Shift to virtualized environments shaking up security practices

By , Network World |  Virtualization

The move to almost fully virtualized computing environments is driving a fresh approach to security in the enterprise, according to information technology security managers applying controls for VMware and Microsoft Hyper-V.

"We're very close to being 100% virtualized," says Gurusimran Khalsa, systems group supervisor in the state of New Mexico's human services department. That organization's servers are based on VMware's vSphere, and a virtual desktop project is being started, too. The agency's 170 server-based virtual machines (VMs) run in its local data center, with a range of Web applications, multi-tiered IT systems, file servers, domain servers, SharePoint and SQL servers.

ANALYSIS: New security demands arising for virtualization, cloud security

Because of a security breach that occurred a few years ago -- the loss of sensitive data was considered so serious that several IT staff were laid off -- the agency in Santa Fe has sought to keep a tight rein, requiring two-factor authentication to get into servers and introducing "air gaps" to protect some sensitive data. But at the time, while the benefits of virtualization, such as server consolidation, were being introduced, it wasn't fully understood how this transformation would impact security, says Khalsa.

Increasingly, there was concern among security and compliance officers that if VMware's vCenter management console were compromised, the game would be over. "It's the central point of access to vCenter that manages our production environment," says Khalsa.

To beef up controls there, the agency decided to install the HyTrust virtual appliance, which intercepts administrative requests to the virtual infrastructure to determine which requests are in line with the organization's policies. "We have a couple of vSphere admins at a higher level of access," says Khalsa. HyTrust can be set up to ensure only certain workloads are permitted to boot up in specific hosts or clusters, and it can label virtual objects and apply policies to them.

Originally published on Network World |  Click here to read the original story.
Join us:






Answers - Powered by ITworld

Ask a Question