8
Avoiding Security Mistakes In Virtualized Environments Ahmed Sallam Senior Technologist, Software Architecture & Strategy Chief Software Architect © 2009 The SANS™ Institute - www.sans.org

Sans Mc Afee Pandel Slides

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Sans Mc Afee Pandel Slides

Avoiding Security Mistakes In Virtualized Environments

Ahmed SallamSenior Technologist, Software Architecture & StrategyChief Software Architect

© 2009 The SANS™ Institute - www.sans.org

Page 2: Sans Mc Afee Pandel Slides

How to Avoid

– Holistic approach to Virtualization Security• VM image files security• VMs traditional end point security• Securing the virtual network (NIPS, Firewall)• Mitigating vulnerable and out of patch VMs

– Security must be “Baked In” when designing Virtual Environments

• Security at the hypervisor level• Security underneath the operating system• VMSafe is a good example

© 2009 The SANS™ Institute - www.sans.org 2

Page 3: Sans Mc Afee Pandel Slides

Scanning of offline Virtual Images

Running VMs

Offline Images

Scans VMs stored locally Scans VMs stored centrally

Page 4: Sans Mc Afee Pandel Slides

Securing underneath the OSVMSafe example

• Be prepared for a notion of protecting VM• Monitor & control memory inside VMs

Page 5: Sans Mc Afee Pandel Slides

Security underneath the OSThe evolution

• Protection for all virtualized devices

Page 6: Sans Mc Afee Pandel Slides

Enterprise Virtual Firewall / NIPS

© 2009 The SANS™ Institute - www.sans.org 6

LAN 1 LAN 2

Web Servers Database Servers

vSwitch1

Physical NIC

vSwitch2

Physical Server

Other Networks

vNic 1 vNic2

Secure FirewallVirtual Appliance

All Traffic Entering/Leaving

the Virutal Environment goes

through the firewall as well

as Inter-LAN traffic

The “Virtual World”

VMWARE ESX

vSwitch0

LAN 1 LAN 2

Web Servers Database Servers

Vswitch

Physical NIC2

Vswitch

Physical Server

Physical NIC1

Network Firewall (Virtualized or Not Virtualized)

Other Networks

The “Virtual World”

VMWARE ESX

Physical Network Firewall inspects Inter-lan traffic as well

as inbound/outbound traffic

Page 7: Sans Mc Afee Pandel Slides

In Summary

– Tighter integration of security capabilities futures

– Security virtualization challenge has to do with people and processes

– Education on unique virtualization security issues and capabilities.

© 2009 The SANS™ Institute - www.sans.org 7

Page 8: Sans Mc Afee Pandel Slides

Thank You

© 2009 The SANS™ Institute - www.sans.org