<section title="20.2. Virtualisation"><subsection title="Objective"><paragraph
    title="20.2.1."


><![CDATA[<p>To identify virtualisation specific risks and apply mitigations to minimise risk and secure the virtual environment.</p>]]></paragraph>
 </subsection>
<subsection title="Context"><paragraph
    title="20.2.2."


><![CDATA[<p>Virtualisation is the software simulation of the components of an information system and may include the simulation of hardware, operating systems, applications, infrastructure and storage. Underlying the simulation is hardware and control or simulation software, often described as a virtual machine (VM).</p>]]></paragraph>
<paragraph
    title="20.2.3."


><![CDATA[<p>A Hypervisor is a fundamental component of a virtual environment and provides a supervisory function and framework that enables multiple operating systems, often described as “Guest Operating Systems”, to run on a single physical device.</p>]]></paragraph>
<paragraph
    title="20.2.4."


><![CDATA[<p>A fundamental construct in the management of risk in virtual environments is that of Trust Zones and Trust Boundaries. A Trust Zone is a zoning construct based on levels of trust, classification, information asset value and essential information security. A Trust Boundary is the interface between two or more Trust Zones. Trust Zones use the principles of separation and segregation to manage sensitive information assets and ensure security policies are consistently applied to all assets in a particular trust Zone. As assets are added to a Trust Zone, they inherit the security policies set for that Trust Zone.</p>]]></paragraph>
<paragraph
    title="20.2.5."


><![CDATA[<p>Trust Zones will also apply the Principal of Least Privilege, which requires that each element in the network is permitted to access only those other network elements that are required for the node to perform its business function.</p>]]></paragraph>
<paragraph
    title="20.2.6."


><![CDATA[<p>Virtualisation is radically changing how agencies and other organisations select, deploy implement and manage ICT. &nbsp;While offering significant benefits in efficiency, resource consolidation and utilisation of CIT assets, virtualisation can add risks to the operation of a system and the security of the data processed and managed by that system.</p>]]></paragraph>
<paragraph
    title="20.2.7."


><![CDATA[<p>Virtualisation adds layers of technology and can combine many, traditionally discrete and physically separate components, into a single physical system. &nbsp;This consolidation invariably creates greater impact if faults occur or the system is compromised. &nbsp;Virtual systems are designed to be dynamic and to facilitate the movement and sharing of data. This characteristic is also a prominent attack vector and can make the enforcement and maintenance of security boundaries much more complex.</p>]]></paragraph>
<paragraph
    title="20.2.8."


><![CDATA[<p>Virtualisation is susceptible to the same threats and vulnerabilities as traditional ICT assets but traditional security offers limited visibility of virtualised environments where the assets configurations and security postures are constantly changing. Incidents in virtualised environments can rapidly escalate across multiple services, applications and data sets, causing significant damage and making recovery complex.</p>]]></paragraph>
 <block title="Virtualisation risks"><paragraph
    title="20.2.9."


><![CDATA[<p>Virtualisation risks can be considered in four categories:</p>
<ul>
<li>Risks directly related to virtualisation technologies;</li>
<li>Systems architecture; implementation and management;</li>
<li>The usage and business models; and</li>
<li>Generic technology risks.</li>
</ul>]]></paragraph>
</block>
<block title="Mitigations"><paragraph
    title="20.2.10."


><![CDATA[<p>The controls described elsewhere in this manual deal with generic technology risks. Important steps in risk mitigation for virtual environments include:</p>
<ul>
<li>Identify and accurately characterise all deployed virtualisation and security measures beyond built-in hypervisor controls on VMs.</li>
<li>Comparing security controls against known threats and industry standards to determine gaps and select appropriate controls.</li>
<li>Identify and implement anti-malware tools, intrusion prevention and detection, active vulnerability scanning and systems security management and reporting tools.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="20.2.11."


><![CDATA[<p class="NormS10C1b">Further references can be found at:</p>
<table class="table-main">
<tbody>
<tr>
<td><strong>Reference&nbsp;</strong></td>
<td><strong>Title</strong></td>
<td>
<p><strong>Publisher</strong></p>
</td>
<td>
<p><strong>Source</strong></p>
</td>
</tr>
<tr>
<td>
<p><strong><strong>NIST&nbsp;<strong>Special Publication</strong></strong>&nbsp;800-125, January 2011</strong></p>
</td>
<td>
<p><strong>Guide to Security for Full Virtualisation Technologies</strong></p>
</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-125/final" target="_blank">SP 800-125, Guide to Security for Full Virtualization Technologies | CSRC (nist.gov)</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>The Security Technical Implementation Guides,</strong></p>
</td>
<td style="text-align: center;">
<p>Defense Information Systems Agency,</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://public.cyber.mil/stigs/" target="_blank">Security Technical Implementation Guides (STIGs) – DoD Cyber Exchange</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Virtualization Security Checklist</strong></p>
</td>
<td style="text-align: center;">
<p>ISACA</p>
</td>
<td><a href="https://docplayer.net/656004-Virtualization-security-checklist.html">Virtualization Security Checklist - PDF Free Download (docplayer.net)</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Guidelines for System Hardening&nbsp;</strong></p>
</td>
<td style="text-align: center;">
<p>ACSC</p>
</td>
<td>
<p><a href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-system-hardening">Guidelines for System Hardening | Cyber.gov.au</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Virtual Machine Security Guidelines</strong></p>
</td>
<td style="text-align: center;">
<p>The Center for Internet Security</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="http://benchmarks.cisecurity.org/tools2/vm/CIS_VM_Benchmark_v1.0.pdf" target="_blank"></a><a href="https://www.cisecurity.org/cis-benchmarks">CIS Benchmarks (cisecurity.org)</a><a rel="noopener noreferrer" href="http://benchmarks.cisecurity.org/tools2/vm/CIS_VM_Benchmark_v1.0.pdf" target="_blank"></a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Software-Defined Networking (SDN) Definition</strong></p>
</td>
<td style="text-align: center;">
<p>Open Networking Foundation</p>
</td>
<td>
<p><a href="https://opennetworking.org/sdn-definition/">Software-Defined Networking (SDN) Definition - Open Networking Foundation</a><a rel="noopener noreferrer" href="https://www.opennetworking.org/sdn-resources/sdn-definition" target="_blank"></a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Network segmentation and segregation</strong></p>
</td>
<td style="text-align: center;">
<p>ASD</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/publications/implementing-network-segmentation-and-segregation" target="_blank">Implementing Network Segmentation and Segregation | Cyber.gov.au</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Functional segregation between servers"><paragraph
    title="20.2.12.R.01."

    tags="Technical,Virtualisation"


><![CDATA[<p>Agencies may implement segregation through the use of techniques to restrict a process to a limited portion of the file system, but this is often less effective. &nbsp;Virtualisation technology MUST be carefully architected to avoid cascade failures.</p>]]></paragraph>
<paragraph
    title="20.2.12.R.02."

    tags="Technical,Virtualisation"


><![CDATA[<p>The key element in separating security domains of differing classifications is physical separation. Current virtualisation technology cannot guarantee separation.</p>]]></paragraph>
<paragraph
    title="20.2.12.R.03."

    tags="Technical,Virtualisation"


><![CDATA[<p>The use of virtualisation technology within a security domain is a recognised means of efficiently architecting a system.</p>]]></paragraph>
<paragraph
    title="20.2.12.C.01."

    tags="Technical,Virtualisation"


    classification="All Classifications"
    compliance="Must Not"
    cid="4877"
><![CDATA[<p>Virtualisation technology MUST NOT be used for functional segregation between servers of different classifications.</p>]]></paragraph>
<paragraph
    title="20.2.12.C.02."

    tags="Technical,Virtualisation"


    classification="Secret, Top Secret, Confidential"
    compliance="Must Not"
    cid="4878"
><![CDATA[<p>Virtualisation technology MUST NOT be used for functional segregation between servers in different security domains at the same classification.</p>]]></paragraph>
<paragraph
    title="20.2.12.C.03."

    tags="Technical,Virtualisation"


    classification="All Classifications"
    compliance="Should"
    cid="4879"
><![CDATA[<p>Agencies SHOULD ensure that functional segregation between servers is achieved by:</p>
<ul>
<li>physically, using single dedicated machines for each function; or</li>
<li>using virtualisation technology to create separate virtual machines for each function within the same security domain.</li>
</ul>]]></paragraph>
<paragraph
    title="20.2.12.C.04."

    tags="Technical,Virtualisation"


    classification="All Classifications"
    compliance="Should Not"
    cid="4880"
><![CDATA[<p>Virtualisation technology SHOULD NOT be used for functional segregation between servers in different security domains at the same classification.</p>]]></paragraph>
</block>
<block title="Risk Management"><paragraph
    title="20.2.13.R.01."

    tags="Governance,Risk Management,Risk Assessment,Virtualisation"


><![CDATA[<p>Where virtualisation technologies are to be used, risk identification, assessment and management are important in order to identify virtualisation specific risks, threats and treatments.</p>]]></paragraph>
<paragraph
    title="20.2.13.C.01."

    tags="Governance,Risk Management,Risk Assessment,Virtualisation"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="4883"
><![CDATA[<p>Agencies MUST undertake a virtualisation specific risk assessment in order to identify risks, related risk treatments and controls.</p>]]></paragraph>
<paragraph
    title="20.2.13.C.02."

    tags="Governance,Risk Management,Risk Assessment,Virtualisation"


    classification="All Classifications"
    compliance="Should"
    cid="4884"
><![CDATA[<p>Agencies SHOULD undertake a virtualisation specific risk assessment in order to identify risks and related risk treatments.</p>]]></paragraph>
</block>
<block title="Systems Architecture"><paragraph
    title="20.2.14.R.01."

    tags="Technical,Virtualisation"


><![CDATA[<p>It is important to include virtualisation specific concepts, constraints, mitigations and controls in the design of systems architectures that propose using virtualisation technologies, in order to gain maximum advantage from the use of these technologies and to ensure security of systems and data is maintained.</p>]]></paragraph>
<paragraph
    title="20.2.14.R.02."

    tags="Technical,Virtualisation"


><![CDATA[<p>Virtual environments enable a small number of technical specialists to cover a wide range of activities such as network, security, storage and application management. &nbsp;Such activities are usually undertaken as discrete activities by a number of individuals in a physical environment. &nbsp;To remain secure and correctly and safely share resources, VMs must be designed following the principles of separation and segregation through the establishment of trust zones.</p>]]></paragraph>
<paragraph
    title="20.2.14.R.03."

    tags="Technical,Virtualisation"


><![CDATA[<p>Software-defined networking (SDN) is an approach to networking in which control is decoupled from hardware and managed by a separate application described as a controller. &nbsp;SDNs are intended to provide flexibility by enabling network engineers and administrators to respond to rapidly changing business requirements. &nbsp;Separation and segregation principles also apply to SDNs.</p>]]></paragraph>
<paragraph
    title="20.2.14.R.04."

    tags="Technical,Virtualisation"


><![CDATA[<p>In addition to segregation of key elements, VM security can be strengthened through functional segregation. &nbsp;For example, the creation of separate security zones for desktops and servers with the objective of minimising intersection points.</p>]]></paragraph>
<paragraph
    title="20.2.14.R.05."

    tags="Technical,Virtualisation"


><![CDATA[<p>Poor control over VM deployments can lead to breaches where unauthorised communication and data exchange can take place between VMs. &nbsp;This can create opportunity for attackers to gain access to multiple VMs and the host system.</p>]]></paragraph>
<paragraph
    title="20.2.14.C.01."

    tags="Technical,Virtualisation"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="4891"
><![CDATA[<p>Agencies MUST architect virtualised systems and environments to enforce the principles of separation and segregation of key elements of the system using trust zones or security domains.</p>]]></paragraph>
<paragraph
    title="20.2.14.C.02."

    tags="Technical,Virtualisation"


    classification="Secret, Confidential, Top Secret"
    compliance="Must Not"
    cid="4892"
><![CDATA[<p>Agencies MUST NOT permit the sharing of files or other operating system components between host and guest operating systems.</p>]]></paragraph>
<paragraph
    title="20.2.14.C.03."

    tags="Technical,Virtualisation"


    classification="All Classifications"
    compliance="Should"
    cid="4893"
><![CDATA[<p>Agencies SHOULD architect virtualised systems and environments to enforce the principles of separation and segregation of key elements of the system using trust zones.</p>]]></paragraph>
<paragraph
    title="20.2.14.C.04."

    tags="Technical,Virtualisation"


    classification="All Classifications"
    compliance="Should"
    cid="4894"
><![CDATA[<p>Agencies SHOULD design virtualised systems and environments to enable functional segregation within a security domain.</p>]]></paragraph>
<paragraph
    title="20.2.14.C.05."

    tags="Technical,Virtualisation"


    classification="All Classifications"
    compliance="Should"
    cid="4895"
><![CDATA[<p>Agencies SHOULD harden the host operating systems following an agency or other approved hardening guide.</p>]]></paragraph>
<paragraph
    title="20.2.14.C.06."

    tags="Technical,Virtualisation"


    classification="All Classifications"
    compliance="Should"
    cid="4896"
><![CDATA[<p>Agencies SHOULD separate production from test or development virtual environments.</p>]]></paragraph>
<paragraph
    title="20.2.14.C.07."

    tags="Technical,Virtualisation"


    classification="All Classifications"
    compliance="Should Not"
    cid="4897"
><![CDATA[<p>Agencies SHOULD NOT permit the sharing of files or other operating system components between host and guest operating systems.</p>]]></paragraph>
</block>
<block title="Systems Management"><paragraph
    title="20.2.15.R.01."

    tags="Technical,Virtualisation"


><![CDATA[<p>VMs are easy to deploy, often without formal policies or controls to manage the creation, management and decommissioning of VMs. &nbsp;This is sometimes described as “VM sprawl”, which is the unplanned proliferation of VMs. &nbsp;Attackers can take advantage of poorly managed and monitored resources. &nbsp;More deployments also mean more failure points, so VM sprawl can create operational difficulties even if no malicious activity is involved.</p>]]></paragraph>
<paragraph
    title="20.2.15.R.02."

    tags="Technical,Virtualisation"


><![CDATA[<p>A related difficulty occurs with <strong>unsecured VM migration</strong> when a VM is migrated to a new host, and security policies and configuration are not updated. &nbsp;VMs may also be migrated to other physical servers with little or no indication to users that a migration has occurred. &nbsp;Unsecured migration can introduce vulnerabilities through poor configuration and incomplete security and operational monitoring.</p>]]></paragraph>
<paragraph
    title="20.2.15.R.03."

    tags="Technical,Virtualisation"


><![CDATA[<p>Denial of service attacks can be designed specifically to exploit virtual environments. &nbsp;These attacks range from traffic flooding to the exploit of the virtual environment host’s own resources.</p>]]></paragraph>
<paragraph
    title="20.2.15.R.04."

    tags="Technical,Virtualisation"


><![CDATA[<p>The ability to monitor VM backbone network traffic is vital to maintain security and operations. &nbsp;Conventional methods for monitoring network traffic are generally not effective because the traffic is largely contained and controlled within the virtual environment. Careful selection and implementation of hypervisors will ensure effective monitoring tools are enabled, tested and monitored.</p>]]></paragraph>
<paragraph
    title="20.2.15.C.01."

    tags="Technical,SOPs,Virtualisation"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="4903"
><![CDATA[<p>Agencies MUST ensure a VM migration policy and related SOPs are implemented.</p>]]></paragraph>
<paragraph
    title="20.2.15.C.02."

    tags="Technical,Virtualisation"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="4904"
><![CDATA[<p>Agencies MUST implement controls to prohibit unauthorised VM migrations within a virtual environment or between physical environments.</p>]]></paragraph>
<paragraph
    title="20.2.15.C.03."

    tags="Technical,Virtualisation"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="4905"
><![CDATA[<p>Agencies MUST implement controls to safely decommission VMs when no longer required, including elimination of images, snapshots, storage, backup, archives and any other residual data.</p>]]></paragraph>
<paragraph
    title="20.2.15.C.04."

    tags="Technical,SOPs,Virtualisation"


    classification="All Classifications"
    compliance="Should"
    cid="4906"
><![CDATA[<p>Agencies SHOULD ensure a VM migration policy and related SOPs are implemented.</p>]]></paragraph>
<paragraph
    title="20.2.15.C.05."

    tags="Technical,Virtualisation"


    classification="All Classifications"
    compliance="Should"
    cid="4907"
><![CDATA[<p>Agencies SHOULD implement controls to prohibit unauthorised VM migrations within a virtual environment or between physical environments.</p>]]></paragraph>
<paragraph
    title="20.2.15.C.06."

    tags="Technical,Virtualisation"


    classification="All Classifications"
    compliance="Should"
    cid="4908"
><![CDATA[<p>Agencies SHOULD implement controls to safely decommission VMs when no longer required.</p>]]></paragraph>
<paragraph
    title="20.2.15.C.07."

    tags="Technical,Virtualisation"


    classification="All Classifications"
    compliance="Should"
    cid="4909"
><![CDATA[<p>Agencies SHOULD implement security and operational management and monitoring tools which include the following minimum capabilities:</p>
<ul>
<li>Identify VMs when initiated;</li>
<li>Validate integrity of files prior to installation;</li>
<li>Scan new VMs for vulnerabilities and misconfigurations;</li>
<li>Load only minimum operating system components and services;</li>
<li>Set resource usage limits;</li>
<li>Establish connections to peripherals only as required;</li>
<li>Ensure host and guest time synchronisation;</li>
<li>Detect snapshot rollbacks and scans after restores;</li>
<li>Track asset migration; and</li>
<li>Monitor the security posture of migrated assets.</li>
</ul>]]></paragraph>
</block>
<block title="Authentication and Access"><paragraph
    title="20.2.16.R.01."

    tags="Technical,Access Control,Virtualisation"


><![CDATA[<p>VM sprawl can compromise authentication and access procedures, identity management, and system logging. &nbsp;This can be complicated with the use of customer-facing interfaces, such as websites.</p>]]></paragraph>
<paragraph
    title="20.2.16.R.02."

    tags="Technical,Access Control,Virtualisation"


><![CDATA[<p>Host and guest interactions and their system vulnerabilities can magnify virtual system vulnerabilities. &nbsp;The co-hosting and multi-tenancy nature of virtual systems and the existence of multiple data sets can make a serious attack on a virtual environment particularly damaging.</p>]]></paragraph>
<paragraph
    title="20.2.16.R.03."

    tags="Technical,Access Control,Virtualisation"


><![CDATA[<p>A guest OS can avoid or ignore its VM encapsulation to interact directly with the hypervisor either as a direct attack or through poor design, configuration and control. &nbsp;This can give the attacker access to all VMs in the virtual environment and potentially, the host machine. &nbsp;Described as a “VM escape”, it is considered to be one of the most serious threats to virtual systems.</p>]]></paragraph>
<paragraph
    title="20.2.16.R.04."

    tags="Technical,Access Control,Virtualisation"


><![CDATA[<p>Hyperjacking is a form of attack that takes direct control of the hypervisor in order to gain access to the hosted VMs and data. &nbsp;This attack typically requires direct access to the hypervisor. &nbsp;While technically challenging, hyperjacking is considered a real-world threat.</p>]]></paragraph>
<paragraph
    title="20.2.16.C.01."

    tags="Technical,Access Control,Virtualisation"


    classification="All Classifications"
    compliance="Must"
    cid="4915"
><![CDATA[<p>Agencies MUST maintain strong physical security and physical access controls.</p>]]></paragraph>
<paragraph
    title="20.2.16.C.02."

    tags="Technical,Access Control,Virtualisation"


    classification="All Classifications"
    compliance="Must"
    cid="4916"
><![CDATA[<p>Agencies MUST maintain strong authentication and access controls.</p>]]></paragraph>
<paragraph
    title="20.2.16.C.03."

    tags="Technical,Access Control,Virtualisation"


    classification="All Classifications"
    compliance="Should"
    cid="4917"
><![CDATA[<p>Agencies SHOULD maintain strong data validation checks.</p>]]></paragraph>
</block>
</subsection>
</section>
