Tuesday, February 25, 2014

The importance of securing your virtual world

Information security breaches are in the news a lot these days, but for many companies security doesn’t get the attention it deserves, until something bad happens. Let’s face it, implementing better security in a data center is a pain in the ass and inconveniences everyone from administrators to end users. Better security doesn’t make anyone’s job easier and as a result everyone tends to be resistant to it. But the reality is that unless you want to end up in the newspaper headlines you have to do it, and not just make a half-ass effort at it, you need to do it right and you also need to stay vigilant at it. Security isn’t something you do once and you’re done, it’s an ongoing job that requires discipline, time and effort to do.

Implementing virtualization makes security a more difficult job, not only do you have to secure the physical side of your data center but you also have to secure the virtual side. In a traditional non-virtualized environment implementing security was much simpler, adding virtualization to the mix makes it much more difficult and complicated as there are many more attack vectors that you need to protect. You would probably notice someone carrying a physical server out of your data center, but in a virtual environment whole servers can leave your data center in someones pocket, without them even entering your data center.

I did an article a while back for Tech Target, “How To Steal a VM in 3 Easy Steps” that described a simple scenario on how someone could make copy a VM and carry it home with them on a flash drive. From there they could easily power it on in their own environment and access the OS,  applications and data on it. To prevent this you need to start by following security best practices for virtualization and make sure you understand where the weak points are in your virtual environment and secure them properly. The ESXi hypervisor has good built-in security but it’s easy to change settings to make administration easier that results in weakening it and opening up attack points into your virtual environment. There are also a number of very good 3rd party virtualization security products from vendors like Catbird and HyTrust that can help provide an additional layer of security and monitoring to improve the security of your virtual environment.

VMware has just updated their Security of the vSphere Hypervisor white paper which provides a good overview of the security things that you need to know in vSphere. definitely give this a read and also check out some of the security resources below:

Security of the VMware vSphere Hypervisor - Good high-level overview of how ESXi security architecture and controls address common concerns in the security community regarding virtualizationVMware Security Hardening Guides - Step by step guides specific to each vSphere version that provide prescriptive guidance for customers on how to deploy and operate VMware products in a secure mannerPCI DSS Virtualization Guidelines - Provides supplemental security guidance on the use of virtualization technologies in cardholder data environmentsVMware Solution Guide for Payment Card Industry (PCI) - VMware specific security guidelines to address PCI Compliance standardsVerizon Enterprise 2013 Data Breach Report - Great report that shows where and how most corporate data breaches occur and what types of victims are typically targeted

----
Shared via my feedly reader

Sunday, February 23, 2014

Cool Tool - RVTools version 3.6 now available for download

RVTools is a windows .NET 2.0 application which uses the VI SDK to display information about your virtual machines and ESX hosts. Interacting with VirtualCenter 2.5, ESX Server 3.5, ESX Server 3i, VirtualCenter 4.x, ESX Server 4.x, VirtualCenter 5.0, VirtualCenter Appliance, ESX Server 5.0, VirtualCenter 5.1, ESX Server 5.1, VirtualCenter 5.5, ESX Server 5.5. RVTools is able to list information about VMs, CPU, Memory, Disks, Partitions, Network, Floppy drives, CD drives, Snapshots, VMware tools, Resource pools, Clusters, ESX hosts, HBAs, Nics, Switches, Ports, Distributed Switches, Distributed Ports, Service consoles, VM Kernels, Datastores, Multipath info and health checks. With RVTools you can disconnect the cd-rom or floppy drives from the virtual machines and RVTools is able to update the VMware Tools installed inside each virtual machine to the latest version.

Version 3.6 (February, 2014)

New tabpage with cluster informationNew tabpage with multipath informationOn vInfo tabpage new fields HA Isolation response and HA restart priorityOn vInfo tabpage new fields Cluster affinity rule informationOn vInfo tabpage new fields connection state and suspend timeOn vInfo tabpage new field The vSphere HA protection state for a virtual machine (DAS Protection)On vInfo tabpage new field quest state.On vCPU tabpage new fields Hot Add and Hot Remove informationOn vCPU tabpage cpu/socket/cores information adaptedOn vHost tabpage new fields VMotion support and storage VMotion supportOn vMemory tabpage new field Hot AddOn vNetwork tabpage new field VM folder.On vSC_VMK tabpage new field MTURVToolsSendMail: you can now also set the mail subjectFixed a datastore bug for ESX version 3.5Fixed a vmFolder bug when started from the commandlineImproved documentation for the commandline options

Get your free copy of RVTools version 3.6

----
Shared via my feedly reader

Wednesday, February 12, 2014

VMware vSphere Mobile Watchlist - Now Available

VMware vSphere Mobile Watchlist allows you to monitor the virtual machines you care about in your vSphere infrastructure remotely on your phone. Discover diagnostic information about any alerts on your VMs using VMware Knowledge Base Articles and the web. Remediate problems from your phone by using power operations or delegate the problem to someone on your team back at the datacenter.

IMPORTANT NOTE: A VMware vSphere installation (5.0 and above) is required to use VMware vSphere Mobile Watchlist. Access to your vSphere infrastructure may need a secure access method like VPN. Contact your IT department for further assistance.

   

FEATURES:

·   EASILY CREATE VM WATCHLISTS
Select a subset of VMs from your VMware vSphere VM inventory to tell the app what VMs to track. Use multiple lists to organize these important VMs.

·   VMS AT A GLANCE
Review the status of these VMs from your device including: their state, health, console and related objects.

·   SUGGESTED KB ARTICLES
Got an alert on your VM? Let VMware vSphere Mobile Watchlist suggest what KB Articles might help you or search the web to gather more information.

·   REMEDIATE REMOTELY
Use power operations to remediate many situations remotely from your device.

·   DELEGATE TO YOUR TEAM
For those situations where you are not able to fix an issue from the device, VMware vSphere Mobile Watchlist will enable you to share the VM and alert information along with any suggested KB articles and other web pages relevant to the current problem. Your colleagues back in the datacenter can use this context to resolve the issue.

 

Download Now

iTunes App Store:    https://itunes.apple.com/us/app/vmware-vsphere-mobile-watchlist/id792869677?ls=1&mt=8

Google Play:            https://play.google.com/store/apps/details?id=com.vmware.beacon&hl=en

VMW Community:  https://communities.vmware.com/community/vmtn/vsphere/vsphere-mobile

 

This entry was originally posted in vCenter Server, vCloud Suite, vSphere and tagged 5.1, alerts, mobile, Performance, smartphone, vcenter, vcenter appliance, virtualcenter, VMware, vSphere 5.1, vsphere 5.5, watchlist on February 11, 2014 by Justin King.

 

http://blogs.vmware.com/vsphere/2014/02/now-available-vmware-vsphere-mobile-watchlist.html