Sei sulla pagina 1di 29

BY: A.Tolnai,S.H.

Von Solms Academy for information Technology University of Johannesburg Johannesburg,South Africa

Presented By: Gurjot Kaur Sumeet Kaur M.Tech-I

Virtualization:
The ability to run multiple operating systems on a single physical system and share the underlying hardware resources

Cloud Computing:
The provisioning of services in a timely (near on instant), on-demand manner, to allow the scaling up and down of resources. Thus,Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet)

Thus cloud computing is :


App and Infrastructure over Internet I pay ONLY for what I use ONLY when I use it . With the ability to SCALE capacity up anddown ondemand

Hypervisor:
A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems to share a single hardware host.

Multitenancy (shared resources) Massive scalability Elasticity Pay as you go Self-provisioning of resources A Massive Concentration of Resources

Host security responsibilities in SaaS, PaaS and IaaS are the responsibility of the cloud service provider (CSP).
The integrity and availability of the hypervisor are of utmost importance. When control of the hypervisor is obtained, data as well as sensitive information can be accessed and redirected.

Virtual machine escape


System configuration drift Root kits Insider Threats

SOA- Service oriented architecture The virtualized services offered must be secure. The virtualized services must be backed up and recovered as though theyre physical systems. The resources need to have workload management, workflow, provisioning and load balancing at the foundation.

Some virtualization security risks are: Virtual machine escape, Insider threats Root kits.
These risks & root kits can potentially cause a security breach in the virtual environment.

A root kit can exist within the hardware by the act of patching firmware.

Firmware root kits: These types of root kits are difficult to find, and exist even after rebooting the system. Blue pill: Virtualization is used to attack the host, whereby the normal boot process happens within a

virtualized environment that the user is unaware of, while the boot process is infected so that the root kit is able to boot first.

Vitriol: also known as VT-x Hardware Virtual Machine root kit. When this root kit is installed it migrates a running virtual machine to another virtual machine while it runs within the CPU.

The compromising of the hypervisor is one of the highest vulnerablities and threats. Various steps to verify that security is well implemented as follows: Secure the hardware Secure the host operating system Secure the hypervisor Secure the management interfaces Secure the virtual machine

The potential security solutions to detecting and patching the root kits are presented below: Firmware root kits: comparing the firmware checksums. Blue pill: By looking at resource consumption of the translation look aside buffer (TLB). Vitriol: This version sits within the hardware and is difficult to detect.

A security assessment needs to be run to identify the security risks and to be able to fix the security gaps in order secure any management appliance.

Apply the relevant hardening guidelines to secure the operating system.

For securing the hypervisor, we have to secure the following resources: Access to CPU Memory Assignment Access to Network Access to Disk Application Programming Interfaces into the Hypervisor

Scheduler
Virtual mc 1 Virtual mc 2 Virtual mc 3 Virtual mc 4

Physical cpu1

Physical cpu 2

Physical cpu 3

Physical cpu 4

The memory taken from one virtual machine is zeroed out before handing it over to another virtual machine, meaning that there is no security risk.

Through the use of the kernels memory management, it is not possible for one virtual machine to see another virtual machines memory.

The copies of memory can be accessed by the super user of the virtualisation host. To mitigate security risk, not allow anyone to log in directly as super user. Use of built-in auditing,to ensure files are not directly acessed from the system.

CBPS enables virtual machines to share the same memory pages between themselves. Hash algorithms are no longer safe,however the CBPS is due to its bit-by-bit Comparison. CBPS can also be Disabled,but there is no security reason to do so.

Most network devices dont have any built-in firewalls, but the protection is available through the virtual switch. It is possible to add firewalls into virtual switches, but currently a virtual switch will provide protection from the following types of attacks: MAC flooding, multicast brute force attacks etc.

Ensure that backup tools create files with the proper permissions. The zeroed thick disk and the eager zeroed thick disk options are the ones which should be the primarily used disk formats, as they are the most secure.

The concept of virtual appliances and APIs create more attack points into the kernel. Use of digitally signed virtual appliances by the appropriate certificate authority (CA) can help. Special networking configurations need to take place to further protect the kernel during runtime.

The management interface consists of the management of the entire virtual infrastructure, a specific host, or the virtual machines. Virtual Infrastructure Management Virtual Machine Management

Instead of creating user roles and permissions, groups should be created. A single administrator group should be created. Direct access to the management appliance should be denied where all other groups are concerned. Default protections for the super accounts should be preserved to guarantee auditing capability.

A set of tools and drivers can be installed so that VM knows little more about its environment. Use of isolation tools: to limit information leakage to protect the innocent to compliant with standards and guidelines.

Hardening and security guidelines expressed by each guest operating system should be applied independently of the virtual infrastructure. The virtual machine hardening should include steps so that the remote console has limited exposure and is only used on a need-to basis. Hardening guidelines for guest operating systems should include steps to protect the remote console as well as any additional files added to the system.

THANK YOU !!

Potrebbero piacerti anche