SlideShare a Scribd company logo
Virtualization vulnerabilities, security issues,
and solutions
VIRTUALIZATION SECURITY
THREATS IN
CLOUD COMPUTING
Vulnerabilities Security Issues And Solutions
What is Virtualization?
Cloud Computing, Virtualization means to
create a virtual version of a device or resources.
Where the framework divides the resources
into one or more execution environment.
Why you Should Care?
Fewer Physical Machines
Lowered CAPEX
Centralized Management
Higher Utilization
Minimized or Eliminate Downtime
How does virtualization work in cloud computing?
Hypervisor software is the secret sauce that makes virtualization
possible.
_______________________________________________________
Hypervisor Types-
Welcoming Greater flexibility leads to potentially
large security risks
The Security Risks of Virtualization
In a Virtualized environment, each of the VMs is detached from
the rest of the system by the hypervisor or Virtual Machine
Monitor (VMM).
A Strong accomplishment can break this confinement and thus
point to various concerns respecting the Confidentiality, Integrity,
Or Availability of the VMs.
Virtualization Security Issues
VM escape- Enables a hacker/cracker to gain access to the primary
hypervisor and its created virtual machines.
Hyperjacking- Hacker takes malicious control over the hypervisor that
creates the virtual environment within a virtual machine (VM)
host.
VM sprawl- When the large number of virtual machines exist in the
environment without proper management.
Virtualization Security Issues
VM footprint
Used for gathering information about target VM like
OS installed, packages installed and services running
etc.
Inside-VM attack VM can get infected with malware or OS rootkits at run-
time.
Outside-VM attack
Attacks from the host OS and co-located VMs are known
as outside-VM attacks.
Virtualization Security Issues
Cross VM side
channel
To maximize resource utilization, multiple VMs are
usually placed on the same physical server in the
cloud environment. The basic idea is a malicious VM
penetrates the isolation between VMs, and then
access the shared hardware and cache locations to
extract confidential information from the target.
Virtualization Security Issues
Oudated SW
packages in VMs
Outdated software packages in virtual machines can
pose serious security threats in the virtualized
environment. Because of the low cost and the ease of
creation, users tend to create new virtual machines for
different tasks, branch new virtual machines based on
the old ones, snapshot machines or even rollback
machines to an earlier state.
Virtualization security measures amd requirements
In order to protect the virtualization environment in the cloud, the authority
must implement definite security measures.
The following measures must be endorsed for a secure cloud execution.
Protected network
Deactivating the non-essential features
Detach unutilized hardware devices
Backup of VM images
Hardened Configuration.
Patch Management
Intrusion Detection System.
Cloud Shared Responsibility model
Cloud Always comes as a shared responsibility model between a cloud service
provider and cloud customers.
Cloud
Service
Provider
Cloud
Service
Customer
Cloud Shared Responsibility Model
Conclusion
 Virtualization involves the use of encapsulating software layer (Hypervisor or
Virtual Machine Monitor) which surrounds or underlies an operating system
and provides the same input, outputs, and behavior that would be expected
from an actual physical device.
 Virtualized systems introduce important security gaps that need to be taken
into account when deploying strong and secure virtualized infrastructure.
 Cloud Virtualization environment can be compromised by different attacks at
hypervisor, virtual machines and VM images.
 We have identified attack scenarios at these components and different
existing security schemes that provide security to virtualization.
List of References/Bibliography
• Virtualization vulnerabilities, security issues, and solutions:
A critical study and comparison
Darshan Tank . Akshai Aggarwal . Nirbhay Chaubey
https://doi.org/10.1007/s41870-019-00294
© Bharati Vidyapeeth’s Institute of Computer Applications and Management 2019
• Google.com
• Youtube.com
• en.Wikipedia.org
Virtualization security threats in cloud computing
Ad

More Related Content

What's hot (20)

Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computing
Soumyajit Basu
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
Mohammad Ilyas Malik
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Ninh Nguyen
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
Mehul Jariwala
 
Virtual machine security
Virtual machine securityVirtual machine security
Virtual machine security
Jacob Zvirikuzhe
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
Dr.Neeraj Kumar Pandey
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
Mehul Patel
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
 
Cloud computing and Cloudsim
Cloud computing and CloudsimCloud computing and Cloudsim
Cloud computing and Cloudsim
Manash Kumar Mondal
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Ripal Ranpara
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology
Ravindra Dastikop
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
vishal choudhary
 
Virtualization
VirtualizationVirtualization
Virtualization
Srisailam Reddy Kanapuram
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
Dr. Ramkumar Lakshminarayanan
 
Implementation levels of virtualization
Implementation levels of virtualizationImplementation levels of virtualization
Implementation levels of virtualization
Gokulnath S
 
Eucalyptus, Nimbus & OpenNebula
Eucalyptus, Nimbus & OpenNebulaEucalyptus, Nimbus & OpenNebula
Eucalyptus, Nimbus & OpenNebula
Amar Myana
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
Thanakrit Lersmethasakul
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
Rahul Hada
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
Shalini Toluchuri
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computing
Soumyajit Basu
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Ninh Nguyen
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
Mehul Jariwala
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
Dr.Neeraj Kumar Pandey
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
Mehul Patel
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology
Ravindra Dastikop
 
Implementation levels of virtualization
Implementation levels of virtualizationImplementation levels of virtualization
Implementation levels of virtualization
Gokulnath S
 
Eucalyptus, Nimbus & OpenNebula
Eucalyptus, Nimbus & OpenNebulaEucalyptus, Nimbus & OpenNebula
Eucalyptus, Nimbus & OpenNebula
Amar Myana
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
Thanakrit Lersmethasakul
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
Rahul Hada
 

Similar to Virtualization security threats in cloud computing (20)

virtukdjkdjajdajkjdacdjdjdjcjdcjkdjc.pptx
virtukdjkdjajdajkjdacdjdjdjcjdcjkdjc.pptxvirtukdjkdjajdajkjdacdjdjdjcjdcjkdjc.pptx
virtukdjkdjajdajkjdacdjdjdjcjdcjkdjc.pptx
aravym456
 
Virtualization security
Virtualization securityVirtualization security
Virtualization security
Ahmed Nour
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicro
dvmug1
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised Computing
IOSR Journals
 
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
Siddharth Coontoor
 
IT Security Risk Mitigation Report: Virtualization Security
IT Security Risk Mitigation Report: Virtualization SecurityIT Security Risk Mitigation Report: Virtualization Security
IT Security Risk Mitigation Report: Virtualization Security
Booz Allen Hamilton
 
CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...
CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...
CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...
PreethaV16
 
Virtualization Types of Virtualization and Types of Hupervisors
Virtualization Types of Virtualization and Types of HupervisorsVirtualization Types of Virtualization and Types of Hupervisors
Virtualization Types of Virtualization and Types of Hupervisors
csncbaewcc
 
Virtualization Security
Virtualization SecurityVirtualization Security
Virtualization Security
syrinxtech
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
CloudExpoEurope
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
JD Sherry
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
Mangesh Gunjal
 
Security challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governanceSecurity challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governance
Adam Bert Lacay
 
week 3 cloud computing northumbria foudation
week 3 cloud computing northumbria foudationweek 3 cloud computing northumbria foudation
week 3 cloud computing northumbria foudation
MarufFarhanRigan1
 
Zimory White Paper: Security in the Cloud pt 2/2
Zimory White Paper: Security in the Cloud pt 2/2Zimory White Paper: Security in the Cloud pt 2/2
Zimory White Paper: Security in the Cloud pt 2/2
Zimory
 
PCI DSS & Virtualization
 PCI DSS & Virtualization PCI DSS & Virtualization
PCI DSS & Virtualization
TobyRobinson13
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
Maliha Ali
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
Baqar kazmi
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
bakar kazmi
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
Baqar Kazmi
 
virtukdjkdjajdajkjdacdjdjdjcjdcjkdjc.pptx
virtukdjkdjajdajkjdacdjdjdjcjdcjkdjc.pptxvirtukdjkdjajdajkjdacdjdjdjcjdcjkdjc.pptx
virtukdjkdjajdajkjdacdjdjdjcjdcjkdjc.pptx
aravym456
 
Virtualization security
Virtualization securityVirtualization security
Virtualization security
Ahmed Nour
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicro
dvmug1
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised Computing
IOSR Journals
 
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
Siddharth Coontoor
 
IT Security Risk Mitigation Report: Virtualization Security
IT Security Risk Mitigation Report: Virtualization SecurityIT Security Risk Mitigation Report: Virtualization Security
IT Security Risk Mitigation Report: Virtualization Security
Booz Allen Hamilton
 
CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...
CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...
CLOUD COMPUTING TECHNIQUES -This course will enable the students to learn the...
PreethaV16
 
Virtualization Types of Virtualization and Types of Hupervisors
Virtualization Types of Virtualization and Types of HupervisorsVirtualization Types of Virtualization and Types of Hupervisors
Virtualization Types of Virtualization and Types of Hupervisors
csncbaewcc
 
Virtualization Security
Virtualization SecurityVirtualization Security
Virtualization Security
syrinxtech
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
JD Sherry
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
Mangesh Gunjal
 
Security challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governanceSecurity challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governance
Adam Bert Lacay
 
week 3 cloud computing northumbria foudation
week 3 cloud computing northumbria foudationweek 3 cloud computing northumbria foudation
week 3 cloud computing northumbria foudation
MarufFarhanRigan1
 
Zimory White Paper: Security in the Cloud pt 2/2
Zimory White Paper: Security in the Cloud pt 2/2Zimory White Paper: Security in the Cloud pt 2/2
Zimory White Paper: Security in the Cloud pt 2/2
Zimory
 
PCI DSS & Virtualization
 PCI DSS & Virtualization PCI DSS & Virtualization
PCI DSS & Virtualization
TobyRobinson13
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
Maliha Ali
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
Baqar kazmi
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
bakar kazmi
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
Baqar Kazmi
 
Ad

Recently uploaded (20)

Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Ad

Virtualization security threats in cloud computing

  • 1. Virtualization vulnerabilities, security issues, and solutions VIRTUALIZATION SECURITY THREATS IN CLOUD COMPUTING Vulnerabilities Security Issues And Solutions
  • 2. What is Virtualization? Cloud Computing, Virtualization means to create a virtual version of a device or resources. Where the framework divides the resources into one or more execution environment.
  • 3. Why you Should Care? Fewer Physical Machines Lowered CAPEX Centralized Management Higher Utilization Minimized or Eliminate Downtime
  • 4. How does virtualization work in cloud computing? Hypervisor software is the secret sauce that makes virtualization possible. _______________________________________________________
  • 6. Welcoming Greater flexibility leads to potentially large security risks
  • 7. The Security Risks of Virtualization In a Virtualized environment, each of the VMs is detached from the rest of the system by the hypervisor or Virtual Machine Monitor (VMM). A Strong accomplishment can break this confinement and thus point to various concerns respecting the Confidentiality, Integrity, Or Availability of the VMs.
  • 8. Virtualization Security Issues VM escape- Enables a hacker/cracker to gain access to the primary hypervisor and its created virtual machines. Hyperjacking- Hacker takes malicious control over the hypervisor that creates the virtual environment within a virtual machine (VM) host. VM sprawl- When the large number of virtual machines exist in the environment without proper management.
  • 9. Virtualization Security Issues VM footprint Used for gathering information about target VM like OS installed, packages installed and services running etc. Inside-VM attack VM can get infected with malware or OS rootkits at run- time. Outside-VM attack Attacks from the host OS and co-located VMs are known as outside-VM attacks.
  • 10. Virtualization Security Issues Cross VM side channel To maximize resource utilization, multiple VMs are usually placed on the same physical server in the cloud environment. The basic idea is a malicious VM penetrates the isolation between VMs, and then access the shared hardware and cache locations to extract confidential information from the target.
  • 11. Virtualization Security Issues Oudated SW packages in VMs Outdated software packages in virtual machines can pose serious security threats in the virtualized environment. Because of the low cost and the ease of creation, users tend to create new virtual machines for different tasks, branch new virtual machines based on the old ones, snapshot machines or even rollback machines to an earlier state.
  • 12. Virtualization security measures amd requirements In order to protect the virtualization environment in the cloud, the authority must implement definite security measures. The following measures must be endorsed for a secure cloud execution. Protected network Deactivating the non-essential features Detach unutilized hardware devices Backup of VM images Hardened Configuration. Patch Management Intrusion Detection System.
  • 13. Cloud Shared Responsibility model Cloud Always comes as a shared responsibility model between a cloud service provider and cloud customers. Cloud Service Provider Cloud Service Customer Cloud Shared Responsibility Model
  • 14. Conclusion  Virtualization involves the use of encapsulating software layer (Hypervisor or Virtual Machine Monitor) which surrounds or underlies an operating system and provides the same input, outputs, and behavior that would be expected from an actual physical device.  Virtualized systems introduce important security gaps that need to be taken into account when deploying strong and secure virtualized infrastructure.  Cloud Virtualization environment can be compromised by different attacks at hypervisor, virtual machines and VM images.  We have identified attack scenarios at these components and different existing security schemes that provide security to virtualization.
  • 15. List of References/Bibliography • Virtualization vulnerabilities, security issues, and solutions: A critical study and comparison Darshan Tank . Akshai Aggarwal . Nirbhay Chaubey https://doi.org/10.1007/s41870-019-00294 © Bharati Vidyapeeth’s Institute of Computer Applications and Management 2019 • Google.com • Youtube.com • en.Wikipedia.org