Virtualization security threats in cloud computing
The document discusses virtualization in cloud computing, highlighting its benefits, risks, and security vulnerabilities, such as VM escape and hyperjacking. It emphasizes the need for effective security measures to protect virtualized environments, including network protection and patch management, as these environments can be compromised by various attack scenarios. Additionally, it outlines the shared responsibility model of security between cloud service providers and customers.
What is Virtualization?
CloudComputing, Virtualization means to
create a virtual version of a device or resources.
Where the framework divides the resources
into one or more execution environment.
3.
Why you ShouldCare?
Fewer Physical Machines
Lowered CAPEX
Centralized Management
Higher Utilization
Minimized or Eliminate Downtime
4.
How does virtualizationwork in cloud computing?
Hypervisor software is the secret sauce that makes virtualization
possible.
_______________________________________________________
The Security Risksof Virtualization
In a Virtualized environment, each of the VMs is detached from
the rest of the system by the hypervisor or Virtual Machine
Monitor (VMM).
A Strong accomplishment can break this confinement and thus
point to various concerns respecting the Confidentiality, Integrity,
Or Availability of the VMs.
8.
Virtualization Security Issues
VMescape- Enables a hacker/cracker to gain access to the primary
hypervisor and its created virtual machines.
Hyperjacking- Hacker takes malicious control over the hypervisor that
creates the virtual environment within a virtual machine (VM)
host.
VM sprawl- When the large number of virtual machines exist in the
environment without proper management.
9.
Virtualization Security Issues
VMfootprint
Used for gathering information about target VM like
OS installed, packages installed and services running
etc.
Inside-VM attack VM can get infected with malware or OS rootkits at run-
time.
Outside-VM attack
Attacks from the host OS and co-located VMs are known
as outside-VM attacks.
10.
Virtualization Security Issues
CrossVM side
channel
To maximize resource utilization, multiple VMs are
usually placed on the same physical server in the
cloud environment. The basic idea is a malicious VM
penetrates the isolation between VMs, and then
access the shared hardware and cache locations to
extract confidential information from the target.
11.
Virtualization Security Issues
OudatedSW
packages in VMs
Outdated software packages in virtual machines can
pose serious security threats in the virtualized
environment. Because of the low cost and the ease of
creation, users tend to create new virtual machines for
different tasks, branch new virtual machines based on
the old ones, snapshot machines or even rollback
machines to an earlier state.
12.
Virtualization security measuresamd requirements
In order to protect the virtualization environment in the cloud, the authority
must implement definite security measures.
The following measures must be endorsed for a secure cloud execution.
Protected network
Deactivating the non-essential features
Detach unutilized hardware devices
Backup of VM images
Hardened Configuration.
Patch Management
Intrusion Detection System.
13.
Cloud Shared Responsibilitymodel
Cloud Always comes as a shared responsibility model between a cloud service
provider and cloud customers.
Cloud
Service
Provider
Cloud
Service
Customer
Cloud Shared Responsibility Model
14.
Conclusion
Virtualization involvesthe use of encapsulating software layer (Hypervisor or
Virtual Machine Monitor) which surrounds or underlies an operating system
and provides the same input, outputs, and behavior that would be expected
from an actual physical device.
Virtualized systems introduce important security gaps that need to be taken
into account when deploying strong and secure virtualized infrastructure.
Cloud Virtualization environment can be compromised by different attacks at
hypervisor, virtual machines and VM images.
We have identified attack scenarios at these components and different
existing security schemes that provide security to virtualization.