Virtual servers are prone to the same attacks that plague physical servers, as well as to new threats that exploit weaknesses in hypervisor technology, experts warn.
Server virtualisation makes it possible to run multiple applications and operating systems on fewer hardware resources, and it lets customers quickly provision new resources based on demand. But the features that enable such flexible computing cause network and security managers to wonder whether a security threat in a virtualised environment could spread to the entire network.
“I am holding off on server virtualisation because I have already been hearing about security issues with the hypervisor,” says Craig Bush, network administrator at Exactech. “One server being breached doesn’t take down our entire network, but if it is possible for a hypervisor to do that, I’ll just wait until the security angle is more played out before I jump into virtualisation.”
Here we address four of the top concerns about securing virtual environments and attempt to discern the hype from reality.
1. Virtual-machine escapes could propagate security problems
IT managers worry that security attacks designed to exploit a hypervisor could infect virtual machines that reside on the same physical host, in what is known as a “virtual-machine escape.”
If a virtual machine is able to “escape” the isolated environment in which it resides and interact with the parent hypervisor, industry experts say it’s possible an attacker could gain access to the hypervisor, which controls other virtual machines, and avoid security controls designed to protect the virtual machine.
“The Holy Grail of security in the virtual world is to bounce out of the [virtual machine] and take control,” said Pete Lindstrom, a senior analyst at Burton Group, on a recent Webcast on virtualisation security.
But while there are documented attempts to execute a virtual-machine escape, some point out that a security disaster related to such an event has yet to be proved.
“To my knowledge, there has never been a hack that has allowed a security problem to propagate from one virtual host to another by way of the hypervisor technology,” says Steve Ross, a consultant with Catapult Systems, which is helping logistics provider Transplace deploy and maintain its VMware virtual environments.
“It could happen, and the attacker or breach could hop from [virtual machine] to [virtual machine], but I have yet to see it as a functional exploit out there today,” adds Tim Antonowicz, systems engineer at Bowdoin College. Antonowicz, who uses VMware ESX to virtualise servers, says he tries to thwart such problems by sequestering virtual machines in resource clusters, depending on the sensitivity level of the applications or data the virtual machine is housing. “You have to segregate machines in that manner to heighten security,” he says.
Edward Christensen, director of technical operations at Cars.com in Chicago, also is taking steps to insulate his company’s virtual environments.
“The old-school ways of securing an environment involve putting firewalls between the database and application layers, for instance, but when you have a virtualised environment, those lines get crossed,” Christensen says. The online automotive company uses VMware to virtualise servers on HP boxes, and Christensen says being able to store virtual environments off the network helps ease security worries. “It’s one of the nice things about virtual environments,” he says.