26
Hyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman [email protected] www.SymonPerriman.com Thomas Maurer @ThomasMaurer www.ThomasMaurer.com

Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman [email protected] Thomas

Embed Size (px)

Citation preview

Page 1: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Hyper-V Security TipsFix the Gaps you Never Knew About

Symon Perriman@[email protected]

Thomas [email protected]

Page 2: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Security Threats to Virtualization

Page 3: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Security Threats for Hyper-V

Compute• Denial of Memory or CPU

Network• Virus, Malware, Trojan Horses,

Denial of Service

Storage• Data Breach or Loss, Denial of Data

Web• Denial of Service

Active Persistent Threats• Cross-Site Scripting (XSS), Man in Middle• Virtualized infrastructure attacks

“This class of threats called APT is so top of mind for each of us…we want to detect

Advanced Persistent Threats and to be able to take action as an organization to isolate

and protect ourselves.”

- Satya Nadella, Microsoft CEO at Microsoft Ignite - May, 2015

Page 4: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Virtualized Environments are Never Secure

Security for virtualization is differentNew Threats• End users / tenants• Storage devices•Network attacks

Unidentified Threats•New signatures• Time bomb / logic bomb

Most datacenters are already infected

Page 5: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Multi-Layered Agentless Security

Virtual FirewallAV Detection on the NetworkAV Scan on the DiskNetwork Intrusion DetectionNetwork Anomaly AnalysisExtensible to Analytics Systems

Page 6: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Virtualization SecurityBest Practices

Page 7: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

How a Threat Reaches a VM

Hyper-V Virtual Machines

Virtual Network Adapters

Virtual Switch

Hyper-V Host

Physical Network Adapter

Page 8: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Agentless Host-Level Protection

Page 9: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Automatic & Immediate Protection

Security for virtualized environments is differentShared environments are never secureIt is impossible to guarantee securityusing traditional “endpoint protection”• Requires installation• Slows deployment• Complicates management

Virtualized environments are dynamic• Virtual machines• Virtual disks• Virtual networks• Virtual switches

Page 10: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Abstract & Hide Security from Users

Non-technical users or the public are using your hardwareRemove the burden of security from the clients•Manage security for the clients•Update signatures for the clients• Ensure the clients cannot disable security• Accidently• Purposely with bad intentions

Page 11: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Centrally Manage Rules & Definitions

Use a recognized industry leader• Antivirus / antimalware• Intrusion detection

Set up a local proxy for extra security

Page 12: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Guarantee Isolation & Resource Access

Isolation and privacy is critical in a cloud• An admin should not access a tenant’s VM• A VM cannot affect the host• A VM cannot affect another VM

Use Quality of Service (QoS) or throttling for memory, CPU, network & storage bandwidth• Avoid Denial of <Resource> attacks

Page 13: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Traditional security protect traffic between hosts• Does not protect traffic between

VMs on the same host• Threats can spread if one client becomes

infected

Virtual Network Types• External• Internal• Private

Protect All Virtual Networks

Network Security Applianc

e

Page 14: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Universal Virtual Firewall for all VMs

Intercept network traffic before it even gets to the VMManage traffic at the network protocol level• TCP, UDP, GRE, ICMP, IGMP, etc.

Hyper-V Guest OS List: aka.ms/HyperVGuestOS

Server• Windows Server 2016• Windows Server 2012

R2• Windows Server 2012• Windows Server 2008

R2• Home Server 2011• Small Business Server

2011• Windows Server 2003

Client• Windows 10• Windows 8.1• Windows 8• Windows 7• Windows

Vista• Windows XP

Linux & UNIX• CentOS• Debian• FreeBSD• Oracle Linux• Red Hat

RHEL• SUSE• Ubuntu

Page 15: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Active Detection of Incoming Threats

Immediately identify incoming threats•Unencrypted traffic• Based on protocol

Automatically alert admins• Email• PowerShell• Event Logs

Page 16: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Fast AV Scanning with No Performance Impact

Agent-based scanning causes “scanning storms”• Decreases VM performance for all clients• Reduces VM density on the hosts

Optimized scans useChange Block Tracking (CBT) driver• Scan only changed

blocks on the disk• Scan up to 70x faster

Page 17: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Automate Security Task Management

PowerShell supportTask schedulingEnables scalabilityEnsures consistent SLAsEliminates human errorFor tasks with high resourceutilization, stagger the action to avoid performance impact

Page 18: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Hyper-V Hosts & Clusters

SQL Server

Security Management Server / VM

Redundant Management Group

SQL Server

SQL Cluster

Branch Office

SQL Server

Sync

ManagementConsole | PowerShell | Azure Pack | System Center

Enterprise High-Availability for Security

Page 19: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Inbound, Outbound & Internal Threat Protection

Hyper-V Hosts & Clusters

SQL Server

Security Management Server / VM

Public Internet

1 2 3 4 5 6 7 8 9 10111213141516171819202122230

10

20

30

40

50

60

70

80

90

100

Normal Traffic

1 2 3 4 5 6 7 8 9 10111213141516171819202122230

10

20

30

40

50

60

70

80

90

100

Unusual Traffic

Page 20: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Extensible to Analytics Platforms

Hyper-V Hosts

SQL Server

Security Management Server / VM

Public Internet

On-Premises Analytics (Syslog)

Cloud-Based Analytics

Page 21: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

System Center Integration

Centralized security management through System Center to protect Hyper-V Infrastructure and VMs

Automatically apply security policies to guarantee immediate protection for hosts and virtual machines

Accelerate and secure VM deployments with an agentless solution designed for Hyper-V

Monitor the infrastructure with Operations Manager

Scales to protect the largest enterprises running System Center and the Microsoft Cloud Platform

Page 22: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Azure Pack (WAP) IntegrationSecurity as a Service (SECaaS) to protect your datacenter, your customers, and their clouds

Generate new revenue by offering an higher security tier

Meet the latest compliance and regulation requirements with multi-layered unified security

Automatically and immediately secure your tenants with non-invasive protection

Support more VMs and tenants on each host with the most efficient security solution for Hyper-V

Simplify security management for tenants through on/off buttons• Firewall, Network Detection & Intrusion Detection• Preconfigure firewall templates for different VM roles

*Azure Pack (WAP) allows you to run Azure services in your datacenter on your hardware

Page 23: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Benefits of Agentless Security

Universal virtual firewall for all guest OSesProtect all virtual networksDetect inbound, outbound and internal attacksFastest disk scans with least performance impactAutomatic & immediate protectionCentrally manage & update policiesRemove burden from end usersSecurity cannot be disabled

Page 24: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Summary

Page 25: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas

Summary

Security for virtualization is differentProtect your datacenter with a virtual firewall, antivirus, antimalware, and intrusion detection systemUse an agentless solution for Hyper-V, System Center Virtual Machine Manager, and Azure PackUse centralized management and reporting with industry standard signaturesEmail [email protected] for questions

Page 26: Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Perriman @SymonPerriman Symon@5nine.com  Thomas