Tuesday, October 21, 2008
Update: I've update the text so I can let Chris Hoff (our drunken security friend) comment and help us all understand better what he understood/understands...well...better :-)
So why is this good news? We need the endorsement of those hackers of understanding that it's not the OS where all the energy will be spilled but on the Virtual Data Center OS, as VMware puts it.
So again why it's good news?
- This is a validation of the fact that Virtualization is going mainstream.
- Security and Compliance will be core focus of all organizations (as regulators will come knocking at your doorsteps)
- Virtual Infrastructures are easier to batten down and secure due to its uniformity.
- Regulators will increasingly ask for audits, where as in traditional environments (I've seen such audits by the like of KPMG etc) and always wondered like "wow--you are so prepared, dude, NOT!", Virtual environments suddenly enables auditors to ask the right questions and get or not get the expected results.
- Focus on security would mean that we will have to work harder to provide a secure and compliant virtual platforms.
So, I welcome this shift. Virtualization platform are secure and have been secured, the ones that aren't, should start doing it right away. I'll be personally speaking in an event in November on security and why a "secure and compliant practice will enhance your competitive edge", its not just about securing, your customers want to know if they are secure with you. Feel free to mail me if you need more information.
For now the report:
Graham Titterington, principal analyst at Ovum, told ZDNet Asia in an email interview that, with the increasing prominence of virtualisation, threats to virtual machines (VMs) are becoming more significant.
"There is little evidence of attacks on the foundation layers of virtualised environments yet, but we need to be vigilant as attacks will surely come," he noted.
"Virtualisation [can offer] the attacker the bonus of taking down many VMs with one attack, if successful. There is also the risk of attacks on the information held in all the VMs sharing the same physical platform if hypervisor security is broken," said Titterington.
Ronnie Ng, Symantec's manager for systems engineering in Singapore and Indonesia, concurred with Titterington's assessment. "While actual hypervisor breaches are still rare, there is still the potential threat of the hypervisor layer being compromised, putting at risk all the virtual servers running business applications," he said in an email.
The key problem with the growth in adoption of server virtualisation, Ng explained, is the lack of control — or 'VM sprawl' — in the datacentre. The ease of deployment of virtual servers makes it difficult to audit and enforce security policies, noted Ng.
Benjamin Low, managing director of Asia South at Secure Computing, added in an email that the mobility of virtual environments and the fact that VMs can "hide" when they are not active make it difficult for traditional network-security tools to monitor and control traffic within virtual networks.
Acknowledging that it would be a matter of time before hackers act on "unprotected vulnerabilities that the technology presents", he warned: "Virtualisation may become the next frontier for black hats."
ZDnet Security Blog