Section 15.135 Virtualisation and Containerisation Flashcards

Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources

1
Q

Virtualisation

A

Powerful technology that allows for emulation of servers, each with its own OS within a virtual machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Containerisation

A

Lightweight alternative, encapsulating apps with their OS environment

Key Benefits
● Efficiency and Speed
● Portability
● Scalability
● Isolation
● Consistency

In simpe terms containerisation is a method of running application in isolated user spaces called containers. These containers are seperated from each other but share the host system OS Kernel. Each container includes the application and all its dependencies but shares the OS and usually the binaries and the libaries from the host machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Containerisation Technologies

A

■ Docker, Kubernetes, Red Hat OpenShift are popular containerisation platforms

■ Revolutionised application deployment in cloud environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hypervisors

A

Virtual machines operate on a platform know as a Hypervisor which manages the distribution of the physical se4rvers resources such as the proccessor, meory and hard disk space amongst the VM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Two Types of Hypervisors

Type 1 (Bare Metal)

A

Runs directly on hardware and functions similarly to an operating system (e.g., Microsifts Hyper-V, Citrix’s XenServer, VMware’s ESXi and vSphere)

Type 1 hypervisor is faster and efficient than a type 2 hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Two Types of Hypervisors

Type 2 (Hosted)

A

Operates within a standard OS such as Windows, Mac or Linux

for example VirtualBox, VMware)

Type 1 hypervisor is faster and efficient than a type 2 hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virtualisation Vulnerabilities

Virtual Machine (VM) Escape

A

Attackers break out of isolated VMs to access the hypervisor

Attackers can migrate from hypervisor to another service - they are difficult to conduct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virtualisation Vulnerabilities

Privilege Elevation

A

Unauthorised elevation to higher-level users such as root or administator

Catastrophic is attacker can perform this on the hypervisor itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virtualisation Vulnerabilities

Live VM Migration

A

Attacker captures unencrypted data between servers

When a VM needs to move from one physical host to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virtualisation Vulnerabilities

Resource Reuse

A

Improper clearing of resources may expose sensitive data

Concept in computing where systems resouces like memory or processing power are resused

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Securing Virtual Machines

A

■ Regularly update OS, applications, and apply security patches

■ Install antivirus solutions and software firewalls

■ Use strong passwords and implement security policies

■ Secure the hypervisor with manufacturer-released patches

■ Limit VM connections to physical machines and isolate infected VMs

■ Distribute VMs among multiple servers to prevent resource exhaustion

■ Monitor VMs to prevent “Virtualisation Sprawl”

■ Enable encryption of VM files for data safety and confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly