S 4.346 Secure configuration of virtual IT systems

Initiation responsibility: Head of IT

Implementation responsibility: Administrator

Virtual IT systems (occasionally also referred to as virtual machines) are first and foremost IT systems. Therefore, they must be handled and modelled similarly to physical IT systems as described in S 2.392 Modelling of virtualisation servers and virtual IT systems.

However, some particularities are applicable to virtual IT systems that must be taken into consideration.

Virtual IT systems must often be provided with access to devices connected to the virtualisation server, e.g. CD or DVD drives, USB dongles, tape drives (SCSI), and other peripheral devices. Here, devices provided by the virtualisation server to the virtual IT systems may often be controlled from the virtual machine using guest tools. For example, the network card can be disabled or data media can be inserted into the virtual CD/DVD drive or diskette drive using the physical drive.

Furthermore, some virtualisation systems provide for the option of overbooking the main memory or the hard disk space. Resources are "overbooked" if more resources may be assigned to the virtual IT systems in total than are actually physically present. In order to avoid resource bottlenecks, the guest tools in virtual IT systems may provide functions in order to control these overbooking functions. For example, the guest tools of the manufacturer VMware (VMware tools) provide a function for occupying the main memory that may be made available to other virtual IT systems (ballooning). These tools may also prepare a virtual hard disk for reducing the size of the file container it is contained in. For this, all occupied blocks of a virtual hard disk are moved to the start of the container and the now free blocks are overwritten using zeroes so that they can be identified as being free by the virtualisation layer.

Therefore, the following aspects must be taken into consideration when commissioning virtual IT systems, along with the safeguards already known from physical server operations:

Some of the functions described above are controlled or facilitated by guest tools that may be installed in the virtual IT systems. Therefore, binding regulations for configuring and using these guest tools in virtual IT systems must be drawn up.

Review questions: