SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
EAI Endorsed Transactions on
Risk Analysis and Mitigation in virtualized environment
02 -04 2015 | Volume 1 | Issue __ | e_
EAI Endorsed Transactions
On Risk Analysis and Mitigation in Virtualized Environments
Editorial
1
Risk Analysis and Mitigation in Virtualized Environments
Abstract
Virtualization technology is extensively used across almost all IT departments today as it allows you
to increase your network capacity without significantly increasing your capital investment. But with
the advent of virtualization, you might ask whether your current security investments are still valid.
Will proven strategies continue to work? If they do, are they just as effective? What about all the tools
you have invested in? Perhaps the best way to answer these questions is to consider the changes that
virtualization will bring and how it impacts the core of your information technology. The objective of
this paper is to outline a risk analysis and discuss about mitigation techniques in such virtualized
environments.
1.0 Introduction
Virtualization has made a dramatic impact in a
very short time on IT and networking and has
already delivered huge cost savings and return
on investment to enterprise data centers and
cloud service providers. Typically, the drivers
for machine virtualization, including
multitenancy, are better server utilization, data
center consolidation, and relative ease and speed
of provisioning. Cloud service providers can
achieve higher density, which translates into
better margins. Enterprises can use
virtualization to shrink capital expenditures on
server hardware as well as to increase
operational efficiency.
Server virtualization is the masking of server
resources, including the number and identity of
individual physical servers, processors, and
operating systems, from server users. The server
administrator uses a software application to
divide one physical server into multiple isolated
virtual environments. The virtual environments
are sometimes called virtual private servers, but
they are also known as guests, instances,
containers or emulations.
Virtualization brings significant value to
business managers and engineers attempting to
keep pace with business pressure for additional
servers. It enables maximum use of hardware
resources while introducing an increased
flexibility in how organizations design and
implement new solutions. However, it also
introduces new security concerns. Until
recently, organizations had to leverage security
controls not specifically designed to protect
virtual environments.
As enterprises embark on their virtualization
journeys, it is critical to review existing
processes and develop strategies to address
security risks across physical and virtual
environments in order to ensure compliance and
security visibility in the data center. In that view
the objective of this paper is stress on the
analysis and mitigation of common risks
observed in virtual environments.
In the next section we shall discuss the overview
of a virtualization technology, section 3 shall
discuss architecture of server virtualization and
then section 4 emphasizes in identifying the
risks in virtual environment, finally section 5
will discuss risk assessment and mitigation
techniques in the virtual environment.
Siddharth Coontoor
2
2.0 Overview of Virtualization
Technology
Server virtualization allows multiple operating
systems and applications to run concurrently on
a single hardware. The OSs run independent of
each other in isolated environments (the VMs).
A virtualization layer is required to run on the
computer’s OSs as an application or service to
create multiple VM environments. OSs and
applications running in a VM can access the
CPU, memory, and disk and network resources
that are similar to a physical computer.
Figure 1: Virtual Server
The virtual server divides physical resources
into virtual resources called virtual machines as
seen in Figure 1. In this way virtualization adds
a layer of abstraction between two layers in that
computer system. The layer of abstraction is a
software layer between the hardware and the
guest operating systems. The layer acts as a
resource manager to enable the sharing of
processing power and memory. This software is
called a virtual machine monitor (VMM) or
hypervisor. VMMs virtualise the hardware of a
physical machine and partition it into multiple,
logically separated VMs. The VMM monitors
everything that happens inside a VM, and it
enforces resource management policies on the
VM. Multiple operating systems (OSs) can
coexist on the same virtual machine in isolation
from one another and can operate
simultaneously on a single server.
Virtualization in a distributed environment is the
basis for grid computing and cloud computing
supplying a computing infrastructure as a utility,
on-demand service. Virtualization can be
categorised into three areas:
Storage virtualization — Virtualizes the
physical storage from multiple network storage
devices so that they appear to be a single storage
device. In general, ‘virtualization’ refers to
server virtualization.
Network virtualization — Combines
computing resources in a network by splitting
the available bandwidth into independent
channels that can be assigned to a particular
server or device in real time.
Server virtualization — Hides the physical
nature of server resources, including the number
and identity of individual servers, processors
and OSs from the software running on them.
The term workload is increasingly used to
describe the a vast array of virtualized
resources. For example, a virtual machine is a
type of workload. While VMs are the
predominant virtualization technology
implemented today, there are a number of other
workloads to consider, including application,
desktop, network, and storage virtualization
models.
3.0 Architecture of Server
Virtualization Technology and
Identification of critical assets
Server virtualization allows multiple operating
systems and applications to run concurrently on
a single hardware. The OSs run independent of
each other in isolated environments (the VMs).
A virtualization layer is required to run on the
computer’s OSs as an application or service to
create multiple VM environments. OSs and
applications running in a VM can access the
CPU, memory, and disk and network resources
that are similar to a physical computer.
Figure 2: Server Virtualization Architecture
Risk Analysis and Mitigation in Virtualized Environments
3
Figure 2 shows architecture of server
virtualization. As seen in the figure there are
four major components in the virtualization
technology, they are as follows:
 Physical hardware - Physical machine on
which the VM environments reside. The
number of VMs that can be supported on a
single physical machine depends on the
hardware configuration and specifications.
 Operating system Layer - Primary OS on
the physical machine. The virtualization
layer resides on this OS.
 Virtualization layer - Virtualization
software that co-ordinates with the host OSs
for requests from VMs regarding CPU time,
physical memory, disk read and write,
network input/output (I/O), etc. The
virtualization software is called hypervisor.
 Virtual machine - Independent and isolated
environment created by the virtualization
software. OSs can run VMs independent of
each other.
 Guest operating systems - The OSs
installed on VMs. These run on the host OS.
Virtualization technology allows multiple
VMs with heterogeneous guest OSs to run in
isolation, side by side on the same physical
machine. The VMs have their own virtual
hardware (e.g., CPU, RAM, disks, network
cards) on which the guest OSs and
applications are loaded. The guest OSs
perform consistently, irrespective of the
physical components.
The virtualization software mentioned earlier is
known as the hypervisor. The hypervisor plays
an important role in virtualization technology.
Figure 3: View of Hypervisor
It intercepts the hardware resource requests
from the virtual machines that reside on it and
translates the requests to a format that can be
understood by the physical hardware. Similarly,
the requests from the physical hardware are
translated by the hypervisor so that the virtual
machines can understand. This way the
hypervisor decouples the VMs from the physical
hosts by introducing a layer of abstraction
between the VMs and the physical hardware
layer.
Based on the architecture of the virtualized
server and the services it would provide, it
would be essential to identify critical assets
whose working is important to the business.
Similar to traditional risk assessment
approaches, the first step is to identify the assets
that are important to business. Nest step, would
be to identify the risks associated with these
assets and their associated vulnerabilities.
The critical assets in a virtualized environment
are as follows:
 Physical server
 Host Operating System
 Hypervisor
 Hypervisor Management tools and API
 Virtual Machines
 Network
 Storage
4.0 Identifying Risk in Virtualized
Environments
While virtualization may provide a number
functional and operational benefits, moving to a
virtual environment doesn’t alleviate the risks
which existed on the physical systems, and may
also introduce new and unique risks. Therefore
as a part of risk assessment, it is important to
identify the virtualization server as an important
asset and take into consideration risks associated
with it. The following are the most common
risks associated with a virtualized servers
Siddharth Coontoor
4
identified by virtualization vendors and stake
holders.
Risk 1 - VM Sprawl
Uncontrolled proliferation of VMs can lead to
an unmanageable condition of unpatched and
unaccounted for machines.
Risk 2 - Sensitive Data within a VM
Data confidentiality within VMs can be easily
compromised, because data can be easily
transported and tampered with.
Risk 3 - Resource Exhaustion
Uncontrolled physical resource consumption by
virtual processes can lead to reduced
availability.
A risk factor unique to virtual environments is
the hypervisor. Hypervisor is the software
and/or firmware responsible for hosting and
managing VMs. It provides a single point of
access into the virtual environment and is also
potentially a single point of failure. A
misconfigured hypervisor can result in a single
point of compromise of the security of all its
hosted components. It does not matter how
individual VMs are hardened a compromised
hypervisor can override those controls and
provide a convenient single point of
unauthorized access to all the VMs. The
following security risks related to the use of
hypervisor should be considered by those
planning to use or currently using virtual
technologies:
Risk 4 - Hypervisor Security
Hypervisor security is the process of ensuring
that the hypervisor, the software that enables
virtualization, is secure throughout its life cycle,
including development, implementation,
provisioning, and management.
Risk 5 - Unauthorized Access to Hypervisor
Administrative access controls to the hypervisor
may not be adequate to protect against potential
hacker attacks.
Compared to traditional IT environments,
virtualization of IT systems inevitably leads to
changes in operational procedures. As a result,
some common defence in depth practices used
in securing physical servers may be affected or
ignored, while newly introduced features or
functions may expose the environment to
additional risks. The following security risks
related to changes in operation procedures
should be considered:
Risk 6 - Account or Service Hijacking
Through the Self-Service Portal
Portal vulnerabilities can lead to privilege
escalation attacks.
Risk 7 - Workloads of Different Trust Levels
Located on the Same Server
Ensure that there is sufficient security
segregation of workloads on a physical host.
Some enterprise infocom personnel may elect to
apply virtualization technologies through
outsourcing services from cloud service
providers. In such cases, it may be necessary to
consider additional risk factors, including the
following.
Risk 8 - Risk Due to Cloud Service Provider
APIs
A hybrid (private/public) cloud virtualization
implementation can pose security risks due to
account/authentication federation.
5.0 Risk Assessment and
Mitigation
Once risks have been identified as in the above
section, it is important that a risk table be
maintained for the risks related to the virtualized
server as shown in Appendix A1.
The risk table maintains details about the risk
like Risk name, description, relevant security
aspect(confidentiality, integrity, availability),
risk governance area, vulnerabilities that lead to
this risk, affected assets.
Risk Analysis and Mitigation in Virtualized Environments
5
The risk table helps enlist vulnerabilities
associated to that risk. Based on the risk the risk
table for each risk is as follows:
Risk name VM Sprawl
Relevant Security
Aspect
Confidentiality/Integrity/Av
ailability
Relevant Security
Governance Risk Area
Architectural and
configuration risk
Vulnerabilities
associated with the risk
 Proper policy and
control processes to
manage VM lifecycle
do not exist.
 Placement / zoning
policies or enforcement
of where a dormant VM
can instantiate or reside
do not exist.
 A discovery tool for
identification of
unauthorized VMs does
not exist.
Affected Assets VM
Risk name Sensitive Data Within a VM
Relevant Security
Aspect
Risk to confidentiality and
integrity
Relevant Security
Governance Risk Area
Configuration risk
Vulnerabilities
associated with the risk
 VM images and
snapshots are not
treated the same way
as the sensitive data
they contain. They
are not protected
from unauthorized
access, modification,
duplication, and
replacement
 Policies and procedures
to restrict storage of
VM images and
snapshots do not exist,
including:
Formal change
management processes
that govern image
creation, security,
distribution, storage,
use, retirement, and
destruction
Monitoring and control
of stored images and
snapshots, including
activities logging
Affected Assets VM & Storage
Risk name Resource Exhaustion
Relevant Security
Aspect
Risk to availability
Relevant Security
Governance Risk Area
Architectural and hypervisor
software risk
Vulnerabilities
associated with the risk
 Servers can be
burdened by
concurrent
execution of
resource-intensive
software such as
anti- virus software
on multiple VMs.
 Simultaneous
automated
operating system
patches on a group
of VMs can create
an enormous excess
strain on a common
storage resource.
Affected Assets VM
Risk name Hypervisor Security
Relevant Security
Aspect
Risk to confidentiality,
integrity, and availability
Relevant Security
Governance Risk Area
Architectural and hypervisor
software risk
Vulnerabilities
associated with the risk
 Hypervisor
configuration may
not be hardened to
reduce areas of
vulnerability, such
as unused services.
 Vendor-
recommended best
practices have not
been adopted.
 Unused physical
hardware devices
are connected, and
clipboard / file-
sharing services are
not disabled.
 Vendor security
bulletins / alerts are
not implemented
promptly.
 Hypervisor self-
integrity checks (or
the equivalent) are
Siddharth Coontoor
6
not conducted upon
boot-up.
 Ongoing
monitoring,
including analysis
of hypervisor logs,
does not occur.
 The attack surface
is further increased
through
uncontrolled use of
hypervisor
management APIs
by IT / DevOps
tools and scripts
and other
infrastructure
technologies.
Affected Assets Hypervisor
Risk name Unauthorized Access to
Hypervisor
Relevant Security
Aspect
Risk to confidentiality,
integrity, and availability
Relevant Security
Governance Risk Area
Architectural, hypervisor
software, and configuration
risk
Vulnerabilities
associated with the risk
 Access to the
virtualization layer
is not restricted as
with any sensitive
OS (i.e., using
console access
restricted by
firewalls).
 The hypervisor may
not support role-
based access
control of
administrative
responsibilities.
 Additional third-
party tools designed
to provide tight
administrative
control are not
deployed.
 Separate
authentication is not
used to restrict
access.
 Hypervisor
management APIs /
CLIs are not
adequately
protected.
 A separate
“management
LAN” is not
deployed to manage
access to
hypervisors.
 Remote
management of
hypervisors is not
disabled.
 Administrative
interfaces are
accidentally
exposed through
network
configuration errors
and lack of change
management
procedures.
Affected Assets Hypervisor, Management
tools and API
Risk name Account or Service
Hijacking Through the Self-
Service Portal
Relevant Security
Aspect
Risk to confidentiality,
integrity, and availability
confined to the designated
virtual environment
Relevant Security
Governance Risk Area
Architectural and hypervisor
software risk
Vulnerabilities
associated with the risk
 Strong authentication
control is lacking.
 Policy governing the
creation and use of self-
service portals does not
exist.
 Policy-based self-
service portal
management is not used.
 Unauthorized activity is
not proactively
monitored.
 Account management
(e.g., password reset
sent in clear text) is
“relaxed.”
Affected Assets Applications, VMs, and
virtualization platform
Risk Analysis and Mitigation in Virtualized Environments
7
Risk name Workloads of Different
Trust Levels Located on the
Same Server
Relevant Security
Aspect
Risk to confidentiality,
integrity, and availability
Relevant Security
Governance Risk Area
Architectural and
configuration risk
Vulnerabilities
associated with the risk
 VMs of different trust-
levels are hosted on or
migrated to the same
physical server (host).
 Physical or logical
software-defined
networks for VMs of
different trust levels are
not segregated.
 Physical and virtual
firewalls are not
deployed to isolate
groups of VMs from
other hosted groups, for
example, production
from development
systems or development
from other cloud-
resident systems.
 Virtual desktop
workloads are not
isolated from rest of the
physical data center.
 Administrative
separation of duties may
not be implemented,
allowing unauthorized
changes or accidental
misconfiguration that
violates the logical
zoning.
Affected Assets VMs on physical server
Risk name Risk due to Cloud Service
Provider API
Relevant Security
Aspect
Risk to confidentiality,
integrity, and availability
Relevant Security
Governance Risk Area
Architectural and
configuration risk
Vulnerabilities
associated with the risk
 The cloud service
provider’s API set is not
secured.
 Data transmitted or
stored in the cloud is
not protected by
encryption.
 Strong authentication /
access control is not
implemented for
external systems.
 Identity and credential
federation, such as
Active Directory
services or another
LDAPv3 directory, is
not used. Traffic is not
transmitted via a private
/ out-of-band encrypted
channel that is separate
from normal internal
traffic.
 Security, compliance,
and governance controls
and monitoring are not
consistently enabled.
Affected Assets Security of Hybrid
Environment
The risk table helps enlist the vulnerabilities
associated with each risk scenario based upon
which the impact and likelihood can be derived
that would finally form a risk matrix.
As vulnerabilities are enlisted and risk
calculated for them, suitably mitigation
techniques for these vulnerabilities can be
derived which would help calculate the residual
risk.
The likelihood rating is provided in Appendix
A2, which provides the rating notation for
creating risk matrix. Similarly Appendix A3
provides impact rating for CIA compromise and
Appendix A4 provides risk matrix defining the
risk levels.
The risk evaluation is based on the likelihood of
a particular vulnerability being exploited and the
impact it would have on the business.
Siddharth Coontoor
8
Vulnerability Likelihood
(See
Appendix A2)
Impact Due
to
Confidentialit
y
Compromise
(See
Appendix A2)
Impact Due
to
Integrity
Compromis
e (See
Appendix
A2)
Impact Due
to
Availability
Compromis
e (See
Appendix
A2)
Evalu
ate
Risk
Level
(See
Appen
dix
A3)
Risk
Treatment
Control to be
implemented
Evaluate
Residual
Risk
Level
(See
Appendix
A3)
Type of Risk: 1 – VM Sprawl
Asset exposed to risk: VM
Lack of effective
control process to
manage VM lifecycle
Low Low Low Low 1 Put effective
policies,
guidelines, and
processes in place
to govern and
control VM
lifecycle
management,
including self-
service and
automated scripts /
DevOps tools.
Lack of placement / zoning
policies or enforcement
of where a dormant VM
can instantiate or reside
Low Low Low Low
1
Lack of discovery tool to
identify unauthorized VMs
Low Low Low Low 1
Type of Risk: 2 – Sensitive Data in VM
Asset exposed to risk: VM and Storage
VM images and snapshots
are not treated in the same
way as the sensitive data.
Medium High High Low 4 Encrypt data stored
on virtual and
cloud servers to
make it unreadable.
Develop policies to
restrict storage of
VM images and
snapshots.
1
Policies and processes are
not in place to control
storage of VM images and
snapshots.
Low High High Low 3 1
Type of Risk: 3 – Resource Exhaustion
Asset exposed to risk: VM
Servers are burdened by
concurrent execution of
resource-intensive software.
High Low Low High 5 Implement
operating
procedure that
detects VMs that
are throttled due
to resource
exhaustion and
puts a remedy in
place instantly.
2
Simultaneous OS automated
patching on a group of VMs
causes enormous access strain
on a common storage
resource.
Medium Low Low High
4 2
Type of Risk: 4 – Hypervisor Security
Asset exposed to risk: Hypervisor
Configuration of
hypervisor may not be
hardened to reduce areas
of vulnerabilities.
Medium Medium Low Medium
3 Harden the
hypervisor’s
configuration to
reduce areas of
vulnerability.
Put vendor-
provided best
practices in place
where applicable.
2
Vendor- recommended best
practices are not adopted.
Low Low Low Low 1
Unused physical hardware
devices are connected.
Clipboard / file-sharing
services are not disabled.
Low Low Low Low
1
Risk Analysis and Mitigation in Virtualized Environments
9
Vulnerability Likelihood
(See Appendix
A2)
Impact Due to
Confidentialit
y Compromise
(See Appendix
A2))
Impact Due
to
Integrity
Compromis
e (See
Appendix
A2)
Impact Due
to
Availabiliy
Compromis
e (See
Appendix
A2)
Evaluate
Risk
Level
(See
Appendix
A3)
Risk
Treatment
Control to
be
implemente
d
Evaluate
Residual
Risk
Level
(See
Appendix
A3)
Vendor security bulletins
/alerts are not subscribed
to. Security updates are
not implemented
promptly
Low Low Low Low
1 Disconnect
unused
physical
hardware
devices and
disable
clipboard or
file-sharing
services.
Use a
hypervisor
integrity
monitoring
technology,
for example,
Intel Trusted
Platform
Module/Trust
ed Execution
Technology.
Self-integrity checks or
equivalence are not
conducted upon boot-
up to confirm whether
or not hypervisor has
been compromised.
Low Low Low Low
1
Ongoing monitoring
including
analysis of hypervisor
logs does not occur.
Medium Low Low Low
2 1
Attack surface is further
increased through
uncontrolled use of
hypervisor management
APIs by IT/DevOps tools
and scripts and other
infrastructure
technologies.
Medium Medium Medium Medium
3 2
Type of Risk: 5 – Unauthorized Access to hypervisor
Asset exposed to risk: Hypervisor and Management Tools
Access to virtualization
layer is not restricted as
with any sensitive OS.
High High Medium Medium
5 Restrict
access to the
virtualization
layer by
firewalls that
restrict
console
access.
Evaluate
implemented
role based
access control
policies in
order to
ensure that
they are
functionally
correct.
Deploy a
separate
“management
LAN” to
manage
access to
hypervisors.
3
Hypervisor may not
support role-based access
control.
Low Low Low Low 1
Additional third-party
tools that provide tight
administrative control are
not deployed.
Low Low Low Low
1
A separate authentication
is
not used to restrict access.
Low Medium Medium Low 2 1
Hypervisor management
APIs/CLIs are not
adequately protected.
Low Medium Low Low 2 1
Separate LAN
authentication is not used
to restrict access.
Medium High Low Low 4 2
Remote hypervisor
management is not
disabled.
Low High Low High 3 1
Siddharth Coontoor
10
Vulnerability Likelihood
(See
Appendix A2)
Impact Due to
Confidentiality
Compromise
(See Appendix
A2))
Impact Due
to
Integrity
Compromis
e (See
Appendix
A2)
Impact Due to
Availabiliy
Compromise
(See
Appendix
A2)
Evalu
ate
Risk
Level
(See
Appe
ndix
A3)
Risk
Treatment
Control to
be
implemente
d
Evaluate
Residual
Risk
Level
(See
Appendix
A3)
Administrative interfaces
are accidentally exposed
through network
configuration errors and
lack of change of
management procedures
Low Medium Medium Medium
2 Deploy a
separate
“management
LAN” to
manage
access to
hypervisors.
1
Type of Risk: 6 – Account or Service Hijacking through Self- Service Portal
Asset exposed to risk: Privileged access to applications, VM, and Virtualization Platform
Strong authentication
control is lacking.
Low High High Medium 3 Use
administrative
controls
selectively,
based on
users’ roles
and needs.
Enforce
secure
management
of accounts,
identities, and
credentials.
2
Policy governing creation
and use of self-service
portals is lacking.
Low Low Low Low 1
Policy-based management
of self-service portal is not
used.
Low Low Low Low 1
Proactive monitoring of
unauthorized activity does
not occur.
Low Low Low Low 1
Account management is
“relaxed” (e.g., password
reset sent in clear text)
Low High High Low 3 2
Type of Risk: 7 – Workload of Different Trust Levels Located on the Same Server (Commingling of Data)
Asset exposed to risk: VMs in the same physical server
Different VM trust levels
are hosted on to the same
physical server.
High High Medium Low 5 Carefully
design and
implement
access from
each trust
level to
physical and
virtual
management
and security
systems.
Implement
policies and
processes to
categorize
systems and
data
according to
different
security
classifications
.
3
Physical/logical s/w defined-
n/w for VMs of different
trust levels are not separated.
High High Low Low
5 3
Physical and virtual
firewalls
are not deployed to isolate
groups of VMs from other
hosted groups.
Medium Medium Low Low
3 2
Virtual desktop workloads
are not isolated from the
rest..
Low Low Low Low 1
Administrative separation
of duties may not be
implemented, allowing
unauthorized changes or
accidental
misconfiguration that
violates logical zoning.
Low Low High High
3 1
Risk Analysis and Mitigation in Virtualized Environments
11
The Risk matrix once created, risk evaluation
can be performed and given a point in the scale
of 1-5 as seen in Appendix 3. The risk can also
be mitigated by providing a remediation
technique in "Risk Treatment control to be
implement" and accordingly the risk evaluation
can be done again after mitigation as residual
risk.
Above is the Risk evaluation along with
mitigation techniques for all the risks discussed.
6.0 Conclusion
Inside a cloud, it is difficult to identify where
data is stored and how it is segregated. This lack
of visibility and the ability to control, audit, and
verify poses a number of security and
compliance concerns for IT personnel, end-
users, and regulators. While the cloud
community is still grappling with these
emerging risks, virtualization technologies are
continuing to be rapidly innovated. To manage
such a dynamic risk environment, organizations
Vulnerability Likelihood
(See Appendix
A2)
Impact Due to
Confidentiality
Compromise
(See Appendix
A2))
Impact Due to
Integrity
Compromise
(See
Appendix
A2)
Impact Due to
Availabiliy
Compromise
(See
Appendix
A2)
Eva
luat
e
Ris
k
Lev
el
(See
Ap
pen
dix
A3)
Risk
Treatment
Control to
be
implemente
d
Evaluate
Residual
Risk
Level
(See
Appendix
A3)
Type of Risk: 8 – Risk Due to CSP API)
Asset exposed to risk: Security of the hybrid environment
Cloud service provider API
set is not secured.
Medium Medium Low Low 3 Implement
strong
authentication
and granular
access control
with
encrypted
transmission.
Transmit
Active
Directory
traffic via a
private / out-
of-band
encrypted
channel that is
separate from
normal
Internet traffic
if it is used
across the
Internet.
2
Data transmission is not
protected by encryption.
Low High Low Low 3 2
Strong authentication/
access control is not
implemented for external
systems.
Low Medium Medium Low 2 1
Active Directory traffic is
not transmitted via a
private/out- of- band
encrypted channel
(separated from normal
internal traffic)
Low High High Low
3 2
Identity federation is not
used.
Low Low High Low 3 1
Security, compliance, and
governance controls and
monitoring are not
consistently enabled.
Low Medium Medium Medium 3 1
Siddharth Coontoor
12
should put effective governance and risk
management processes and controls in place to
continually monitor and proactively mitigate the
evolving risks.
7.0 Appendix
A1: Risk Table
Risk name
Relevant Security
Aspect
Confidentiality/Integrity/Av
ailability
Relevant Security
Governance Risk Area
Configuration/Architectural/
Operational
Vulnerabilities
associated with the risk
Affected Assets VM/Hypervisor/Network/O
S/Applications/Physical
Server
A2: Likelihood Rating for Vulnerability
Likelihood Rating Evaluation Criteria
High Relevant security control
not in place
Medium Relevant security control in
place but not effective
Low Relevant security control in
place and effective
A3: Impact Rating for CIA Compromise
Impact Rating Evaluation Criteria
High Significant Business
Impact to the enterprise
Medium There is tangible or
intangible loss to
enterprise.
Low There is insignificant loss
due to minor inconvenience
in business operations.
A4: Risk Matrix showing the defined risk
levels
Impact
Likelihood Low Medium High
Low 1
(Insignificant)
2
(Minor)
3
(Medium)
Medium 2
(Minor)
3
(Medium)
4
(High)
High 3
(Medium)
4
(High)
5
(Very
High)
References
[1] http://resources.infosecinstitute.com/chapter-10-
virtualization-security/
[2] https://www.vmware.com/files/pdf/partners/security/mcafe
e-key-security-ent-arch-wp.ion
[3] http://www.isaca.org/Journal/archives/2011/Volume-
1/Pages/Auditing-Security-Risks-in-Virtual-IT-
Systems.aspx
[4] http://www.symantec.com/content/en/us/enterprise/media/s
ecurity_response/whitepapers/threats_to_virtual_environm
ents.pdf
[5] https://www.pcisecuritystandards.org/documents/Virtualiz
ation_InfoSupp_v2.pdf
[6] https://www.vmware.com/pdf/virtualization_consideration
s.pdf
[7] https://downloads.cloudsecurityalliance.org/whitepapers/B
est_Practices_for%20_Mitigating_Risks_Virtual_Environ
ments_April2015_4-1-15_GLM5.pdf

Contenu connexe

Tendances

Cloud servers-new-risk-considerations
Cloud servers-new-risk-considerationsCloud servers-new-risk-considerations
Cloud servers-new-risk-considerationsAccenture
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Vmware virtualization in data centers
Vmware virtualization in data centersVmware virtualization in data centers
Vmware virtualization in data centersHarshitTaneja13
 
Desktop Virtualization and the Consumerization of IT
Desktop Virtualization and the Consumerization of ITDesktop Virtualization and the Consumerization of IT
Desktop Virtualization and the Consumerization of ITInnoTech
 
Remote Access Outgoing VDI Gateway
Remote Access Outgoing VDI GatewayRemote Access Outgoing VDI Gateway
Remote Access Outgoing VDI GatewayObserveIT
 
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...FindWhitePapers
 
ConsoleWorks ITFM for VMware
ConsoleWorks ITFM for VMwareConsoleWorks ITFM for VMware
ConsoleWorks ITFM for VMwareTvkearns
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giantseblake
 
Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud ComputingJamie Shoup
 
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKSMAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKSIJCNCJournal
 
The Evolution Of Server Virtualization By Hitendra Molleti
The Evolution Of Server Virtualization By Hitendra MolletiThe Evolution Of Server Virtualization By Hitendra Molleti
The Evolution Of Server Virtualization By Hitendra MolletiHitendra Molleti
 
3529 v mware_solution_brochure_final
3529 v mware_solution_brochure_final3529 v mware_solution_brochure_final
3529 v mware_solution_brochure_finalVictor Diaz Campos
 
Performance, fault tolerance and scalability analysis of virtual infrastructu...
Performance, fault tolerance and scalability analysis of virtual infrastructu...Performance, fault tolerance and scalability analysis of virtual infrastructu...
Performance, fault tolerance and scalability analysis of virtual infrastructu...www.pixelsolutionbd.com
 
Challenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computingChallenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computingcloudresearcher
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised ComputingIOSR Journals
 
Xen client4.5 customer-presentation-2012-12-28
Xen client4.5 customer-presentation-2012-12-28Xen client4.5 customer-presentation-2012-12-28
Xen client4.5 customer-presentation-2012-12-28Nuno Alves
 

Tendances (19)

Cloud servers-new-risk-considerations
Cloud servers-new-risk-considerationsCloud servers-new-risk-considerations
Cloud servers-new-risk-considerations
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Citrix Application Management Framework
Citrix Application Management FrameworkCitrix Application Management Framework
Citrix Application Management Framework
 
Palo Alto Networks VM-Series firewall now available on NetScaler SDX Platform
Palo Alto Networks VM-Series firewall now available on NetScaler SDX PlatformPalo Alto Networks VM-Series firewall now available on NetScaler SDX Platform
Palo Alto Networks VM-Series firewall now available on NetScaler SDX Platform
 
Vmware virtualization in data centers
Vmware virtualization in data centersVmware virtualization in data centers
Vmware virtualization in data centers
 
Desktop Virtualization and the Consumerization of IT
Desktop Virtualization and the Consumerization of ITDesktop Virtualization and the Consumerization of IT
Desktop Virtualization and the Consumerization of IT
 
Remote Access Outgoing VDI Gateway
Remote Access Outgoing VDI GatewayRemote Access Outgoing VDI Gateway
Remote Access Outgoing VDI Gateway
 
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
 
ConsoleWorks ITFM for VMware
ConsoleWorks ITFM for VMwareConsoleWorks ITFM for VMware
ConsoleWorks ITFM for VMware
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giants
 
Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud Computing
 
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKSMAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
 
The Evolution Of Server Virtualization By Hitendra Molleti
The Evolution Of Server Virtualization By Hitendra MolletiThe Evolution Of Server Virtualization By Hitendra Molleti
The Evolution Of Server Virtualization By Hitendra Molleti
 
3529 v mware_solution_brochure_final
3529 v mware_solution_brochure_final3529 v mware_solution_brochure_final
3529 v mware_solution_brochure_final
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Performance, fault tolerance and scalability analysis of virtual infrastructu...
Performance, fault tolerance and scalability analysis of virtual infrastructu...Performance, fault tolerance and scalability analysis of virtual infrastructu...
Performance, fault tolerance and scalability analysis of virtual infrastructu...
 
Challenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computingChallenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computing
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised Computing
 
Xen client4.5 customer-presentation-2012-12-28
Xen client4.5 customer-presentation-2012-12-28Xen client4.5 customer-presentation-2012-12-28
Xen client4.5 customer-presentation-2012-12-28
 

En vedette

Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementMel Drews
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Government
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & StrategyTony Hauxwell
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overviewxband
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanDr David Probert
 
OEB Cyber Security Framework
OEB Cyber Security FrameworkOEB Cyber Security Framework
OEB Cyber Security FrameworkNorbi Hegedus
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 

En vedette (8)

Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat Analysis
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
OEB Cyber Security Framework
OEB Cyber Security FrameworkOEB Cyber Security Framework
OEB Cyber Security Framework
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 

Similaire à Risk Analysis and Mitigation in Virtualized Environments

Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud EnvironmentDr. Sunil Kr. Pandey
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its TypesHTS Hosting
 
Four Main Types of Virtualization
Four Main Types of VirtualizationFour Main Types of Virtualization
Four Main Types of VirtualizationHTS Hosting
 
Virtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.pptVirtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.pptMohammadArmanulHaque
 
VIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptxVIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptxKelvinBakespear
 
Security challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governanceSecurity challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governanceAdam Bert Lacay
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software TestingColloquium
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulizationAJIT NEGI
 
International Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docxInternational Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docxvrickens
 
Cloud Resource Management
Cloud Resource ManagementCloud Resource Management
Cloud Resource ManagementNASIRSAYYED4
 
DEPLOYMENT-DRIVEN SECURITY CONFIGURATION FOR VIRTUAL NETWORKS
DEPLOYMENT-DRIVEN SECURITY CONFIGURATION FOR VIRTUAL NETWORKSDEPLOYMENT-DRIVEN SECURITY CONFIGURATION FOR VIRTUAL NETWORKS
DEPLOYMENT-DRIVEN SECURITY CONFIGURATION FOR VIRTUAL NETWORKScscpconf
 
Deployment driven security
Deployment driven securityDeployment driven security
Deployment driven securitycsandit
 
Mid term report
Mid term reportMid term report
Mid term reportlokesh039
 
Datacenter migration using vmware
Datacenter migration using vmwareDatacenter migration using vmware
Datacenter migration using vmwareWilson Erique
 
2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docxshruti533256
 

Similaire à Risk Analysis and Mitigation in Virtualized Environments (20)

Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its Types
 
Four Main Types of Virtualization
Four Main Types of VirtualizationFour Main Types of Virtualization
Four Main Types of Virtualization
 
Presentation on Top Cloud Computing Technologies
Presentation on Top Cloud Computing TechnologiesPresentation on Top Cloud Computing Technologies
Presentation on Top Cloud Computing Technologies
 
Virtualization - cloud computing
Virtualization - cloud computingVirtualization - cloud computing
Virtualization - cloud computing
 
Virtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.pptVirtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.ppt
 
VIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptxVIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptx
 
Managing The Virtualized Enterprise New Technology, New Challenges
Managing The Virtualized Enterprise New Technology, New ChallengesManaging The Virtualized Enterprise New Technology, New Challenges
Managing The Virtualized Enterprise New Technology, New Challenges
 
Security challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governanceSecurity challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governance
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software Testing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
 
International Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docxInternational Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docx
 
Cloud Resource Management
Cloud Resource ManagementCloud Resource Management
Cloud Resource Management
 
DEPLOYMENT-DRIVEN SECURITY CONFIGURATION FOR VIRTUAL NETWORKS
DEPLOYMENT-DRIVEN SECURITY CONFIGURATION FOR VIRTUAL NETWORKSDEPLOYMENT-DRIVEN SECURITY CONFIGURATION FOR VIRTUAL NETWORKS
DEPLOYMENT-DRIVEN SECURITY CONFIGURATION FOR VIRTUAL NETWORKS
 
Deployment driven security
Deployment driven securityDeployment driven security
Deployment driven security
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
Mid term report
Mid term reportMid term report
Mid term report
 
Datacenter migration using vmware
Datacenter migration using vmwareDatacenter migration using vmware
Datacenter migration using vmware
 
2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx
 

Dernier

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Dernier (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Risk Analysis and Mitigation in Virtualized Environments

  • 1. EAI Endorsed Transactions on Risk Analysis and Mitigation in virtualized environment 02 -04 2015 | Volume 1 | Issue __ | e_ EAI Endorsed Transactions On Risk Analysis and Mitigation in Virtualized Environments Editorial 1 Risk Analysis and Mitigation in Virtualized Environments Abstract Virtualization technology is extensively used across almost all IT departments today as it allows you to increase your network capacity without significantly increasing your capital investment. But with the advent of virtualization, you might ask whether your current security investments are still valid. Will proven strategies continue to work? If they do, are they just as effective? What about all the tools you have invested in? Perhaps the best way to answer these questions is to consider the changes that virtualization will bring and how it impacts the core of your information technology. The objective of this paper is to outline a risk analysis and discuss about mitigation techniques in such virtualized environments. 1.0 Introduction Virtualization has made a dramatic impact in a very short time on IT and networking and has already delivered huge cost savings and return on investment to enterprise data centers and cloud service providers. Typically, the drivers for machine virtualization, including multitenancy, are better server utilization, data center consolidation, and relative ease and speed of provisioning. Cloud service providers can achieve higher density, which translates into better margins. Enterprises can use virtualization to shrink capital expenditures on server hardware as well as to increase operational efficiency. Server virtualization is the masking of server resources, including the number and identity of individual physical servers, processors, and operating systems, from server users. The server administrator uses a software application to divide one physical server into multiple isolated virtual environments. The virtual environments are sometimes called virtual private servers, but they are also known as guests, instances, containers or emulations. Virtualization brings significant value to business managers and engineers attempting to keep pace with business pressure for additional servers. It enables maximum use of hardware resources while introducing an increased flexibility in how organizations design and implement new solutions. However, it also introduces new security concerns. Until recently, organizations had to leverage security controls not specifically designed to protect virtual environments. As enterprises embark on their virtualization journeys, it is critical to review existing processes and develop strategies to address security risks across physical and virtual environments in order to ensure compliance and security visibility in the data center. In that view the objective of this paper is stress on the analysis and mitigation of common risks observed in virtual environments. In the next section we shall discuss the overview of a virtualization technology, section 3 shall discuss architecture of server virtualization and then section 4 emphasizes in identifying the risks in virtual environment, finally section 5 will discuss risk assessment and mitigation techniques in the virtual environment.
  • 2. Siddharth Coontoor 2 2.0 Overview of Virtualization Technology Server virtualization allows multiple operating systems and applications to run concurrently on a single hardware. The OSs run independent of each other in isolated environments (the VMs). A virtualization layer is required to run on the computer’s OSs as an application or service to create multiple VM environments. OSs and applications running in a VM can access the CPU, memory, and disk and network resources that are similar to a physical computer. Figure 1: Virtual Server The virtual server divides physical resources into virtual resources called virtual machines as seen in Figure 1. In this way virtualization adds a layer of abstraction between two layers in that computer system. The layer of abstraction is a software layer between the hardware and the guest operating systems. The layer acts as a resource manager to enable the sharing of processing power and memory. This software is called a virtual machine monitor (VMM) or hypervisor. VMMs virtualise the hardware of a physical machine and partition it into multiple, logically separated VMs. The VMM monitors everything that happens inside a VM, and it enforces resource management policies on the VM. Multiple operating systems (OSs) can coexist on the same virtual machine in isolation from one another and can operate simultaneously on a single server. Virtualization in a distributed environment is the basis for grid computing and cloud computing supplying a computing infrastructure as a utility, on-demand service. Virtualization can be categorised into three areas: Storage virtualization — Virtualizes the physical storage from multiple network storage devices so that they appear to be a single storage device. In general, ‘virtualization’ refers to server virtualization. Network virtualization — Combines computing resources in a network by splitting the available bandwidth into independent channels that can be assigned to a particular server or device in real time. Server virtualization — Hides the physical nature of server resources, including the number and identity of individual servers, processors and OSs from the software running on them. The term workload is increasingly used to describe the a vast array of virtualized resources. For example, a virtual machine is a type of workload. While VMs are the predominant virtualization technology implemented today, there are a number of other workloads to consider, including application, desktop, network, and storage virtualization models. 3.0 Architecture of Server Virtualization Technology and Identification of critical assets Server virtualization allows multiple operating systems and applications to run concurrently on a single hardware. The OSs run independent of each other in isolated environments (the VMs). A virtualization layer is required to run on the computer’s OSs as an application or service to create multiple VM environments. OSs and applications running in a VM can access the CPU, memory, and disk and network resources that are similar to a physical computer. Figure 2: Server Virtualization Architecture
  • 3. Risk Analysis and Mitigation in Virtualized Environments 3 Figure 2 shows architecture of server virtualization. As seen in the figure there are four major components in the virtualization technology, they are as follows:  Physical hardware - Physical machine on which the VM environments reside. The number of VMs that can be supported on a single physical machine depends on the hardware configuration and specifications.  Operating system Layer - Primary OS on the physical machine. The virtualization layer resides on this OS.  Virtualization layer - Virtualization software that co-ordinates with the host OSs for requests from VMs regarding CPU time, physical memory, disk read and write, network input/output (I/O), etc. The virtualization software is called hypervisor.  Virtual machine - Independent and isolated environment created by the virtualization software. OSs can run VMs independent of each other.  Guest operating systems - The OSs installed on VMs. These run on the host OS. Virtualization technology allows multiple VMs with heterogeneous guest OSs to run in isolation, side by side on the same physical machine. The VMs have their own virtual hardware (e.g., CPU, RAM, disks, network cards) on which the guest OSs and applications are loaded. The guest OSs perform consistently, irrespective of the physical components. The virtualization software mentioned earlier is known as the hypervisor. The hypervisor plays an important role in virtualization technology. Figure 3: View of Hypervisor It intercepts the hardware resource requests from the virtual machines that reside on it and translates the requests to a format that can be understood by the physical hardware. Similarly, the requests from the physical hardware are translated by the hypervisor so that the virtual machines can understand. This way the hypervisor decouples the VMs from the physical hosts by introducing a layer of abstraction between the VMs and the physical hardware layer. Based on the architecture of the virtualized server and the services it would provide, it would be essential to identify critical assets whose working is important to the business. Similar to traditional risk assessment approaches, the first step is to identify the assets that are important to business. Nest step, would be to identify the risks associated with these assets and their associated vulnerabilities. The critical assets in a virtualized environment are as follows:  Physical server  Host Operating System  Hypervisor  Hypervisor Management tools and API  Virtual Machines  Network  Storage 4.0 Identifying Risk in Virtualized Environments While virtualization may provide a number functional and operational benefits, moving to a virtual environment doesn’t alleviate the risks which existed on the physical systems, and may also introduce new and unique risks. Therefore as a part of risk assessment, it is important to identify the virtualization server as an important asset and take into consideration risks associated with it. The following are the most common risks associated with a virtualized servers
  • 4. Siddharth Coontoor 4 identified by virtualization vendors and stake holders. Risk 1 - VM Sprawl Uncontrolled proliferation of VMs can lead to an unmanageable condition of unpatched and unaccounted for machines. Risk 2 - Sensitive Data within a VM Data confidentiality within VMs can be easily compromised, because data can be easily transported and tampered with. Risk 3 - Resource Exhaustion Uncontrolled physical resource consumption by virtual processes can lead to reduced availability. A risk factor unique to virtual environments is the hypervisor. Hypervisor is the software and/or firmware responsible for hosting and managing VMs. It provides a single point of access into the virtual environment and is also potentially a single point of failure. A misconfigured hypervisor can result in a single point of compromise of the security of all its hosted components. It does not matter how individual VMs are hardened a compromised hypervisor can override those controls and provide a convenient single point of unauthorized access to all the VMs. The following security risks related to the use of hypervisor should be considered by those planning to use or currently using virtual technologies: Risk 4 - Hypervisor Security Hypervisor security is the process of ensuring that the hypervisor, the software that enables virtualization, is secure throughout its life cycle, including development, implementation, provisioning, and management. Risk 5 - Unauthorized Access to Hypervisor Administrative access controls to the hypervisor may not be adequate to protect against potential hacker attacks. Compared to traditional IT environments, virtualization of IT systems inevitably leads to changes in operational procedures. As a result, some common defence in depth practices used in securing physical servers may be affected or ignored, while newly introduced features or functions may expose the environment to additional risks. The following security risks related to changes in operation procedures should be considered: Risk 6 - Account or Service Hijacking Through the Self-Service Portal Portal vulnerabilities can lead to privilege escalation attacks. Risk 7 - Workloads of Different Trust Levels Located on the Same Server Ensure that there is sufficient security segregation of workloads on a physical host. Some enterprise infocom personnel may elect to apply virtualization technologies through outsourcing services from cloud service providers. In such cases, it may be necessary to consider additional risk factors, including the following. Risk 8 - Risk Due to Cloud Service Provider APIs A hybrid (private/public) cloud virtualization implementation can pose security risks due to account/authentication federation. 5.0 Risk Assessment and Mitigation Once risks have been identified as in the above section, it is important that a risk table be maintained for the risks related to the virtualized server as shown in Appendix A1. The risk table maintains details about the risk like Risk name, description, relevant security aspect(confidentiality, integrity, availability), risk governance area, vulnerabilities that lead to this risk, affected assets.
  • 5. Risk Analysis and Mitigation in Virtualized Environments 5 The risk table helps enlist vulnerabilities associated to that risk. Based on the risk the risk table for each risk is as follows: Risk name VM Sprawl Relevant Security Aspect Confidentiality/Integrity/Av ailability Relevant Security Governance Risk Area Architectural and configuration risk Vulnerabilities associated with the risk  Proper policy and control processes to manage VM lifecycle do not exist.  Placement / zoning policies or enforcement of where a dormant VM can instantiate or reside do not exist.  A discovery tool for identification of unauthorized VMs does not exist. Affected Assets VM Risk name Sensitive Data Within a VM Relevant Security Aspect Risk to confidentiality and integrity Relevant Security Governance Risk Area Configuration risk Vulnerabilities associated with the risk  VM images and snapshots are not treated the same way as the sensitive data they contain. They are not protected from unauthorized access, modification, duplication, and replacement  Policies and procedures to restrict storage of VM images and snapshots do not exist, including: Formal change management processes that govern image creation, security, distribution, storage, use, retirement, and destruction Monitoring and control of stored images and snapshots, including activities logging Affected Assets VM & Storage Risk name Resource Exhaustion Relevant Security Aspect Risk to availability Relevant Security Governance Risk Area Architectural and hypervisor software risk Vulnerabilities associated with the risk  Servers can be burdened by concurrent execution of resource-intensive software such as anti- virus software on multiple VMs.  Simultaneous automated operating system patches on a group of VMs can create an enormous excess strain on a common storage resource. Affected Assets VM Risk name Hypervisor Security Relevant Security Aspect Risk to confidentiality, integrity, and availability Relevant Security Governance Risk Area Architectural and hypervisor software risk Vulnerabilities associated with the risk  Hypervisor configuration may not be hardened to reduce areas of vulnerability, such as unused services.  Vendor- recommended best practices have not been adopted.  Unused physical hardware devices are connected, and clipboard / file- sharing services are not disabled.  Vendor security bulletins / alerts are not implemented promptly.  Hypervisor self- integrity checks (or the equivalent) are
  • 6. Siddharth Coontoor 6 not conducted upon boot-up.  Ongoing monitoring, including analysis of hypervisor logs, does not occur.  The attack surface is further increased through uncontrolled use of hypervisor management APIs by IT / DevOps tools and scripts and other infrastructure technologies. Affected Assets Hypervisor Risk name Unauthorized Access to Hypervisor Relevant Security Aspect Risk to confidentiality, integrity, and availability Relevant Security Governance Risk Area Architectural, hypervisor software, and configuration risk Vulnerabilities associated with the risk  Access to the virtualization layer is not restricted as with any sensitive OS (i.e., using console access restricted by firewalls).  The hypervisor may not support role- based access control of administrative responsibilities.  Additional third- party tools designed to provide tight administrative control are not deployed.  Separate authentication is not used to restrict access.  Hypervisor management APIs / CLIs are not adequately protected.  A separate “management LAN” is not deployed to manage access to hypervisors.  Remote management of hypervisors is not disabled.  Administrative interfaces are accidentally exposed through network configuration errors and lack of change management procedures. Affected Assets Hypervisor, Management tools and API Risk name Account or Service Hijacking Through the Self- Service Portal Relevant Security Aspect Risk to confidentiality, integrity, and availability confined to the designated virtual environment Relevant Security Governance Risk Area Architectural and hypervisor software risk Vulnerabilities associated with the risk  Strong authentication control is lacking.  Policy governing the creation and use of self- service portals does not exist.  Policy-based self- service portal management is not used.  Unauthorized activity is not proactively monitored.  Account management (e.g., password reset sent in clear text) is “relaxed.” Affected Assets Applications, VMs, and virtualization platform
  • 7. Risk Analysis and Mitigation in Virtualized Environments 7 Risk name Workloads of Different Trust Levels Located on the Same Server Relevant Security Aspect Risk to confidentiality, integrity, and availability Relevant Security Governance Risk Area Architectural and configuration risk Vulnerabilities associated with the risk  VMs of different trust- levels are hosted on or migrated to the same physical server (host).  Physical or logical software-defined networks for VMs of different trust levels are not segregated.  Physical and virtual firewalls are not deployed to isolate groups of VMs from other hosted groups, for example, production from development systems or development from other cloud- resident systems.  Virtual desktop workloads are not isolated from rest of the physical data center.  Administrative separation of duties may not be implemented, allowing unauthorized changes or accidental misconfiguration that violates the logical zoning. Affected Assets VMs on physical server Risk name Risk due to Cloud Service Provider API Relevant Security Aspect Risk to confidentiality, integrity, and availability Relevant Security Governance Risk Area Architectural and configuration risk Vulnerabilities associated with the risk  The cloud service provider’s API set is not secured.  Data transmitted or stored in the cloud is not protected by encryption.  Strong authentication / access control is not implemented for external systems.  Identity and credential federation, such as Active Directory services or another LDAPv3 directory, is not used. Traffic is not transmitted via a private / out-of-band encrypted channel that is separate from normal internal traffic.  Security, compliance, and governance controls and monitoring are not consistently enabled. Affected Assets Security of Hybrid Environment The risk table helps enlist the vulnerabilities associated with each risk scenario based upon which the impact and likelihood can be derived that would finally form a risk matrix. As vulnerabilities are enlisted and risk calculated for them, suitably mitigation techniques for these vulnerabilities can be derived which would help calculate the residual risk. The likelihood rating is provided in Appendix A2, which provides the rating notation for creating risk matrix. Similarly Appendix A3 provides impact rating for CIA compromise and Appendix A4 provides risk matrix defining the risk levels. The risk evaluation is based on the likelihood of a particular vulnerability being exploited and the impact it would have on the business.
  • 8. Siddharth Coontoor 8 Vulnerability Likelihood (See Appendix A2) Impact Due to Confidentialit y Compromise (See Appendix A2) Impact Due to Integrity Compromis e (See Appendix A2) Impact Due to Availability Compromis e (See Appendix A2) Evalu ate Risk Level (See Appen dix A3) Risk Treatment Control to be implemented Evaluate Residual Risk Level (See Appendix A3) Type of Risk: 1 – VM Sprawl Asset exposed to risk: VM Lack of effective control process to manage VM lifecycle Low Low Low Low 1 Put effective policies, guidelines, and processes in place to govern and control VM lifecycle management, including self- service and automated scripts / DevOps tools. Lack of placement / zoning policies or enforcement of where a dormant VM can instantiate or reside Low Low Low Low 1 Lack of discovery tool to identify unauthorized VMs Low Low Low Low 1 Type of Risk: 2 – Sensitive Data in VM Asset exposed to risk: VM and Storage VM images and snapshots are not treated in the same way as the sensitive data. Medium High High Low 4 Encrypt data stored on virtual and cloud servers to make it unreadable. Develop policies to restrict storage of VM images and snapshots. 1 Policies and processes are not in place to control storage of VM images and snapshots. Low High High Low 3 1 Type of Risk: 3 – Resource Exhaustion Asset exposed to risk: VM Servers are burdened by concurrent execution of resource-intensive software. High Low Low High 5 Implement operating procedure that detects VMs that are throttled due to resource exhaustion and puts a remedy in place instantly. 2 Simultaneous OS automated patching on a group of VMs causes enormous access strain on a common storage resource. Medium Low Low High 4 2 Type of Risk: 4 – Hypervisor Security Asset exposed to risk: Hypervisor Configuration of hypervisor may not be hardened to reduce areas of vulnerabilities. Medium Medium Low Medium 3 Harden the hypervisor’s configuration to reduce areas of vulnerability. Put vendor- provided best practices in place where applicable. 2 Vendor- recommended best practices are not adopted. Low Low Low Low 1 Unused physical hardware devices are connected. Clipboard / file-sharing services are not disabled. Low Low Low Low 1
  • 9. Risk Analysis and Mitigation in Virtualized Environments 9 Vulnerability Likelihood (See Appendix A2) Impact Due to Confidentialit y Compromise (See Appendix A2)) Impact Due to Integrity Compromis e (See Appendix A2) Impact Due to Availabiliy Compromis e (See Appendix A2) Evaluate Risk Level (See Appendix A3) Risk Treatment Control to be implemente d Evaluate Residual Risk Level (See Appendix A3) Vendor security bulletins /alerts are not subscribed to. Security updates are not implemented promptly Low Low Low Low 1 Disconnect unused physical hardware devices and disable clipboard or file-sharing services. Use a hypervisor integrity monitoring technology, for example, Intel Trusted Platform Module/Trust ed Execution Technology. Self-integrity checks or equivalence are not conducted upon boot- up to confirm whether or not hypervisor has been compromised. Low Low Low Low 1 Ongoing monitoring including analysis of hypervisor logs does not occur. Medium Low Low Low 2 1 Attack surface is further increased through uncontrolled use of hypervisor management APIs by IT/DevOps tools and scripts and other infrastructure technologies. Medium Medium Medium Medium 3 2 Type of Risk: 5 – Unauthorized Access to hypervisor Asset exposed to risk: Hypervisor and Management Tools Access to virtualization layer is not restricted as with any sensitive OS. High High Medium Medium 5 Restrict access to the virtualization layer by firewalls that restrict console access. Evaluate implemented role based access control policies in order to ensure that they are functionally correct. Deploy a separate “management LAN” to manage access to hypervisors. 3 Hypervisor may not support role-based access control. Low Low Low Low 1 Additional third-party tools that provide tight administrative control are not deployed. Low Low Low Low 1 A separate authentication is not used to restrict access. Low Medium Medium Low 2 1 Hypervisor management APIs/CLIs are not adequately protected. Low Medium Low Low 2 1 Separate LAN authentication is not used to restrict access. Medium High Low Low 4 2 Remote hypervisor management is not disabled. Low High Low High 3 1
  • 10. Siddharth Coontoor 10 Vulnerability Likelihood (See Appendix A2) Impact Due to Confidentiality Compromise (See Appendix A2)) Impact Due to Integrity Compromis e (See Appendix A2) Impact Due to Availabiliy Compromise (See Appendix A2) Evalu ate Risk Level (See Appe ndix A3) Risk Treatment Control to be implemente d Evaluate Residual Risk Level (See Appendix A3) Administrative interfaces are accidentally exposed through network configuration errors and lack of change of management procedures Low Medium Medium Medium 2 Deploy a separate “management LAN” to manage access to hypervisors. 1 Type of Risk: 6 – Account or Service Hijacking through Self- Service Portal Asset exposed to risk: Privileged access to applications, VM, and Virtualization Platform Strong authentication control is lacking. Low High High Medium 3 Use administrative controls selectively, based on users’ roles and needs. Enforce secure management of accounts, identities, and credentials. 2 Policy governing creation and use of self-service portals is lacking. Low Low Low Low 1 Policy-based management of self-service portal is not used. Low Low Low Low 1 Proactive monitoring of unauthorized activity does not occur. Low Low Low Low 1 Account management is “relaxed” (e.g., password reset sent in clear text) Low High High Low 3 2 Type of Risk: 7 – Workload of Different Trust Levels Located on the Same Server (Commingling of Data) Asset exposed to risk: VMs in the same physical server Different VM trust levels are hosted on to the same physical server. High High Medium Low 5 Carefully design and implement access from each trust level to physical and virtual management and security systems. Implement policies and processes to categorize systems and data according to different security classifications . 3 Physical/logical s/w defined- n/w for VMs of different trust levels are not separated. High High Low Low 5 3 Physical and virtual firewalls are not deployed to isolate groups of VMs from other hosted groups. Medium Medium Low Low 3 2 Virtual desktop workloads are not isolated from the rest.. Low Low Low Low 1 Administrative separation of duties may not be implemented, allowing unauthorized changes or accidental misconfiguration that violates logical zoning. Low Low High High 3 1
  • 11. Risk Analysis and Mitigation in Virtualized Environments 11 The Risk matrix once created, risk evaluation can be performed and given a point in the scale of 1-5 as seen in Appendix 3. The risk can also be mitigated by providing a remediation technique in "Risk Treatment control to be implement" and accordingly the risk evaluation can be done again after mitigation as residual risk. Above is the Risk evaluation along with mitigation techniques for all the risks discussed. 6.0 Conclusion Inside a cloud, it is difficult to identify where data is stored and how it is segregated. This lack of visibility and the ability to control, audit, and verify poses a number of security and compliance concerns for IT personnel, end- users, and regulators. While the cloud community is still grappling with these emerging risks, virtualization technologies are continuing to be rapidly innovated. To manage such a dynamic risk environment, organizations Vulnerability Likelihood (See Appendix A2) Impact Due to Confidentiality Compromise (See Appendix A2)) Impact Due to Integrity Compromise (See Appendix A2) Impact Due to Availabiliy Compromise (See Appendix A2) Eva luat e Ris k Lev el (See Ap pen dix A3) Risk Treatment Control to be implemente d Evaluate Residual Risk Level (See Appendix A3) Type of Risk: 8 – Risk Due to CSP API) Asset exposed to risk: Security of the hybrid environment Cloud service provider API set is not secured. Medium Medium Low Low 3 Implement strong authentication and granular access control with encrypted transmission. Transmit Active Directory traffic via a private / out- of-band encrypted channel that is separate from normal Internet traffic if it is used across the Internet. 2 Data transmission is not protected by encryption. Low High Low Low 3 2 Strong authentication/ access control is not implemented for external systems. Low Medium Medium Low 2 1 Active Directory traffic is not transmitted via a private/out- of- band encrypted channel (separated from normal internal traffic) Low High High Low 3 2 Identity federation is not used. Low Low High Low 3 1 Security, compliance, and governance controls and monitoring are not consistently enabled. Low Medium Medium Medium 3 1
  • 12. Siddharth Coontoor 12 should put effective governance and risk management processes and controls in place to continually monitor and proactively mitigate the evolving risks. 7.0 Appendix A1: Risk Table Risk name Relevant Security Aspect Confidentiality/Integrity/Av ailability Relevant Security Governance Risk Area Configuration/Architectural/ Operational Vulnerabilities associated with the risk Affected Assets VM/Hypervisor/Network/O S/Applications/Physical Server A2: Likelihood Rating for Vulnerability Likelihood Rating Evaluation Criteria High Relevant security control not in place Medium Relevant security control in place but not effective Low Relevant security control in place and effective A3: Impact Rating for CIA Compromise Impact Rating Evaluation Criteria High Significant Business Impact to the enterprise Medium There is tangible or intangible loss to enterprise. Low There is insignificant loss due to minor inconvenience in business operations. A4: Risk Matrix showing the defined risk levels Impact Likelihood Low Medium High Low 1 (Insignificant) 2 (Minor) 3 (Medium) Medium 2 (Minor) 3 (Medium) 4 (High) High 3 (Medium) 4 (High) 5 (Very High) References [1] http://resources.infosecinstitute.com/chapter-10- virtualization-security/ [2] https://www.vmware.com/files/pdf/partners/security/mcafe e-key-security-ent-arch-wp.ion [3] http://www.isaca.org/Journal/archives/2011/Volume- 1/Pages/Auditing-Security-Risks-in-Virtual-IT- Systems.aspx [4] http://www.symantec.com/content/en/us/enterprise/media/s ecurity_response/whitepapers/threats_to_virtual_environm ents.pdf [5] https://www.pcisecuritystandards.org/documents/Virtualiz ation_InfoSupp_v2.pdf [6] https://www.vmware.com/pdf/virtualization_consideration s.pdf [7] https://downloads.cloudsecurityalliance.org/whitepapers/B est_Practices_for%20_Mitigating_Risks_Virtual_Environ ments_April2015_4-1-15_GLM5.pdf