SlideShare a Scribd company logo
1 of 8
Avoiding Security Mistakes In Virtualized Environments Ahmed Sallam Senior Technologist, Software Architecture & Strategy Chief Software Architect © 2009 The SANS™ Institute - www.sans.org
How to Avoid ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© 2009 The SANS™ Institute - www.sans.org
Scanning of offline Virtual Images Running VMs Offline Images Scans VMs stored locally Scans VMs stored centrally
Securing underneath the OS VMSafe example ,[object Object],[object Object]
Security underneath the OS The evolution ,[object Object]
Enterprise Virtual Firewall / NIPS © 2009 The SANS™ Institute - www.sans.org
In Summary ,[object Object],[object Object],[object Object],© 2009 The SANS™ Institute - www.sans.org
Thank You © 2009 The SANS™ Institute - www.sans.org

More Related Content

What's hot

Celebrity bodyguards
Celebrity bodyguardsCelebrity bodyguards
Celebrity bodyguards
stanvankush
 
Ict - Computer Security
Ict - Computer SecurityIct - Computer Security
Ict - Computer Security
aleeya91
 

What's hot (11)

10 critical elements of next generation of endpoint layered security
10 critical elements of next generation of endpoint layered security10 critical elements of next generation of endpoint layered security
10 critical elements of next generation of endpoint layered security
 
The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14
 
CCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionCCNA Security 03- network foundation protection
CCNA Security 03- network foundation protection
 
Zimperium - Technology Briefing
Zimperium - Technology BriefingZimperium - Technology Briefing
Zimperium - Technology Briefing
 
Celebrity bodyguards
Celebrity bodyguardsCelebrity bodyguards
Celebrity bodyguards
 
Ict - Computer Security
Ict - Computer SecurityIct - Computer Security
Ict - Computer Security
 
Cybersecurity - Needs and Barriers of SMEs
Cybersecurity - Needs and Barriers of SMEsCybersecurity - Needs and Barriers of SMEs
Cybersecurity - Needs and Barriers of SMEs
 
Acronis Active Protection: A Way To Combat Ransomware Attack
Acronis Active Protection: A Way To Combat Ransomware AttackAcronis Active Protection: A Way To Combat Ransomware Attack
Acronis Active Protection: A Way To Combat Ransomware Attack
 
Campus Safety
Campus SafetyCampus Safety
Campus Safety
 
Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...
Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...
Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
 

Viewers also liked

Taking it to the next level major gifts
Taking it to the next level   major giftsTaking it to the next level   major gifts
Taking it to the next level major gifts
Rotary International
 
UCF Business Incubator Workshop Russ Pandel
UCF Business Incubator Workshop Russ PandelUCF Business Incubator Workshop Russ Pandel
UCF Business Incubator Workshop Russ Pandel
Russ Pandel
 
Separating the meat from the chaff
Separating the meat from the chaffSeparating the meat from the chaff
Separating the meat from the chaff
Kacie Trimble
 
The structure and function of the brain
The structure and function of the brainThe structure and function of the brain
The structure and function of the brain
Crystal Delosa
 

Viewers also liked (9)

Hosted desktops and server evolution technologies - 2014 Edition
Hosted desktops and server evolution technologies - 2014 EditionHosted desktops and server evolution technologies - 2014 Edition
Hosted desktops and server evolution technologies - 2014 Edition
 
The Experience of Information
The Experience of InformationThe Experience of Information
The Experience of Information
 
Using Your Powers for Good - As A Career
Using Your Powers for Good - As A CareerUsing Your Powers for Good - As A Career
Using Your Powers for Good - As A Career
 
Taking it to the next level major gifts
Taking it to the next level   major giftsTaking it to the next level   major gifts
Taking it to the next level major gifts
 
General brain function: Action – Outcome Evaluation
General brain function: Action – Outcome EvaluationGeneral brain function: Action – Outcome Evaluation
General brain function: Action – Outcome Evaluation
 
Promoted Products
Promoted ProductsPromoted Products
Promoted Products
 
UCF Business Incubator Workshop Russ Pandel
UCF Business Incubator Workshop Russ PandelUCF Business Incubator Workshop Russ Pandel
UCF Business Incubator Workshop Russ Pandel
 
Separating the meat from the chaff
Separating the meat from the chaffSeparating the meat from the chaff
Separating the meat from the chaff
 
The structure and function of the brain
The structure and function of the brainThe structure and function of the brain
The structure and function of the brain
 

Similar to Sans Mc Afee Pandel Slides

Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
TheInevitableCloud
 
Chaos engineering for cloud native security
Chaos engineering for cloud native securityChaos engineering for cloud native security
Chaos engineering for cloud native security
Kennedy
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
Mangesh Gunjal
 

Similar to Sans Mc Afee Pandel Slides (20)

Webinar on Common Mistakes and Learnings in Securing Cloud Based Applications
Webinar on Common Mistakes and Learnings in Securing Cloud Based ApplicationsWebinar on Common Mistakes and Learnings in Securing Cloud Based Applications
Webinar on Common Mistakes and Learnings in Securing Cloud Based Applications
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS SummitCarry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
 
Virtualization security
Virtualization securityVirtualization security
Virtualization security
 
Virtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the CloudVirtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the Cloud
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
 
Chaos engineering for cloud native security
Chaos engineering for cloud native securityChaos engineering for cloud native security
Chaos engineering for cloud native security
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
 
Brochure network security-en
Brochure network security-enBrochure network security-en
Brochure network security-en
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6
Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6
Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6
 
Virutalization and the Future of Datacenter Security
Virutalization and the Future of Datacenter SecurityVirutalization and the Future of Datacenter Security
Virutalization and the Future of Datacenter Security
 
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
 
Cloud security
Cloud securityCloud security
Cloud security
 
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
 
The World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the RescueThe World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the Rescue
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 

More from Ahmed Sallam

Hosted Desktop and Evolution of Hardware Server Technologies-2015 Edition
Hosted Desktop and Evolution of Hardware Server Technologies-2015 EditionHosted Desktop and Evolution of Hardware Server Technologies-2015 Edition
Hosted Desktop and Evolution of Hardware Server Technologies-2015 Edition
Ahmed Sallam
 
An Analysis And Solution For The Problem Of Hidden Orphan Processes On Window...
An Analysis And Solution For The Problem Of Hidden Orphan Processes On Window...An Analysis And Solution For The Problem Of Hidden Orphan Processes On Window...
An Analysis And Solution For The Problem Of Hidden Orphan Processes On Window...
Ahmed Sallam
 
VMWorld 2009 Presentation
VMWorld 2009 PresentationVMWorld 2009 Presentation
VMWorld 2009 Presentation
Ahmed Sallam
 

More from Ahmed Sallam (9)

RSA SF Conference talk-2009-ht2-401 sallam
RSA SF Conference talk-2009-ht2-401 sallamRSA SF Conference talk-2009-ht2-401 sallam
RSA SF Conference talk-2009-ht2-401 sallam
 
Intel vmcs-shadowing-paper
Intel vmcs-shadowing-paperIntel vmcs-shadowing-paper
Intel vmcs-shadowing-paper
 
Hosted Desktop and Evolution of Hardware Server Technologies-2015 Edition
Hosted Desktop and Evolution of Hardware Server Technologies-2015 EditionHosted Desktop and Evolution of Hardware Server Technologies-2015 Edition
Hosted Desktop and Evolution of Hardware Server Technologies-2015 Edition
 
Hosted desktop and evolution of hardware server technologies - 2015 edition
Hosted desktop and evolution of hardware server technologies - 2015 editionHosted desktop and evolution of hardware server technologies - 2015 edition
Hosted desktop and evolution of hardware server technologies - 2015 edition
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtity
 
Ahmed sallam technical_journey_1992_1999
Ahmed sallam technical_journey_1992_1999Ahmed sallam technical_journey_1992_1999
Ahmed sallam technical_journey_1992_1999
 
Arm tech con 2014 slides - sallam-public
Arm tech con 2014   slides - sallam-publicArm tech con 2014   slides - sallam-public
Arm tech con 2014 slides - sallam-public
 
An Analysis And Solution For The Problem Of Hidden Orphan Processes On Window...
An Analysis And Solution For The Problem Of Hidden Orphan Processes On Window...An Analysis And Solution For The Problem Of Hidden Orphan Processes On Window...
An Analysis And Solution For The Problem Of Hidden Orphan Processes On Window...
 
VMWorld 2009 Presentation
VMWorld 2009 PresentationVMWorld 2009 Presentation
VMWorld 2009 Presentation
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Sans Mc Afee Pandel Slides

  • 1. Avoiding Security Mistakes In Virtualized Environments Ahmed Sallam Senior Technologist, Software Architecture & Strategy Chief Software Architect © 2009 The SANS™ Institute - www.sans.org
  • 2.
  • 3. Scanning of offline Virtual Images Running VMs Offline Images Scans VMs stored locally Scans VMs stored centrally
  • 4.
  • 5.
  • 6. Enterprise Virtual Firewall / NIPS © 2009 The SANS™ Institute - www.sans.org
  • 7.
  • 8. Thank You © 2009 The SANS™ Institute - www.sans.org

Editor's Notes

  1. Holistic Approach Don’t take a hit and miss approach to Virtualization Security. Consider Vendor Partners that bring solutions to the table vs. point products to help you tame these complex environments vs. you having to manage the diverse technology. Baked In Implement Security Best Practices when designing your environment, like. A Secure Design Approach Separate and Isolate Management Networks Plan for VM mobility Partition trust zones Combine trust zones using virtual network segmentation and virtual network management best practices Combine trust zones using portable VM protection there are 3 rd -party tools that can help with this A Secure Deployment approach Harden VMware Infrastructure according to their guidelines There are other 3 rd -party: STIG, CIS, Xtravirt Security Risk Assessment template, etc. Always secure virtual machines like you would physical servers Anti-virus, Patching, Host-based intrusion detection/prevention and Use Templates and Cloning to enforce conformity of virtual machines Hidden Costs Planning for training of personnel should be taken into consideration, also software security products (agents or appliances) if needed as a result of your up front design work. Don’t forget to work with your vendor over pricing models for software if they will need to be changed.
  2. Top Market Challenges Virtual machine (VM) sprawl: Enterprise applications are easier to provision and deploy in virtual environments when compared to physical servers. In many cases, it takes as little as 15 minutes to bring up an application (Source: Gartner). Ease of deployment leads to VMs even for small workloads, further exacerbating the sprawl. Proliferation of VM creates a periodic need for virtualized applications to be brought offline for patching, configuration, testing and backup. Archived VMs stay offline for extended periods of time, some for as long as 7years to meet regulatory requirements (e.g. Financial apps/transactions have to be saved for 7years) Operating systems and applications within an archived VM remain un-patched while Microsoft continues to introduce new security patches monthly. Same applies to other application vendors. Offline VMs pose a serious risk upon activation since their security profile is out-of-date. VirusScan Enterprise for Offline Virtual Images is the solution. Integrated support for offline VMs Ensures security on offline VMs is up-to-date Identify malware Remove malware Automate security updates Manageable by ePO our global management console VSE for OVI - Flexible Deployment Scenarios Scans VMs stored locally Scans VMs stored centrally
  3. Traditional Solution Pros Maximum utilization of ESX/Hardware platform No security restrictions on data paths within ESX, “policies applied in the network”   Cons Vulnerability in virtualization layer can break separation All traffic between VMs is passed over the network Firewall is blind to VM internal network, only sees traffic sent to it, potential for inter-VM traffic that is uninspected Virtual switch/network based separation of server traffic Cost savings limited to server consolidation, firewall may be under-utilized or over-utilized McAfee Virtual F/W It’s really a firewall for the “virtual world”, it can assist with Correcting security oversights in your virtualization efforts by: Enabling inter-VM access control policies Delivering IPS inspection of traffic within the virtual network Delivering fully integrated McAfee Anti-virus, SSL decryption, and McAfee SmartFilter URL filtering utilizing our Trusted Source Technology It can Improve audit capabilities, facilitate separation and control, so it really is a full function device for the virtual environment.
  4. Tighter integration of security capabilities initiatives like VMSafe will Protect the VM by inspection of virtual components (CPU, Memory, Network and Storage). Providing complete integration and awareness of VMotion, Storage VMotion, HA, etc. This in turn will provide an unprecedented level of security for the application and the data inside the VM. Security virtualization challenge really has to do with people and processes Adapting processes that are used in securing physical assets, for configuration management, patch management, or change management generally, are evermore important in this new environment. Education on unique virtualization security issues and capabilities. We have to ensure that not only security, but audit, operations, and others are educated on these topics, so they can properly interface with the security group when they will.