Gartner Outlines Six Most Common Virtualization Security Risks and How to Combat Them Through 2012, 60 percent of virtualized servers will be less secure than the physical servers they replace, according to Gartner, Inc. Although Gartner expects this figure to fall to 30 percent by the end of 2015, analysts warned that many virtualization deployment projects are being undertaken without involving the information security team in the initial architecture and planning stages.
Gartner has identified the six most common virtualization security risks together with advice on how each issue might be addressed:
Risk: Information Security Isn't Initially Involved in the Virtualization Projects
Survey data from Gartner conferences in late 2009 indicates that about 40 percent of virtualization deployment projects were undertaken without involving the information security team in the initial architecture and planning stages. Typically, the operations teams will argue that nothing has really changed — they already have skills and processes to secure workloads, operating systems (OSs) and the hardware underneath. While true, this argument ignores the new layer of software in the form of a hypervisor and virtual machine monitor (VMM) that is introduced when workloads are virtualized.
Gartner said that security professionals need to realize that risk that isn't acknowledged and communicated cannot be managed. They should start by looking at extending their security processes, rather than buying more security, to address security in virtualized data centers.
Risk: A Compromise of the Virtualization Layer Could Result in the Compromise of All Hosted Workloads
The virtualization layer represents another important IT platform in the infrastructure, and like any software written by human beings, this layer will inevitably contain embedded and yet-to-be-discovered vulnerabilities that may be exploitable. Given the privileged level that the hypervisor/VMM holds in the stack, hackers have already begun targeting this layer to potentially compromise all the workloads hosted above it. From an IT security and management perspective, this layer must be patched, and configuration guidelines must be established.
Gartner recommends that organizations treat this layer as the most critical x86 platform in the enterprise data center and keep it as thin as possible, while hardening the configuration to unauthorized changes. Virtualization vendors should be required to support measurement of the hypervisor/VMM layer on boot-up to ensure it has not been compromised. Above all, organizations should not rely on host-based security controls to detect a compromise or protect anything running below it.
Risk: The Lack of Visibility and Controls on Internal Virtual Networks Created for VM-to-VM Communications Blinds Existing Security Policy Enforcement Mechanisms
For efficiency in communications between virtual machines (VMs), most virtualization platforms include the ability to create software-based virtual networks and switches inside of the physical host to enable VMs to communicate directly. This traffic will not be visible to network-based security protection devices, such as network-based intrusion prevention systems.
Gartner recommends that at a minimum, organizations require the same type of monitoring they place on physical networks, so that they don't lose visibility and control when workloads and networks are virtualized. To reduce the chance of misconfiguration and mismanagement, they should favor security vendors that span physical and virtual environments with a consistent policy management and enforcement framework.
Risk: Workloads of Different Trust Levels Are Consolidated Onto a Single Physical Server Without Sufficient Separation
As organizations move beyond the "low-hanging fruit" of workloads to be virtualized, more critical systems and sensitive workloads are being targeted for virtualization. This is not necessarily an issue, but it can become an issue when these workloads are combined with other workloads from different trust zones on the same physical server without adequate separation.
At a minimum, enterprises should require the same type of separation required in physical networks today for workloads of different trust levels within the enterprise data center. They should treat hosted virtual desktop workloads as untrusted, and strongly isolate them from the rest of the physical data center. Enterprises are advised to evaluate the need for point solutions that are able to associate security policy to virtual machines' identities and that prevent the mixing of workloads from different trust levels on the same server.
Risk: Adequate Controls on Administrative Access to the Hypervisor/VMM Layer and to Administrative Tools Are Lacking
Because of the critical support the hypervisor/VMM layer provides, administrative access to this layer must be tightly controlled, but this is complicated by the fact that most virtualization platforms provide multiple paths of administration for this layer.
Gartner recommends restricting access to the virtualization layer as with any sensitive OS and favoring virtualization platforms that support role-based access control of administrative responsibilities to further refine who can do what within the virtual environment. Where regulatory and/or compliance requirements dictate, organizations should evaluate the need for third-party tools to provide tight administrative control.
Risk: There Is a Potential Loss of Separation of Duties for Network and Security Controls
When physical servers are collapsed into a single machine, it increases the risk that both system administrators and users will inadvertently gain access to data that exceeds their normal privilege levels. Another area of concern is which group configures and supports the internal virtual switch.
Gartner recommends that the same team responsible for the configuration of network topology (including virtual LANs) in the physical environment should be responsible for this in virtual environments. They should favor virtualization platform architectures that support replaceable switch code, so that the same console and policies span physical and virtual configurations.
Additional information is available in the report "Addressing the Most Common Security Risks in Data Center Virtualization Projects" which is available on the Gartner Web site at http://www.gartner.com/resId=1288115.
About Gartner's Security Summits 2010
Gartner's Security Summits are the premier conferences and meeting places for IT and business executives responsible for creating, implementing and managing a proactive and comprehensive IT strategy for information security, risk management, compliance and business continuity management. Analysts will provide insight and a vision of how things will evolve over the long term and provide road maps on how enterprises and solution providers will proceed at the Gartner Security & Risk Management Summit, June 21-23 in Washington D.C. and at the Gartner Information Security Summit, September 22-23 in London.
Members of the media can register for the Summit in Washington D.C. by contacting Christy Pettey, Gartner PR, at email@example.com. For further information on the Security & Risk Management Summit, please visit www.gartner.com/us/itsecurity.
Members of the media can register for the Summit in London by contacting Laurence Goasduff, Gartner PR, on +44 (0)1784 267195 or at firstname.lastname@example.org. For further information on the London Summit, please visit http://www.gartner.com/it/page.jsp?id=1219313.
Additional information from the event will be shared onTwitter at http://twitter.com/Gartner_inc and using #GartnerSecurity.
Gartner, Inc. (NYSE: IT), is the world's leading research and advisory company and a member of the S&P 500. We equip business leaders with indispensable insights, advice and tools to achieve their mission-critical priorities and build the successful organizations of tomorrow.
Our unmatched combination of expert-led, practitioner-sourced and data-driven research steers clients toward the right decisions on the issues that matter most. We're trusted as an objective resource and critical partner by more than 12,000 organizations in more than 100 countries—across all major functions, in every industry and enterprise size.
To learn more about how we help decision makers fuel the future of business, visit www.gartner.com.
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.