At last week’s Black Hat conference, virtualization security was one of the hottest topics and sources of debate. If you’re trying to get a grip on how your enterprise’s virtualization security stacks up, consider this advice from Chris Whitener, chief security strategist, HP Secure Advantage.
Additional OS features such as isolation capabilities and strong security between OS partitions makes it easier for you to decrease the “attack surface” of a host OS.
MORE ON VIRTUALIZATION SECURITY
VMware’s Free ESXi Will Cost You if it’s Not Secured Properly
How to Find and Fix 10 Real Security Threats on Your Virtual Servers
Future Threats to Virtualization Security: Fact vs. Fiction
2. Ensure that your host OS is as secure as the guest operating system.
A virtual machine inherits all vulnerabilities of a host OS. Select a virtualization technology which provides strong security isolation (enforces distrust) between guest OS instances if needed. If organizations are concerned about malicious software in one guest OS attacking another OS, or don’t have mutual trust among administrators of the different guest OSes, then the virtualization layer must be designed to enforce the idea of distrust.
3. Security policies in the host OS should reflect requirements of individual virtual machines.
Using the host OS to implement compliance requirements further enhances your assurance of compliance. It can be relied upon independently of trust in the administration of the guest OS.
4. Manage virtual processes more like you already manage your physical resources.
The host OS security lifecycle and virtual machine security lifecycle(s) must both be managed efficiently thought the data center. Ideally, the virtual infrastructure would be managed in the same way as physical resources. This includes software configuration, updates and patches, auditing and performance monitoring.
5. Stay vigilant about securely managing the physical infrastructure.
Deploying workloads on virtualized platforms make them more mobile, and provides flexibility and agility; this does not mean that the physical infrastructure can be ignored. The physical infrastructure has a critical role in supporting the good execution of those workloads, and the security of the virtualized infrastructure depends on the physical resource configuration and access control being managed securely across the data center.
For more advice on improving the security of your virtual infrastructure, see CIO.com’s in-depth feature article How to Find and Fix 10 Real Security Threats on Your Virtual Servers. Also see CIO.com’s virtualization security expert Edward L. Haletky’s blogs for continuing virtual security coverage.