Skip to main content

Good news! Hackers focus on Virtualization

Update: I've update the text so I can let Chris Hoff (our drunken security friend) comment and help us all understand better what he understood/understands...well...better :-)

So why is this good news? We need the endorsement of those hackers of understanding that it's not the OS where all the energy will be spilled but on the Virtual Data Center OS, as VMware puts it.

So again why it's good news?

  • This is a validation of the fact that Virtualization is going mainstream.
  • Security and Compliance will be core focus of all organizations (as regulators will come knocking at your doorsteps)
  • Virtual Infrastructures are easier to batten down and secure due to its uniformity.
  • Regulators will increasingly ask for audits, where as in traditional environments (I've seen such audits by the like of KPMG etc) and always wondered like "wow--you are so prepared, dude, NOT!", Virtual environments suddenly enables auditors to ask the right questions and get or not get the expected results.
  • Focus on security would mean that we will have to work harder to provide a secure and compliant virtual platforms.

So, I welcome this shift. Virtualization platform are secure and have been secured, the ones that aren't, should start doing it right away. I'll be personally speaking in an event in November on security and why a "secure and compliant practice will enhance your competitive edge", its not just about securing, your customers want to know if they are secure with you. Feel free to mail me if you need more information.

For now the report:

Graham Titterington, principal analyst at Ovum, told ZDNet Asia in an email interview that, with the increasing prominence of virtualisation, threats to virtual machines (VMs) are becoming more significant.

"There is little evidence of attacks on the foundation layers of virtualised environments yet, but we need to be vigilant as attacks will surely come," he noted.

"Virtualisation [can offer] the attacker the bonus of taking down many VMs with one attack, if successful. There is also the risk of attacks on the information held in all the VMs sharing the same physical platform if hypervisor security is broken," said Titterington.

Ronnie Ng, Symantec's manager for systems engineering in Singapore and Indonesia, concurred with Titterington's assessment. "While actual hypervisor breaches are still rare, there is still the potential threat of the hypervisor layer being compromised, putting at risk all the virtual servers running business applications," he said in an email.

The key problem with the growth in adoption of server virtualisation, Ng explained, is the lack of control — or 'VM sprawl' — in the datacentre. The ease of deployment of virtual servers makes it difficult to audit and enforce security policies, noted Ng.

Benjamin Low, managing director of Asia South at Secure Computing, added in an email that the mobility of virtual environments and the fact that VMs can "hide" when they are not active make it difficult for traditional network-security tools to monitor and control traffic within virtual networks.

Acknowledging that it would be a matter of time before hackers act on "unprotected vulnerabilities that the technology presents", he warned: "Virtualisation may become the next frontier for black hats."

ZDnet Security Blog


Popular posts from this blog

DeepLearningTrucker Part 1

Avastu Blog is migrating to; 1st Jan 2009 live


I will send out emails personally to those who are using my link(s) on their sites.

Thanks much for your co-operation and hope you enjoy the new site and its cool new features :-)

Not like the site is unlive or something..on the contrary, its beginning to get a lot of attention already. Well most of the work is done, you don't have to worry about anything though:

What won't change

Links/Referrals: I will be redirecting the links (all links which you may have cross-posted) to - so you don't have to do anything in all your posts and links. Although, I would urge however that you do change the permalinks, especially on your blogs etc yourselfThis blog is not going away anywhere but within a few months, I will consider discontinuing its usage. I won't obviously do …

Cloud Security: Eliminate humans from the "Information Supply Chain on the Web"

My upcoming article, part - 3 data center predictions for 2009, has a slideshot talking about the transition from the current age to the cloud computing age to eventually the ideation age- the age where you will have clouds that will emote but they will have no internal employees.

Biggest management disasters occur because internal folks are making a mess of the playground.

Om's blog is carrying an article about Cloud security and it is rather direct but also makes a lot of sense:

I don’t believe that clouds themselves will cause the security breaches and data theft they anticipate; in many ways, clouds will result in better security. Here’s why: Fewer humans –Most computer breaches are the result of human error; only 20-40 percent stem from technical malfunctions. Cloud operators that want to be profitable take humans out of the loop whenever possible.Better tools – Clouds can afford high-end data protection and security monitoring tools, as well as the experts to run them. I trust…