Fake servers even less secure than real ones
But not necessarily so
The prognosticators at Gartner are at it again, and this time they are guessing that IT shops are not going to be as diligent in securing their virtual servers as they need to be for many years to come.
The company has released a new report, with the catchy title Addressing the Most Common Security Risks in Data Center Virtualization Projects, that makes predictions based on surveys of IT shops doing server virtualization projects in 2009. (You can shell out some cash for the report here.)
According to Gartner's surveys, only about 18 per cent of the workloads running on servers that could be virtualized have been virtualized as of the end of last year. By the end of 2012, three long IT years later, Gartner is projecting that about 50 percent of the applications that are suited to be run atop hypervisors will be lifted one level up above their physical boxes.
This is all well and good, but virtual machines and their software stacks are mobile, thanks to live migration, which allows VMs to be teleported from one physical server to another (provided their hypervisors are compatible). Applications running on a single virtual server will have differing levels of trust and security, too, and the virtual networks inside of hypervisors do not generally plug into intrusion detection systems and other security appliances on existing physical networks, so this virtual traffic is largely invisible in terms of security.
"Virtualization is not inherently insecure," explains Neil MacDonald, the vice president at Gartner who wrote the report. "However, most virtualized workloads are being deployed insecurely. The latter is a result of the immaturity of tools and processes and the limited training of staff, resellers, and consultants."
Oddly enough, in many cases, security seems to not even be an afterthought, much less a forethought. Gartner's surveys show that 40 per cent of server virtualization projects were done without bringing the company security experts in from the get-go as the virtualized infrastructure was planned.
While companies do have processes in place to secure hardware, operating systems, and networks, they do not always have processes to lock down access to the hypervisor and its virtual machine monitoring (VMM) tools.
Gartner recommends that companies have to get tools to check the hypervisors and tools at boot time to make sure they are not compromised and that they never rely on host-based tools running inside a virtual environment to assess the security of hypervisors and VMMs. And Gartner adds that IT shops should brace themselves for this hypervisor layer to become the plump, juicy target that it is for hackers to try to crack. Administrative access to the hypervisor has to be controlled tightly and monitored continually.
But, not everyone will do the things they need to do, just as is the case with physical servers, thanks to laziness or ignorance. And therefore Gartner is projecting that through 2012, when virtualization is firmly established in the data center, some 60 per cent of virtualized servers will be less secure than the physical servers they replace. And by 2015, Gartner projects, some 30 per cent of virtual servers will still be less secure than if their workloads had been running in bare-metal mode on physical boxes. ®
Sponsored: 2016 Cyberthreat defense report