Despite the increasing number of critical applications and secure data on virtual infrastructures, few forensics tools exist to be sure a VM is locked down, or find out why it wasn't once it's been compromised. Computer forensics is an increasingly important field not only for investigating intrusions, hacks and data theft, but also to help analyze the security of a physical or virtual machine that has not yet been compromised. Unfortunately, there is as great a dearth of forensic tools within the virtual environment as there are in other areas of virtual-server security. Yes a Virtual Machine Disk File (VMDK) can be used by most if not all the forensics tools available from FTK, EnCase, Penguin SleuthKit, WinHex, etc. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe Weak forensic capabilities are becoming more of a pressing issue, however. Forensics can be broken up into two parts, one is acquisition, and the other is analysis. Some Forensics companies have tools that work within physical or virtual hosts to do on the fly analysis of data and usage. Those will still work within the virtual environment.My concern is with the acquisition of data once it is determined that further investigation is required. How do you currently acquire a VMDK currently residing upon the Virtual Machine File System (VMFS)? If the VMDK resides on Windows or Linux file systems or is shared via NFS the acquisition is easier as those are well understood file systems. On the other hand a VMFS is not well understood, largely because VMware has not yet released its format like as it has for the VMDK.Do you acquire the entire VMFS just to get one VMDK? Do you acquire the single VMDK, if so, how can you do this in a forensically sound method? How do you handle the large data stores used by virtual infrastructures? What if the VM spans multiple data stores and includes Raw Disk Maps (direct LUN attachments), uses iSCSI Initiators, USB over IP, or NPIV SAN attachments?If you do acquire the VMFS, how can you do it in a 100-percent read-only mode with no running VMs upon it? How can you ensure the VMFS or VMDK is not changing during acquisition?Assuming all these questions are answered, now we begin the analysis. Assuming you are starting from a VMFS, how would you find the VMDK you want when the format is not known? Do we have to resort to trial and error? Is it even possible for data to be hidden on a VMFS? If they are an administrator, of course it is. Thankfully a VM cannot hide data on a VMFS, only within the bounds of the VMDK.There is a need for better tools and information from VMware to make forensic acquisition and analysis a reality within the virtual infrastructure.There also needs to be proper processes and procedures in place that are acceptable by the forensic community.So far neither the vendors nor the community has stepped in to fill the gap. Virtualization expert Edward L. Haletky is the author of “VMWare ESX Server in the Enterprise: Planning and Securing Virtualization Servers,” Pearson Education (2008.) He recently left Hewlett-Packard, where he worked in the Virtualization, Linux, and High-Performance Technical Computing teams. Haletky owns AstroArch Consulting, providing virtualization, security, and network consulting and development. Haletky is also a champion and moderator for the VMware discussion forums, providing answers to security and configuration questions. Related content opinion The changing face of cybersecurity threats in 2023 Cybersecurity has always been a cat-and-mouse game, but the mice keep getting bigger and are becoming increasingly harder to hunt. By Dipti Parmar Sep 29, 2023 8 mins Cybercrime Security brandpost Should finance organizations bank on Generative AI? Finance and banking organizations are looking at generative AI to support employees and customers across a range of text and numerically-based use cases. By Jay Limbasiya, Global AI, Analytics, & Data Management Business Development, Unstructured Data Solutions, Dell Technologies Sep 29, 2023 5 mins Artificial Intelligence brandpost Embrace the Generative AI revolution: a guide to integrating Generative AI into your operations The CTO of SAP shares his experiences and learnings to provide actionable insights on navigating the GenAI revolution. By Juergen Mueller Sep 29, 2023 4 mins Artificial Intelligence feature 10 most in-demand generative AI skills Gen AI is booming, and companies are scrambling to fill skills gaps by hiring freelancers to make the most of the technology. These are the 10 most sought-after generative AI skills on the market right now. By Sarah K. White Sep 29, 2023 8 mins Hiring Generative AI IT Skills Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe