Introduction and Virtualization Part 2

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
8 hours 19 minutes
Difficulty
Beginner
CEU/CPE
8
Video Transcription
00:00
When we talk about virtualization, we really have to talk about the heart and soul of a virtualized environment. And that's the hyper visor.
00:07
The hyper visor is what allows this isolation into virtual machines, and it's going to provide communication from what's happening in the virtual machine, either through the operating system or directly to the hardware.
00:20
That depends on whether or not we have a type one or Type two hypervisors,
00:24
a type one hypervisors sometimes referred to as the bare metal hypervisors, meaning that it sits directly on top of the hardware so you don't install an operating system. First, you install the hyper visor, and it has direct access to the hardware through the commands within the virtual software.
00:39
With this, you have a more secure system.
00:42
It's hardware based, so it's just a virtual machine. And because of that, you get better performance. You cut out the middleman that comes with the Type two hypervisors
00:50
with the Type two hypervisors. You first install a host based operating system like Windows or Lennox. Then on top of that, you install a virtual machine through an application like Oracle View box. That's the one I've been using a lot lately. I like that.
01:03
So there's a virtual machine or your VM workstation. Those are the ones that most users may have more experience with.
01:11
This is considered to be software based because it's software that you install on top of an operating system. But here's the deal with that.
01:18
All of your commands from the VM are running through the guest operating system. So you've got that middle man.
01:23
Keep in mind if you're running this on Windows Atlantic's operating system, you have the vulnerabilities of those operating systems introduced to the mix.
01:32
When we use these, we might be using them in a lab environment.
01:36
We might be using them on an individual system to do things with application virtualization or for testing devices. But when we're talking about really virtualizing servers, that's when we're going to do this bare metal type one hyper visor,
01:49
Any cloud based service providers going to be running type one
01:56
If a hypervisors compromised, everything in the virtual environment is compromised and there are root kits for hypervisors.
02:02
There are types of malware that specifically target hypervisors, so we need to make sure that our hyper visor, like any other piece of software is hardened.
02:10
It's up to date and patch, just like any other operating system or application.
02:15
That does reduce the likelihood of having malicious code introduced
02:19
as a general rule. If we're accessing our resources through the cloud and we have a virtualized environment, the hyper visor is usually the cloud services providers responsibility. We need to make sure that we know how that's protected and be aware of any mitigating strategies to keep that safe.
02:35
We're running a type two hypervisors. Then, of course, we're responsible for making sure the software is patched and running correctly.
02:44
Lots of concerns here
02:45
again, regionalization doesn't fix every problem, and it certainly doesn't make your typical problems go away.
02:52
One of the first issues that we have to think about is an issue called VM Escape, which is exactly what it sounds like.
02:58
Virtualization is supposed to be true isolation for these applications and systems
03:02
and a multi lenient environment. Our ritual system should be truly isolated from other ritual systems.
03:08
However, VM escape is when some entity, whether it's process or an individual hops from one virtual machine to another,
03:15
shouldn't happen. But again there are attacks specifically geared towards virtualized environments.
03:23
Another concern. You may have maybe 15 different services running on a single physical machine.
03:29
That means that one network card on that system provides a pathway into the system for all those 15 services
03:36
and from a physical perspective as well. If you have failure of that physical machine and the services are gone from the time being until we can get it restored
03:44
other ideas like anti malware.
03:46
A lot of times we slap anti malware on a machine, and we say We're good. That's all taken care of, but which you have is. You have a numerous virtual machines running on a system, so you have to have anti malware on the host. But for each additional guest operating system that has to be scanned for malware as well,
04:03
it really is like a separate physical machine.
04:06
The same thing with Monory.
04:09
We're not going to get monitoring of those virtual machines from one tool just scanning the host. So we have to make those considerations and make sure we have the right tools on each of the guest operating systems.
04:18
Last but not least, unintentional bridging. Like we said, you've got one network care connecting you out to the public network. You've got an internal network and you have virtual network cards. You can build a virtual network, connect everybody through virtual switches and all. That's great. But if we miss configure our network cards, they may be bridged out to the network.
04:39
Which is exactly how things like VM escapes happiness.
04:43
I've accidentally got a pathway to the network through my host machine.
04:46
We need to make sure that those are limited to the virtual land, as opposed to being bridge to the outside world.
04:54
We wrap up the discussion virtualization. There's no doubt that it has numerous benefits. Virtualization saves us space, saves a hardware, saves on heating and cooling and allows us to run multiple services on a single vertical machine, making it more cost effective and all that's great.
05:10
We get virtual desktop interfaces where we take that golden image. That's a configuration of exactly what we want on those host computers. And then, even if our clients are and users make changes, it's still going to refer back to the golden image. At the end of the day,
05:25
we have to think about our hyper razors are hypervisors are either type one or type two.
05:30
Type one is a bare metal hypervisors that sits directly on top of the hardware.
05:33
That's where you're going to get the best performance and the best security because there is no middle man
05:40
now, the hyper visor, this type to install the hyper visor on top of the operating system. So for the hyper visor to interact with the hardware has to go through the OS.
05:49
That OS has its own set of vulnerabilities.
05:53
Then last, we discussed some security concerns. We said No environment is perfect. We have to watch for things like VM Escape or a process might move from one VM to another and perhaps malware or worm might spread.
06:05
We have to think about things like hyper jacking, which is where our route kick gets installed in the hyper visor.
06:11
We have to be concerned with multi tenancy.
06:14
There are a lot of areas for security concerns with hypervisors and virtualization, but with our due diligence and a little bit of effort, we can secure these environments and reap the benefits
Up Next