VMworld 2014/Separating Fact from Fiction - ESXi Hypervisor Security

From Omnia
Revision as of 17:13, 27 August 2014 by Kenneth (talk | contribs) (Created page with "INF2336 - Separating Fact from Fiction - ESXi Hypervisor Security ''"VMware ESXi has been developed from the ground up to run virtual machines in a secure manner. ESXi addres...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

INF2336 - Separating Fact from Fiction - ESXi Hypervisor Security

"VMware ESXi has been developed from the ground up to run virtual machines in a secure manner. ESXi addresses the security concerns of the most demanding datacenter environments for enterprises and government organizations. Get a better understanding of exactly how!"

  • Yuecel Karabulut - Product Line Manager, vSphere Platform Security, VMware
  • Mike Foley - Sr. Technical Marketing Manager, VMware

Virtualization Security: Fact vs Fiction Foundational Platform Security Solutions Operation Security - Where the REAL threat is

"What are you most concerned about?"

  • concerned about internal threats (eg. malicious privileged VI admin)
  • VM escape scenarios (guest to host attack)

More likely: VM escape or operational security threats? Operational is.

  • Cost vs Probability aka "sexy" vs "boring"

VM Escape is really hard to do - why?

  • proven vm isolation and evolving architecture
  • secure software development life cycle
  • minimum attack surface
  • world class systems security engineers

Isolation is the name of the game

7 Layers of Isolation and Protection:

  • Instruction
  • Memory
  • Device
  • Network
  • Noisy neighbor
  • Storage
  • Memory

To control hardware and memory, you need ring 0. VMs do not have access to ring 0, just a virtualized ring 0. Only the ESX kernel has ring 0 access. Requests are received trapped and securely executed.

Networking - vSwitches are not routers. To route packets between vSwitches you need something else.

VLAN and Switch vulnerabilities? None of these:

  • MAC flooding
  • 802.1q and ISL tagging
  • double-encapsulation attacks
  • multicast brute-force attacks
  • spanning tree attacks
  • random frame attacks
  • VLAN Hopping - native VLAN not used

google Folly Mitnick - "he hacked me back in 19??, and I got to have lunch with him and talk to him about that"

Doable: Walk by and capture people's RFID codes

Operational Security - where the REAL threat is

Least Privilege needs to be widely adopted

Patching ESXi is a priority

Compromising the ESX isolation is dang hard. Compromising your admin is much easier.

Compromise the Admin, and get access to the infrastructure

Least Privilege - Role Based Access Control (RBAC) Security Policy Enforcement

Should move to a Workflow-based Security Policy Enforcement

  • VMware Orchestrator and vCAC for workflow functionality

I can't help you if you don't patch - if you have an uptime of 4 years as a badge of honor, leave now!

  • evacuate VMs
  • patch ESXi
  • move back

"Security guys: you put the 'no' in innovation"

Isolate your vCenter Servers and your ESX servers

  • Limit access to vcenter and ESXi with a dedicated Management Network

"Defense in depth" - no one barrier should be the only barrier