Skip to main content

Good news! Hackers focus on Virtualization




Update: I've update the text so I can let Chris Hoff (our drunken security friend) comment and help us all understand better what he understood/understands...well...better :-)


So why is this good news? We need the endorsement of those hackers of understanding that it's not the OS where all the energy will be spilled but on the Virtual Data Center OS, as VMware puts it.

So again why it's good news?

  • This is a validation of the fact that Virtualization is going mainstream.
  • Security and Compliance will be core focus of all organizations (as regulators will come knocking at your doorsteps)
  • Virtual Infrastructures are easier to batten down and secure due to its uniformity.
  • Regulators will increasingly ask for audits, where as in traditional environments (I've seen such audits by the like of KPMG etc) and always wondered like "wow--you are so prepared, dude, NOT!", Virtual environments suddenly enables auditors to ask the right questions and get or not get the expected results.
  • Focus on security would mean that we will have to work harder to provide a secure and compliant virtual platforms.

So, I welcome this shift. Virtualization platform are secure and have been secured, the ones that aren't, should start doing it right away. I'll be personally speaking in an event in November on security and why a "secure and compliant practice will enhance your competitive edge", its not just about securing, your customers want to know if they are secure with you. Feel free to mail me if you need more information.

For now the report:

Graham Titterington, principal analyst at Ovum, told ZDNet Asia in an email interview that, with the increasing prominence of virtualisation, threats to virtual machines (VMs) are becoming more significant.

"There is little evidence of attacks on the foundation layers of virtualised environments yet, but we need to be vigilant as attacks will surely come," he noted.

"Virtualisation [can offer] the attacker the bonus of taking down many VMs with one attack, if successful. There is also the risk of attacks on the information held in all the VMs sharing the same physical platform if hypervisor security is broken," said Titterington.

Ronnie Ng, Symantec's manager for systems engineering in Singapore and Indonesia, concurred with Titterington's assessment. "While actual hypervisor breaches are still rare, there is still the potential threat of the hypervisor layer being compromised, putting at risk all the virtual servers running business applications," he said in an email.

The key problem with the growth in adoption of server virtualisation, Ng explained, is the lack of control — or 'VM sprawl' — in the datacentre. The ease of deployment of virtual servers makes it difficult to audit and enforce security policies, noted Ng.

Benjamin Low, managing director of Asia South at Secure Computing, added in an email that the mobility of virtual environments and the fact that VMs can "hide" when they are not active make it difficult for traditional network-security tools to monitor and control traffic within virtual networks.

Acknowledging that it would be a matter of time before hackers act on "unprotected vulnerabilities that the technology presents", he warned: "Virtualisation may become the next frontier for black hats."


ZDnet Security Blog

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op...