What are the risks of hypervisor deployment? Are there specific steps security teams should take for hypervisor...
The risks of a hypervisor deployment include faulty implementation of hypervisor modules and configuration errors. These risks stem from the multiple ways the hypervisor virtualizes hardware resources to execute multiple computer stacks or virtual machines (VMs). The stacks are used to run multiple OSes.
The hypervisor might allocate the same physical resources for one VM to another VM. Examples of simulated resources include storage buggers, CPU registers, and memory and network buffers.
If the hypervisor does not reinitialize the reallocated physical resources, the second VM will have access to data from the first VM. Some conventional security fixes may work for the hosts running a hypervisor, although it may not be possible to turn off a physical port shared by several running VMs. Add-ons to the hypervisors that have not been properly secured could let in hackers.
To better compare the architectures of different hypervisors, the National Institute of Standards and Technology identifies five baseline functions in its Security Recommendations for Hypervisor Deployment:
- Isolation of VM processes. VMs are scheduled for execution. The processes include CPU and memory management.
- Emulation of network and storage devices. Different VMs mediate access to the same physical devices.
- Execution of privileged operations for guest VMs. Certain operations are not being executed directly by the host hardware.
- VM lifecycle management. This function is more than controlling VM states and managing VM images by the administrators. It also involves VM migration, VM monitoring and policy enforcement.
- Management of the hypervisor. Values are set for configurations in the hypervisor and a virtual network inside the hypervisor.
After identifying tasks for each baseline, an organization should identify the assets associated with the hypervisor, including physical resources, and identify the potential threats against the tasks the hypervisor performs.
Finally, the organization should recommend countermeasures that provide assurance against exploitation of these threats. The benefits should outweigh the costs of implementing countermeasures in a hypervisor deployment.
Ask the expert:
Want to ask Judith Myerson a question about security? Submit your question now via email. (All questions are anonymous.)
Test your hypervisor type knowledge with this quiz
Discover the tools to best manage multiple hypervisors
Find out how much of a threat hypervisors actually are
Dig Deeper on Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection
Related Q&A from Judith Myerson
The CVE-2018-0886 vulnerability found within Microsoft's CredSSP was recently patched. Discover what this vulnerability is and how it affects the ... Continue Reading
Developers use text editors to enhance efficiency in the workplace even though they require vulnerable third-party plug-ins. Discover these ... Continue Reading
Researchers recently discovered Mosquito -- an air-gapped attack that bites computers to put air-gapped networks at risk. Discover the logistics of ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.