Is Virtualization A Black Hole in Your Security?: 5 Ways To Ensure It Isn't
Is Virtualization A Black Hole in Your Security?: 5 Ways To Ensure It Isn't
November 2008
Virtualization in a nutshell
Virtualization separates logical resources from physical resources, allowing multiple systems to be run on one piece of hardware.
This upward trend looks firmly set to continue, with Gartner, Inc predicting Virtualization will be the highest-impact trend changing infrastructure and operations through 2012.1
Enabler
Can run more applications on fewer computers, and legacy applications and operating systems on newer desktops Can be moved quickly and automatically to new systems Easier deployment and management of virtual systems Availability of cheap storage and high bandwidth
Benefits
Allows IT to extract more value from its hardware investments and reduces management costs
Enables business continuity and disaster recovery in the event of hardware failure Reduces the administrative complexity
Like smartphones, instant messaging, and other technologies which can sneak into the organization through the backdoor, the hidden, unmanaged virtual environments which your employees deliberately or unwittingly install on their corporate systems without your knowledge, circumvent traditional policies and privileges, and create a black hole in your organizations security system. Installing a virtual machine on a networked computer is functionally the same as installing a physical desktop computer. So each new virtual machine must conform to your security policies. This means it must have its own anti-virus agents and any other endpoint security software your policies mandate, and must be kept up to date with relevant security patches. Even though the computer probably has all these security measures in place, the virtual machine is, to all intents and purposes, separate and must be patched and secured as a separate computer. Unfortunately, a user-downloaded and installed virtual machine most probably doesnt conform to corporate security policies, or have your companydeployed security software running. Since you cannot detect its contents, theres no way to find out if it does. Even worse, the virtual machine might contain viruses or other threats that can be used to infect or hack your network. This not only compromises your security but also creates a significant risk that you will no longer comply with the increasing number of legal and industry regulations that require you to protect confidential data. A typical user will almost certainly not consider this when downloading a virtual machine. And even if they do, theres often no way for them to know whats on the virtual machine until they install it.
There is also risk associated with authorized but unmanaged virtualization, notably the selfcontained test and Q&A environments created by developers.
Hidden, unmanaged virtual environments circumvent traditional policies and privileges, and create a black hole in your organizations security system.
The truth is, in many IT environments, most users have no need for virtual machines on their desktops at all. The best solution is simply to forbid the installation of freely downloadable virtual software on corporate desktops or laptops. The situation is different with regard to the professional virtualization tools that users, such as developers, need for software testing or other purposes. Permission to use virtual machines should be limited to this small group of users who truly need them and who can be trusted to ensure that the use of all virtual technologies conforms to corporate security policies.
Most organizations have acceptable use policies (AUPs) in place with the rules and guidelines users must follow when using their computers and the internet. Its time to update your AUP to address virtualization, spelling out the exact conditions under which virtual software can be installed, what approvals are required, what types of software can be run, and how it must be protected. You also need to spell out the repercussions employees can expect if their unauthorized installations are discovered. At the same time, its important to educate your employees on your entire AUP policy, including what the threats are, how they translate into policy, and the true costs and implications of a security breach.
Make sure every known virtual machine includes the same personal firewalls, anti-virus, intrusion detection and other client security software as your physical desktops and laptops. Vendors are starting to develop security software that can sit underneath the virtual machine layer by integrating with the hypervisor the means by which virtualization is possible but these solutions still do not provide the in-depth context and sensitive behavioral analysis necessary to detect the latest malware in action. Network access control (NAC) software on each computer can help, depending on configuration (virtual machines can operate in a bridged mode where they connect directly to the network, or can masquerade as the host making NAC difficult), as it can block network access until a physical or virtual machine is up to date according to corporate policies.
As with any software, virtualization software itself can be exploited, so its important also to keep all your known virtualization software and applications updated with appropriate security patches from the vendor. Some centralized patching solutions may not provide detection or patch remediation capabilities for virtualization products, meaning that your administrator will have to define policies for the virtualization vendors update tools.
Things to consider when looking at security products that support virtualization include:
Are there any known conflicts with existing Does the security software allow you to control
the use of virtualization software?
Conclusion
Virtualization can represent real value, particularly at a time of increasingly constrained IT budgets and its mushrooming popularity looks set to continue, transforming the way computers are used in the enterprise. While organizations deploying managed virtual desktops are running no significant increased risk, unauthorized desktop virtualization brings a host of security challenges to IT. By incorporating virtualization into your overall security strategy, you can protect your network from its dangers while profiting from its benefits.
One of the surest ways to ensure developers and testers create virtual machines that meet your security requirements is to make it quick and easy to do so. Create a repository of virtual machine builds with all the configuration settings, security software, and software patches required by your security policy that users can simply download use, and reuse as necessary.
Sources
1 www.gartner.com/it/page.jsp?id=638207
Sophos solution
Sophos Endpoint Security and Control uses a unified single client to proactively protect against malware and hackers, as well as controlling removable storage devices and the installation and use of unauthorized applications including virtualization applications such as VMWare Player, Virtual PC or Citrix Xen. You can use the free Sophos Application Discovery Tool to scan your network for unauthorized applications. Visit www.sophos.com/products/free-tools/sophos-application-discovery.html