SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Virtual security is no less real


Virtualisation may not be an entirely new technology, but the current financial meltdown has re-emphasised
its ability to reduce IT costs and maximise existing investments. Organisations are tightening their belts, but
this doesn't mean that business demands on technology come to a standstill. In fact, the pressure for
technology        to     do      less      with      more        only      increases     during      difficult     times.


Virtual environments can lower the total cost of IT with the use of smaller data centres that result in less energy
consumption and hardware waste. As such, analysts predict virtualisation to increase significantly in 2009. Yet many
organisations fail to realise that without proper management and monitoring, they can easily find themselves in a
position where critical applications perform poorly and affect business productivity. Cost efficiency shouldn't come at
the expense of IT services' availability and performance.


In 2008, NetIQ surveyed 1000 enterprises worldwide on the topic of virtualisation, and was shocked to find that while
three quarters of respondents were deploying virtual infrastructures, almost 80 per cent of these organisations had
not considered any formal means of management. In the excitement of deploying a new technology, you'd be
amazed how many IT professionals forget the importance of trivial matters like security management.


Besides the tangible discrepancies, there are few differences between virtual and physical servers, meaning that
virtual environments still have an abundance of security and compliance requirements. There's no doubt that
virtualisation is a cost-efficient technology, but it does entail a renewed approach to security. Here are four factors to
consider for your virtual environment:


1. What's good for the goose....


It might sound obvious, but treat your virtual environments as you would physical infrastructures. Configuration and
patch management are crucial, but remember virtual machines are often hidden from security architects, which
leaves            systems               more            vulnerable               than        physical            servers.


While planning your migration, conduct a security audit on the servers to be virtualised. Server configuration is often
modified during migration, so it's vitally important that you have a pre-migration baseline to compare with after
virtualisation. Also, don't neglect to perform regular audits after migration.


All the policies and procedures that keep your physical environment secure still apply to virtual servers. Once
migrated, start by implementing existing policies and then call on your security and audit teams to develop those
specific to the virtual environment.
2. Don't mix network traffic


Hypervisors can host up to 30+ virtual servers. Traffic can easily flow between servers without leaving the host,
through firewalls from one subnet or VLAN to another, completely unseen by analysis or monitoring tools. It's critical
to isolate network traffic in a virtual world. Don't mix varying traffic types such as application and virtual management
traffic that increase the risk of 'man-in-the-middle' attacks. It's best to physically isolate traffic types on separate
network interface cards (NICs), switches and VLANS, or by using a hybrid of VLANS and NICs.


3. Stay in control


Naturally, you don't give all of your IT staff access to Active Directory objects in your physical server infrastructure, so
don't lose control of access to your virtual servers either. Use Access Control Lists (ACLs) and be meticulous about
assigning roles and permissions among staff so that no one can accidentally - or intentionally - compromise security
and performance. Likewise, if something does go wrong, ACLs will make it easier to identify those responsible. Work
closely   with   security   teams,    and    systems     and    data    owners    to    define   access    to   resources.


4. Don't skimp on the training!


Education and awareness relates to every element of managing virtual environments. Send your staff to certification
classes, research the technology via webinars, and take advantage of vendor training. Don't rely on 'on-the-job'
training when it comes to the security of your infrastructure and assets. Investing a little time to understand the
technology will make it infinitely easier to manage and keep secure.


There are dramatic cost benefits to virtualisation, but they're easily negated by poor security practices that result in
breaches and downtime. The only way for IT departments to meet critical SLAs is to arm themselves with the
procedures they need to proactively manage the security of hybrid data centres. Virtualisation is still a relatively new
concept, and the safest way to adopt new technologies is to start with a solid security foundation. Planning ahead is
always better than learning from costly mistakes.




Rick Logan is the Senior Technical Specialist, Security & Compliance - Asia Pacific, for NetIQ.

Contenu connexe

Tendances

ONI Assure Insight Brochure fv
ONI Assure Insight Brochure fvONI Assure Insight Brochure fv
ONI Assure Insight Brochure fv
Carl Pollard
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
Sridhar Karnam
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!
centralohioissa
 

Tendances (20)

Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
 
Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
5 benefits that ai gives to cloud security venkat k - medium
5 benefits that ai gives to cloud security   venkat k - medium5 benefits that ai gives to cloud security   venkat k - medium
5 benefits that ai gives to cloud security venkat k - medium
 
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
CyberObserver
CyberObserverCyberObserver
CyberObserver
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
ONI Assure Insight Brochure fv
ONI Assure Insight Brochure fvONI Assure Insight Brochure fv
ONI Assure Insight Brochure fv
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data Infographic
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...
 
End Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoEnd Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and Cisco
 
Brochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric EncryptionBrochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric Encryption
 
SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013
 

En vedette

Investment Charity Flyer
Investment Charity FlyerInvestment Charity Flyer
Investment Charity Flyer
guestb00f48
 
merck 2005 Guidance Release
merck 	2005 Guidance Release merck 	2005 Guidance Release
merck 2005 Guidance Release
finance11
 
Outlet Moto Madrid Y Cirmat
Outlet Moto Madrid Y CirmatOutlet Moto Madrid Y Cirmat
Outlet Moto Madrid Y Cirmat
guestfd845b
 
STL Form processing
STL Form processingSTL Form processing
STL Form processing
guesta9112a0
 
merck 4Q08 Earnings Announcemen
merck 4Q08 Earnings Announcemenmerck 4Q08 Earnings Announcemen
merck 4Q08 Earnings Announcemen
finance11
 
Ser Maestro 7
Ser Maestro 7Ser Maestro 7
Ser Maestro 7
darckelin
 
merck 2Q07 Other Financial Disclosures
merck  	2Q07 Other Financial Disclosuresmerck  	2Q07 Other Financial Disclosures
merck 2Q07 Other Financial Disclosures
finance11
 
Natural Selling Ebook[1]
Natural Selling Ebook[1]Natural Selling Ebook[1]
Natural Selling Ebook[1]
raylifestyle
 

En vedette (20)

Cultura De Colombia
Cultura De ColombiaCultura De Colombia
Cultura De Colombia
 
Investment Charity Flyer
Investment Charity FlyerInvestment Charity Flyer
Investment Charity Flyer
 
影音網站介紹
影音網站介紹影音網站介紹
影音網站介紹
 
merck 2005 Guidance Release
merck 	2005 Guidance Release merck 	2005 Guidance Release
merck 2005 Guidance Release
 
Red Hot Testing In A Green World
Red Hot Testing In A Green WorldRed Hot Testing In A Green World
Red Hot Testing In A Green World
 
Stats Cw Ns
Stats Cw NsStats Cw Ns
Stats Cw Ns
 
vvvvvv
vvvvvvvvvvvv
vvvvvv
 
Outlet Moto Madrid Y Cirmat
Outlet Moto Madrid Y CirmatOutlet Moto Madrid Y Cirmat
Outlet Moto Madrid Y Cirmat
 
Simple Past
Simple PastSimple Past
Simple Past
 
STL Form processing
STL Form processingSTL Form processing
STL Form processing
 
Persona design method / ペルソナ概論
Persona design method / ペルソナ概論Persona design method / ペルソナ概論
Persona design method / ペルソナ概論
 
merck 4Q08 Earnings Announcemen
merck 4Q08 Earnings Announcemenmerck 4Q08 Earnings Announcemen
merck 4Q08 Earnings Announcemen
 
Prezentare
PrezentarePrezentare
Prezentare
 
Ser Maestro 7
Ser Maestro 7Ser Maestro 7
Ser Maestro 7
 
Web 2
Web 2Web 2
Web 2
 
Podcasting
PodcastingPodcasting
Podcasting
 
Richard Namme Senior Consultant Us
Richard Namme Senior Consultant UsRichard Namme Senior Consultant Us
Richard Namme Senior Consultant Us
 
Bibliotek2.0
Bibliotek2.0Bibliotek2.0
Bibliotek2.0
 
merck 2Q07 Other Financial Disclosures
merck  	2Q07 Other Financial Disclosuresmerck  	2Q07 Other Financial Disclosures
merck 2Q07 Other Financial Disclosures
 
Natural Selling Ebook[1]
Natural Selling Ebook[1]Natural Selling Ebook[1]
Natural Selling Ebook[1]
 

Similaire à Virtual security is no less real

br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
Christopher Bennett
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
Yury Chemerkin
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
Brianna Johnson
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
Frederic Roy-Gobeil, CPA, CGA, M.Tax.
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
curwenmichaela
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 

Similaire à Virtual security is no less real (20)

br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 
Cyber security providers adopt strategic defences
Cyber security providers adopt strategic defences Cyber security providers adopt strategic defences
Cyber security providers adopt strategic defences
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
Virtualization Security Risks
Virtualization Security RisksVirtualization Security Risks
Virtualization Security Risks
 
Whitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdf
Whitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdfWhitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdf
Whitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdf
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Networking Expertise
Networking ExpertiseNetworking Expertise
Networking Expertise
 
Is it an internal affair
Is it an internal affairIs it an internal affair
Is it an internal affair
 
Three Ways To Secure Cloud Migration.pdf
Three Ways To Secure Cloud Migration.pdfThree Ways To Secure Cloud Migration.pdf
Three Ways To Secure Cloud Migration.pdf
 
Cloud Computing - Emerging Opportunities in the CA Profession
Cloud Computing - Emerging Opportunities in the CA ProfessionCloud Computing - Emerging Opportunities in the CA Profession
Cloud Computing - Emerging Opportunities in the CA Profession
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Cloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary TechnologyCloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary Technology
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
 
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfTop Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

Virtual security is no less real

  • 1. Virtual security is no less real Virtualisation may not be an entirely new technology, but the current financial meltdown has re-emphasised its ability to reduce IT costs and maximise existing investments. Organisations are tightening their belts, but this doesn't mean that business demands on technology come to a standstill. In fact, the pressure for technology to do less with more only increases during difficult times. Virtual environments can lower the total cost of IT with the use of smaller data centres that result in less energy consumption and hardware waste. As such, analysts predict virtualisation to increase significantly in 2009. Yet many organisations fail to realise that without proper management and monitoring, they can easily find themselves in a position where critical applications perform poorly and affect business productivity. Cost efficiency shouldn't come at the expense of IT services' availability and performance. In 2008, NetIQ surveyed 1000 enterprises worldwide on the topic of virtualisation, and was shocked to find that while three quarters of respondents were deploying virtual infrastructures, almost 80 per cent of these organisations had not considered any formal means of management. In the excitement of deploying a new technology, you'd be amazed how many IT professionals forget the importance of trivial matters like security management. Besides the tangible discrepancies, there are few differences between virtual and physical servers, meaning that virtual environments still have an abundance of security and compliance requirements. There's no doubt that virtualisation is a cost-efficient technology, but it does entail a renewed approach to security. Here are four factors to consider for your virtual environment: 1. What's good for the goose.... It might sound obvious, but treat your virtual environments as you would physical infrastructures. Configuration and patch management are crucial, but remember virtual machines are often hidden from security architects, which leaves systems more vulnerable than physical servers. While planning your migration, conduct a security audit on the servers to be virtualised. Server configuration is often modified during migration, so it's vitally important that you have a pre-migration baseline to compare with after virtualisation. Also, don't neglect to perform regular audits after migration. All the policies and procedures that keep your physical environment secure still apply to virtual servers. Once migrated, start by implementing existing policies and then call on your security and audit teams to develop those specific to the virtual environment.
  • 2. 2. Don't mix network traffic Hypervisors can host up to 30+ virtual servers. Traffic can easily flow between servers without leaving the host, through firewalls from one subnet or VLAN to another, completely unseen by analysis or monitoring tools. It's critical to isolate network traffic in a virtual world. Don't mix varying traffic types such as application and virtual management traffic that increase the risk of 'man-in-the-middle' attacks. It's best to physically isolate traffic types on separate network interface cards (NICs), switches and VLANS, or by using a hybrid of VLANS and NICs. 3. Stay in control Naturally, you don't give all of your IT staff access to Active Directory objects in your physical server infrastructure, so don't lose control of access to your virtual servers either. Use Access Control Lists (ACLs) and be meticulous about assigning roles and permissions among staff so that no one can accidentally - or intentionally - compromise security and performance. Likewise, if something does go wrong, ACLs will make it easier to identify those responsible. Work closely with security teams, and systems and data owners to define access to resources. 4. Don't skimp on the training! Education and awareness relates to every element of managing virtual environments. Send your staff to certification classes, research the technology via webinars, and take advantage of vendor training. Don't rely on 'on-the-job' training when it comes to the security of your infrastructure and assets. Investing a little time to understand the technology will make it infinitely easier to manage and keep secure. There are dramatic cost benefits to virtualisation, but they're easily negated by poor security practices that result in breaches and downtime. The only way for IT departments to meet critical SLAs is to arm themselves with the procedures they need to proactively manage the security of hybrid data centres. Virtualisation is still a relatively new concept, and the safest way to adopt new technologies is to start with a solid security foundation. Planning ahead is always better than learning from costly mistakes. Rick Logan is the Senior Technical Specialist, Security & Compliance - Asia Pacific, for NetIQ.