19
SECURING AND LEVERAGING THE POWER OF VIRTUAL SERVERS AND DESKTOPS Conrado Wang Cheng Niemeyer <chengw (at) sacredheart.edu> Information Security Officer, Sacred Heart University

Securing and Leveraging the Power of Virtual Servers and Desktops

  • Upload
    maxine

  • View
    42

  • Download
    2

Embed Size (px)

DESCRIPTION

Securing and Leveraging the Power of Virtual Servers and Desktops. Conrado Wang Cheng Niemeyer < chengw (at) sacredheart.edu> Information Security Officer, Sacred Heart University. Virtualization Advantages. Virtualization? “Cheap”, fast, easy to setup Application isolation - PowerPoint PPT Presentation

Citation preview

Page 1: Securing and Leveraging the Power of Virtual Servers and Desktops

SECURING AND LEVERAGING THE POWER OF VIRTUAL SERVERS AND DESKTOPS

Conrado Wang Cheng Niemeyer <chengw (at) sacredheart.edu>Information Security Officer, Sacred Heart University

Page 2: Securing and Leveraging the Power of Virtual Servers and Desktops

Virtualization Advantages

Virtualization? “Cheap”, fast, easy to setup Application

isolation Template Deployment Disaster Recovery High Availability Forensic Analysis w/P2V & in place with

memory snapshots Honeypotting

Page 3: Securing and Leveraging the Power of Virtual Servers and Desktops

Virtualization Disadvantages Using a template image

One vulnerability is shared by all Same admin/root passwords??!!

Possibly sequential IP range Single file Servers & Workstations

Just copy one file and you’re done! Poor multimedia support Many eggs in fewer baskets Virtual Machine Sprawl

Page 4: Securing and Leveraging the Power of Virtual Servers and Desktops

Virtualization Vulnerabilities

Guest to Guest Attacks Guest to Host Attacks Guest Client Vulnerabilities Management Console/Host OS

Vulnerabilities Hypervisor Vulnerabilities

Not well developed and widespread, YET…

Page 5: Securing and Leveraging the Power of Virtual Servers and Desktops

VM Security Best Practices

Security Best Practices (Firewalls, IPS, Patching, Patching, Patching, Patching) Secure your VMs as you would physical machines

Secure the Network Use Separate Private backup and SAN network Use Separate Private Management Console network

Favor Type 1 Hypervisors for Production and Testing Servers VMWare ESX Server, Citrix XenServer, MS Hyper-V, etc.

Favor Type 2 use in Security applications Disable Hardware Acceleration Use QEmu (full emulation mode w/out kqemu) Disable all sharing features

Favor Type 2 for Development environments Run different security zones VMs on separate physical hosts

Use separate physical switches or VLANs in physical switches Run different Management stations

Disable/remove unnecessary virtual hardware

Page 6: Securing and Leveraging the Power of Virtual Servers and Desktops

Monitoring in a vSwitch

Page 7: Securing and Leveraging the Power of Virtual Servers and Desktops

VMWare ESX Specific

VMWare Update (ESX 3.5 & VC 2.5) Fix maximum size and rotation for Log

Files Use Resource Management Secure the VI Console Access Verify the ESX Console Firewall rules Use SSL Certificates Encrypt Access to

Virtual Center Secure Console’s Linux environment

Page 8: Securing and Leveraging the Power of Virtual Servers and Desktops

Virtualization Applications

Setting up Development Environments Setting up Testing Environments Setting up Research Environments Honeypotting Consolidate Physical Servers

Virtual Secure Desktops… Provide a desktop environment for users

Quickly deployed Secured Easily maintained

Provide access from those environments to all work tools, systems, and services

Page 9: Securing and Leveraging the Power of Virtual Servers and Desktops

Secure Desktop Advantages Secured Access to Sensitive

Systems

Separation of Critical Business data from User data

Quick and Easy Deployment Stand a new VM(s) in under

2mins Ease of Policy Enforcement Can Provide local admin

elevation when necessary Anywhere anytime access

(or not) Easy Integration into

Identity Management

Currently ERP (Datatel Colleague

R17, R18) Registrar’s Human Resources Business Office

Admissions (Recruitment Plus)

Financial Aid (PowerFAIDS, EDConnect)

Institutional Advancement (Raiser’s Edge)

Payroll (ADP) Future Expansion

Document Imaging Department Shares MicroFAIDS (MS-DOS!!!!!)

Page 10: Securing and Leveraging the Power of Virtual Servers and Desktops

Secure Desktop Disadvantages Poor Multimedia

Support ACL/Firewall Rule

Maintenance Vulnerable to Screen

Scrapping Increased Disaster

Recovery Complexity SSL Gateway Connection Broker Provisioning Server ESX Servers SAN & Blade

Infrastructure

“Quality of Life” Issues Cannot browse the

web Cannot persist

software changes Cannot connect

certain USB devices Coming Soon

Cannot access e-mail Cannot copy & paste

to host Cannot connect any

USB devices

Page 11: Securing and Leveraging the Power of Virtual Servers and Desktops

Secure Desktop Backend at SHU

HP c7000 Blade Enclosure HP BL460c

2 x Quad Core 2.3Ghz (Intel E5345)

16 GB RAM 4 x 1Gb Ethernet (on 2

separate boards) Netapp 3020c Filers

7TB (4TB Usable ??!!) for VMs 12TB for User/Department

Data iSCSI all the way baby!!!

Cisco Catalyst 3750 Switches 1Gb Ethernet (Copper) 10Gb Uplink

VMWare VI3 (ESX 3.5 and Virtual Center 2.5)

Provision Networks Virtual Access Suite 5.9 SSL Gateway RDP Connection Broker

Citrix Provisioning Server Desktops v4.5 Sp1 PXE Boot HDD Streaming

Microsoft DHCP Server Microsoft Windows XP Sp2

Hardware Software

Page 12: Securing and Leveraging the Power of Virtual Servers and Desktops

Connection Broker Architecture

Page 13: Securing and Leveraging the Power of Virtual Servers and Desktops

SSL Gateway Architecture

Page 14: Securing and Leveraging the Power of Virtual Servers and Desktops

HDD Streaming Architecture

Page 15: Securing and Leveraging the Power of Virtual Servers and Desktops

Physical vs. Virtual Hardware

Dell OptiPlex 755 Intel Core2 2.4Ghz 2GB RAM 160GB HDD Integrated Graphics 1Gb Ethernet ~$1,000

VMWare ESX 3.5 Virtual Dual to

Quad Core 2.3Ghz 256MB RAM 1MB HDD RDP Graphics 1Gb Ethernet ~$290 w/existing

hardware

Physical Virtual

Page 16: Securing and Leveraging the Power of Virtual Servers and Desktops

Getting Buy-in

Initial deployment as test environments Clarifying the difference between a purely

work environment and a hybrid work/personal one

No other alternatives with new versions Ease of use and virtually no training

required Unreliability of VPN and Citrix Ability to access legacy environments with

new simultaneously

Page 17: Securing and Leveraging the Power of Virtual Servers and Desktops

Demo

https://securedesk.sacredheart.edu/

Page 18: Securing and Leveraging the Power of Virtual Servers and Desktops

New Developments

Embedded Hypervisors ESX 3i, XenServer OEM, etc.

VMSafe VDI SAN Snapshot Clones

Netapp FlexClone Sophisticated Virtual Machine Detection

Page 19: Securing and Leveraging the Power of Virtual Servers and Desktops

Resources, Q & A

http://www.cisecurity.org/ http://www.securityfocus.com/ http://www.vmware.com/resources/

techresources/cat/91 http://www.citrix.com/ http://www.provisionnetworks.com/