The scary side of virtualization
After pushing forward with server virtualization, some IT executives are rethinking the security implications
Computerworld - During a roundtable discussion at the Computerworld Premier 100 IT Leaders conference in March, one CIO stood up to express his uneasiness about the security of a virtual infrastructure that has subsumed more than half of his company's production servers. In short order, two other IT executives chimed in with their own nagging worries.
None of the executives in that room wanted to admit on the record that they feel vulnerable, but Jai Chanani, senior director of technical services and architecture at Plano Texas-based retailer Rent-a-Center Inc., feels their pain. "One of my biggest fears is the ability to steal [virtual servers]," he says. His team has about 200 VMware ESX and XenServer virtual servers operating as file, print and, in some cases, application servers. But, for security reasons, his shop doesn't use virtualization for the company's ERP system, databases or e-mail.
Michael Israel, CIO at amusement park operator Six Flags Inc. in Grand Prairie, Texas, voices a different concern. To him, the most unnerving scenario is the idea of a rogue administrator moving virtual servers from a secure network segment onto physical hosts in an unsecured segment, or creating new, undocumented, unlicensed and unpatched virtual servers. "The biggest concern I have is the renegade side of it. The last thing I want is 25 servers out there... that I don't know exist," he says.
The migration onto virtual servers has saved businesses huge sums of money as a result of consolidation and improved efficiency, but as virtualization has gobbled up more and more production servers, some IT executives are getting indigestion. Has anything been overlooked? Could a catastrophic breach somehow bring down critical applications -- or perhaps an entire data center? "Customers wake up one day, realize that 50% of their business-critical apps reside on virtual infrastructure and say 'Gee, is that secure?' That's very common," says Kris Lovejoy, a vice president at IBM Security Solutions, IBM's security consultancy.
"There are some huge, well-known corporate names around the globe that you'd think would have this stuff pretty much beat. That couldn't be further from the truth," says Andrew Mulé, a senior security consultant in the RSA Security practice at EMC Consulting; he spends his time in the field with corporate customers.
The problem isn't that virtual infrastructure is difficult to secure per se, but that many companies still haven't adapted their best practices -- if they have them -- to the new environment.
Virtualization introduces technologies -- including a new software layer, the hypervisor, -- that must be managed. Also new: Virtual switching, which routes network traffic between virtual servers in ways that aren't always visible to tools designed to monitor traffic on the physical network.
Moreover, virtualization breaks down the traditional separation of duties within IT by allowing a single administrator to generate new virtual servers en masse, at the push of a button, without approval from purchasing or input from the network, storage, business continuity or IT security groups. In many organizations, the IT security team isn't consulted about virtual infrastructure until well after the architecture is built and rolled out on production servers. And virtualization-aware security technologies and best practices are both still evolving.
The market has emerged so quickly that customers have not been able to keep up from a best practices standpoint, says Lovejoy. There's a lack of knowledge on the subject and a lack of skills in the field. While technologies are available to secure virtual infrastructure, Lovejoy often sees security failures that can be tracked to misconfigurations.
"The questions about security in a virtual environment are centered around lack of visibility, lack of control and fear of the unknown," says Bill Trussell, managing director of security research at The Info Pro, a Manhattan-based IT consultancy.
Read more about it
- The scary side of virtualization
- Hypervisor as virtualization's enforcer?
- Tighten up virtual server security, cautions Gartner
- The virtual blind spot
- Case study: Hungry for virtual server security
- Blog: Securing mixed environments - not everybody will be virtualized
- Opinion: Virtualization security assessment guides inadequate
- Virtualization's security threats
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- See the Possibilities Utilizing Data Visualization Do you simply want to collect data, or do you want to derive business insights from it? What if you could quickly and...
- 5 Reasons To Migrate From Cisco (ACE) to Riverbed Stingray ADC As you consider refreshing your legacy Cisco ACE application delivery infrastructure, consider migrating to the Riverbed® Stingray™ family of products and learn the...
- The Sky's the Limit for Eclipse Aerospace and VCE This case study highlights how Eclipse was able to unlock critical IP, support business growth, dial up or down resources without having to...
- Implementing Agile Systems Management in Cloud and Virtual Infrastructure The solution to the obstacle stopping enterprises from realizing the benefits of cloud computing- how to extend existing enterprise management applications to the...
- Maximize Efficiency in Your Virtual Environment with Converged Solutions Efficiency is the key to success in IT, especially in a virtual environment. But traditional infrastructure management and inflexible architectures can be costly...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Virtualization White Papers | Webcasts