Virtualization Security Guidelines

posted

Link: Virtualization Security Guidelines – blog.scottlowe.org The Center for Internet Security (CIS) has released some security benchmarks for VMware ESX Server 3.0.x.  The ESX security benchmark joins recommendations and guidelines for Windows 2000, Windows XP, Windows Server 2003, Red Hat Linux, and Mac OS X that are also available from the CIS.  The CIS has Read more...

Security Virtualization myths dispelled?

posted

Link: Security Virtualization myths dispelled? | Virtual Scoop. In an article titled VMware dispels virtualization myths, Bridget Botelho  wrote: "One significant issue with virtual machine security is with virtual switch isolation," said Burton Group’s Wolf."The current all-or-nothing approach to making a virtual switch ‘promiscuous’ in order to connect it to an IDS/IPS is not favorable Read more...

VMware partnering using security APIs

posted

Link: VMware shares secrets in security drive | CNET News.com. VMware has traditionally restricted access to its hypervisor code and, while the vendor has made no official announcement about the API sharing program tentatively called "Vsafe," VMware founder and chief scientist Mendel Rosenblum said that the company has started sharing some APIs (application program interfaces) Read more...

Being Escorted out of the Cave

posted

Posted by Charu ChaubalTechnical Marketing Manager for Datacenter Management Recently, security consulting company Intelguardians presented at NDSS claiming they could execute malicious code on the host OS of a computer running VMware hosted virtualization software, such as the free VMware Player or the licensed VMware Workstation. Their subsequent presentation at SANSFIRE 2007, which was reported Read more...

I spy a blue pill: detecting the theoretical rootkit

posted

We seem to be writing a lot about Blue Pill for something that’s pretty hypothetical at this point. A bit of background if you haven’t been following this: Blue Pill is theoretical/proof of concept rootkit that uses virtualization — a hypervisor architecture — to insert itself and hide under your operating system.  Previous coverage on Read more...