NIST SP 800-125 Flashcards
Virtualization
simulation of the software and/or hardware upon which other software runs
simulated environment
called a virtual machine (VM)
Forms of virtualization
Examples:
1. Full virtualization (server virtualization and desktop virtualization)
- Application virtualization, Example Java Virtual Machine (JVM)
- Operating system virtualization
Full Virtualization
One or more OSs and the applications they contain are run on top of virtual hardware
Each instance of an OS and its applications runs in a separate VM called a guest operating system
Guest OSs on a host are managed by the hypervisor, also called the virtual machine monitor (VMM)
Full Virtualization
hypervisor provides most of the same hardware interfaces as those provided by the hardware’s physical platform
paravirtualization
hypervisor offer interfaces to the guest OS that the guest OS can use instead of the normal hardware interfaces
offer significantly faster access for resources such as hard drives and networks
paravirtualization
offer significantly faster access for resources such as hard drives and networks
Full virtualization benefits (Pros)
operational efficiency (server virtualization) desktop virtualization
Full virtualization benefits (Cons)
adds layers of technology, which can increase the security management burden by necessitating additional security controls
easy to share information between the systems. can turn out to be an attack vector if it is not carefully controlled
Two forms of full virtualization
bare metal virtualization (native virtualization)
hosted virtualization
bare metal virtualization (native virtualization)
the hypervisor runs directly on the underlying hardware, without a host OS; the hypervisor can even be built into the computer’s firmware
hosted virtualization
the hypervisor runs on top of the host OS
allow users to run applications such as web browsers and email clients alongside the hosted virtualization application
Type of hosted virtualization
Hardware emulation (sometimes called hardware translation)
sandboxing
Isolating each guest OS from the others and restricting what resources they can access and what privileges they have is also known as sandboxing.
side-channel attacks
exploit the physical properties of hardware to reveal information about usage patterns for memory access, CPU use, and other resources