Should I trust the hypervisor to separate my security zones. And which architectures minimise the risk from an error by VMware in their software.
Instead they deflect it with a Gartner quote:
Gartner research supports this view by suggesting that security risks primarily emanate from administrative misconfiguration and not from the virtual infrastructure.
Gartner are probably right. But if you fix your administrative configuration issues then the virtual infrastructure is surely worth worrying about, no?
More on the big question
So, should you trust the hypervisor? Well, CESG, who tend to err on the side of caution have made a fairly positive announcement with VMware. Note that it only applies to vSphere, and that the security procedures they recommend don't appear to be public - which is a shame.
So, should you trust the hypervisor? Well, CESG, who tend to err on the side of caution have made a fairly positive announcement with VMware. Note that it only applies to vSphere, and that the security procedures they recommend don't appear to be public - which is a shame.
So I don't have a firm answer on this one. It probably depends on your threat profile. If you are a major target for hackers - you are probably best having separate virtual server farms for different zones - possibly with more segregation than is even suggested in the VMWare papers Partially Collapsed model.
On the other hand, if you are a less interesting target, keep your hypervisor patched and keep an eye on the security news to make sure the situation doesn't change.
Segregation of duties
On the other hand, if you are a less interesting target, keep your hypervisor patched and keep an eye on the security news to make sure the situation doesn't change.
Segregation of duties
The most substantial point VMware also make is about staff. Can you maintain security if you go the full virtual server route for your environment, with virtual firewalls, switches and all the various zones on a single virtual server platform.
The virtual server deployment is probably led by your IT staff. You would be lucky if they apply the same level of diligence to the network security architecture as your networking teams. In fact, perhaps the networking teams will lose control entirely with virtual switch, router and firewall management becoming an IT function. IT staff are pressured to deploy things quickly. They may not have the same background in network security either. What's going to keep network security policy enforced? Who will audit it?
Even if control of the virtual firewalls is kept to a separate firewall team, are there people who can move a server to a different security zone to avoid going through the firewall at all? Or to put a second interface on a virtual server to bypass a slow security review process?
This is important stuff.
Further Reading
Also, a useful VMWare hardening guide on SANS.