12
EAI Endorsed Transactions on Risk Analysis and Mitigation in virtualized environment 02 -04 2015 | Volume 1 | Issue __ | e_ EAI Endorsed Transactions On Risk Analysis and Mitigation in Virtualized Environments Editorial 1 Risk Analysis and Mitigation in Virtualized Environments Abstract Virtualization technology is extensively used across almost all IT departments today as it allows you to increase your network capacity without significantly increasing your capital investment. But with the advent of virtualization, you might ask whether your current security investments are still valid. Will proven strategies continue to work? If they do, are they just as effective? What about all the tools you have invested in? Perhaps the best way to answer these questions is to consider the changes that virtualization will bring and how it impacts the core of your information technology. The objective of this paper is to outline a risk analysis and discuss about mitigation techniques in such virtualized environments. 1.0 Introduction Virtualization has made a dramatic impact in a very short time on IT and networking and has already delivered huge cost savings and return on investment to enterprise data centers and cloud service providers. Typically, the drivers for machine virtualization, including multitenancy, are better server utilization, data center consolidation, and relative ease and speed of provisioning. Cloud service providers can achieve higher density, which translates into better margins. Enterprises can use virtualization to shrink capital expenditures on server hardware as well as to increase operational efficiency. Server virtualization is the masking of server resources, including the number and identity of individual physical servers, processors, and operating systems, from server users. The server administrator uses a software application to divide one physical server into multiple isolated virtual environments. The virtual environments are sometimes called virtual private servers, but they are also known as guests, instances, containers or emulations. Virtualization brings significant value to business managers and engineers attempting to keep pace with business pressure for additional servers. It enables maximum use of hardware resources while introducing an increased flexibility in how organizations design and implement new solutions. However, it also introduces new security concerns. Until recently, organizations had to leverage security controls not specifically designed to protect virtual environments. As enterprises embark on their virtualization journeys, it is critical to review existing processes and develop strategies to address security risks across physical and virtual environments in order to ensure compliance and security visibility in the data center. In that view the objective of this paper is stress on the analysis and mitigation of common risks observed in virtual environments. In the next section we shall discuss the overview of a virtualization technology, section 3 shall discuss architecture of server virtualization and then section 4 emphasizes in identifying the risks in virtual environment, finally section 5 will discuss risk assessment and mitigation techniques in the virtual environment.

Risk Analysis and Mitigation in Virtualized Environments

Embed Size (px)

Citation preview

EAI Endorsed Transactions on Risk Analysis and Mitigation in virtualized environment

02 -04 2015 | Volume 1 | Issue __ | e_

EAI Endorsed Transactions On Risk Analysis and Mitigation in Virtualized Environments

Editorial

1

Risk Analysis and Mitigation in Virtualized Environments

Abstract

Virtualization technology is extensively used across almost all IT departments today as it allows you

to increase your network capacity without significantly increasing your capital investment. But with

the advent of virtualization, you might ask whether your current security investments are still valid.

Will proven strategies continue to work? If they do, are they just as effective? What about all the tools

you have invested in? Perhaps the best way to answer these questions is to consider the changes that

virtualization will bring and how it impacts the core of your information technology. The objective of

this paper is to outline a risk analysis and discuss about mitigation techniques in such virtualized

environments.

1.0 Introduction

Virtualization has made a dramatic impact in a

very short time on IT and networking and has

already delivered huge cost savings and return

on investment to enterprise data centers and

cloud service providers. Typically, the drivers

for machine virtualization, including

multitenancy, are better server utilization, data

center consolidation, and relative ease and speed

of provisioning. Cloud service providers can

achieve higher density, which translates into

better margins. Enterprises can use

virtualization to shrink capital expenditures on

server hardware as well as to increase

operational efficiency.

Server virtualization is the masking of server

resources, including the number and identity of

individual physical servers, processors, and

operating systems, from server users. The server

administrator uses a software application to

divide one physical server into multiple isolated

virtual environments. The virtual environments

are sometimes called virtual private servers, but

they are also known as guests, instances,

containers or emulations.

Virtualization brings significant value to

business managers and engineers attempting to

keep pace with business pressure for additional

servers. It enables maximum use of hardware

resources while introducing an increased

flexibility in how organizations design and

implement new solutions. However, it also

introduces new security concerns. Until

recently, organizations had to leverage security

controls not specifically designed to protect

virtual environments.

As enterprises embark on their virtualization

journeys, it is critical to review existing

processes and develop strategies to address

security risks across physical and virtual

environments in order to ensure compliance and

security visibility in the data center. In that view

the objective of this paper is stress on the

analysis and mitigation of common risks

observed in virtual environments.

In the next section we shall discuss the overview

of a virtualization technology, section 3 shall

discuss architecture of server virtualization and

then section 4 emphasizes in identifying the

risks in virtual environment, finally section 5

will discuss risk assessment and mitigation

techniques in the virtual environment.

Siddharth Coontoor

2

2.0 Overview of Virtualization Technology

Server virtualization allows multiple operating

systems and applications to run concurrently on

a single hardware. The OSs run independent of

each other in isolated environments (the VMs).

A virtualization layer is required to run on the

computer’s OSs as an application or service to

create multiple VM environments. OSs and

applications running in a VM can access the

CPU, memory, and disk and network resources

that are similar to a physical computer.

Figure 1: Virtual Server

The virtual server divides physical resources

into virtual resources called virtual machines as

seen in Figure 1. In this way virtualization adds

a layer of abstraction between two layers in that

computer system. The layer of abstraction is a

software layer between the hardware and the

guest operating systems. The layer acts as a

resource manager to enable the sharing of

processing power and memory. This software is

called a virtual machine monitor (VMM) or

hypervisor. VMMs virtualise the hardware of a

physical machine and partition it into multiple,

logically separated VMs. The VMM monitors

everything that happens inside a VM, and it

enforces resource management policies on the

VM. Multiple operating systems (OSs) can

coexist on the same virtual machine in isolation

from one another and can operate

simultaneously on a single server.

Virtualization in a distributed environment is the

basis for grid computing and cloud computing

supplying a computing infrastructure as a utility,

on-demand service. Virtualization can be

categorised into three areas:

Storage virtualization — Virtualizes the

physical storage from multiple network storage

devices so that they appear to be a single storage

device. In general, ‘virtualization’ refers to

server virtualization.

Network virtualization — Combines

computing resources in a network by splitting

the available bandwidth into independent

channels that can be assigned to a particular

server or device in real time.

Server virtualization — Hides the physical

nature of server resources, including the number

and identity of individual servers, processors

and OSs from the software running on them.

The term workload is increasingly used to

describe the a vast array of virtualized

resources. For example, a virtual machine is a

type of workload. While VMs are the

predominant virtualization technology

implemented today, there are a number of other

workloads to consider, including application,

desktop, network, and storage virtualization

models.

3.0 Architecture of Server

Virtualization Technology and

Identification of critical assets

Server virtualization allows multiple operating

systems and applications to run concurrently on

a single hardware. The OSs run independent of

each other in isolated environments (the VMs).

A virtualization layer is required to run on the

computer’s OSs as an application or service to

create multiple VM environments. OSs and

applications running in a VM can access the

CPU, memory, and disk and network resources

that are similar to a physical computer.

Figure 2: Server Virtualization Architecture

Risk Analysis and Mitigation in Virtualized Environments

3

Figure 2 shows architecture of server

virtualization. As seen in the figure there are

four major components in the virtualization

technology, they are as follows:

Physical hardware - Physical machine on

which the VM environments reside. The

number of VMs that can be supported on a

single physical machine depends on the

hardware configuration and specifications.

Operating system Layer - Primary OS on

the physical machine. The virtualization

layer resides on this OS.

Virtualization layer - Virtualization

software that co-ordinates with the host OSs

for requests from VMs regarding CPU time,

physical memory, disk read and write,

network input/output (I/O), etc. The

virtualization software is called hypervisor.

Virtual machine - Independent and isolated

environment created by the virtualization

software. OSs can run VMs independent of

each other.

Guest operating systems - The OSs

installed on VMs. These run on the host OS.

Virtualization technology allows multiple

VMs with heterogeneous guest OSs to run in

isolation, side by side on the same physical

machine. The VMs have their own virtual

hardware (e.g., CPU, RAM, disks, network

cards) on which the guest OSs and

applications are loaded. The guest OSs

perform consistently, irrespective of the

physical components.

The virtualization software mentioned earlier is

known as the hypervisor. The hypervisor plays

an important role in virtualization technology.

Figure 3: View of Hypervisor

It intercepts the hardware resource requests

from the virtual machines that reside on it and

translates the requests to a format that can be

understood by the physical hardware. Similarly,

the requests from the physical hardware are

translated by the hypervisor so that the virtual

machines can understand. This way the

hypervisor decouples the VMs from the physical

hosts by introducing a layer of abstraction

between the VMs and the physical hardware

layer.

Based on the architecture of the virtualized

server and the services it would provide, it

would be essential to identify critical assets

whose working is important to the business.

Similar to traditional risk assessment

approaches, the first step is to identify the assets

that are important to business. Nest step, would

be to identify the risks associated with these

assets and their associated vulnerabilities.

The critical assets in a virtualized environment

are as follows:

Physical server

Host Operating System

Hypervisor

Hypervisor Management tools and API

Virtual Machines

Network

Storage

4.0 Identifying Risk in Virtualized

Environments

While virtualization may provide a number

functional and operational benefits, moving to a

virtual environment doesn’t alleviate the risks

which existed on the physical systems, and may

also introduce new and unique risks. Therefore

as a part of risk assessment, it is important to

identify the virtualization server as an important

asset and take into consideration risks associated

with it. The following are the most common

risks associated with a virtualized servers

Siddharth Coontoor

4

identified by virtualization vendors and stake

holders.

Risk 1 - VM Sprawl

Uncontrolled proliferation of VMs can lead to

an unmanageable condition of unpatched and

unaccounted for machines.

Risk 2 - Sensitive Data within a VM

Data confidentiality within VMs can be easily

compromised, because data can be easily

transported and tampered with.

Risk 3 - Resource Exhaustion

Uncontrolled physical resource consumption by

virtual processes can lead to reduced

availability.

A risk factor unique to virtual environments is

the hypervisor. Hypervisor is the software

and/or firmware responsible for hosting and

managing VMs. It provides a single point of

access into the virtual environment and is also

potentially a single point of failure. A

misconfigured hypervisor can result in a single

point of compromise of the security of all its

hosted components. It does not matter how

individual VMs are hardened a compromised

hypervisor can override those controls and

provide a convenient single point of

unauthorized access to all the VMs. The

following security risks related to the use of

hypervisor should be considered by those

planning to use or currently using virtual

technologies:

Risk 4 - Hypervisor Security

Hypervisor security is the process of ensuring

that the hypervisor, the software that enables

virtualization, is secure throughout its life cycle,

including development, implementation,

provisioning, and management.

Risk 5 - Unauthorized Access to Hypervisor

Administrative access controls to the hypervisor

may not be adequate to protect against potential

hacker attacks.

Compared to traditional IT environments,

virtualization of IT systems inevitably leads to

changes in operational procedures. As a result,

some common defence in depth practices used

in securing physical servers may be affected or

ignored, while newly introduced features or

functions may expose the environment to

additional risks. The following security risks

related to changes in operation procedures

should be considered:

Risk 6 - Account or Service Hijacking

Through the Self-Service Portal

Portal vulnerabilities can lead to privilege

escalation attacks.

Risk 7 - Workloads of Different Trust Levels

Located on the Same Server

Ensure that there is sufficient security

segregation of workloads on a physical host.

Some enterprise infocom personnel may elect to

apply virtualization technologies through

outsourcing services from cloud service

providers. In such cases, it may be necessary to

consider additional risk factors, including the

following.

Risk 8 - Risk Due to Cloud Service Provider

APIs

A hybrid (private/public) cloud virtualization

implementation can pose security risks due to

account/authentication federation.

5.0 Risk Assessment and Mitigation

Once risks have been identified as in the above

section, it is important that a risk table be

maintained for the risks related to the virtualized

server as shown in Appendix A1.

The risk table maintains details about the risk

like Risk name, description, relevant security

aspect(confidentiality, integrity, availability),

risk governance area, vulnerabilities that lead to

this risk, affected assets.

Risk Analysis and Mitigation in Virtualized Environments

5

The risk table helps enlist vulnerabilities

associated to that risk. Based on the risk the risk

table for each risk is as follows:

Risk name VM Sprawl

Relevant Security

Aspect

Confidentiality/Integrity/Av

ailability

Relevant Security

Governance Risk Area

Architectural and

configuration risk

Vulnerabilities

associated with the risk Proper policy and

control processes to

manage VM lifecycle

do not exist.

Placement / zoning

policies or enforcement

of where a dormant VM

can instantiate or reside

do not exist.

A discovery tool for

identification of

unauthorized VMs does

not exist.

Affected Assets VM

Risk name Sensitive Data Within a VM

Relevant Security

Aspect

Risk to confidentiality and

integrity

Relevant Security

Governance Risk Area

Configuration risk

Vulnerabilities

associated with the risk VM images and

snapshots are not

treated the same way

as the sensitive data

they contain. They

are not protected

from unauthorized

access, modification,

duplication, and

replacement

Policies and procedures

to restrict storage of

VM images and

snapshots do not exist,

including:

Formal change

management processes

that govern image

creation, security,

distribution, storage,

use, retirement, and

destruction

Monitoring and control

of stored images and

snapshots, including

activities logging

Affected Assets VM & Storage

Risk name Resource Exhaustion

Relevant Security

Aspect

Risk to availability

Relevant Security

Governance Risk Area

Architectural and hypervisor

software risk

Vulnerabilities

associated with the risk Servers can be

burdened by

concurrent

execution of

resource-intensive

software such as

anti- virus software

on multiple VMs.

Simultaneous

automated

operating system

patches on a group

of VMs can create

an enormous excess

strain on a common

storage resource.

Affected Assets VM

Risk name Hypervisor Security

Relevant Security

Aspect

Risk to confidentiality, integrity, and availability

Relevant Security

Governance Risk Area

Architectural and hypervisor

software risk

Vulnerabilities

associated with the risk Hypervisor

configuration may

not be hardened to

reduce areas of

vulnerability, such

as unused services.

Vendor-

recommended best

practices have not

been adopted.

Unused physical

hardware devices

are connected, and

clipboard / file-

sharing services are

not disabled.

Vendor security

bulletins / alerts are

not implemented

promptly.

Hypervisor self-

integrity checks (or

the equivalent) are

Siddharth Coontoor

6

not conducted upon

boot-up.

Ongoing

monitoring,

including analysis

of hypervisor logs,

does not occur.

The attack surface

is further increased

through

uncontrolled use of

hypervisor

management APIs

by IT / DevOps

tools and scripts

and other

infrastructure

technologies.

Affected Assets Hypervisor

Risk name Unauthorized Access to

Hypervisor

Relevant Security

Aspect

Risk to confidentiality,

integrity, and availability

Relevant Security

Governance Risk Area

Architectural, hypervisor

software, and configuration

risk

Vulnerabilities

associated with the risk Access to the

virtualization layer

is not restricted as

with any sensitive

OS (i.e., using

console access

restricted by

firewalls).

The hypervisor may

not support role-

based access

control of

administrative

responsibilities.

Additional third-

party tools designed

to provide tight

administrative

control are not

deployed.

Separate

authentication is not

used to restrict

access.

Hypervisor

management APIs /

CLIs are not

adequately

protected.

A separate

“management

LAN” is not

deployed to manage

access to

hypervisors.

Remote

management of

hypervisors is not

disabled.

Administrative

interfaces are

accidentally

exposed through

network

configuration errors

and lack of change

management

procedures.

Affected Assets Hypervisor, Management

tools and API

Risk name Account or Service

Hijacking Through the Self-

Service Portal

Relevant Security

Aspect

Risk to confidentiality,

integrity, and availability

confined to the designated

virtual environment

Relevant Security

Governance Risk Area

Architectural and hypervisor

software risk

Vulnerabilities

associated with the risk Strong authentication

control is lacking.

Policy governing the

creation and use of self-

service portals does not

exist.

Policy-based self-

service portal

management is not used.

Unauthorized activity is

not proactively

monitored.

Account management

(e.g., password reset

sent in clear text) is

“relaxed.”

Affected Assets Applications, VMs, and

virtualization platform

Risk Analysis and Mitigation in Virtualized Environments

7

Risk name Workloads of Different

Trust Levels Located on the

Same Server

Relevant Security

Aspect

Risk to confidentiality,

integrity, and availability

Relevant Security

Governance Risk Area

Architectural and

configuration risk

Vulnerabilities

associated with the risk VMs of different trust-

levels are hosted on or

migrated to the same

physical server (host).

Physical or logical

software-defined

networks for VMs of

different trust levels are

not segregated.

Physical and virtual

firewalls are not

deployed to isolate

groups of VMs from

other hosted groups, for

example, production

from development

systems or development

from other cloud-

resident systems.

Virtual desktop

workloads are not

isolated from rest of the

physical data center.

Administrative

separation of duties may

not be implemented,

allowing unauthorized

changes or accidental

misconfiguration that

violates the logical

zoning.

Affected Assets VMs on physical server

Risk name Risk due to Cloud Service

Provider API

Relevant Security

Aspect

Risk to confidentiality,

integrity, and availability

Relevant Security

Governance Risk Area

Architectural and

configuration risk

Vulnerabilities

associated with the risk

The cloud service

provider’s API set is not

secured.

Data transmitted or

stored in the cloud is

not protected by

encryption.

Strong authentication /

access control is not

implemented for

external systems.

Identity and credential

federation, such as

Active Directory

services or another

LDAPv3 directory, is

not used. Traffic is not

transmitted via a private

/ out-of-band encrypted

channel that is separate

from normal internal

traffic.

Security, compliance,

and governance controls

and monitoring are not

consistently enabled.

Affected Assets Security of Hybrid

Environment

The risk table helps enlist the vulnerabilities

associated with each risk scenario based upon

which the impact and likelihood can be derived

that would finally form a risk matrix.

As vulnerabilities are enlisted and risk

calculated for them, suitably mitigation

techniques for these vulnerabilities can be

derived which would help calculate the residual

risk.

The likelihood rating is provided in Appendix

A2, which provides the rating notation for

creating risk matrix. Similarly Appendix A3

provides impact rating for CIA compromise and

Appendix A4 provides risk matrix defining the

risk levels.

The risk evaluation is based on the likelihood of

a particular vulnerability being exploited and the

impact it would have on the business.

Siddharth Coontoor

8

Vulnerability Likelihood

(See

Appendix A2)

Impact Due to

Confidentialit

y

Compromise

(See

Appendix A2)

Impact Due to

Integrity

Compromis

e (See

Appendix

A2)

Impact Due to

Availability

Compromis

e (See

Appendix

A2)

Evaluate Risk

Level

(See

Appen

dix

A3)

Risk

Treatment

Control to be

implemented

Evaluate

Residual

Risk

Level

(See

Appendix

A3)

Type of Risk: 1 – VM Sprawl

Asset exposed to risk: VM

Lack of effective

control process to

manage VM lifecycle

Low Low Low Low 1 Put effective

policies,

guidelines, and

processes in place

to govern and

control VM

lifecycle

management,

including self-

service and

automated scripts /

DevOps tools.

Lack of placement / zoning

policies or enforcement

of where a dormant VM

can instantiate or reside

Low

Low

Low

Low

1

Lack of discovery tool to

identify unauthorized VMs

Low

Low

Low Low

1

Type of Risk: 2 – Sensitive Data in VM

Asset exposed to risk: VM and Storage

VM images and snapshots

are not treated in the same

way as the sensitive data.

Medium High High Low 4 Encrypt data stored

on virtual and

cloud servers to

make it unreadable.

Develop policies to

restrict storage of

VM images and

snapshots.

1

Policies and processes are not in place to control storage of VM images and snapshots.

Low

High High Low

3 1

Type of Risk: 3 – Resource Exhaustion

Asset exposed to risk: VM

Servers are burdened by

concurrent execution of

resource-intensive software.

High Low Low High 5 Implement

operating

procedure that

detects VMs that

are throttled due

to resource

exhaustion and

puts a remedy in

place instantly.

2

Simultaneous OS automated

patching on a group of VMs

causes enormous access strain

on a common storage

resource.

Medium

Low

Low

High

4 2

Type of Risk: 4 – Hypervisor Security

Asset exposed to risk: Hypervisor

Configuration of

hypervisor may not be

hardened to reduce areas

of vulnerabilities.

Medium

Medium

Low

Medium

3 Harden the

hypervisor’s

configuration to

reduce areas of

vulnerability.

Put vendor-

provided best

practices in place

where applicable.

2

Vendor- recommended best

practices are not adopted.

Low Low

Low

Low

1

Unused physical hardware

devices are connected.

Clipboard / file-sharing

services are not disabled.

Low

Low

Low

Low

1

Risk Analysis and Mitigation in Virtualized Environments

9

Vulnerability Likelihood

(See Appendix

A2)

Impact Due to

Confidentialit

y Compromise

(See Appendix

A2))

Impact Due to

Integrity

Compromis

e (See

Appendix

A2)

Impact Due to

Availabiliy

Compromis

e (See

Appendix

A2)

Evaluate Risk

Level

(See

Appendix

A3)

Risk

Treatment

Control to

be

implemente

d

Evaluate

Residual

Risk

Level

(See

Appendix

A3)

Vendor security bulletins

/alerts are not subscribed

to. Security updates are

not implemented

promptly

Low

Low

Low

Low

1 Disconnect

unused

physical

hardware

devices and

disable

clipboard or

file-sharing

services.

Use a

hypervisor

integrity

monitoring

technology,

for example,

Intel Trusted

Platform

Module/Trust

ed Execution

Technology.

Self-integrity checks or

equivalence are not

conducted upon boot-

up to confirm whether

or not hypervisor has

been compromised.

Low

Low

Low

Low

1

Ongoing monitoring including

analysis of hypervisor

logs does not occur.

Medium

Low

Low

Low

2 1

Attack surface is further

increased through

uncontrolled use of

hypervisor management

APIs by IT/DevOps tools

and scripts and other

infrastructure

technologies.

Medium

Medium

Medium

Medium

3 2

Type of Risk: 5 – Unauthorized Access to hypervisor

Asset exposed to risk: Hypervisor and Management Tools

Access to virtualization

layer is not restricted as

with any sensitive OS.

High

High

Medium

Medium

5 Restrict

access to the

virtualization

layer by

firewalls that

restrict

console

access.

Evaluate

implemented

role based

access control

policies in

order to

ensure that

they are

functionally

correct.

Deploy a

separate

“management

LAN” to

manage

access to

hypervisors.

3

Hypervisor may not

support role-based access

control.

Low Low Low Low 1

Additional third-party

tools that provide tight

administrative control are

not deployed.

Low

Low

Low

Low

1

A separate authentication is

not used to restrict access.

Low Medium Medium Low 2 1

Hypervisor management

APIs/CLIs are not

adequately protected.

Low Medium Low Low 2 1

Separate LAN

authentication is not used

to restrict access.

Medium High Low Low 4 2

Remote hypervisor

management is not

disabled.

Low

High Low

High 3 1

Siddharth Coontoor

10

Vulnerability Likelihood

(See

Appendix A2)

Impact Due to

Confidentiality

Compromise

(See Appendix

A2))

Impact Due to

Integrity

Compromis

e (See

Appendix

A2)

Impact Due to

Availabiliy

Compromise

(See

Appendix

A2)

Evaluate Risk

Level

(See

Appe

ndix

A3)

Risk

Treatment

Control to

be

implemente

d

Evaluate

Residual

Risk

Level

(See

Appendix

A3)

Administrative interfaces

are accidentally exposed

through network

configuration errors and

lack of change of

management procedures

Low

Medium

Medium

Medium

2 Deploy a

separate

“management

LAN” to

manage

access to

hypervisors.

1

Type of Risk: 6 – Account or Service Hijacking through Self- Service Portal

Asset exposed to risk: Privileged access to applications, VM, and Virtualization Platform

Strong authentication

control is lacking.

Low High High Medium 3 Use

administrative

controls

selectively,

based on

users’ roles

and needs.

Enforce

secure

management

of accounts,

identities, and

credentials.

2

Policy governing creation and use of self-service portals is lacking.

Low Low Low Low 1

Policy-based management

of self-service portal is not

used.

Low Low Low Low 1

Proactive monitoring of

unauthorized activity does

not occur.

Low Low Low Low 1

Account management is

“relaxed” (e.g., password

reset sent in clear text)

Low

High High Low 3 2

Type of Risk: 7 – Workload of Different Trust Levels Located on the Same Server (Commingling of Data)

Asset exposed to risk: VMs in the same physical server

Different VM trust levels

are hosted on to the same

physical server.

High High Medium Low 5 Carefully

design and

implement

access from

each trust

level to

physical and

virtual

management

and security

systems.

Implement

policies and

processes to

categorize

systems and

data

according to

different

security

classifications

.

3

Physical/logical s/w defined-

n/w for VMs of different

trust levels are not separated.

High

High

Low

Low

5 3

Physical and virtual firewalls

are not deployed to isolate

groups of VMs from other

hosted groups.

Medium

Medium

Low

Low

3 2

Virtual desktop workloads are not isolated from the rest..

Low Low Low Low 1

Administrative separation of duties may not be implemented, allowing unauthorized changes or accidental misconfiguration that violates logical zoning.

Low

Low

High

High

3 1

Risk Analysis and Mitigation in Virtualized Environments

11

The Risk matrix once created, risk evaluation

can be performed and given a point in the scale

of 1-5 as seen in Appendix 3. The risk can also

be mitigated by providing a remediation

technique in "Risk Treatment control to be

implement" and accordingly the risk evaluation

can be done again after mitigation as residual

risk.

Above is the Risk evaluation along with

mitigation techniques for all the risks discussed.

6.0 Conclusion

Inside a cloud, it is difficult to identify where

data is stored and how it is segregated. This lack

of visibility and the ability to control, audit, and

verify poses a number of security and

compliance concerns for IT personnel, end-

users, and regulators. While the cloud

community is still grappling with these

emerging risks, virtualization technologies are

continuing to be rapidly innovated. To manage

such a dynamic risk environment, organizations

Vulnerability Likelihood

(See Appendix

A2)

Impact Due to

Confidentiality

Compromise

(See Appendix

A2))

Impact Due to

Integrity

Compromise

(See

Appendix

A2)

Impact Due to

Availabiliy

Compromise

(See

Appendix

A2)

Evaluate Risk

Lev

el

(See

Ap

pen

dix

A3)

Risk

Treatment

Control to

be

implemente

d

Evaluate

Residual

Risk

Level

(See

Appendix

A3)

Type of Risk: 8 – Risk Due to CSP API)

Asset exposed to risk: Security of the hybrid environment

Cloud service provider API

set is not secured.

Medium Medium Low Low 3 Implement

strong

authentication

and granular

access control

with

encrypted

transmission.

Transmit

Active

Directory

traffic via a

private / out-

of-band

encrypted

channel that is

separate from

normal

Internet traffic

if it is used

across the

Internet.

2

Data transmission is not

protected by encryption.

Low

High Low Low 3 2

Strong authentication/ access control is not implemented for external systems.

Low Medium Medium Low 2 1

Active Directory traffic is not transmitted via a private/out- of- band encrypted channel (separated from normal internal traffic)

Low

High

High

Low

3 2

Identity federation is not

used.

Low

Low

High Low

3 1

Security, compliance, and

governance controls and

monitoring are not

consistently enabled.

Low Medium Medium Medium 3 1

Siddharth Coontoor

12

should put effective governance and risk

management processes and controls in place to

continually monitor and proactively mitigate the

evolving risks.

7.0 Appendix

A1: Risk Table

Risk name

Relevant Security

Aspect

Confidentiality/Integrity/Av

ailability

Relevant Security

Governance Risk Area

Configuration/Architectural/

Operational

Vulnerabilities

associated with the risk

Affected Assets VM/Hypervisor/Network/O

S/Applications/Physical

Server

A2: Likelihood Rating for Vulnerability

Likelihood Rating Evaluation Criteria

High Relevant security control

not in place

Medium Relevant security control in

place but not effective

Low Relevant security control in

place and effective

A3: Impact Rating for CIA Compromise

Impact Rating Evaluation Criteria

High Significant Business

Impact to the enterprise

Medium There is tangible or

intangible loss to

enterprise.

Low There is insignificant loss

due to minor inconvenience

in business operations.

A4: Risk Matrix showing the defined risk

levels

Impact

Likelihood Low Medium High

Low 1

(Insignificant)

2

(Minor)

3

(Medium)

Medium 2

(Minor)

3

(Medium)

4

(High)

High 3

(Medium)

4

(High)

5

(Very

High)

References

[1] http://resources.infosecinstitute.com/chapter-10-

virtualization-security/

[2] https://www.vmware.com/files/pdf/partners/security/mcafe

e-key-security-ent-arch-wp.ion

[3] http://www.isaca.org/Journal/archives/2011/Volume-

1/Pages/Auditing-Security-Risks-in-Virtual-IT-

Systems.aspx

[4] http://www.symantec.com/content/en/us/enterprise/media/s

ecurity_response/whitepapers/threats_to_virtual_environm

ents.pdf

[5] https://www.pcisecuritystandards.org/documents/Virtualiz

ation_InfoSupp_v2.pdf

[6] https://www.vmware.com/pdf/virtualization_consideration

s.pdf

[7] https://downloads.cloudsecurityalliance.org/whitepapers/B

est_Practices_for%20_Mitigating_Risks_Virtual_Environ

ments_April2015_4-1-15_GLM5.pdf