévention 2020 club ImP'act PREVENTION
Prévention 2020 club ImP'act PREVENTION
Régis MARCHAL ip
 
Comunicado28 05-15
Comunicado28 05-15Comunicado28 05-15
Comunicado28 05-15
funsanmartin
 
Grupo 3
Grupo 3Grupo 3
Grupo 3
SolSolange
 

Viewers also liked (9)

Smarter Commerce Day 2015 - Per Schlingmann
Smarter Commerce Day 2015 - Per SchlingmannSmarter Commerce Day 2015 - Per Schlingmann
Smarter Commerce Day 2015 - Per Schlingmann
 
R mateos cabezas e1
R mateos cabezas e1R mateos cabezas e1
R mateos cabezas e1
 
Lecture network programming
Lecture network programmingLecture network programming
Lecture network programming
 
Qué es netiqueta
Qué es netiquetaQué es netiqueta
Qué es netiqueta
 
Menyemai Benih (Bhg 2) Mengaku
Menyemai Benih (Bhg 2) MengakuMenyemai Benih (Bhg 2) Mengaku
Menyemai Benih (Bhg 2) Mengaku
 
Prévention 2020 club ImP'act PREVENTION
Prévention 2020 club ImP'act PREVENTIONPrévention 2020 club ImP'act PREVENTION
Prévention 2020 club ImP'act PREVENTION
 
Document3
Document3Document3
Document3
 
Comunicado28 05-15
Comunicado28 05-15Comunicado28 05-15
Comunicado28 05-15
 
Grupo 3
Grupo 3Grupo 3
Grupo 3
 

Similar to V mware security

Virtual Machine
Virtual MachineVirtual Machine
Virtual Machine
Mohammed Twaha
 
Virtual Machine
Virtual MachineVirtual Machine
Virtual Machine
Mohammed Twaha
 
VMware And Avamar Backup
VMware And Avamar BackupVMware And Avamar Backup
VMware And Avamar Backup
jpo1974
 
Virtual machines and their architecture
Virtual machines and their architectureVirtual machines and their architecture
Virtual machines and their architecture
Mrinmoy Dalal
 
Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud Computing
Pyingkodi Maran
 
Veeam Backup & Replication v8 for VMware — General Overview
Veeam Backup & Replication v8 for VMware — General OverviewVeeam Backup & Replication v8 for VMware — General Overview
Veeam Backup & Replication v8 for VMware — General Overview
Veeam Software
 
663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf
663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf
663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf
pivanon243
 
move-anti-virus
move-anti-virusmove-anti-virus
move-anti-virus
Aakash Chaturvedi
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
MuhammadRizkyFaza
 
Top Ten Private Cloud Risks
Top Ten Private Cloud RisksTop Ten Private Cloud Risks
Top Ten Private Cloud Risks
Symantec
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
AJIT NEGI
 
CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2
vivekbhat
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
Mangesh Gunjal
 
Virtualization securityv2
Virtualization securityv2Virtualization securityv2
Virtualization securityv2
vivekbhat
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server Virtualisation
Alan McSweeney
 
Chapter 3.4.pptx
Chapter 3.4.pptxChapter 3.4.pptx
Chapter 3.4.pptx
kalavathisugan
 
lecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptxlecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptx
Anilkumarbehera16
 
How to configure esx to pass an audit
How to configure esx to pass an auditHow to configure esx to pass an audit
How to configure esx to pass an audit
Concentrated Technology
 
The virtual box.pptx
The virtual box.pptxThe virtual box.pptx
The virtual box.pptx
XanGwaps
 
Virtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the CloudVirtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the Cloud
Tjylen Veselyj
 

Similar to V mware security (20)

Virtual Machine
Virtual MachineVirtual Machine
Virtual Machine
 
Virtual Machine
Virtual MachineVirtual Machine
Virtual Machine
 
VMware And Avamar Backup
VMware And Avamar BackupVMware And Avamar Backup
VMware And Avamar Backup
 
Virtual machines and their architecture
Virtual machines and their architectureVirtual machines and their architecture
Virtual machines and their architecture
 
Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud Computing
 
Veeam Backup & Replication v8 for VMware — General Overview
Veeam Backup & Replication v8 for VMware — General OverviewVeeam Backup & Replication v8 for VMware — General Overview
Veeam Backup & Replication v8 for VMware — General Overview
 
663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf
663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf
663187411-UNIT-III-Virtualization-System-Specific-Attacks-1.pdf
 
move-anti-virus
move-anti-virusmove-anti-virus
move-anti-virus
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Top Ten Private Cloud Risks
Top Ten Private Cloud RisksTop Ten Private Cloud Risks
Top Ten Private Cloud Risks
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
 
CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
 
Virtualization securityv2
Virtualization securityv2Virtualization securityv2
Virtualization securityv2
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server Virtualisation
 
Chapter 3.4.pptx
Chapter 3.4.pptxChapter 3.4.pptx
Chapter 3.4.pptx
 
lecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptxlecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptx
 
How to configure esx to pass an audit
How to configure esx to pass an auditHow to configure esx to pass an audit
How to configure esx to pass an audit
 
The virtual box.pptx
The virtual box.pptxThe virtual box.pptx
The virtual box.pptx
 
Virtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the CloudVirtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the Cloud
 

V mware security

  • 1. VM WARE SECURITY SARAH ALEXANDER C8A 50
  • 2. VMs A self-contained operating environment that behaves as if it is a separate computer. For example, Java applets run in a Java virtual machine (VM) that has no access to the host OS. This design has two advantages: • System Independence • Security
  • 3. • VMs do not require specialized hypervisor- specific hardware. Virtualization does however require more bandwidth, storage and processing capacity than a traditional server. • VMs can easily move, be copied and reassigned between host servers to optimize hardware resource utilization. Because VMs on a physical host can consume unequal resource quantities (one may hog the available physical storage while another stores little), IT professionals must balance VMs with
  • 4. VMware SECURITY • It is strongly recommended that each virtual machine be treated as if it was a physical machine for most activities. • VMs are vulnerable to most of the same things as physical machines including data loss/corruption, hardware failures, viruses, and hackers. • Install and use virus scanning software.
  • 5. • Take regular updates to your operating system, preferably via an automatic update system. • Make regular backups of important data. Follow the recommended best practices for your guest operating system. • In most cases, simply treat your virtual workstation as you would any other machine.
  • 6. SECURITY RECOMMENDATIONS • Treat each virtual machine as though it is a real machine for the purposes of security. • Install Anti-Virus Software • Choose Strong Passwords • Keep your Operating Systems Updated • Maintain Like Risk Postures for All Machines • Limit Host Access (firewalled off).
  • 7. BEST PRACTICES • Don't register a virtual machine for DHCP on wireless. • When copying or backing up a VM image: –Make sure the virtual machine is powered off. –Do not copy the lock file directory (the only subdirectory that ends in ".lck"). • When restoring from backup, use move, not copy. This prevents issues with duplicate MAC Addresses on the same
  • 8. • Treat each VM as a standalone computer for security purposes. Install virus scanning software. Take regular OS updates. • Enable "Time synchronization between the virtual machine and the host operating system" via the VMware Tools installed on the virtual machine. • Networking: use NAT. This should be the default setting for your VMs.
  • 9. • Carefully plan your disk allocations. Do not over-allocate your disk. It is dangerous to tell VMware to make images that, if they all grew to their full size, would take up more disk space than you have free. If this happens, VMware may pop up an alert, warning you when you're about to use up more space than you have. That would give you a chance to free up disk space or exit cleanly.
  • 10. BACKUP • VMs are at just as much risk for data loss, , if not more, for data loss due to hardware failure, file corruption, system compromise, and other events. • If data loss happens, a backup can make a world of difference in recovering from such an event. How you use your virtual machine (VM) will determine the best way to do backups for your VMs.
  • 11. • You have important software/data in the VM (research, data, etc): Install software that runs regular backups of the data within within your VM. This method doesn’t preserve your VM , just the data within it. it. • Your VM is an appliance: We recommend that the system administrator manually makes backups. This preserves both the VM VM and your data within it. Simply, drag and copy the VM somewhere (e.g., an external drive). Exclude your VM files from from regular backups.
  • 12. Things to note regarding virtual machine backups: • A VM image is actually comprised of several files. All of those have to be in sync or behavior is erratic. • From outside the VM (host machine), if a backup is made when the VM is running, the results are inconsistent. Backup your VM files on the host machine when the VM is not running.
  • 13. SECURITY RISKS SPECIFIC TO VMS While VMs are at risk of all the same things as any other machine, you should be aware of a few additional issues. • If a host is compromised, scripts can be run on the host that can interact with the guest at whatever privilege level the guest is logged in as. This can result in malicious Trojans being installed on the host and guest machines.
  • 14. • A VM that is not virus protected, compromised, and in a shared networking configuration can be used by an attacker to scan both the private and public address spaces. The other VMs on the host (if not patched) can also be exploited via the network, so a software firewall on each of the guests is recommended. • (Enterprise version) When turning on shared folders, they can be accessed through a compromised guest. Files can then be placed on the host and attackers can access other guests' file

Editor's Notes

  1. System Independence: A Java application will run the same in any Java VM, regardless of hardware / software underlying the system. Security: Because the VM has no contact with the OS, there is little possibility of a Java program damaging other files or applications. This however, has a downside. Because programs running in a VM are separate from the OS, they cannot take advantage of special OS features.
  2. (LAST POINT) We don't recommend relying on the warning. There's no guarantee it will appear before bad things (data loss or corruption) happen.