securing and leveraging the power of virtual servers and

Download Report

Transcript securing and leveraging the power of virtual servers and

SECURING AND
LEVERAGING THE POWER OF
VIRTUAL SERVERS AND
DESKTOPS
Conrado Wang Cheng Niemeyer <chengw (at) sacredheart.edu>
Information Security Officer, Sacred Heart University
Virtualization Advantages







Virtualization?
“Cheap”, fast, easy to setup Application isolation
Template Deployment
Disaster Recovery
High Availability
Forensic Analysis w/P2V & in place with memory
snapshots
Honeypotting
Virtualization Disadvantages

Using a template image
 One
vulnerability is shared by all
 Same admin/root passwords??!!


Possibly sequential IP range
Single file Servers & Workstations
 Just



copy one file and you’re done!
Poor multimedia support
Many eggs in fewer baskets
Virtual Machine Sprawl
Virtualization Vulnerabilities

Guest to Guest Attacks
Guest to Host Attacks
Guest Client Vulnerabilities
Management Console/Host OS Vulnerabilities
Hypervisor Vulnerabilities

Not well developed and widespread, YET…




VM Security Best Practices

Security Best Practices (Firewalls, IPS, Patching, Patching, Patching, Patching)


Secure the Network






Disable Hardware Acceleration
Use QEmu (full emulation mode w/out kqemu)
Disable all sharing features
Favor Type 2 for Development environments
Run different security zones VMs on separate physical hosts



VMWare ESX Server, Citrix XenServer, MS Hyper-V, etc.
Favor Type 2 use in Security applications


Use Separate Private backup and SAN network
Use Separate Private Management Console network
Favor Type 1 Hypervisors for Production and Testing Servers


Secure your VMs as you would physical machines
Use separate physical switches or VLANs in physical switches
Run different Management stations
Disable/remove unnecessary virtual hardware
Monitoring in a vSwitch
VMWare ESX Specific







VMWare Update (ESX 3.5 & VC 2.5)
Fix maximum size and rotation for Log Files
Use Resource Management
Secure the VI Console Access
Verify the ESX Console Firewall rules
Use SSL Certificates Encrypt Access to Virtual
Center
Secure Console’s Linux environment
Virtualization Applications

Setting up Development Environments
Setting up Testing Environments
Setting up Research Environments
Honeypotting
Consolidate Physical Servers

Virtual Secure Desktops…





Provide a desktop environment for users




Quickly deployed
Secured
Easily maintained
Provide access from those environments to all work tools, systems, and
services
Secure Desktop Advantages



Secured Access to Sensitive
Systems

Separation of Critical Business
data from User data
Quick and Easy Deployment







ERP (Datatel Colleague R17,
R18)



Stand a new VM(s) in under
2mins
Ease of Policy Enforcement
Can Provide local admin
elevation when necessary
Anywhere anytime access (or not)
Easy Integration into Identity
Management
Currently





Registrar’s
Human Resources
Business Office
Admissions (Recruitment Plus)
Financial Aid (PowerFAIDS,
EDConnect)
Institutional Advancement
(Raiser’s Edge)
Payroll (ADP)
Future Expansion



Document Imaging
Department Shares
MicroFAIDS (MS-DOS!!!!!)
Secure Desktop Disadvantages




Poor Multimedia Support
ACL/Firewall Rule
Maintenance
Vulnerable to Screen
Scrapping
Increased Disaster
Recovery Complexity





SSL Gateway
Connection Broker
Provisioning Server
ESX Servers
SAN & Blade Infrastructure

“Quality of Life” Issues




Cannot browse the web
Cannot persist software
changes
Cannot connect certain USB
devices
Coming Soon



Cannot access e-mail
Cannot copy & paste to
host
Cannot connect any USB
devices
Secure Desktop Backend at SHU
Hardware

HP c7000 Blade Enclosure



2 x Quad Core 2.3Ghz (Intel E5345)
16 GB RAM
4 x 1Gb Ethernet (on 2 separate
boards)



7TB (4TB Usable ??!!) for VMs
12TB for User/Department Data
iSCSI all the way baby!!!



1Gb Ethernet (Copper)
10Gb Uplink



SSL Gateway
RDP Connection Broker
Citrix Provisioning Server
Desktops v4.5 Sp1

Cisco Catalyst 3750 Switches

VMWare VI3 (ESX 3.5 and
Virtual Center 2.5)
Provision Networks Virtual Access
Suite 5.9

Netapp 3020c Filers



HP BL460c


Software
PXE Boot
HDD Streaming
Microsoft DHCP Server
Microsoft Windows XP Sp2
Connection Broker Architecture
SSL Gateway Architecture
HDD Streaming Architecture
Physical vs. Virtual Hardware
Physical

Dell OptiPlex 755
 Intel
Core2 2.4Ghz
 2GB RAM
 160GB HDD
 Integrated Graphics
 1Gb Ethernet
 ~$1,000
Virtual

VMWare ESX 3.5
Virtual Dual to Quad
Core 2.3Ghz
 256MB RAM
 1MB HDD
 RDP Graphics
 1Gb Ethernet
 ~$290 w/existing
hardware

Getting Buy-in






Initial deployment as test environments
Clarifying the difference between a purely work
environment and a hybrid work/personal one
No other alternatives with new versions
Ease of use and virtually no training required
Unreliability of VPN and Citrix
Ability to access legacy environments with new
simultaneously
Demo

https://securedesk.sacredheart.edu/
New Developments

Embedded Hypervisors
 ESX



3i, XenServer OEM, etc.
VMSafe
VDI
SAN Snapshot Clones
 Netapp

FlexClone
Sophisticated Virtual Machine Detection
Resources, Q & A





http://www.cisecurity.org/
http://www.securityfocus.com/
http://www.vmware.com/resources/techresources/c
at/91
http://www.citrix.com/
http://www.provisionnetworks.com/