Attacks/Breaches
9/8/2011
11:15 PM
Charles Babcock
Charles Babcock
Commentary
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Virtualization Security: No One Product Does It

VMware environments demand multiple tools to build barriers, trap intruders, maintain VM security-- and keep the Jason Cornishes out.

Security in the virtual environment is both potentially better than in the physical world and at the same time more complex. After the Jason Cornish affair, you may be asking yourself whether your virtual machines could be exposed to a powerful, concentrated attack like that through the VM management interface.

Cornish, in his deletion of 88 production servers at Japanese pharmaceutical company Shionogi, had a "legitimate" password, probably handed off to him from an unidentified insider about to become a casualty of layoffs. Shionogi's procedures didn't detect the maneuver or the placement of a vSphere client on a data center server from which an authorized IT administrator could gain access to vCenter management consoles. With these tools in hand, Cornish deleted his former employer's production environment, apparently while munching down $4.96 worth of hamburger and fries at McDonald's.

Mark Chuang, VMware's director of product marketing in the security area, did not respond to a query about the Cornish affair. But he said in an interview at VMworld Aug. 31 that VMware's vShield framework contains many VMware security measures, plus third parties are plugging their own security products into it. The plug-ins work through a VMware vShield API. Together, these point products and VMware's measures amount to a defense in depth, he said.

What about intruders? VMware works with three partners to supply intrusion detection in the virtual environment. They are McAfee's Network IPS, HP's Tipping Point, and Sourcefire. These three also happen to be Gartner's picks as the three leading intrusion detection/intrusion prevention vendors. McAfee has been a leader in the field for the past five years, according to Gartner. HP enjoys a leadership spot, thanks to its acquisition of Tipping Point as part of the 3Com purchase. Sourcefire is an intrusion prevention specialist; its Sourcefire 3D System appliance has been rated by NSS Labs as providing the most complete protection among the IPS competitors.

Intrusion detection--I should say, intrusion prevention, as the field has changed--consists of using an appliance on the network to inspect all incoming packets in real time, looking for any patterns that match known patterns of attack. The appliance can block an attack signature when it detects one. In many cases, a McAfee, Tipping Point, or Sourcefire intrusion prevention appliance is going to be a physical device. But there's no reason it can't also be a virtual appliance and be installed at a specific point of vulnerability in the virtual environment. Sourcefire in particular has been quick to extend physical world-type protections into virtual appliances and virtual world operations.

These systems are updated quickly, usually within 24 hours, when a new malware signature is discovered, which makes them useful as blocking mechanisms until all data center servers can be updated with a vulnerability patch.

Would one of these systems have prevented a Cornish-style attack? No, Cornish did not use any malware or attack pattern to get into the data center over the network. He connected and logged in as an authorized user, which is a different problem, and one that is related to an insider-style attack. By definition, intrusion detection is looking for outsiders coming in.

In addition to intrusion detection at the network perimeter, there are many additional security boundaries that can be guarded. Chuang said applications may be grouped according to their sensitivity in particular hardware clusters, then security measures, such as firewalls, applied to those clusters--another physical boundary.

At the same time, the VMware API allows third party security products to peer inside the operation of specific virtual machines, including their CPU and memory use, allowing the addition of highly specific point products to the virtual environment.

Chuang mentioned seven security partners: Trend Micro, Symantec, Luminous, Sophos, BitDefender, Kaspersky, and again, McAfee. They offer different security measures, including virtual firewalls applied to specific virtual machines or virtual machine hosts. Let's take a look at a few of them to see how defense in depth might be constructed.

Trend Micro focuses on defense of the integrity of servers in the data center, including host servers and their virtual machines, said Harish Agastya, director of marketing for the firm's data center security products, in an interview. "We can make sure the files have not been modified in some way. Our software notifies you if something has changed," said Agastya.

Trend Micro's Deep Security product, which acts as a watchdog over virtual and physical environments, would have notified the Shionogi IT staffers that Cornish had deleted the files of its production systems--but after the fact notification isn't much help, is it?

Deep Security, however, was highly useful in a situation where a knowledgeable insider modified the payroll system just before direct deposits were made in order to route a number of deposits to his own account. The alteration was then erased at the end of the payroll run and the original list of recipients restored. When employees complained they hadn't gotten their payments, IT managers could find no defect in the payroll list. But using Trend Micro's Deep Security product, they found that the files were being altered, then restored, immediately before and after the payroll run. The discovery helped IT administrators identify who was capable of such a maneuver and track down the offender, Agastya said.

The Deep Security virtual appliance, working with VMware's vShield Endpoint, can maintain vigilance over virtual machine files, examine access attempts for any known threats, and screen out malware, he added. VShield Endpoint allows the normal processing required by an agent located in a virtual machine--the usual way of implementing anti-malware measures--to be offloaded to Deep Security, improving virtual machine performance. Trend Micro's approach is "agent-less," said Agastya.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7392
Published: 2014-07-22
Gitlist allows remote attackers to execute arbitrary commands via shell metacharacters in a file name to Source/.

CVE-2014-2385
Published: 2014-07-22
Multiple cross-site scripting (XSS) vulnerabilities in the web UI in Sophos Anti-Virus for Linux before 9.6.1 allow local users to inject arbitrary web script or HTML via the (1) newListList:ExcludeFileOnExpression, (2) newListList:ExcludeFilesystems, or (3) newListList:ExcludeMountPaths parameter t...

CVE-2014-3518
Published: 2014-07-22
jmx-remoting.sar in JBoss Remoting, as used in Red Hat JBoss Enterprise Application Platform (JEAP) 5.2.0, Red Hat JBoss BRMS 5.3.1, Red Hat JBoss Portal Platform 5.2.2, and Red Hat JBoss SOA Platform 5.3.1, does not properly implement the JSR 160 specification, which allows remote attackers to exec...

CVE-2014-3530
Published: 2014-07-22
The org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory method in PicketLink, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 5.2.0 and 6.2.4, expands entity references, which allows remote attackers to read arbitrary code and possibly have other unspecified impact via...

CVE-2014-4326
Published: 2014-07-22
Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.