S 2.392 Modelling of virtualisation servers and virtual IT systems

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator, Head of IT

To achieve an adequate level of overall security for IT operations, all virtualisation servers and all virtual IT systems must be taken into account systematically in the security concept. In terms of the IT-Grundschutz methodology, this means in particular that all virtual IT systems must be integrated into the structure analysis and the modelling process.

Modelling in the IT-Grundschutz methodology refers to the assignment of modules to the existing target objects (IT systems, applications, rooms, etc.). In general, the virtual IT systems are modelled according to the same rules as for stand-alone physical IT systems. This means that the information in Section 2.2 of the IT-Grundschutz Catalogues must be taken into account. The IT-Grundschutz modules are assigned primarily according to the function of the IT system (i.e. as a server, client, etc.), the operating system used (Unix, Windows, etc.), and the applications running on the IT system (databases, web servers, etc.).

To facilitate maintenance of the security concepts and reduce their complexity, an organisation should take special care when checking the extent to which the virtual IT systems can be grouped. In principle, it is also possible to place virtual IT systems located on different physical computers together in a single group. However, the ability to do this must be examined on a case-by-case basis. Information on how to form groups can be found in the IT-Grundschutz methodology.

If a fully functional and stand-alone base operating system is operated below the virtualisation layer, then this operating system must be included in the model separately from the virtual IT systems. It is also necessary in this case to check if it is possible to group some of the virtual IT systems together.

Example scenario

As an example, we will consider a physical server S1 on which three virtual servers VM1, VM2, and VM3 are operated with the help of a virtualisation layer. A version of Unix is used as the base operating system on the physical server S1. The virtualisation layer in this example is a software component that runs on Unix, i.e. a host-based server virtualisation (type 2). The two virtual servers VM1 and VM2 are operated using Windows 2003, but Unix is installed on VM3. Applications can be run on the three virtual servers as well as directly on the base operating system of the physical server, Server S1 (by bypassing the virtualisation layer).

The following figure shows a diagram of the configuration in this example:

Diagram of the configuration in the example with three virtual servers
Figure: Diagram of the configuration in the example with three virtual servers

Note: Not all solutions for virtualisation use a base operating system with full functionality below the virtualisation layer.

If the prerequisites for placing VM1 and VM2 in a group are met, then the model for the example scenario presented above could appear as shown below (excerpt):

Modules Target object
S 3.101 General server S1
S 3.101 General server VM3
S 3.101 General server Group with VM1 and VM2
S 3.102 Servers under Unix S1
S 3.102 Servers under Unix VM3
S 3.108 Windows Server 2003 Group with VM1 and VM2

Table: Module to target object assignments

Review questions: