4.2 Security Requirements Flashcards

1
Q

VM Escape

A

Threat attempts to get out of an isolated VM and send commands to the underlying hypervisor. VM escape is easier to perform on a Type II hypervisor. To prevent the attack make sure all of the hypervisors remain patched and are up to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

VM Hopping

A

Threat attempts to move from one VM to another on the same host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sandbox escape

A

Occurs when an attacker circumvents sandbox protections to gain access to the protected OS or other privileged processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Live migration

A

Migrates the VM from one host to another while it’s running. Ensure that live migration only occurs on a trusted network or utilizes encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data remnants

A

Leftover pieces of data that may exist in the hard drive which are no longer needed. to mitigate, encrypt virtual machines storage locations and destroy the encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

VM Sprawl

A

Uncontrolled deployment of virtual machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly