Virtualization Security 2.3 Flashcards
1
Q
Virtual Machines (VM)
A
- Enable replication of processing units that can be manipulated between different computers.
- Can appear anywhere.
2
Q
Hypervisor
A
- Low level program
- Allows multiple operating systems to run concurrently on a single host computer.
- Uses a thin layer of code to allocate resources in real time.
- Traffic cop that that controls I/O and memory.
3
Q
VM Vulnerabilities
A
- Local privilege escalations
- Command injection
- Information disclosure
4
Q
VM Escape
A
- Breaking out of one VM and interact with the host operating system or hardware that is on the same hypervisor.
5
Q
Issues of VM Escape
A
- If a VM escape occurs, the attacker could potentially gain access to another VM and have access to more data than permitted.
6
Q
VM Escape Protection
A
- A way to prevent VM Escape that would allow attackers to access another VM and the associated data.
7
Q
Types of Hypervisors
A
Type 1 hypervisor and Type 2 hypervisor
8
Q
Hypervisor Type 1
A
- Designed for speed and efficiency.
- Designed for the high-end server market in enterprises and are designed to allow multiple VMs on a single set of server hardware.
9
Q
Hypervisor Type 2
A
- Designed for limited numbers of VMs.
- Typically running in a desktop or small server.
10
Q
Resource Policies
A
- Determine ‘what’, ‘where’, or ‘how’ resources are provisioned.
- Allows organization to set restrictions, manage the resources, and manage cloud costs.