Software
News
5/12/2008
04:45 PM
Connect Directly
RSS
E-Mail
50%
50%

Virtualization Has A Security Blind Spot

Along with the flexibility and agility gained through virtualization comes a loss of visibility into network traffic.

NEW TECHNOLOGIES (AND CHALLENGES)
Those infrastructure changes can have a significant impact on security. Virtualized servers, which are hosted on the same physical box, can communicate directly with each other without any of their traffic hitting the physical network where traditional network security tools reside. Standard in-line security data tools, such as intrusion prevention, count on being in line with the conversation over the network. This lack of visibility can have unintended consequences: Tools for capturing network, database, and application reports from logs for regulatory compliance don't get all the information they need; host-based antivirus tools, if installed on numerous virtual servers, can bring the overall CPU utilization of the physical server to a crawl; and patch management apps may not offer good support for virtualized systems.

To make certain proper security controls are in place, companies have created logical security zones such as trusted, untrusted, and Internet-facing demilitarized zones. This way, virtualized instances that contain sensitive or proprietary information will be limited to physical hosts within zones ranked at the appropriate security level, with higher security settings in more trusted zones and loosely managed systems in the untrusted zones. These zones can be segmented much the same way security zones are used in physical networks. For instance, a network segment that supports the sales department of a pharmaceutical company would have much different security controls than research and development segments would have.

Yet attempting to secure virtualized environments in this way can significantly limit the utility of virtualization--being able to quickly add or shift virtualized instances to available host server resources. Because security zones lessen the number of virtual servers that can be consolidated, you'll need to add more physical servers for each zone.

"The benefits and ROI of virtualization naturally push organizations because they want the flexibly to allocate more databases, more Web servers, more application servers when needed," says analyst Antonopoulos. "But if you run out of capacity in the database pool, you can't shift demand to the application pool. You're now put in a difficult position of having to make explicit choices between business utility, flexibility, and ROI on one hand, and security on the other," he says.

CPU STRAIN
Another challenge: The hardware capacity demands of running security software within multiple VMs, as well as on the physical host, can strain CPU loads. "Host-based security tools can work just fine, but you may not get the amount of consolidation you sought, and capacity-planning CPU cycles becomes even more important in virtualized environments," says Pete Lindstrom, a security analyst at research firm Burton Group.

As a workaround to this, companies have tried routing virtual server traffic through virtual switches out to the physical network, to be vetted by their traditional network security controls such as intrusion-prevention and anti-malware systems, and then back to the virtual server. But even this can get messy. "Trying to manage virtual system security the way you managed physical system security is both the best and worst answer," says Antonopoulos. "You scale that to any number of machines above a dozen, and the result is what I call 'VLAN spaghetti.' It's completely unmanageable."

Top Security Concerns Of Virtualization
» The loss of separation of duties for administrative tasks, which can lead to a breakdown of defense in depth
» Patching, signature updates, and protection from tampering for offline virtual machine and virtual machine appliance images
» Patching and secure confirmation management of VM appliances where the underlying OS and configuration aren't accessible
» Limited visibility into the host OS and virtual network to find vulnerabilities and assess correct configuration
» Restricted view into inter-VM traffic for inspection by intrusion-prevention systems
» Mobile VMs will require security policy and settings to migrate with them
» Immature and incomplete security and management tools
Data: Gartner
A swath of security vendors is bringing to market tools to ease the security and manageability of virtualized systems. Some, like Skybox Security, are updating their tools to adapt to virtualization. Skybox supports virtual firewalls from Juniper and Cisco in its Skybox View 4.0 risk management and network-modeling suite. Others, including startups Altor Networks, Catbird, Fortisphere, and Montego Networks, offer tools that provide everything from virtual machine discovery and management to intrusion prevention and policy management and enforcement capabilities. "These toolsets virtualize security, not try to bring physical security methods to virtual systems," says Antonopoulos.

To help its partners better integrate security into virtualized environments, virtualization stalwart VMware recently kicked off its VMsafe initiative. VMsafe is a set of APIs that permit security apps to attain a level of visibility into VMware's hypervisor--that thin layer of virtualization software that abstracts the operating system and apps from the hardware platform. The APIs let security vendors develop tools to block viruses and Trojans, monitor network traffic, build firewalls that integrate more tightly with VMs, and even improve patch management and perform vulnerability assessments. About 20 suppliers have expressed interest in VMsafe, including Check Point Software, McAfee, Symantec, and VMware parent EMC's RSA Security unit.

"VMsafe is a signal to the market that VMware is taking security seriously and that they're willing to work with third-party security vendors to bring their solutions to the virtualized environment," says Lindstrom.

That openness is a double-edged sword. "By giving security vendors access to directly interact with, and in some cases control, functions will bring virtualized generations of security toolsets, but it will also present some interesting attack vectors that can be exploited by people who love to take advantage of that same set of APIs," says Unisys' Hoff.

While the risks to virtualized environments are real, the tools and best practices for securing them are fast becoming real, too. "The security tools will mature," says consultant Hession. "We'll see the same level of rapid innovation from the startup security vendors. Those tools will be tested and proven in the market, and eventually become part of the network fabric." That can't happen soon enough for companies looking to capitalize on the business benefits of virtualization.

Illustration by Dan Page

Continue to the sidebar:
The Right Security Tools

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Google in the Enterprise Survey
Google in the Enterprise Survey
There's no doubt Google has made headway into businesses: Just 28 percent discourage or ban use of its productivity ­products, and 69 percent cite Google Apps' good or excellent ­mobility. But progress could still stall: 59 percent of nonusers ­distrust the security of Google's cloud. Its data privacy is an open question, and 37 percent worry about integration.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest September 24, 2014
Start improving branch office support by tapping public and private cloud resources to boost performance, increase worker productivity, and cut costs.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.