Virtualisation and security: Enterprise solutions in reach of SMBs

By

SMBs that have considered virtualisation but decided that it is too expensive or simply not viable, especially in terms of security, should think again.

The current challenging economic climate makes it necessary for businesses to seek ways of maximising their use of resources while simultaneously reducing their operational costs, and virtualisation enables them to do just that. SMBs that have considered virtualisation but decided that it is too expensive or simply not viable, especially in terms of security, should think again.

Virtualisation and security: Enterprise solutions in reach of SMBs

Virtualisation enables businesses to do more with less. It enables SMBs to level the competitive playing field. And security has a lot to gain from virtualisation. But virtualisation has a lot to lose if it has no security controls.

Consider an example. At a basic level, security in the virtual world has the physical layer abstracted. Thus, a single physical firewall can be partitioned into multiple virtual firewalls to serve different administrative domains or applications.

But the real challenge, and the reason security and virtualisation are discussed a lot today, is that server virtualisation has moved beyond the development environment and into production. In a production setting, many of the ideas that seemed great in development are running into objections from security teams and auditors.

Questions arise, such as: "So, you took the three-tier architecture with firewalls and collapsed it into a single server pool? How are you controlling between the virtual machines?" The on-demand, virtual-moving dream of dynamic servers smacks hard into the static, inflexible reality of security-by-physical architecture.

Such issues lead to the conundrum: Is security going to thwart your business agility and new computing paradigms? Or are you going to find more dynamic way of doing security? Security virtualisation is therefore more about making security infrastructure (hardware, software or both) flexible enough to co-exist and contribute to a virtualised environment.

Security in a virtualised environment
In a virtualised environment, some of the old concepts have to go: IP addresses do not identify servers because servers can be redeployed on-the-fly to a different subnet. So your "IP A.A.A.A can send packets to IP B.B.B.B" access control design is no longer relevant or helpful. What was at "IP A.A.A.A" has moved to a different subnet/data centre/continent.

Dynamically allocated virtual servers need dynamically allocated virtual security. Maybe it's software in the virtual machine in the hypervisor, as a virtual switch I/O path plug-in, or some combination of software and hardware. But it cannot be a ring of physical appliances surrounding the pool of servers and trying to make sense of three dozen VLAN segments.

One approach from a vendor is VMware's VMsafe, which uses VMware's APIs to enable security vendors to plug new versions of their products into the hypervisor, giving them the opportunity to create tight hooks into the virtual environment with greater visibility and dynamic management over client virtual machines.

Expect a lot of transformation this year around leveraging VMsafe and moving from just protecting the virtual layer as if it were a normal machine to really exploiting the benefits of introspection and really being ready for the mobility that comes with a virtual data centre.

At the core, security requirements don't change in a virtual environment, but must be adapted to work effectively in it. Most importantly, that means effective management and maintaining correct configuration settings and efficient change control. Virtualisation is also the perfect opportunity to review, improve and, if necessary, reinvent your IT risk management and security policies and processes.

See original article on scmagazineus.com

Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

Qantas facing 'significant' data theft after cyber attack

Qantas facing 'significant' data theft after cyber attack

Home Affairs officer accessed data on "friends and associates"

Home Affairs officer accessed data on "friends and associates"

Qantas contacted by "potential cyber criminal"

Qantas contacted by "potential cyber criminal"

SA Power Networks tackles IAM, cloud security under five-year strategy

SA Power Networks tackles IAM, cloud security under five-year strategy

Log In

  |  Forgot your password?