4.2 Security Requirements Flashcards
VM Escape
Threat attempts to get out of an isolated VM and send commands to the underlying hypervisor. VM escape is easier to perform on a Type II hypervisor. To prevent the attack make sure all of the hypervisors remain patched and are up to date
VM Hopping
Threat attempts to move from one VM to another on the same host
Sandbox escape
Occurs when an attacker circumvents sandbox protections to gain access to the protected OS or other privileged processes.
Live migration
Migrates the VM from one host to another while it’s running. Ensure that live migration only occurs on a trusted network or utilizes encryption
Data remnants
Leftover pieces of data that may exist in the hard drive which are no longer needed. to mitigate, encrypt virtual machines storage locations and destroy the encryption key
VM Sprawl
Uncontrolled deployment of virtual machines