Four things to note about server security

Source: Internet
Author: User
Tags new features access virtual environment firewall
Server virtualization requires less hardware resources to run multiple applications and operating systems, allowing users to quickly deploy new resources based on their own needs. But these flexibilities also cause network and security managers to worry that security risks that exist in virtual environments can spread across the network. Because if there is a problem with the server management program, it will quickly spread through the virtual machine throughout the network. Next, let's look at the issues associated with server virtualization in the following four ways:

1. Virtual machine overflow causes security problems to spread

The security implications of the hypervisor design process can infect virtual machines on the same physical host, a phenomenon known as "virtual machine overflow."

If a virtual machine can be detached from the independent environment in which the hypervisor resides, intruders will gain access to the hypervisor that controls the virtual machine, bypassing the security control system specifically designed to protect the virtual machines.

Security issues in the virtual world are trying to break out of the virtual machine's control. Although no company would allow security issues to spread and spread among virtual hosts through hypervisor technology, such security risks still exist. Because intruders or security vulnerabilities can be disruptive to and fro between virtual machines, this will be a problem that developers must face in the development process.

Now technical engineers usually use the way of isolating virtual machines to ensure the security of virtual environment. The traditional way to secure a virtual environment is to set up firewalls between the database and application tiers. Their offline storage of virtualized environments from the network helps mitigate security concerns. This is a better approach for virtualized environments.

2. Virtual machine multiplied, patch update burden increased

Another security risk that virtual machines encounter is that virtual machine patching faces a greater challenge because, as virtual machines grow faster, patch fixes are multiplying.

IT managers also agree that patches are critical in virtualized environments, but the real difference between virtual machines and physical server patches is not a security issue, but a quantity problem. Virtualized servers also require patch management and day-to-day maintenance, as do physical servers. Currently, there are three virtualized environments in the world-two within the network and one in the Demilitarized zone (DMZ)-About 150 virtual machines. But this arrangement means that the management program adds extra layers for patch management. But even so, there is no way to change the key problem, whether it's a physical machine or a patch on a virtual machine.

In addition, when the server multiplied and increased the number of patches to the technical engineers in a timely manner to bring some pressure, they began to pay more and more attention to the implementation of the process of the birth of automated tools.

3. Running virtual machines in the area of separation (DMZ)

In general, many IT managers are unwilling to place virtual servers in the Quarantine Zone (DMZ). Other IT managers do not run critical applications on virtual machines in the Demilitarized zone (DMZ), or even servers that are protected by corporate firewalls. But it is also possible to do so if the user takes safety measures correctly. Users you can run virtualization in the Demilitarized Zone (DMZ), even if the firewall or isolation device is on a physical machine. In most cases, separating resources is a safer way to do it. At this point, a virtualized environment can be established, whether in quarantine or in a demilitarized zone, and is a way of restricting access in a cluster of virtual resources. "Each cluster is its own resource and portal, so it cannot be concatenated back and forth between clusters," he explains. Many IT managers are committed to separating their virtual servers, putting them under the protection of a corporate firewall, and putting virtual machines in quarantine-running non-critical applications only.

4. The new features of the management process technology are vulnerable to hacker attacks

Any new operating system will be vulnerable and flawed. Does that mean hackers can exploit the flaws of the virtual operating system and then launch an attack?

Industry watchers recommend that security maintainers remain vigilant about virtualized operating systems, that they have potential vulnerabilities and security concerns, and that it is not enough for security personnel to be repaired by manual patches.

Virtualization is essentially a completely new operating system, and there are many aspects that we don't yet understand. It will interact with the priority hardware and the use environment, making it possible to make a mess of the situation.

Virtualization management programs are not the kind of security risks that people think of themselves. Virtualization vendors such as VMware are also working to develop the possibility of controlling security vulnerabilities in the development of hypervisor technology, based on an understanding of Microsoft's robust patch Windows operating system.



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.