What are the risks of hypervisor deployment? Are there specific steps security teams should take for hypervisor...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
The risks of a hypervisor deployment include faulty implementation of hypervisor modules and configuration errors. These risks stem from the multiple ways the hypervisor virtualizes hardware resources to execute multiple computer stacks or virtual machines (VMs). The stacks are used to run multiple OSes.
The hypervisor might allocate the same physical resources for one VM to another VM. Examples of simulated resources include storage buggers, CPU registers, and memory and network buffers.
If the hypervisor does not reinitialize the reallocated physical resources, the second VM will have access to data from the first VM. Some conventional security fixes may work for the hosts running a hypervisor, although it may not be possible to turn off a physical port shared by several running VMs. Add-ons to the hypervisors that have not been properly secured could let in hackers.
To better compare the architectures of different hypervisors, the National Institute of Standards and Technology identifies five baseline functions in its Security Recommendations for Hypervisor Deployment:
- Isolation of VM processes. VMs are scheduled for execution. The processes include CPU and memory management.
- Emulation of network and storage devices. Different VMs mediate access to the same physical devices.
- Execution of privileged operations for guest VMs. Certain operations are not being executed directly by the host hardware.
- VM lifecycle management. This function is more than controlling VM states and managing VM images by the administrators. It also involves VM migration, VM monitoring and policy enforcement.
- Management of the hypervisor. Values are set for configurations in the hypervisor and a virtual network inside the hypervisor.
After identifying tasks for each baseline, an organization should identify the assets associated with the hypervisor, including physical resources, and identify the potential threats against the tasks the hypervisor performs.
Finally, the organization should recommend countermeasures that provide assurance against exploitation of these threats. The benefits should outweigh the costs of implementing countermeasures in a hypervisor deployment.
Ask the expert:
Want to ask Judith Myerson a question about security? Submit your question now via email. (All questions are anonymous.)
Test your hypervisor type knowledge with this quiz
Discover the tools to best manage multiple hypervisors
Find out how much of a threat hypervisors actually are
Dig Deeper on Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection
Related Q&A from Judith Myerson
A patch was issued for the Dirty COW vulnerability, but researchers later discovered problems with the patch. Expert Judith Myerson explains what ...continue reading
Getting firewall settings right is one of the most basic ways to protect enterprise data from accidental exposures. Expert Judith Myerson discusses ...continue reading
Expert Judith Myerson explains how IP theft can happen despite the cryptographic protections in IEEE standard P1735, as well as what can be done to ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.