2C Flashcards
There are several areas of concern when deploying virtual machines:
training and education
change control
asset tracking and management
patch management
authentication and authorization
logging and auditing.
When assessing the customer’s security implementations, we often find significant attention focused on technology to the detriment of the end users. It is vital that users are ___ ___ about new technology to understand and plan for any change in processes brought about by the new technology.
trained properly
It is recommended to ____ administrators, operational staff, solution architects, and users on the topic of virtualization.
train
___ need to know the proper way to set up virtualization configurations and be mindful of any pitfalls. ____ must also understand what the security capabilities of the underlying technologies are and the assurances they provide. For instance, certain features can be disabled by the ____ at a global level, but they can still be enabled by individual users for their own virtual machines. It is crucial to be aware of such features so other control mechanisms can be put in place or to enable an audit trail.
Administrators
___ ___ and review boards should carefully consider any changes to the base infrastructure before approving them. Making changes at the base level is like upgrading the hardware or firmware on a physical machine. Such an operation would be treated with utmost care on production machines in the physical world and the same care should be applied to updates, upgrades, and installation of any software or changes to configurations of a virtualized
environment.
Change control
These changes can often affect the three fundamentals of security:
- Confidentiality- all users and devices have network access.
- Integrity- Data is not compromised.
- Availability – data readily available to authorized users.
First, any change should be tested in a ___ ___ to ensure the change does not adversely affect either the host or guest operating systems. This could mean running a battery of security tests before and after the change to verify this—ranging from a simple port scan to see if
the Transfer Control Protocol/Internet Protocol (TCP/IP) fingerprint has changed, to a full-blown vulnerability scan as new services on the host come online for virtual management.
staging environment
Secondly, once testing is complete, changes should only be made during approved ___ ___ ___ no matter how trivial or small the change appears to be on the host. All the change control best practices continue to apply for the guest workloads.
change control windows
Getting a new server up and running can be as simple as cloning an existing VM or importing an existing physical machine. Features such as live virtual-machine migration and dynamic load balancing can result in new machines being “spun up” on the fly. This can lead to difficulty from an ___ ___ perspective. Lack of ___ ___ and management puts companies at risk of falling out of compliance with licensing requirements.
asset tracking
With VMs being brought up and torn down, licenses may even be lost. To manage this risk, it is imperative operations applied in a virtual environment adhere to the same standards created for
___ ___.
physical systems
Organizations should create and maintain detailed ____ of the software. Once the ____ is created, it is important to track the usual vulnerability news sources (security mailing lists, vendor websites, and the popular security press) to watch for any newly discovered
vulnerabilities and their associated mitigation options.
inventory
Another important aspect of virtualization is that assets can be ____ _____ ____. Several virtualization vendors offer preconfigured virtual appliances (a combination of hardware and software). These appliances are built, optimized, and typically serve specific purposes such as a firewall or an Internet browser appliance.
downloaded from the internet
A further complication to keep in mind is most of the virtualization technologies available today support ___ ___ ___, making such virtual machines undetectable by the network while still providing them with unrestricted access to the host and the network itself.
complex networking schemes
A common problem with many organizations, even before the introduction of virtualization, is patching efforts focusing only on perceived big targets. This includes the operating system and
possibly server software—Web servers, application servers, and database servers. Unfortunately, the smaller, seemingly inconsequential components (especially those from third
parties or open-source libraries) tend to be _____. This can expose the network infrastructure to several critical security issues.
forgotten
The host and guest operating systems, the software applications, and the virtualization software itself must all be ____.
patched