Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Virtualization Security: Where's The Innovation?: Page 2 of 2

On Your Own, For Now

Effective security requires specialized engineering expertise, and therefore few believe that open source projects on their own will provide acceptable security for either KVM or Xen. Microsoft has the resources and talent to develop something like vShield for Hyper-V, but it has yet to do so. "Microsoft admits they're not networking people," says Christofer Hoff, chief security architect at Juniper, adding that he expects Redmond to foster a security ecosystem around Hyper-V, much like that coalescing around the VMsafe partner program.

One problem with all virtual security software is the near impossibility of extending a company's own security policies into the public cloud. The easiest option for VMware shops is adopting VMware's cloud management service, vCloud--something VMware must see as a strategic advantage. However, for companies using Amazon or Rackspace cloud services, your virtualization security policies go out the window when you go to the public cloud. Hoff sees developing a consistent set of high-level security APIs that work across platforms and providers as the next big challenge for virtualization security. But he admits the industry is a long way from converging on such a standardized, interchangeable set of security protocols.

So what can IT do until then?

Plan to combine traditional and virtualized defenses, with a bias toward increased use of virtualization. The security software you pick will be dictated by which virtualization platforms you're using, but make your vendors aware that support for a diverse set of hypervisors is a selling point. That's especially true if you plan to implement desktop virtualization, which is a much more wide-open market in terms of viable vendors. Virtual desktop infrastructure can rein in chaotic PC environments, making it easier to keep devices securely configured and consistently patched. If you're using VDI, move endpoint protection from the guest OS into the hypervisor, replacing standalone, agent-based client anti-malware with an endpoint virtual security appliance. The gains in performance and manageability are significant.

Make sure that server and network virtualization is part of your security team's charter and project plans--not a one-off implemented by VM administrators. Don't underestimate the potential for turf wars, either. As Crosby points out, virtual security appliances expose thorny control issues, especially as the VM management platform now handles vSwitches and logical volumes and is thus rapidly subsuming various categories of data center labor, including security, network, and storage configuration. Server admins inheriting these new roles may be ill-prepared to handle the subtleties.

Don't expect to shed security layers. VM security supplements but doesn't replace other elements of a defense-in-depth strategy, like perimeter hardware firewalls, intrusion prevention appliances, and content filters.

Tie virtualization into your overall security reporting framework. Even virtualized network devices like vSwitches and vNICs need to be monitored and audited, but you don't want another SEIM, network, or intrusion monitoring and management platform. That means virtualized security products must be integrated into the existing network management and reporting infrastructure, not treated as special cases. No silos.

Finally, talk to your vendors. Over the past few years, several have announced and even demonstrated products designed to provide network security for VMs, only to redirect their strategies, either in the face of competition from big boys like Cisco, Juniper, and VMware or after realizing the technical complexity of the task. "Over time, as VMware has added capabilities, other players like Catbird and Reflex have transitioned away from doing enforcement into compliance," says Hoff, referring to all-in-one VM management platforms providing monitoring, policy compliance, and auditing rather than Layer 2 or Layer 3 virtual network security.

Our take is that we're likely to see VMware and other major IT vendors, including CA, Hewlett-Packard, IBM, and Microsoft, encroach on this niche by adding VM management features to their comprehensive infrastructure management suites.

chart: What percentage of your company's production servers do you expect to have virtualized by end of next year?