{"id":2405,"date":"2007-02-21T00:00:00","date_gmt":"2007-02-21T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/02\/21\/vms-create-potential-risks\/"},"modified":"2021-12-30T11:41:17","modified_gmt":"2021-12-30T11:41:17","slug":"vms-create-potential-risks","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/02\/21\/vms-create-potential-risks\/","title":{"rendered":"VMs Create Potential Risks"},"content":{"rendered":"<p>Those tens of thousands of virtual servers spawned from your thousands of physical ones offer no guarantee your security policies will carry over, and can leave you with a security time bomb ticking away in your data center, according to vendors and some experts.  &#8220;Virtualization is both an opportunity and a threat,&#8221; says Patrick Lin, senior director of product management for VMWare.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;But one of the key things about hypervisors is their design is simpler than the modern operating system.  On the flip side, it&#8217;s a new layer that&#8217;s another opportunity for attack,&#8221; he says.<\/p>\n<p>Hypervisors are programs that allow multiple operating systems to use the same hardware.  But these programs can also breed complexity, and with complexity comes security problems.<\/p>\n<p>Virtualization security solutions so far have been focused mostly on the hypervisor: IBM, for instance, recently unveiled SHype, a new secure hypervisor technology that ties security policies to virtual machines.  And VMWare&#8217;s desktop Ace software lets you lock down virtual machines, even when they are moved around.  Lin says it works like a network access control (NAC) for virtual machines.<\/p>\n<p>Thomas Ptacek, a security researcher with Matasano Security, says the move to virtualization is the biggest thing happening in IT today.  &#8220;Some say virtualization of the OS doesn&#8217;t change anything, and others, that with virtualization, everything is broken,&#8221; Sequeira says.  There are more vulnerabilities in your operating system than in your virtualization software, such as VMware, Matasano&#8217;s Ptacek notes.  It&#8217;s more about how you configure your virtual architecture, where the virtual machine software is the main barrier among the different apps sharing the same physical machine.&#8221;<\/p>\n<p>The underlying problem: Virtualization creates a set of dynamics in the IT infrastructure that traditional security approaches &#8220;don&#8217;t cope with well,&#8221; says Kevin Leahy, director of virtualization at IBM.<\/p>\n<p>http:\/\/www.darkreading.com\/document.asp?doc_id=117908&#038;WT.svl=news2_3<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2405","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2405","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2405"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2405\/revisions"}],"predecessor-version":[{"id":4892,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2405\/revisions\/4892"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}