S 3.304 Virtualisation

Description

When IT systems are virtualised, one or several virtual IT systems are operated on a physical computer. Such a physical computer is referred to as virtualisation server. Several of such virtualisation servers may frequently be consolidated to form a virtual infrastructure. In such a virtual infrastructure, the virtualisation servers themselves and the virtual IT systems operated on them can be jointly administrated.

The virtualisation of IT systems provides manifold advantages for IT operations in an information system. Costs savings are possible in the fields of hardware procurement, power, and air conditioning if the resources of the servers are used more efficiently. Thanks to the related centralisation and consolidation, as well as the simplified provision of IT systems, cost benefits may also be achieved in the fields of personnel and administration. However, the possibilities of virtualisation simultaneously constitute a new challenge for information system operations. Since the use of the virtualisation technology affects different areas and fields of work in an information system, knowledge and experiences from diverse areas must be combined.

The use of virtualisation servers and virtual IT systems must be taken into consideration in the protection requirements determination for the corresponding information system. It must be taken into account that the protection requirements of the virtualisation server are influenced by the protection requirements of the virtual IT systems operated on it. Problems on one virtualisation server or virtual IT system could have effects on all other virtual IT systems operated on the same virtualisation server.

This module describes how the virtualisation of IT systems can be introduced in the information system and under which prerequisites virtual infrastructures can be operated securely in the information system.

Scope of the subject area

This module only addresses the virtualisation of entire IT systems; other technologies partially associated with the term "virtualisation" (application virtualisation with the help of terminal servers, storage virtualisation, etc.) are not covered by this module. Virtualisation servers and virtual IT systems are considered which run operating systems that are also commonly run directly on physical IT systems.

In the field of software development, the terms virtual machine and virtual machine monitor (VMM) are also sometimes used for certain runtime environments, for example when using Java or Dot-NET (Microsoft .NET). Such runtime environments are not addressed in this module either.

Threat scenario

Given the manifold functions of the virtualisation servers and the manipulation options for virtual IT systems, there are some new organisational and technical threats for the secure operation of virtualisation servers and virtual IT systems. This is related to the fact that a new infrastructure component, namely the virtualisation infrastructure for IT objects, is created. Virtual IT systems may furthermore adopt new conditions. For example, the system that was shut down may nevertheless be in the running condition if it was only frozen by the virtualisation software. Moreover, the lifecycles of virtual IT systems are normally passed through in significantly shorter intervals.

The following typical threats to IT-Grundschutz are assumed to exist in virtual infrastructures:

Organisational Shortcomings

T 2.29 Software testing with production data
T 2.32 Inadequate line bandwidth
T 2.37 Uncontrolled usage of communications lines
T 2.60 Strategy for the network system and management system is not laid down or insufficient
T 2.148 Poor planning of the virtualisation
T 2.149 Insufficient storage capacity for virtual IT systems
T 2.150 Improper integration of guest tools in virtual IT systems
T 2.151 Lack of manufacturer support of applications regarding the use of virtual IT systems

Human Error

T 3.16 Incorrect administration of site and data access rights
T 3.28 Inadequate configuration of active network components
T 3.36 Misinterpretation of events
T 3.79 Incorrect assignment of SAN resources
T 3.99 Incorrect network connections of a virtualisation server
T 3.100 Improper use of snapshots of virtual IT systems
T 3.101 Improper use of guest tools in virtual IT systems
T 3.102 Improper time synchronisation on virtual IT systems

Technical Failure

T 4.74 Failure of IT components in a virtualised environment
T 4.75 Failure of the network infrastructure of virtualisation environments
T 4.76 Failure of administration servers for virtualisation systems
T 4.77 Resource bottlenecks due to improperly functioning guest tools in virtual environments
T 4.78 Failure of virtual machines due to unfinished data backup processes

Deliberate Acts

T 5.29 Unauthorised copying of data media
T 5.133 Unauthorized use of web-based administration tools
T 5.147 Unauthorised reading or disturbance of the virtualisation network
T 5.148 Misuse of virtualisation functions
T 5.149 Misuse of guest tools in virtual IT systems
T 5.150 Compromising the hypervisor of virtual IT systems

Method recommendation

To secure an IT system, other modules will need to be implemented in addition to this module, with these modules being selected based on the results of the IT-Grundschutz modelling process. The following must be taken into consideration for modelling virtualisation servers and virtual IT systems:

Planning and design

When planning a virtual IT infrastructure, a host of general conditions must be taken into consideration. In addition to the questions regarding the virtualisation technology to be used and the corresponding products (see S 2.477 Planning a virtual infrastructure), as well as regarding the suitability of the possible systems in terms of virtualisation (S 2.444 Planning the use of virtual IT systems), the future network infrastructure must be planned in particular (S 5.153 Planning the network for virtual infrastructures). Furthermore, a host of organisational regulations must be adapted.

Since virtualisation servers are particularly appropriate for designing test and development environments, detailed regulations as to how to handle the data processed in these environments should be drawn up (S 2.82 Developing a test plan for standard software).

Purchasing

When selecting the hardware for virtualisation servers, the procurement of systems suitable for the virtualisation solution selected must be ensured The systems must have sufficient power in order to provide all planned virtual IT systems with sufficient performance (S 2.445 Selection of suitable hardware for virtualisation environments).

Implementation

Designing the virtual infrastructure and/or installing the virtualisation servers themselves may be performed in accordance with the trained procedures of the organisation (S 3.1 General server). However, the level of complexity of a virtualisation project as a whole should not be underestimated, which is why a couple of particularities must be taken into account when configuring the networks (S 5.154 Secure configuration of a network for virtual infrastructures) and designing the administrative access to the virtualisation servers (S 2.446 Separation of administrative tasks for virtualisation servers).

Regarding the provision of virtual IT systems on the virtualisation servers, organisational safeguards for installing the virtual IT systems (S 2.447 Secure use of virtual IT systems) must be complemented by technical safeguards (S 4.346 Secure configuration of virtual IT systems) in order to guarantee secure operations.

If possible, the actual virtualisation servers should only run those services belonging to the virtualisation technology. Other services should be provided in the virtualised instances (or on systems outside of the virtual infrastructure).

Operation

The safeguards S 2.448 Monitoring the function and configuration of virtual infrastructures and S 4.349 Secure operation of virtual infrastructures for virtual infrastructures form the basis for secure operations both of the virtualisation servers and of the virtual IT systems. Additionally, safeguard S 4.348 Time synchronisation in virtual IT systems must be taken into consideration.

Contingency Planning

During contingency planning for the virtualisation servers, it should be taken into consideration that the potential extent of damage is higher the more virtual IT systems are operated on a virtualisation server. Therefore, the protection requirements of the entirety of the virtual IT systems must be mapped to the protection requirements of the virtualisation components (S 6.138 Drawing up a business continuity plan for virtualisation component failure).

The bundle of security safeguards for the "virtualisation" module is presented in the following.

Planning and design

S 2.82 (B) Developing a test plan for standard software
S 2.314 (Z) Use of high-availability architectures for servers
S 2.392 (A) Modelling of virtualisation servers and virtual IT systems
S 2.444 (A) Planning the use of virtual IT systems
S 2.477 (A) Planning a virtual infrastructure
S 3.70 (W) Introduction to virtualisation
S 3.71 (B) Virtual environment training for administrators
S 5.153 (B) Planning the network for virtual infrastructures

Purchasing

S 2.445 (C) Selection of suitable hardware for virtualisation environments

Implementation

S 2.83 (B) Testing standard software
S 2.446 (B) Separation of administrative tasks for virtualisation servers
S 2.447 (A) Secure use of virtual IT systems
S 3.72 (W) Basic terminology of virtualisation technology
S 4.97 (Z) One service per server
S 4.346 (A) Secure configuration of virtual IT systems
S 4.347 (Z) Disabling of snapshots of virtual IT systems
S 5.154 (B) Secure configuration of a network for virtual infrastructures

Operation

S 2.448 (B) Monitoring the function and configuration of virtual infrastructures
S 2.449 (Z) Minimum use of console accesses to virtual IT systems
S 4.348 (C) Time synchronisation in virtual IT systems
S 4.349 (A) Secure operation of virtual infrastructures

Contingency Planning

S 6.138 (C) Drawing up a business continuity plan for virtualisation component failure