What are the risks of hypervisor deployment? Are there specific steps security teams should take for hypervisor...
The risks of a hypervisor deployment include faulty implementation of hypervisor modules and configuration errors. These risks stem from the multiple ways the hypervisor virtualizes hardware resources to execute multiple computer stacks or virtual machines (VMs). The stacks are used to run multiple OSes.
The hypervisor might allocate the same physical resources for one VM to another VM. Examples of simulated resources include storage buggers, CPU registers, and memory and network buffers.
If the hypervisor does not reinitialize the reallocated physical resources, the second VM will have access to data from the first VM. Some conventional security fixes may work for the hosts running a hypervisor, although it may not be possible to turn off a physical port shared by several running VMs. Add-ons to the hypervisors that have not been properly secured could let in hackers.
To better compare the architectures of different hypervisors, the National Institute of Standards and Technology identifies five baseline functions in its Security Recommendations for Hypervisor Deployment:
- Isolation of VM processes. VMs are scheduled for execution. The processes include CPU and memory management.
- Emulation of network and storage devices. Different VMs mediate access to the same physical devices.
- Execution of privileged operations for guest VMs. Certain operations are not being executed directly by the host hardware.
- VM lifecycle management. This function is more than controlling VM states and managing VM images by the administrators. It also involves VM migration, VM monitoring and policy enforcement.
- Management of the hypervisor. Values are set for configurations in the hypervisor and a virtual network inside the hypervisor.
After identifying tasks for each baseline, an organization should identify the assets associated with the hypervisor, including physical resources, and identify the potential threats against the tasks the hypervisor performs.
Finally, the organization should recommend countermeasures that provide assurance against exploitation of these threats. The benefits should outweigh the costs of implementing countermeasures in a hypervisor deployment.
Ask the expert:
Want to ask Judith Myerson a question about security? Submit your question now via email. (All questions are anonymous.)
Test your hypervisor type knowledge with this quiz
Discover the tools to best manage multiple hypervisors
Find out how much of a threat hypervisors actually are
Dig Deeper on Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection
Related Q&A from Judith Myerson
The Constrained Application Protocol underpins IoT networks. But the protocol could allow a threat actor to launch an attack. Continue Reading
Dutch researchers discovered flaws in ATA security and TCG Opal affecting self-encrypting drives. What steps can you take to guard data stored on ... Continue Reading
The Signal Desktop application was found to be making decryption keys available in plaintext. Learn how the SQLite database and plaintext passwords ... Continue Reading