 Securing and Administering Virtual Machines George Manley and Yang He.

Slides:



Advertisements
Similar presentations
Virtualisation From the Bottom Up From storage to application.
Advertisements

Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
Xen Virtualization Andrew Hamilton
Virtual Machine Security Design of Secure Operating Systems Summer 2012 Presented By: Musaad Alzahrani.
Introduction to Virtualization
Virtual Machine approach to Security Gautam Prasad and Sudeep Pradhan 10/05/2010 CS 239 UCLA.
Chapter 21: Mobile Virtualization Infrastracture and Related Security Issues Guide to Computer Network Security.
Virtualization for Cloud Computing
An Overview of Virtual Machine Architectures by J.E. Smith and Ravi Nair presented by Sebastian Burckhardt University of Pennsylvania CIS 700 – Virtualization.
5205 – IT Service Delivery and Support
ProjectWise Virtualization Kevin Boland. What is Virtualization? Virtualization is a technique for deploying technologies. Virtualization creates a level.
Virtualization: An Overview Brendan Lynch. Forms of virtualization In all cases virtualization is taking a physical component and simulating the interface.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 3 Desktop Virtualization McGraw-Hill.
Installing Virtualisation Software and Virtual Servers.
Red Hat Installation. Installing Red Hat Linux is the process of copying operating system files from a CD, DVD, or USB flash drive to hard disk(s) on.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Tanenbaum 8.3 See references
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Linux Operations and Administration
Virtualization Virtualization is the creation of substitutes for real resources – abstraction of real resources Users/Applications are typically unaware.
VMs Virtual Machines. VM What is a VM  Virtual Machine  Software implementation of a machine running on another machine The VM may or may not resemble.
Virtualization Week 20. This week Virtualization – What is it? – Software on different operating systems? Group Presentations – minutes per group.
SAIGONTECH COPPERATIVE EDUCATION NETWORKING Spring 2009 Seminar #1 VIRTUALIZATION EVERYWHERE.
Introduction to VMware Virtualization
Virtualization. ABCs Special software: hypervisors or virtual machine managers Guest OS (virtual machine) sits on top of host OS (Win 7 in our case) We.
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
CIS 191 – Lesson 2 System Administration. CIS 191 – Lesson 2 System Architecture Component Architecture –The OS provides the simple components from which.
Secure & flexible monitoring of virtual machine University of Mazandran Science & Tecnology By : Esmaill Khanlarpour January.
What is Driving the Virtual Desktop? VMware View 4: Built for Desktops VMware View 4: Deployment References…Q&A Agenda.
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
ITServices Virtualization Terry Black January 2013.
A Brief Intro to Virtualiztion. What is Virtualization? An abstraction Usually performed via software Many different types –Hardware –Software –Data –Network.
INTRODUCTION TO VIRTUALIZATION KRISTEN WILLIAMS MOSES IKE.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Virtual Infrastructure By: Andy Chau Farzana Mohsini Anya Mojiri Virginia Nguyen Bobby Phimmasane.
Project Name Program Name Project Scope Title Project Code and Name Insert Project Branding Image Here.
A. Frank - P. Weisberg Operating Systems Structure of Operating Systems.
Security Vulnerabilities in A Virtual Environment
Protection of Processes Security and privacy of data is challenging currently. Protecting information – Not limited to hardware. – Depends on innovation.
Cloud Computing Lecture 5-6 Muhammad Ahmad Jan.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the purpose of Microsoft virtualization. Objective Course Weight 2%
Unit 2 VIRTUALISATION. Unit 2 - Syllabus Basics of Virtualization Types of Virtualization Implementation Levels of Virtualization Virtualization Structures.
VIRTUAL MACHINE – VMWARE. VIRTUAL MACHINE (VM) What is a VM? – A virtual machine (VM) is a software implementation of a computing environment in which.
Guide to Operating Systems, 5th Edition
Virtualization.
VMware ESX and ESXi Module 3.
Introduction to VMware Virtualization
Virtualization Virtualization is the creation of substitutes for real resources – abstraction of real resources Users/Applications are typically unaware.
Desktop Virtualization
Virtualization and Hosting
Virtualization, Cloud Computing and Big Data
Virtualization overview
TYPES OF SERVER. TYPES OF SERVER What is a server.
Chapter 21: Virtualization Technology and Security
Virtual Servers.
A Brief Intro to Virtualiztion
A Brief Intro to Virtualiztion
Xen Summit Spring 2007 Platform Virtualization with XenEnterprise
Virtualization Virtualization is the creation of substitutes for real resources – abstraction of real resources Users/Applications are typically unaware.
Introduction to vSphere and the Software-Defined Data Center
Chapter 22: Virtualization Security
OS Virtualization.
Virtualization Techniques
Guide to Operating Systems, 5th Edition
Partition Starter Find out what disk partitioning is, state key features, find a diagram and give an example.
Introduction to Servers
Test Optimization Using Software Virtualization
Presentation transcript:

 Securing and Administering Virtual Machines George Manley and Yang He

What is a Virtual Machine?  Guest OS sitting on top of hypervisor which is on top of physical machine  Able to be moved around between different physical machines  Can share physical resources with other virtual machines

Basics of Securing a Virtual Machine  For the most part the security procedures of a virtual machine is the same as that of a physical machine  This is because the virtual and physical machines both run the exact same operating systems  Only main difference is the level of abstraction which is typically filled by the hypervisor

Problems with VM Security  Overall there have not been a lot of major issues with companies transitioning to virtual machines  One of the major known security risks is the threat of someone maliciously accessing the hypervisor

New Problems that VM’s present  Software Licensing  Software Lifecycle and physical machine upgrades  If only one OS on a physical machine, there’s only that one OS to worry about with the machine’s lifecycle  If multiple OS’s on a physical machine, and hypervisor must be updated, all OS’s must be considered

Similarities of administering VM’s to traditional physical machines  Configuration Guides and all documentation for OS is essentially the same  Monitoring is the same for the OS  All typical day-to-day administration tasks are the same  Security of the OS is the same

New things to administer  They hypervisor  Multiple OS’s on one system  Managing resources of the physical system  All VM’s share the same hardware  Hypervisor takes care of much of this

More VM administration  Networking  Typically done now with VLAN’s  Storage  Typically this is virtualized on the root disks  Can also be virtualized on SAN storage

Benefits of Virtualization  Delegating Management  Guest OS independence  Each OS installed over the hypervisor is a guest OS  These are completely independent of each other  Able to get the most of out of your resources  Testing

What’s currently not being virtualized  Here at Clemson, we typically don’t virtualize san storage for boot devices  The only exception to this is AIM (Coming in a later slide)  Currently the only network virtualization is through the use of VLAN’s  The future of this is limitless though the use of Openflow

Future of Virtualization- AIM  Every aspect of the environment can be virtualized  Used by lots of companies worldwide  OS is built on a persona  Persona can then be moved back and forth between different bare metal machines as well as different virtual machines automatically in only a matter of minutes

Conclusion  Security  Very few differences between a native OS installed on a physical machine. Hypervisor is only major security difference  Administration  Administration of the OS will be the same  Only new administration tasks will be administering the hypervisor and more closely managing hardware resources