41
VMware Expanded Advanced concepts in virtualization STEVEN AIELLO: BACHELORS OF SCIENCE, CISSP, VCP, & SOME OTHER CERTS NO ONE CARES ABOUT.

VMware Technical Overview (2012)

Embed Size (px)

Citation preview

Page 1: VMware Technical Overview (2012)

VMware

Expanded Advanced

concepts in virtualization

STEVEN AIELLO: BACHELORS OF SCIENCE, CISSP, VCP, & SOME OTHER CERTS NO ONE CARES ABOUT.

Page 2: VMware Technical Overview (2012)

Sources & References CSA Guide v3.0

NIST Special Publication 800-145

Gartner Newsroom

CRN (News Network)

SANS Institute InfoSec Reading Room

Schneier on Security

Threat Analysis Group

Symantec

Securing the Virtual Environment (Published May 8th 2012)

Itnews.com

Snipe.net

Page 3: VMware Technical Overview (2012)

~Francois Marie Arouet Voltaire

“Judge a man by his

questions rather than

his answers."

Page 4: VMware Technical Overview (2012)

A Bit About Me 2002 – 2004: Focus1Data

Healthcare Billing, Financial Data, HIPAA

2004 – 2012 (March): ADPWorlds Largest Payroll company (73% of the worlds pay-roll) Every compliance you can imagine…

2012 – Current: OnlineTechPCI, HIPAA, SOC 2, Operationalizing Compliance. “Virtualization Engineering & Systems Support Manager” . Soon to have dev. something in there since I started coding for VMware…

Undergrad EMU in Technology Management

Graduate Student at EMU: Masters of Science concentration in Information Assurance

Page 5: VMware Technical Overview (2012)

Why Do I Like Virtualization?

It invites chaos

It breaks down walls

It changes the way good engineers will design

their networks

It gives me power

It causes fights (I’m being serious)

It will make your life better

Page 6: VMware Technical Overview (2012)

Why are we here?

We are a security organization

How does VMware play into security?

What other options are there for virtualization

besides VMware?

Does VMware introduce new security holes

into our environment?

Page 7: VMware Technical Overview (2012)

Are We Doing Something New?

“Virtualization was first implemented more

than 30 years ago by IBM as a way to

logically partition mainframe computers into

separate virtual machines. These partitions

allowed mainframes to multitask”

Page 8: VMware Technical Overview (2012)

Why Do We Virtualize?

Run multiple operating systems on a single

computer

Reduce Capital Cost

Energy efficiency

High application availability

Business continuity & disaster recovery

Page 9: VMware Technical Overview (2012)

What is a VM? Why would you

want to use them?

Compatibility

Isolation

Encapsulation

Hardware

independence

Infrastructure building

blocks

Page 10: VMware Technical Overview (2012)

Benefits of virtualization Besides

VMs?

If done right, virtualization will change the way you think

Virtualization will change the way you design physical infrastructure

It will make your infrastructure faster (I’m not kidding)

It will give you more control

Virtualization can drive operational efficiency

Page 11: VMware Technical Overview (2012)

What Options Do I Have?

It turns out a lot!

VMware

Citrix XenServer

Xen (Open source)

Microsoft Hyper-V

Oracle VM

Parallels (used by Media Temple)

Redhat Enterprise Virtualization

Page 12: VMware Technical Overview (2012)

Hypervisor Comparison Table

Page 13: VMware Technical Overview (2012)

XenServer You get a lot for free!

Hypervisor

Management Suit

Snapshot & Revert

Live Migration (aka vMotion)

1000$ per server

dVS’s

Resource Pools

HA

Page 14: VMware Technical Overview (2012)

Short comings of XenServer?

Backup options (Limited)

AV at the hypervisor not available

Third party hardware integration

(more on this later)

It’s playing catch up…

Page 15: VMware Technical Overview (2012)

Why Use VMware? I Don’t Expect You To Be Able To Read This

It’s secure, really secure, maybe the 2nd most secure piece of nonmilitary code on the market

Common Criteria rating EAL 4+

Broad 3rd party hardware integration, EMC, NetApp, Equallogic SAN integration

Automatic host and storage load balancing (DRS)

Automatic VM failover in event of a hardware failure

Fault Tolerance for non-cluster aware apps.

Great service (once you get someone on the phone)

Memory over commitment

Thin provisioning

Independent disks

VMware vApps

Pluggable Storage Architecture

VMware SDK

VMware VIX (now in the SDK in ESXi 5.0)

Storage I/O control

Page 16: VMware Technical Overview (2012)

How Do I Choose

Know your environment

Are you going to use the features in VMware

you’re going to pay a lot of money for?

Are you multi-tenant?

Is your current hardware on the VMware HCL?

Does your storage infrastructure integrate with

VMware’s PSA?

Do you plan on using the SDK?

Page 17: VMware Technical Overview (2012)

Finding Common Ground

What is our definition

of security?

Page 18: VMware Technical Overview (2012)

CIA Triad!

Page 19: VMware Technical Overview (2012)

Risk Reaction Options

Mitigate RiskReduce your attack surface

Avoid the RiskDon’t do it

Transfer the RiskInsurance

Accept the RiskCost outweighs advantages

Page 20: VMware Technical Overview (2012)

More Common Ground

Assumption: We are

using VMware for

some sort of IaaS

Page 21: VMware Technical Overview (2012)

Tri-Force of Security

Confidentiality: (Founded predictions)Keep your information private

Integrity: (Unfounded predictions)Your data is what it should be

Availability: Your data is there when you need it

Page 22: VMware Technical Overview (2012)

Potential Targets

Hypervisors

Orchestration Tools

Administrative Machines

API Endpoints (very important)

Virtual Machines

Applications

Page 23: VMware Technical Overview (2012)

What’s Juicy?

Statistics from 2010 for VMware

EAL 4+

99 Vulnerabilities

7 in VMware’s

3 in the Bare-metal hypervisor

1 exploit in the current version

0 exploited in the wild

Page 24: VMware Technical Overview (2012)

What’s Juicy?

zLinux Mainframe

EAL 5

There has never been a reported incident of a

zLinux Mainframe being hacked or infected by

a virus… ever…http://www.longpelaexpertise.com.au/ezine/zosvUnix.php

Page 25: VMware Technical Overview (2012)

Availability Attacks

Attack underlying network infrastructure

Failure to control disk I/O in a shared

environment

Concurrent provisioning operations

Lack of memory & CPU resource controls

Page 26: VMware Technical Overview (2012)

Where VMware Shines

Availability!

Page 27: VMware Technical Overview (2012)

How Does VMware Help? What VMware Offers to Increase Uptime

vMotion

Storage vMotion

Distributed Resource Scheduling

High Availability

Fault Tolerance

Site Recovery Manager (or Veeam)

Reduced network latency

Virtual Distributed Switching

Page 28: VMware Technical Overview (2012)

What are vDSs?

Page 29: VMware Technical Overview (2012)

How Does VMware Hurt?

DoS Attacks are Very Possible

Failure to control disk I/O in a shared

environment

Concurrent provisioning operations

Lack of memory & CPU resource controls

How do you secure these things when

exposing them to clients?

Page 30: VMware Technical Overview (2012)

Availability Protections

Mitigation Tactics

VMware SIOC via VMware’s PSA

Set reservations and limits around multi-

tenant solutions

Limit API operations in the environment

Page 31: VMware Technical Overview (2012)

What if David Copperfield Happens?

Page 32: VMware Technical Overview (2012)

Setting Limits

VM Limits

Memory Limits

CPU Limits

VMware SIOC via

VMware’s PSA

Page 33: VMware Technical Overview (2012)

Confidentiality

How do you

design?

Limit Ingress &

Egress options

Firewalling at the

hypervisor level.

VMware 5.1

Page 34: VMware Technical Overview (2012)

Confidentiality Protections

Buy a stinking SSL

certificate!

Do not use or write

systems that return

sensitive data!

Make sure you write

scheduling into your

operations code

I HATE THIS!

Page 35: VMware Technical Overview (2012)

Encryption & its Limitations

Full disk encryption in virtual

environments

Hardware based disk arrays (FIPS 140-2)Federal Information Processing Standard

Conflicts with VSS (for Windows)

Alternatives: use in application encryption

Alternatives: use in database encryption

Full VMDK encryption in VMware 6.x

Page 36: VMware Technical Overview (2012)

Integrity Protections, a Beacon of

Light?

TrendMicro bought OSSec

TrendMicro has been a leader in the

Hypervisor AV space for a few years

OSSec ala-hypervisor via VMware VIX?

Page 37: VMware Technical Overview (2012)

VMware SDK & VIX

ESXi 4.1 vs ESXi 5.x

Page 38: VMware Technical Overview (2012)

VMware SDK & VIX

Insert brain here…

Page 39: VMware Technical Overview (2012)

VMware SDK & VIX

Data Center Automation

Page 40: VMware Technical Overview (2012)

VMware SDK & VIX

Poorly documented

SDK mostly for C# & Java

VIX is pretty new to ESXi

VIX is horribly documented

VIX is mainly C++ libraries, C# & Java ports