SlideShare une entreprise Scribd logo
1  sur  45
Rohit Gulati | Partner Technical Consultant
               Microsoft
Agenda
 Virtualization Overview
 Hyper-V Architecture
 Hyper-V Security Overview
 Hyper-V Security Guide
 Summary!
Virtualization Today
 Machine virtualization requires control of
 privileged operations
   CPU registers and memory management hardware
   Hardware devices
 Virtualization usually means emulation, but can
 also mean controlled access to privileged state
 The core virtualization software is called a
 Virtual Machine Monitor (VMM)
 There are two approaches to machine
 virtualization:
   Hosted virtualization
   Hypervisor virtualization
Virtual Machine Monitor Arrangements

 Hosted Virtualization             Hypervisor Virtualization

              Guest 1   Guest 2      Guest 1         Guest 2


 Host OS           VMM                         VMM


           Hardware                        Hardware


 Examples:                         Examples:
     VMware Workstation               VMware ESX
     KVM                              Xen
     Virtual PC & Virtual Server      Hyper-V
Monolithic Versus Microkernel Hypervisor

 Monolithic Hypervisor            Microkernel Hypervisor
                                       VM 1
      VM 1                           (Parent)
                  VM 2     VM 3
    (Admin)
                                     Virtual-      VM 2       VM 3
                                     ization      (Child)    (Child)
    Virtualization Stack              Stack
                                    Drivers       Drivers    Drivers
              Hypervisor
                Drivers
                                                Hypervisor

              Hardware                          Hardware

 More simple than a modern        Simple partitioning functionality
 kernel, but still complex        Increase reliability and minimizes TCB
 Implements a driver model        No third-party code
                                  Drivers run within guests
Agenda
 Virtualization Overview
 Hyper-V Architecture
 Hyper-V Security Overview
 Hyper-V Security Guide
 Summary!
Hyper-V Background
 Three major components
    Hypervisor
    Virtualization Stack
    Virtual Devices

 Windows based virtualization platform
    Windows Server 2008 x64 Edition technology (32/64 bit guest support)
    Standard, Enterprise, and Datacenter Editions
    Standards based
    Packaged as a Server Role

 Requires hardware assisted virtualization
    AMD AMD-V
    Intel VT
 Data Execution Prevention (DEP) should be enabled
Hyper-V Architecture
           Root Partition                        Guest Partitions             Provided by:
                                                                                 Windows
  Virtualization Stack
                                                                                 Hyper-V
   WMI Provider                                  Guest Applications
                         VM Worker                                               ISV
        VM               Processes
       Service                                      Ring 3: User Mode


                                            Virtualization
                                               Service             OS
   Server Core        Virtualization                              Kernel
                                               Clients
                            Service            (VSCs)
   Windows
    Kernel       Device Providers
                 Drivers    (VSPs)       VMBus               Enlightenments
                                                    Ring 0: Kernel Mode

                                  Windows Hypervisor

                                  Server Hardware
Hypervisor
 Partitioning Kernel
   Partition is an isolation boundary
   Few virtualization functions; relies on virtualization stack
 Very thin layer of software
   Microkernel
   Highly reliable
 No device drivers
   Two versions, one for Intel and one for AMD
   Drivers run in the root partition
   Leverage the large base of Windows drivers
 Well-defined interface
   Allow others to create support for their OSes as guests
Virtualization Stack
 Runs within the root partition
 Portion of traditional hypervisor that has been pushed
 up and out to make a micro-hypervisor
 Manages guest partitions
 Handles intercepts
 Emulates devices
Agenda
 Virtualization Overview
 Hyper-V Architecture
 Hyper-V Security Overview
 Hyper-V Security Guide
 Summary!
VM “Aware” Threats
New technologies can introduce new types of attacks




       Guest OS   {            SAP                  Dept File / Print


                                          VM Host


           Guest VMs can not see/detect threats in the VM host due to the virtualizing behavior
           of the host.
           This attack approach is similar, yet much more insidious, than the approach rootkits
           take to hide their presence.
Top Virtualization Security Concerns
 The loss of separation of duties for administrative tasks, which
 can lead to a breakdown of defense in depth
 Patching, signature updates, and protection from tampering for
 offline virtual machine and virtual machine appliance images
 Patching and secure confirmation management of VM
 appliances where the underlying OS and configuration aren’t
 accessible
 Limited visibility into the host OS and virtual network to find
 vulnerabilities and access correct configuration
 Restricted view into inter-VM traffic for inspection by intrusion-
 prevention systems
 Mobile VMs will require security policy and settings to migrate
 with them
 Immature and incomplete security and management tools
Security Assumptions
 Guests are un-trusted
 Root must be trusted by hypervisor; guests
 must trust the root
 Code in guests will run in all available
 processor modes, rings, and segments
 Hypercall interface will be well documented
 and widely available to attackers
 All hypercalls can be attempted by guests
 Can detect you are running on a hypervisor
    We’ll even give you the version
 The internal design of the hypervisor will be
 well understood
Security Goals
 Strong isolation between partitions
 Protect confidentiality and integrity of guest
 data
 Separation
   Unique hypervisor resource pools per guest
   Separate per-guest worker processes manage state
   Guest-to-root communications over unique
   channels
 Non-interference
   Guests cannot affect the contents of other guests,
   root, hypervisor
   Guest computations protected from other guests
   Guest-to-guest communications not allowed
   through VM interfaces
Hyper-V Security
 No sharing of virtualized devices
 Separate VMBus per guest to the parent
 No sharing of memory
   Each has its own address space
 Guests cannot communicate with each other,
 except through traditional networking
 Guests can’t perform DMA attacks because
 they’re never mapped to physical devices
 No partition can write into hypervisor memory
Virtualization Attacks
         Root Partition                       Guest Partitions               Provided by:
Virtualization Stack                                                            Windows

 WMI Provider                                   Guest Applications              Hyper-V
                       VM Worker
      VM               Processes                                                ISV
     Service
                                                  Ring 3: User Mode
                                                                                Malicious User

                                           Virtualization
                                              Service             OS
 Server Core        Virtualization                               Kernel
                                              Clients
                          Service             (VSCs)
 Windows
  Kernel       Device Providers
               Drivers    (VSPs)        VMBus
                                        VMBus               Enlightenments

                                                Ring 0: Kernel Mode

                                 Windows hypervisor

                                Server Hardware
Agenda
 Virtualization Overview
 Hyper-V Architecture
 Hyper-V Security Overview
 Hyper-V Security Guide
 Summary!
Hyper-V Security Guide
 Chapter 1: Hardening Hyper-V
    Attack Surface
    Server Role Security Considerations
    Virtual Machine Configuration Checklist
 Chapter 2: Delegating Virtual Machine Management
    Using Tools to Delegate Access
    Delegating Access with Authorization Manager (AzMan)
    System Center Virtual Machine Manager (SCVMM)
 Protecting Virtual Machines
    Methods for Protecting Virtual Machines
    Maintaining Virtual Machines
    Best Practices
Attack Surface
 Adding the Hyper-V role service changes the
 attack surface
 The increased attack surface includes:
    Installed files
    Installed services
    Firewall rules
 The attack surface for Hyper-V is documented
Server Role Security Configuration
 Two main considerations:
    Parent partition (root) security
    Child partition (guest, VM) security
 Parent partition
    Default installation recommendations
    Host network configuration
    Secure dedicated storage devices
    Host management configuration (admin privileges)
 Virtual Machines
    Configuration recommendations
    Hardening the OS
    Checklist
Architecture of an Enterprise Network
Network Configuration for Multi-tier Web
Application
Delegating VM Management
 Hyper-V management console
    Requires admin account
    Manage VMs
 Authorization Manager (AzMan)
    Microsoft Management Console snap-in
    Users assigned to roles
    Roles granted permissions to perform operations
    Hyper-V defines 33 different operations
 System Center Virtual Machine Manager
    Comprehensive management solution for data centers
    Manage VMware ESX Server
    3 defined profiles
Hyper-V Ecosystem
Delegating VM Management
What is Authorization Manager?
 A Role-Based Access Control (RBAC) framework
 composed of:
    AzMan administration tool (AzMan.msc)
    Runtime that allows access checks against policy
 RBAC specifies access in terms of user roles,
 which are administrator-defined
 Authorization policy is managed separately from
 application code
AzMan Terminology
     Scope
     • A collection of similar resources with the same authorization policy
     • Virtual machines; virtual networks

     Role
     • A job category or responsibility
     • “Administrators” or “Self-Service Users” (in SCVMM)

     Task
     • A collection of operations or other actions
     • None are defined by default

     Operation
     • A specific action that a user can perform
     • “Start virtual machine”; “Stop virtual machine”
Hyper-V and AzMan
 One default role defined: Administrators
 Defines specific functions for users or roles
    Start, Stop, Allow Input, Allow Output, etc.
    32 operations are defined in the Auth store
 Hyper-V admins do not need Administrator
 access to parent partition OS
 Default authorization data stored in XML:
    %ProgramData%MicrosoftWindowsHyper-
    VInitialStore.xml

 Authorization data can be stored in Active
 Directory
Hyper-V Operations at-a-Glance
VM Management Operations
Read Service                              Reconfigure Service



Virtual Machine Operations
Allow input to a Allow output    Create virtual    Delete virtual    Change virtual
virtual machine from a virtual   machine           machine           machine
                 machine                                             authorization
                                                                     scope
Stop virtual     Start virtual   Pause and         Reconfigure       View virtual
machine          machine         restart virtual   virtual machine   machine
                                 machine                             configuration
Hyper-V Operations at-a-Glance
Networking Operations
Create virtual   Delete virtual    Create virtual   Delete virtual    Disconnect
switch           switch            switch port      switch port       virtual switch
                                                                      port
Create           Delete internal   Bind external    Unbind external   Change VLAN
internal         Ethernet port     Ethernet port    Ethernet port     configuration
Ethernet port                                                         on port
Modify switch    Modify switch     View switches    View switch       View external
settings         port settings                      ports             Ethernet ports
View internal View VLAN            View LAN         View virtual      Modify
Ethernet ports settings            endpoints        switch            internal
                                                    management        Ethernet port
                                                    service
Hyper-V Authorization Scenarios
 Departmental or Service Administrators

    A Hyper-V server hosts virtual machines for two
    different LOB applications.

    Admins for each application needs to have full control
    over their own virtual machines, but should have no
    access to the other application’s virtual machines, or to
    Hyper-V.
Hyper-V Authorization Scenarios
 Departmental or Service Administrators

    The help desk and, after hours, the Operations
    Center, perform some first level analysis of issues that
    are called in by end-users.

    They need to be able to view virtual machine
    configuration information and interact virtual
    machines. They should not be able to start, stop or
    save any virtual machines or change any configuration
    information.
Using AD as an Auth Store
 AzMan supports other auth stores such as
 Active Directory and SQL Server
 Useful for creating standardized auth policies
 across several servers
 Use of AD requires WS 2003 domain functional
 level or better
 Auth policies cannot be created in non-domain
 partitions
 Hyper-V host computer accounts require READ
 access to the auth store
System Center Virtual Machine Manager
Delegation and Self Service
 Administrators control access
 through policies which designate
 capabilities
 Delegated Administrators
   Manage a scoped environment
 Self service user
   Web user interface
   Manage their own VMs
   Quota to limit VMs
   Scripting through
   PowerShell
Understanding User Roles
                  Membership
     Membership      Determines which users
                     are part of a particular user role
                     Members may be individual users or
                     groups
                     Members may be in multiple user roles
       Profile       including user roles based on different
                     profiles

                  Profile determines
       Scope         Which actions are permitted
                     Which user interface is accessible
                     How the scope is defined

                  Scope determines
      User Role      Which objects a user may take
                     actions on
Built-In Profiles
 Administrators
    Full access to all actions
    Full access to all objects
    Can use the Admin console
    or PowerShell interface

 Delegated Administrators
    Full access to most actions
    Scope can be limited by host
    groups and Library servers
    Can use the Admin console
    or PowerShell interface

 Self-Service Users
    Limited access to a subset of actions
    Scope can be limited by
    host groups and Library share
    Can use the Self-Service
    Portal or PowerShell interface
Customizing Scopes
 Administrators
   No scope customization available,
   Administrators have access to all objects

 Delegated Administrators
   Can be limited to one or more host groups including all child objects
   Can be limited to one or more Library servers
   including all child objects

 Self-Service Users
   Can be limited to a single host group where
   new virtual machines may be created
   Can be limited to a single Library share
   where new virtual machines can be stored
   Can be limited to specific templates to use for new virtual machines
Delegating Administration


           Virtualized Environment
                          Delegated Administration




         Seattle                      New York
                                                  Delegated Administration




                       Production                          Dev/Test




                                            Self Service   Self Service      Self Service
                                               Users          Users             Users
Protecting Virtual Machines
 File system security
 Encryption
 Auditing
 Maintaining virtual machines
 Best practices
Summary
 Virtualization introduces new security concerns
 Hyper-V was designed to achieve strong security
 goals
 Use the Hyper-V Security Guide to:
   Install and configure Hyper-V with a strong focus on
   security
   Reduce the attack surface of Hyper-V host servers
   Secure virtual networks and storage devices on a Hyper-V
   host server
   Delegate administrative access to virtual machine
   resources within an organization
   Protect Virtual Machines - via file system permissions,
   encryption, and auditing
Online Resources
Virtualization Home Page: www.microsoft.com/virtualization



Virtualization Solution Accelerators: www.microsoft.com/vsa



MAP tool : http://microsoft.com/map



Hyper-V Green Tool : http://hyper-green.com
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should
 not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS,
                                                                           IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Contenu connexe

Tendances

pfSense presentation
pfSense presentationpfSense presentation
pfSense presentationSimon Vass
 
Windows 10 IoT Coreの脅威分析と実施すべきセキュリティ対策 by 和栗直英 - CODE BLUE 2015
Windows 10 IoT Coreの脅威分析と実施すべきセキュリティ対策 by 和栗直英 - CODE BLUE 2015Windows 10 IoT Coreの脅威分析と実施すべきセキュリティ対策 by 和栗直英 - CODE BLUE 2015
Windows 10 IoT Coreの脅威分析と実施すべきセキュリティ対策 by 和栗直英 - CODE BLUE 2015CODE BLUE
 
UEFI Firmware Rootkits: Myths and Reality
UEFI Firmware Rootkits: Myths and RealityUEFI Firmware Rootkits: Myths and Reality
UEFI Firmware Rootkits: Myths and RealitySally Feller
 
Vmware desktop infrastructure virtualization assessment
Vmware  desktop infrastructure virtualization assessmentVmware  desktop infrastructure virtualization assessment
Vmware desktop infrastructure virtualization assessmentsolarisyougood
 
Advance linux presentation_0702011
Advance linux presentation_0702011Advance linux presentation_0702011
Advance linux presentation_0702011Aravindan Arun
 
Présentation ubuntu 12.10 PDF
Présentation ubuntu  12.10 PDFPrésentation ubuntu  12.10 PDF
Présentation ubuntu 12.10 PDFMohamed Ben Bouzid
 
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
Csw2017 bazhaniuk exploring_yoursystemdeeper_updatedCsw2017 bazhaniuk exploring_yoursystemdeeper_updated
Csw2017 bazhaniuk exploring_yoursystemdeeper_updatedCanSecWest
 
Dave Gilbert - KVM and QEMU
Dave Gilbert - KVM and QEMUDave Gilbert - KVM and QEMU
Dave Gilbert - KVM and QEMUDanny Abukalam
 
Citrix xen app 6.5 step by-step 構築&操作ガイド
Citrix xen app 6.5 step by-step 構築&操作ガイドCitrix xen app 6.5 step by-step 構築&操作ガイド
Citrix xen app 6.5 step by-step 構築&操作ガイドCitrix Systems Japan
 
Introduction to Linux Kernel
Introduction to Linux KernelIntroduction to Linux Kernel
Introduction to Linux KernelStryker King
 
PHP 7 – What changed internally?
PHP 7 – What changed internally?PHP 7 – What changed internally?
PHP 7 – What changed internally?Nikita Popov
 
Topic #3 of outline Server Environment.pptx
Topic #3 of outline Server Environment.pptxTopic #3 of outline Server Environment.pptx
Topic #3 of outline Server Environment.pptxAyeCS11
 
ELC21: VM-to-VM Communication Mechanisms for Embedded
ELC21: VM-to-VM Communication Mechanisms for EmbeddedELC21: VM-to-VM Communication Mechanisms for Embedded
ELC21: VM-to-VM Communication Mechanisms for EmbeddedStefano Stabellini
 

Tendances (20)

pfSense presentation
pfSense presentationpfSense presentation
pfSense presentation
 
Windows 10 IoT Coreの脅威分析と実施すべきセキュリティ対策 by 和栗直英 - CODE BLUE 2015
Windows 10 IoT Coreの脅威分析と実施すべきセキュリティ対策 by 和栗直英 - CODE BLUE 2015Windows 10 IoT Coreの脅威分析と実施すべきセキュリティ対策 by 和栗直英 - CODE BLUE 2015
Windows 10 IoT Coreの脅威分析と実施すべきセキュリティ対策 by 和栗直英 - CODE BLUE 2015
 
UEFI Firmware Rootkits: Myths and Reality
UEFI Firmware Rootkits: Myths and RealityUEFI Firmware Rootkits: Myths and Reality
UEFI Firmware Rootkits: Myths and Reality
 
Vmware desktop infrastructure virtualization assessment
Vmware  desktop infrastructure virtualization assessmentVmware  desktop infrastructure virtualization assessment
Vmware desktop infrastructure virtualization assessment
 
Advance linux presentation_0702011
Advance linux presentation_0702011Advance linux presentation_0702011
Advance linux presentation_0702011
 
Présentation ubuntu 12.10 PDF
Présentation ubuntu  12.10 PDFPrésentation ubuntu  12.10 PDF
Présentation ubuntu 12.10 PDF
 
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
Csw2017 bazhaniuk exploring_yoursystemdeeper_updatedCsw2017 bazhaniuk exploring_yoursystemdeeper_updated
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
 
Linux Internals - Interview essentials 4.0
Linux Internals - Interview essentials 4.0Linux Internals - Interview essentials 4.0
Linux Internals - Interview essentials 4.0
 
Introduction to Linux
Introduction to LinuxIntroduction to Linux
Introduction to Linux
 
Nikto
NiktoNikto
Nikto
 
Dave Gilbert - KVM and QEMU
Dave Gilbert - KVM and QEMUDave Gilbert - KVM and QEMU
Dave Gilbert - KVM and QEMU
 
Citrix xen app 6.5 step by-step 構築&操作ガイド
Citrix xen app 6.5 step by-step 構築&操作ガイドCitrix xen app 6.5 step by-step 構築&操作ガイド
Citrix xen app 6.5 step by-step 構築&操作ガイド
 
Etes vous-pret pour php8 ?
Etes vous-pret pour php8 ?Etes vous-pret pour php8 ?
Etes vous-pret pour php8 ?
 
An Introduction To Linux
An Introduction To LinuxAn Introduction To Linux
An Introduction To Linux
 
Introduction to Linux Kernel
Introduction to Linux KernelIntroduction to Linux Kernel
Introduction to Linux Kernel
 
SELinux Basic Usage
SELinux Basic UsageSELinux Basic Usage
SELinux Basic Usage
 
PHP 7 – What changed internally?
PHP 7 – What changed internally?PHP 7 – What changed internally?
PHP 7 – What changed internally?
 
Topic #3 of outline Server Environment.pptx
Topic #3 of outline Server Environment.pptxTopic #3 of outline Server Environment.pptx
Topic #3 of outline Server Environment.pptx
 
Sikuli Slides
Sikuli SlidesSikuli Slides
Sikuli Slides
 
ELC21: VM-to-VM Communication Mechanisms for Embedded
ELC21: VM-to-VM Communication Mechanisms for EmbeddedELC21: VM-to-VM Communication Mechanisms for Embedded
ELC21: VM-to-VM Communication Mechanisms for Embedded
 

En vedette

Hyper-V: Best Practices
Hyper-V: Best PracticesHyper-V: Best Practices
Hyper-V: Best PracticesTomica Kaniski
 
How to Optimize Microsoft Hyper-V Failover Cluster and Double Performance
How to Optimize Microsoft Hyper-V Failover Cluster and Double PerformanceHow to Optimize Microsoft Hyper-V Failover Cluster and Double Performance
How to Optimize Microsoft Hyper-V Failover Cluster and Double PerformanceStarWind Software
 
Windows virtual pc
Windows virtual pcWindows virtual pc
Windows virtual pcbrayan_2012
 
Presentation 3 cx on the road
Presentation 3 cx on the roadPresentation 3 cx on the road
Presentation 3 cx on the roadsnomFrance
 
Les 10 règles d'or d'Eptica
Les 10 règles d'or d'EpticaLes 10 règles d'or d'Eptica
Les 10 règles d'or d'Epticaguest29addb
 
Open stack + Containers + Hyper-V
Open stack + Containers + Hyper-VOpen stack + Containers + Hyper-V
Open stack + Containers + Hyper-VSriram Subramanian
 
Chapter 1 exam 70-640 windows server 2008 active directory, config…
Chapter 1   exam 70-640 windows server 2008 active directory, config…Chapter 1   exam 70-640 windows server 2008 active directory, config…
Chapter 1 exam 70-640 windows server 2008 active directory, config…Prasanth Reddy
 
VMworld 2014: vSphere HA Best Practices and FT Tech Preview
VMworld 2014: vSphere HA Best Practices and FT Tech PreviewVMworld 2014: vSphere HA Best Practices and FT Tech Preview
VMworld 2014: vSphere HA Best Practices and FT Tech PreviewVMworld
 
Deep Dive Into Windows Server 2012 Hyper-V
Deep Dive Into Windows Server 2012 Hyper-VDeep Dive Into Windows Server 2012 Hyper-V
Deep Dive Into Windows Server 2012 Hyper-VLai Yoong Seng
 
Hyperv R2 y WDS
Hyperv R2 y WDSHyperv R2 y WDS
Hyperv R2 y WDSITSanchez
 
LeverX SAP PLM Rapid Prototype Case Study
LeverX SAP PLM Rapid Prototype Case StudyLeverX SAP PLM Rapid Prototype Case Study
LeverX SAP PLM Rapid Prototype Case StudyEric Stajda
 
Escaping the waterfall case study_FINAL
Escaping the waterfall case study_FINALEscaping the waterfall case study_FINAL
Escaping the waterfall case study_FINALCassandra Oxford
 
Clocky: The Runaway Alarm Clock Case Analysis
Clocky: The Runaway Alarm Clock Case AnalysisClocky: The Runaway Alarm Clock Case Analysis
Clocky: The Runaway Alarm Clock Case AnalysisDinker Vaid
 
Backup workflow for SMHV on windows 2008R2 HYPER-V
Backup workflow for SMHV on windows 2008R2 HYPER-VBackup workflow for SMHV on windows 2008R2 HYPER-V
Backup workflow for SMHV on windows 2008R2 HYPER-VAshwin Pawar
 
Webcast Conociendo Hyperv R2
Webcast   Conociendo Hyperv R2Webcast   Conociendo Hyperv R2
Webcast Conociendo Hyperv R2ITSanchez
 
Intro to Security in SDLC
Intro to Security in SDLCIntro to Security in SDLC
Intro to Security in SDLCTjylen Veselyj
 

En vedette (20)

Hyper-V: Best Practices
Hyper-V: Best PracticesHyper-V: Best Practices
Hyper-V: Best Practices
 
How to Optimize Microsoft Hyper-V Failover Cluster and Double Performance
How to Optimize Microsoft Hyper-V Failover Cluster and Double PerformanceHow to Optimize Microsoft Hyper-V Failover Cluster and Double Performance
How to Optimize Microsoft Hyper-V Failover Cluster and Double Performance
 
Vlan-spanning tree
Vlan-spanning treeVlan-spanning tree
Vlan-spanning tree
 
Windows virtual pc
Windows virtual pcWindows virtual pc
Windows virtual pc
 
Presentation 3 cx on the road
Presentation 3 cx on the roadPresentation 3 cx on the road
Presentation 3 cx on the road
 
Les 10 règles d'or d'Eptica
Les 10 règles d'or d'EpticaLes 10 règles d'or d'Eptica
Les 10 règles d'or d'Eptica
 
Open stack + Containers + Hyper-V
Open stack + Containers + Hyper-VOpen stack + Containers + Hyper-V
Open stack + Containers + Hyper-V
 
Chapter 1 exam 70-640 windows server 2008 active directory, config…
Chapter 1   exam 70-640 windows server 2008 active directory, config…Chapter 1   exam 70-640 windows server 2008 active directory, config…
Chapter 1 exam 70-640 windows server 2008 active directory, config…
 
VMworld 2014: vSphere HA Best Practices and FT Tech Preview
VMworld 2014: vSphere HA Best Practices and FT Tech PreviewVMworld 2014: vSphere HA Best Practices and FT Tech Preview
VMworld 2014: vSphere HA Best Practices and FT Tech Preview
 
Deep Dive Into Windows Server 2012 Hyper-V
Deep Dive Into Windows Server 2012 Hyper-VDeep Dive Into Windows Server 2012 Hyper-V
Deep Dive Into Windows Server 2012 Hyper-V
 
Hyperv R2 y WDS
Hyperv R2 y WDSHyperv R2 y WDS
Hyperv R2 y WDS
 
Shushank
ShushankShushank
Shushank
 
The security sdlc
The security sdlcThe security sdlc
The security sdlc
 
LeverX SAP PLM Rapid Prototype Case Study
LeverX SAP PLM Rapid Prototype Case StudyLeverX SAP PLM Rapid Prototype Case Study
LeverX SAP PLM Rapid Prototype Case Study
 
Escaping the waterfall case study_FINAL
Escaping the waterfall case study_FINALEscaping the waterfall case study_FINAL
Escaping the waterfall case study_FINAL
 
Clocky: The Runaway Alarm Clock Case Analysis
Clocky: The Runaway Alarm Clock Case AnalysisClocky: The Runaway Alarm Clock Case Analysis
Clocky: The Runaway Alarm Clock Case Analysis
 
Backup workflow for SMHV on windows 2008R2 HYPER-V
Backup workflow for SMHV on windows 2008R2 HYPER-VBackup workflow for SMHV on windows 2008R2 HYPER-V
Backup workflow for SMHV on windows 2008R2 HYPER-V
 
Webcast Conociendo Hyperv R2
Webcast   Conociendo Hyperv R2Webcast   Conociendo Hyperv R2
Webcast Conociendo Hyperv R2
 
V Model and W Model
V Model and W ModelV Model and W Model
V Model and W Model
 
Intro to Security in SDLC
Intro to Security in SDLCIntro to Security in SDLC
Intro to Security in SDLC
 

Similaire à Security Best Practices For Hyper V And Server Virtualization

CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2vivekbhat
 
Virtualization securityv2
Virtualization securityv2Virtualization securityv2
Virtualization securityv2vivekbhat
 
Virtualization: Hyper-V, VMM, App-V and MED-V.
Virtualization: Hyper-V, VMM, App-V and MED-V.Virtualization: Hyper-V, VMM, App-V and MED-V.
Virtualization: Hyper-V, VMM, App-V and MED-V.Microsoft Iceland
 
Virtualizare si SCVMM2008
Virtualizare si SCVMM2008Virtualizare si SCVMM2008
Virtualizare si SCVMM2008Tudor Damian
 
Windows 2008 R2 Virtualization
Windows 2008  R2  VirtualizationWindows 2008  R2  Virtualization
Windows 2008 R2 VirtualizationEduardo Castro
 
Virtualization Primer for Java Developers
Virtualization Primer for Java DevelopersVirtualization Primer for Java Developers
Virtualization Primer for Java DevelopersRichard McDougall
 
System Center Virtual Machine Manager 2008 R2
System Center Virtual Machine Manager 2008 R2System Center Virtual Machine Manager 2008 R2
System Center Virtual Machine Manager 2008 R2aralves
 
Esx Server 3i Presentation[1]
Esx Server 3i Presentation[1]Esx Server 3i Presentation[1]
Esx Server 3i Presentation[1]Rishi Sharma
 
Aidan Finn Hyper V The Future Of Infrastructure
Aidan Finn   Hyper V   The Future Of InfrastructureAidan Finn   Hyper V   The Future Of Infrastructure
Aidan Finn Hyper V The Future Of InfrastructureNathan Winters
 
Hyper V R2 Deep Dive
Hyper V R2 Deep DiveHyper V R2 Deep Dive
Hyper V R2 Deep DiveAidan Finn
 
Windows Server Virtualization
Windows Server VirtualizationWindows Server Virtualization
Windows Server VirtualizationZernike College
 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisorsGaurav Suri
 
Xen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XTXen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XTThe Linux Foundation
 
Hyper V - Minasi Forum 2009
Hyper V - Minasi Forum 2009Hyper V - Minasi Forum 2009
Hyper V - Minasi Forum 2009Aidan Finn
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentationMangesh Gunjal
 
Ready for cloud computing with hyper v
Ready for cloud computing with hyper vReady for cloud computing with hyper v
Ready for cloud computing with hyper vAndik Susilo
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroGraeme Wood
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudGraeme Wood
 

Similaire à Security Best Practices For Hyper V And Server Virtualization (20)

CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2
 
Virtualization securityv2
Virtualization securityv2Virtualization securityv2
Virtualization securityv2
 
Virtualization: Hyper-V, VMM, App-V and MED-V.
Virtualization: Hyper-V, VMM, App-V and MED-V.Virtualization: Hyper-V, VMM, App-V and MED-V.
Virtualization: Hyper-V, VMM, App-V and MED-V.
 
Virtualizare si SCVMM2008
Virtualizare si SCVMM2008Virtualizare si SCVMM2008
Virtualizare si SCVMM2008
 
6420 a 15
6420 a 156420 a 15
6420 a 15
 
Windows 2008 R2 Virtualization
Windows 2008  R2  VirtualizationWindows 2008  R2  Virtualization
Windows 2008 R2 Virtualization
 
Virtualization Primer for Java Developers
Virtualization Primer for Java DevelopersVirtualization Primer for Java Developers
Virtualization Primer for Java Developers
 
System Center Virtual Machine Manager 2008 R2
System Center Virtual Machine Manager 2008 R2System Center Virtual Machine Manager 2008 R2
System Center Virtual Machine Manager 2008 R2
 
Usenix Invited Talk
Usenix Invited TalkUsenix Invited Talk
Usenix Invited Talk
 
Esx Server 3i Presentation[1]
Esx Server 3i Presentation[1]Esx Server 3i Presentation[1]
Esx Server 3i Presentation[1]
 
Aidan Finn Hyper V The Future Of Infrastructure
Aidan Finn   Hyper V   The Future Of InfrastructureAidan Finn   Hyper V   The Future Of Infrastructure
Aidan Finn Hyper V The Future Of Infrastructure
 
Hyper V R2 Deep Dive
Hyper V R2 Deep DiveHyper V R2 Deep Dive
Hyper V R2 Deep Dive
 
Windows Server Virtualization
Windows Server VirtualizationWindows Server Virtualization
Windows Server Virtualization
 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisors
 
Xen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XTXen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XT
 
Hyper V - Minasi Forum 2009
Hyper V - Minasi Forum 2009Hyper V - Minasi Forum 2009
Hyper V - Minasi Forum 2009
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
 
Ready for cloud computing with hyper v
Ready for cloud computing with hyper vReady for cloud computing with hyper v
Ready for cloud computing with hyper v
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The Cloud
 

Plus de rsnarayanan

Kevin Ms Web Platform
Kevin Ms Web PlatformKevin Ms Web Platform
Kevin Ms Web Platformrsnarayanan
 
Harish Understanding Aspnet
Harish Understanding AspnetHarish Understanding Aspnet
Harish Understanding Aspnetrsnarayanan
 
Harish Aspnet Dynamic Data
Harish Aspnet Dynamic DataHarish Aspnet Dynamic Data
Harish Aspnet Dynamic Datarsnarayanan
 
Harish Aspnet Deployment
Harish Aspnet DeploymentHarish Aspnet Deployment
Harish Aspnet Deploymentrsnarayanan
 
Whats New In Sl3
Whats New In Sl3Whats New In Sl3
Whats New In Sl3rsnarayanan
 
Silverlight And .Net Ria Services – Building Lob And Business Applications Wi...
Silverlight And .Net Ria Services – Building Lob And Business Applications Wi...Silverlight And .Net Ria Services – Building Lob And Business Applications Wi...
Silverlight And .Net Ria Services – Building Lob And Business Applications Wi...rsnarayanan
 
Advanced Silverlight
Advanced SilverlightAdvanced Silverlight
Advanced Silverlightrsnarayanan
 
Occasionally Connected Systems
Occasionally Connected SystemsOccasionally Connected Systems
Occasionally Connected Systemsrsnarayanan
 
Developing Php Applications Using Microsoft Software And Services
Developing Php Applications Using Microsoft Software And ServicesDeveloping Php Applications Using Microsoft Software And Services
Developing Php Applications Using Microsoft Software And Servicesrsnarayanan
 
Build Mission Critical Applications On The Microsoft Platform Using Eclipse J...
Build Mission Critical Applications On The Microsoft Platform Using Eclipse J...Build Mission Critical Applications On The Microsoft Platform Using Eclipse J...
Build Mission Critical Applications On The Microsoft Platform Using Eclipse J...rsnarayanan
 
J Query The Write Less Do More Javascript Library
J Query   The Write Less Do More Javascript LibraryJ Query   The Write Less Do More Javascript Library
J Query The Write Less Do More Javascript Libraryrsnarayanan
 
Ms Sql Business Inteligence With My Sql
Ms Sql Business Inteligence With My SqlMs Sql Business Inteligence With My Sql
Ms Sql Business Inteligence With My Sqlrsnarayanan
 
Windows 7 For Developers
Windows 7 For DevelopersWindows 7 For Developers
Windows 7 For Developersrsnarayanan
 
What Is New In Wpf 3.5 Sp1
What Is New In Wpf 3.5 Sp1What Is New In Wpf 3.5 Sp1
What Is New In Wpf 3.5 Sp1rsnarayanan
 
Ux For Developers
Ux For DevelopersUx For Developers
Ux For Developersrsnarayanan
 
A Lap Around Internet Explorer 8
A Lap Around Internet Explorer 8A Lap Around Internet Explorer 8
A Lap Around Internet Explorer 8rsnarayanan
 

Plus de rsnarayanan (20)

Walther Aspnet4
Walther Aspnet4Walther Aspnet4
Walther Aspnet4
 
Walther Ajax4
Walther Ajax4Walther Ajax4
Walther Ajax4
 
Kevin Ms Web Platform
Kevin Ms Web PlatformKevin Ms Web Platform
Kevin Ms Web Platform
 
Harish Understanding Aspnet
Harish Understanding AspnetHarish Understanding Aspnet
Harish Understanding Aspnet
 
Walther Mvc
Walther MvcWalther Mvc
Walther Mvc
 
Harish Aspnet Dynamic Data
Harish Aspnet Dynamic DataHarish Aspnet Dynamic Data
Harish Aspnet Dynamic Data
 
Harish Aspnet Deployment
Harish Aspnet DeploymentHarish Aspnet Deployment
Harish Aspnet Deployment
 
Whats New In Sl3
Whats New In Sl3Whats New In Sl3
Whats New In Sl3
 
Silverlight And .Net Ria Services – Building Lob And Business Applications Wi...
Silverlight And .Net Ria Services – Building Lob And Business Applications Wi...Silverlight And .Net Ria Services – Building Lob And Business Applications Wi...
Silverlight And .Net Ria Services – Building Lob And Business Applications Wi...
 
Advanced Silverlight
Advanced SilverlightAdvanced Silverlight
Advanced Silverlight
 
Netcf Gc
Netcf GcNetcf Gc
Netcf Gc
 
Occasionally Connected Systems
Occasionally Connected SystemsOccasionally Connected Systems
Occasionally Connected Systems
 
Developing Php Applications Using Microsoft Software And Services
Developing Php Applications Using Microsoft Software And ServicesDeveloping Php Applications Using Microsoft Software And Services
Developing Php Applications Using Microsoft Software And Services
 
Build Mission Critical Applications On The Microsoft Platform Using Eclipse J...
Build Mission Critical Applications On The Microsoft Platform Using Eclipse J...Build Mission Critical Applications On The Microsoft Platform Using Eclipse J...
Build Mission Critical Applications On The Microsoft Platform Using Eclipse J...
 
J Query The Write Less Do More Javascript Library
J Query   The Write Less Do More Javascript LibraryJ Query   The Write Less Do More Javascript Library
J Query The Write Less Do More Javascript Library
 
Ms Sql Business Inteligence With My Sql
Ms Sql Business Inteligence With My SqlMs Sql Business Inteligence With My Sql
Ms Sql Business Inteligence With My Sql
 
Windows 7 For Developers
Windows 7 For DevelopersWindows 7 For Developers
Windows 7 For Developers
 
What Is New In Wpf 3.5 Sp1
What Is New In Wpf 3.5 Sp1What Is New In Wpf 3.5 Sp1
What Is New In Wpf 3.5 Sp1
 
Ux For Developers
Ux For DevelopersUx For Developers
Ux For Developers
 
A Lap Around Internet Explorer 8
A Lap Around Internet Explorer 8A Lap Around Internet Explorer 8
A Lap Around Internet Explorer 8
 

Dernier

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Dernier (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Security Best Practices For Hyper V And Server Virtualization

  • 1. Rohit Gulati | Partner Technical Consultant Microsoft
  • 2. Agenda Virtualization Overview Hyper-V Architecture Hyper-V Security Overview Hyper-V Security Guide Summary!
  • 3. Virtualization Today Machine virtualization requires control of privileged operations CPU registers and memory management hardware Hardware devices Virtualization usually means emulation, but can also mean controlled access to privileged state The core virtualization software is called a Virtual Machine Monitor (VMM) There are two approaches to machine virtualization: Hosted virtualization Hypervisor virtualization
  • 4. Virtual Machine Monitor Arrangements Hosted Virtualization Hypervisor Virtualization Guest 1 Guest 2 Guest 1 Guest 2 Host OS VMM VMM Hardware Hardware Examples: Examples: VMware Workstation VMware ESX KVM Xen Virtual PC & Virtual Server Hyper-V
  • 5. Monolithic Versus Microkernel Hypervisor Monolithic Hypervisor Microkernel Hypervisor VM 1 VM 1 (Parent) VM 2 VM 3 (Admin) Virtual- VM 2 VM 3 ization (Child) (Child) Virtualization Stack Stack Drivers Drivers Drivers Hypervisor Drivers Hypervisor Hardware Hardware More simple than a modern Simple partitioning functionality kernel, but still complex Increase reliability and minimizes TCB Implements a driver model No third-party code Drivers run within guests
  • 6. Agenda Virtualization Overview Hyper-V Architecture Hyper-V Security Overview Hyper-V Security Guide Summary!
  • 7. Hyper-V Background Three major components Hypervisor Virtualization Stack Virtual Devices Windows based virtualization platform Windows Server 2008 x64 Edition technology (32/64 bit guest support) Standard, Enterprise, and Datacenter Editions Standards based Packaged as a Server Role Requires hardware assisted virtualization AMD AMD-V Intel VT Data Execution Prevention (DEP) should be enabled
  • 8. Hyper-V Architecture Root Partition Guest Partitions Provided by: Windows Virtualization Stack Hyper-V WMI Provider Guest Applications VM Worker ISV VM Processes Service Ring 3: User Mode Virtualization Service OS Server Core Virtualization Kernel Clients Service (VSCs) Windows Kernel Device Providers Drivers (VSPs) VMBus Enlightenments Ring 0: Kernel Mode Windows Hypervisor Server Hardware
  • 9. Hypervisor Partitioning Kernel Partition is an isolation boundary Few virtualization functions; relies on virtualization stack Very thin layer of software Microkernel Highly reliable No device drivers Two versions, one for Intel and one for AMD Drivers run in the root partition Leverage the large base of Windows drivers Well-defined interface Allow others to create support for their OSes as guests
  • 10. Virtualization Stack Runs within the root partition Portion of traditional hypervisor that has been pushed up and out to make a micro-hypervisor Manages guest partitions Handles intercepts Emulates devices
  • 11. Agenda Virtualization Overview Hyper-V Architecture Hyper-V Security Overview Hyper-V Security Guide Summary!
  • 12. VM “Aware” Threats New technologies can introduce new types of attacks Guest OS { SAP Dept File / Print VM Host Guest VMs can not see/detect threats in the VM host due to the virtualizing behavior of the host. This attack approach is similar, yet much more insidious, than the approach rootkits take to hide their presence.
  • 13. Top Virtualization Security Concerns The loss of separation of duties for administrative tasks, which can lead to a breakdown of defense in depth Patching, signature updates, and protection from tampering for offline virtual machine and virtual machine appliance images Patching and secure confirmation management of VM appliances where the underlying OS and configuration aren’t accessible Limited visibility into the host OS and virtual network to find vulnerabilities and access correct configuration Restricted view into inter-VM traffic for inspection by intrusion- prevention systems Mobile VMs will require security policy and settings to migrate with them Immature and incomplete security and management tools
  • 14. Security Assumptions Guests are un-trusted Root must be trusted by hypervisor; guests must trust the root Code in guests will run in all available processor modes, rings, and segments Hypercall interface will be well documented and widely available to attackers All hypercalls can be attempted by guests Can detect you are running on a hypervisor We’ll even give you the version The internal design of the hypervisor will be well understood
  • 15. Security Goals Strong isolation between partitions Protect confidentiality and integrity of guest data Separation Unique hypervisor resource pools per guest Separate per-guest worker processes manage state Guest-to-root communications over unique channels Non-interference Guests cannot affect the contents of other guests, root, hypervisor Guest computations protected from other guests Guest-to-guest communications not allowed through VM interfaces
  • 16. Hyper-V Security No sharing of virtualized devices Separate VMBus per guest to the parent No sharing of memory Each has its own address space Guests cannot communicate with each other, except through traditional networking Guests can’t perform DMA attacks because they’re never mapped to physical devices No partition can write into hypervisor memory
  • 17. Virtualization Attacks Root Partition Guest Partitions Provided by: Virtualization Stack Windows WMI Provider Guest Applications Hyper-V VM Worker VM Processes ISV Service Ring 3: User Mode Malicious User Virtualization Service OS Server Core Virtualization Kernel Clients Service (VSCs) Windows Kernel Device Providers Drivers (VSPs) VMBus VMBus Enlightenments Ring 0: Kernel Mode Windows hypervisor Server Hardware
  • 18. Agenda Virtualization Overview Hyper-V Architecture Hyper-V Security Overview Hyper-V Security Guide Summary!
  • 19. Hyper-V Security Guide Chapter 1: Hardening Hyper-V Attack Surface Server Role Security Considerations Virtual Machine Configuration Checklist Chapter 2: Delegating Virtual Machine Management Using Tools to Delegate Access Delegating Access with Authorization Manager (AzMan) System Center Virtual Machine Manager (SCVMM) Protecting Virtual Machines Methods for Protecting Virtual Machines Maintaining Virtual Machines Best Practices
  • 20. Attack Surface Adding the Hyper-V role service changes the attack surface The increased attack surface includes: Installed files Installed services Firewall rules The attack surface for Hyper-V is documented
  • 21. Server Role Security Configuration Two main considerations: Parent partition (root) security Child partition (guest, VM) security Parent partition Default installation recommendations Host network configuration Secure dedicated storage devices Host management configuration (admin privileges) Virtual Machines Configuration recommendations Hardening the OS Checklist
  • 22. Architecture of an Enterprise Network
  • 23. Network Configuration for Multi-tier Web Application
  • 24. Delegating VM Management Hyper-V management console Requires admin account Manage VMs Authorization Manager (AzMan) Microsoft Management Console snap-in Users assigned to roles Roles granted permissions to perform operations Hyper-V defines 33 different operations System Center Virtual Machine Manager Comprehensive management solution for data centers Manage VMware ESX Server 3 defined profiles
  • 27. What is Authorization Manager? A Role-Based Access Control (RBAC) framework composed of: AzMan administration tool (AzMan.msc) Runtime that allows access checks against policy RBAC specifies access in terms of user roles, which are administrator-defined Authorization policy is managed separately from application code
  • 28. AzMan Terminology Scope • A collection of similar resources with the same authorization policy • Virtual machines; virtual networks Role • A job category or responsibility • “Administrators” or “Self-Service Users” (in SCVMM) Task • A collection of operations or other actions • None are defined by default Operation • A specific action that a user can perform • “Start virtual machine”; “Stop virtual machine”
  • 29. Hyper-V and AzMan One default role defined: Administrators Defines specific functions for users or roles Start, Stop, Allow Input, Allow Output, etc. 32 operations are defined in the Auth store Hyper-V admins do not need Administrator access to parent partition OS Default authorization data stored in XML: %ProgramData%MicrosoftWindowsHyper- VInitialStore.xml Authorization data can be stored in Active Directory
  • 30. Hyper-V Operations at-a-Glance VM Management Operations Read Service Reconfigure Service Virtual Machine Operations Allow input to a Allow output Create virtual Delete virtual Change virtual virtual machine from a virtual machine machine machine machine authorization scope Stop virtual Start virtual Pause and Reconfigure View virtual machine machine restart virtual virtual machine machine machine configuration
  • 31. Hyper-V Operations at-a-Glance Networking Operations Create virtual Delete virtual Create virtual Delete virtual Disconnect switch switch switch port switch port virtual switch port Create Delete internal Bind external Unbind external Change VLAN internal Ethernet port Ethernet port Ethernet port configuration Ethernet port on port Modify switch Modify switch View switches View switch View external settings port settings ports Ethernet ports View internal View VLAN View LAN View virtual Modify Ethernet ports settings endpoints switch internal management Ethernet port service
  • 32. Hyper-V Authorization Scenarios Departmental or Service Administrators A Hyper-V server hosts virtual machines for two different LOB applications. Admins for each application needs to have full control over their own virtual machines, but should have no access to the other application’s virtual machines, or to Hyper-V.
  • 33. Hyper-V Authorization Scenarios Departmental or Service Administrators The help desk and, after hours, the Operations Center, perform some first level analysis of issues that are called in by end-users. They need to be able to view virtual machine configuration information and interact virtual machines. They should not be able to start, stop or save any virtual machines or change any configuration information.
  • 34. Using AD as an Auth Store AzMan supports other auth stores such as Active Directory and SQL Server Useful for creating standardized auth policies across several servers Use of AD requires WS 2003 domain functional level or better Auth policies cannot be created in non-domain partitions Hyper-V host computer accounts require READ access to the auth store
  • 35. System Center Virtual Machine Manager
  • 36. Delegation and Self Service Administrators control access through policies which designate capabilities Delegated Administrators Manage a scoped environment Self service user Web user interface Manage their own VMs Quota to limit VMs Scripting through PowerShell
  • 37. Understanding User Roles Membership Membership Determines which users are part of a particular user role Members may be individual users or groups Members may be in multiple user roles Profile including user roles based on different profiles Profile determines Scope Which actions are permitted Which user interface is accessible How the scope is defined Scope determines User Role Which objects a user may take actions on
  • 38. Built-In Profiles Administrators Full access to all actions Full access to all objects Can use the Admin console or PowerShell interface Delegated Administrators Full access to most actions Scope can be limited by host groups and Library servers Can use the Admin console or PowerShell interface Self-Service Users Limited access to a subset of actions Scope can be limited by host groups and Library share Can use the Self-Service Portal or PowerShell interface
  • 39. Customizing Scopes Administrators No scope customization available, Administrators have access to all objects Delegated Administrators Can be limited to one or more host groups including all child objects Can be limited to one or more Library servers including all child objects Self-Service Users Can be limited to a single host group where new virtual machines may be created Can be limited to a single Library share where new virtual machines can be stored Can be limited to specific templates to use for new virtual machines
  • 40. Delegating Administration Virtualized Environment Delegated Administration Seattle New York Delegated Administration Production Dev/Test Self Service Self Service Self Service Users Users Users
  • 41. Protecting Virtual Machines File system security Encryption Auditing Maintaining virtual machines Best practices
  • 42. Summary Virtualization introduces new security concerns Hyper-V was designed to achieve strong security goals Use the Hyper-V Security Guide to: Install and configure Hyper-V with a strong focus on security Reduce the attack surface of Hyper-V host servers Secure virtual networks and storage devices on a Hyper-V host server Delegate administrative access to virtual machine resources within an organization Protect Virtual Machines - via file system permissions, encryption, and auditing
  • 43. Online Resources Virtualization Home Page: www.microsoft.com/virtualization Virtualization Solution Accelerators: www.microsoft.com/vsa MAP tool : http://microsoft.com/map Hyper-V Green Tool : http://hyper-green.com
  • 44.
  • 45. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Notes de l'éditeur

  1. AzMan is a role-based access control (RBAC) framework that provides an administrative tool to manage authorization policy and a runtime that allows applications to perform access checks against that policy. The AzMan administration tool (AzMan.msc) is supplied as a Microsoft Management Console (MMC) snap-in.Role-based authorization policy specifies access in terms of user roles that reflect an application's authorization requirements. Users are assigned to roles based on their job functions and these roles are granted permissions to perform related tasks.Authorization policy is managed separately from an application’s code. The application designer defines the set of low-level operations that are considered security sensitive and then defines a set of tasks that map onto those operations. The tasks, but not the operations, are designed to be understandable by administrators and business analysts.Administrators use the AzMan snap-in to manage which roles should have access to which tasks. As the business evolves and roles need to be modified, the administrator makes changes to the authorization policy; the underlying business application does not need to be changed. Federation-aware applications employ AzMan for access control decisions by mapping federation claims to AzMan roles.
  2. By default Hyper-V is configured such that only members of the administrators group can create and control virtual machines. Hyper-V uses the new authorization management framework in Windows to allow you to configure what users can and cannot do with virtual machines.  This is very powerful and allows for some useful and interesting configuration options - but I will explore those on another day.  To set the stage I need to explain some terms from the authorization management framework world:Operation This is the basic building block of authorization manager - and represents some action that the user can perform.  Some operations that exist in our authorization store include op_Create_VM (the act of creating a new virtual machine) or op_Start_VM (the act of starting a virtual machine). TaskA task is a grouping of operations.  We do not create any tasks by default - but you could create a task that was labeled 'control_VM' and then add the operations for starting, stopping, pausing and restarting a virtual machine to that task. RoleA role defines a job / position / responsibility that is held by a user.  For instance, you might have a role called 'Virtual_Network_Admin'.  This role would have all the tasks and operations that relate to virtual networks.  Users are then assigned to roles as needed. ScopeA scope allows you to define which objects are owned by which roles.  If you had a system where you wanted to grant administrative access to a subset of the virtual machines to a specific user - you would create a scope for those virtual machines and apply your configuration change to only that scope. Default Scope The default scope is where virtual machines are stored by default.  It is the equivalent of having no scope defined. Hyper-V can be configured to store it's authorization configuration in Active Directory or in a local XML file.  After initial installation it will always be configured to use a local XML file located at \\programdata\\Microsoft\\Windows\\Hyper-V\\InitialStore.xml on the system partition.  To edit this file you will need to: