SlideShare ist ein Scribd-Unternehmen logo
1 von 39
 
Welcome Kevin Wharram, CISSP, CISM, CEH, EnCE, GCFA, 27001 Lead Auditor Member of the ISACA Security Advisory Group at ISACA London Chapter My interests are in – Forensics, Virtualization and Cloud Security
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Agenda
What is Virtualization? Virtualization is the creation of a virtual (rather than actual) version of something, such as an operating system (OS), a server, a storage device or network resource. Source -  http://en.wikipedia.org/wiki/Virtualization
What is Virtualization cont. ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],History of Virtualization
[object Object],[object Object],[object Object],[object Object],[object Object],Types of Virtualization
Server Virtualization
[object Object],[object Object],[object Object],[object Object],What is Server Virtualization?
Server Virtualization Analogy Hotel VS Holiday Home
Copyright © 2004 VMware, Inc. All rights reserved. Traditional Server Server without Virtualization Holiday Home
Virtualized Server Hotel Server with Virtualization
Desktop Virtualization
[object Object],[object Object],What is Desktop Virtualization?
[object Object],[object Object],[object Object],What is Desktop Virtualization cont.
Application Virtualization
[object Object],[object Object],[object Object],[object Object],What is Application Virtualization?
Network Virtualization
[object Object],[object Object],[object Object],[object Object],What is Network Virtualization?
Physical Network
VMware Virtual Network
Storage Virtualization
[object Object],[object Object],What is Storage Virtualization?
Virtualization Security
Industry Comments ESG Research indicates that security professionals lack virtualization knowledge and best practice models for server virtualization security. Gartner survey:  “ 40% of virtualization deployment projects were undertaken without involving the information security team in the initial architecture and planning stages.”  Gartner analyst Neil MacDonald wrote: “Virtualization is not inherently insecure. However, most virtualized workloads are being deployed insecurely.“
[object Object],[object Object],[object Object],[object Object],Virtualization Security Benefits
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Virtualization Security Issues
[object Object],[object Object],[object Object],[object Object],[object Object],VMware vSphere Security
Virtualization Compliance
[object Object],[object Object],[object Object],Compliance Issues
Controls Policies & Compliance Processes & Standards Compliance Pyramid
Cloud Computing
What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Source -  http://www.nist.gov/itl/cloud/index.cfm
[object Object],[object Object],[object Object],[object Object],Types of Cloud Computing
What is a Private Cloud? ,[object Object],[object Object],[object Object]
Private Cloud Security Most of the virtualization controls that we spoke about earlier, would apply to the Private Cloud as you control the “Private Cloud.”
Controls Organisation Due-Diligence Processes & Standards Compliance Pyramid
Resources NIST guide to Security for Full Virtualization Technologies http://csrc.nist.gov/publications/nistpubs/800-125/SP800-125-final.pdf VMware hardening guides  http://blogs.vmware.com/security/2010/04/vsphere-40-hardening-guide-released.html Cloud Security Alliance http://www.cloudsecurityalliance.org/ NIST Definition of Cloud Computing  http://www.nist.gov/itl/cloud/index.cfm Center for Internet Security (CIS) Benchmarks on Server Virtualization http://cisecurity.org/en-us/?route=downloads.benchmarks Defense Information System Agency (DISA) http://iase.disa.mil/stigs/index.html
Questions? Kevin Wharram [email_address]

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

mod_security introduction at study2study #3
mod_security introduction at study2study #3mod_security introduction at study2study #3
mod_security introduction at study2study #3
 
CDI and Seam 3: an Exciting New Landscape for Java EE Development
CDI and Seam 3: an Exciting New Landscape for Java EE DevelopmentCDI and Seam 3: an Exciting New Landscape for Java EE Development
CDI and Seam 3: an Exciting New Landscape for Java EE Development
 
Cld006 azure v_net___express_route_最新情報
Cld006 azure v_net___express_route_最新情報Cld006 azure v_net___express_route_最新情報
Cld006 azure v_net___express_route_最新情報
 
Node JS reverse shell
Node JS reverse shellNode JS reverse shell
Node JS reverse shell
 
Mod Security
Mod SecurityMod Security
Mod Security
 
Operations Management Suite
Operations Management SuiteOperations Management Suite
Operations Management Suite
 
Mod security
Mod securityMod security
Mod security
 
Gets cisco security training
Gets cisco security trainingGets cisco security training
Gets cisco security training
 
Introduction to Mod security session April 2016
Introduction to Mod security session April 2016Introduction to Mod security session April 2016
Introduction to Mod security session April 2016
 
Make your OpenStack Cloud Self-Defending with VESPA!
Make your OpenStack Cloud Self-Defending with VESPA!Make your OpenStack Cloud Self-Defending with VESPA!
Make your OpenStack Cloud Self-Defending with VESPA!
 
BlueHat v17 || Down the Open Source Software Rabbit Hole
BlueHat v17 || Down the Open Source Software Rabbit Hole BlueHat v17 || Down the Open Source Software Rabbit Hole
BlueHat v17 || Down the Open Source Software Rabbit Hole
 
Strayer cis 333 entire course
Strayer cis 333 entire courseStrayer cis 333 entire course
Strayer cis 333 entire course
 
Linux Security for Developers
Linux Security for DevelopersLinux Security for Developers
Linux Security for Developers
 
Web Application firewall-Mod security
Web Application firewall-Mod securityWeb Application firewall-Mod security
Web Application firewall-Mod security
 
Future of Web Security Opened up by CSP
Future of Web Security Opened up by CSPFuture of Web Security Opened up by CSP
Future of Web Security Opened up by CSP
 
Sandboxing in .NET CLR
Sandboxing in .NET CLRSandboxing in .NET CLR
Sandboxing in .NET CLR
 
Хакеро-машинный интерфейс
Хакеро-машинный интерфейсХакеро-машинный интерфейс
Хакеро-машинный интерфейс
 
Matriux
MatriuxMatriux
Matriux
 
Lession 3
Lession 3Lession 3
Lession 3
 
Advanced OSSEC Training: Integration Strategies for Open Source Security
Advanced OSSEC Training: Integration Strategies for Open Source SecurityAdvanced OSSEC Training: Integration Strategies for Open Source Security
Advanced OSSEC Training: Integration Strategies for Open Source Security
 

Andere mochten auch

Microfix N.V. Bedrijfspresentatie
Microfix N.V. BedrijfspresentatieMicrofix N.V. Bedrijfspresentatie
Microfix N.V. Bedrijfspresentatie
Bart_Koreman
 
Why Have A Digital Investigative Infrastructure
Why Have A Digital Investigative InfrastructureWhy Have A Digital Investigative Infrastructure
Why Have A Digital Investigative Infrastructure
Kevin Wharram
 
Folder Tbv Email01 (2)
Folder Tbv Email01 (2)Folder Tbv Email01 (2)
Folder Tbv Email01 (2)
KoertK
 
8th nizo dairy conference
8th nizo dairy conference8th nizo dairy conference
8th nizo dairy conference
astridkemper
 

Andere mochten auch (15)

Now Massachusetts foreclosure can be stopped
Now Massachusetts foreclosure can be stoppedNow Massachusetts foreclosure can be stopped
Now Massachusetts foreclosure can be stopped
 
About Massachusetts Foreclosure law and lawyers
About Massachusetts Foreclosure law and lawyersAbout Massachusetts Foreclosure law and lawyers
About Massachusetts Foreclosure law and lawyers
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
Microfix N.V. Bedrijfspresentatie
Microfix N.V. BedrijfspresentatieMicrofix N.V. Bedrijfspresentatie
Microfix N.V. Bedrijfspresentatie
 
Why Have A Digital Investigative Infrastructure
Why Have A Digital Investigative InfrastructureWhy Have A Digital Investigative Infrastructure
Why Have A Digital Investigative Infrastructure
 
Folder Tbv Email01 (2)
Folder Tbv Email01 (2)Folder Tbv Email01 (2)
Folder Tbv Email01 (2)
 
WHAT SHOULD YOU KNOW AOUT Foreclosure
WHAT SHOULD YOU KNOW AOUT Foreclosure WHAT SHOULD YOU KNOW AOUT Foreclosure
WHAT SHOULD YOU KNOW AOUT Foreclosure
 
Scisoare catre locuitorii casei"Terra"
Scisoare catre locuitorii casei"Terra"Scisoare catre locuitorii casei"Terra"
Scisoare catre locuitorii casei"Terra"
 
Masachusetts Foreclosure can be avoided
Masachusetts Foreclosure can be avoidedMasachusetts Foreclosure can be avoided
Masachusetts Foreclosure can be avoided
 
David aaker-managementul-capitalului-unui-brand
David aaker-managementul-capitalului-unui-brandDavid aaker-managementul-capitalului-unui-brand
David aaker-managementul-capitalului-unui-brand
 
2014 - AINS - the Cluster of Nutrition and Health
2014 -  AINS - the Cluster of Nutrition and Health2014 -  AINS - the Cluster of Nutrition and Health
2014 - AINS - the Cluster of Nutrition and Health
 
Foreclosure can be avoided in a legal way
Foreclosure can be avoided in a legal wayForeclosure can be avoided in a legal way
Foreclosure can be avoided in a legal way
 
CTNS-Technological Centre of Nutrition and Health
CTNS-Technological Centre of Nutrition and HealthCTNS-Technological Centre of Nutrition and Health
CTNS-Technological Centre of Nutrition and Health
 
8th nizo dairy conference
8th nizo dairy conference8th nizo dairy conference
8th nizo dairy conference
 
Scrisoare catre locuitorii casei "Terra'
Scrisoare catre locuitorii casei "Terra'Scrisoare catre locuitorii casei "Terra'
Scrisoare catre locuitorii casei "Terra'
 

Ähnlich wie Kevin wharram

Advantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of VirtualizationAdvantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of Virtualization
Elizabeth Anderson
 
SYSAD323 Virtualization Basics
SYSAD323 Virtualization BasicsSYSAD323 Virtualization Basics
SYSAD323 Virtualization Basics
Don Bosco BSIT
 
Qinnova Cloud Computing Session
Qinnova Cloud Computing Session Qinnova Cloud Computing Session
Qinnova Cloud Computing Session
aleyeldean
 

Ähnlich wie Kevin wharram (20)

VMware Technical Overview (2012)
VMware Technical Overview (2012)VMware Technical Overview (2012)
VMware Technical Overview (2012)
 
Cloud Technology: Virtualization
Cloud Technology: VirtualizationCloud Technology: Virtualization
Cloud Technology: Virtualization
 
Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud Computing
 
Hello cloud
Hello  cloudHello  cloud
Hello cloud
 
Advantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of VirtualizationAdvantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of Virtualization
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The Cloud
 
Virtulization submission
Virtulization submissionVirtulization submission
Virtulization submission
 
SYSAD323 Virtualization Basics
SYSAD323 Virtualization BasicsSYSAD323 Virtualization Basics
SYSAD323 Virtualization Basics
 
Qinnova Cloud Computing Session
Qinnova Cloud Computing Session Qinnova Cloud Computing Session
Qinnova Cloud Computing Session
 
VMware - vCloud Hybrid Services
VMware - vCloud Hybrid Services VMware - vCloud Hybrid Services
VMware - vCloud Hybrid Services
 
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
 
Virtualization VMWare technology
Virtualization VMWare technologyVirtualization VMWare technology
Virtualization VMWare technology
 
VMware vCloud Air: Introduction
VMware vCloud Air: IntroductionVMware vCloud Air: Introduction
VMware vCloud Air: Introduction
 
DerbyCon 7 - Hacking VDI, Recon and Attack Methods
DerbyCon 7 - Hacking VDI, Recon and Attack MethodsDerbyCon 7 - Hacking VDI, Recon and Attack Methods
DerbyCon 7 - Hacking VDI, Recon and Attack Methods
 
Virtualization meisen 042811
Virtualization meisen 042811Virtualization meisen 042811
Virtualization meisen 042811
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Parth virt
Parth virtParth virt
Parth virt
 
Virtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the CloudVirtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the Cloud
 

Kürzlich hochgeladen

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Kevin wharram

  • 1.  
  • 2. Welcome Kevin Wharram, CISSP, CISM, CEH, EnCE, GCFA, 27001 Lead Auditor Member of the ISACA Security Advisory Group at ISACA London Chapter My interests are in – Forensics, Virtualization and Cloud Security
  • 3.
  • 4. What is Virtualization? Virtualization is the creation of a virtual (rather than actual) version of something, such as an operating system (OS), a server, a storage device or network resource. Source - http://en.wikipedia.org/wiki/Virtualization
  • 5.
  • 6.
  • 7.
  • 9.
  • 10. Server Virtualization Analogy Hotel VS Holiday Home
  • 11. Copyright © 2004 VMware, Inc. All rights reserved. Traditional Server Server without Virtualization Holiday Home
  • 12. Virtualized Server Hotel Server with Virtualization
  • 14.
  • 15.
  • 17.
  • 19.
  • 23.
  • 25. Industry Comments ESG Research indicates that security professionals lack virtualization knowledge and best practice models for server virtualization security. Gartner survey: “ 40% of virtualization deployment projects were undertaken without involving the information security team in the initial architecture and planning stages.” Gartner analyst Neil MacDonald wrote: “Virtualization is not inherently insecure. However, most virtualized workloads are being deployed insecurely.“
  • 26.
  • 27.
  • 28.
  • 30.
  • 31. Controls Policies & Compliance Processes & Standards Compliance Pyramid
  • 33. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Source - http://www.nist.gov/itl/cloud/index.cfm
  • 34.
  • 35.
  • 36. Private Cloud Security Most of the virtualization controls that we spoke about earlier, would apply to the Private Cloud as you control the “Private Cloud.”
  • 37. Controls Organisation Due-Diligence Processes & Standards Compliance Pyramid
  • 38. Resources NIST guide to Security for Full Virtualization Technologies http://csrc.nist.gov/publications/nistpubs/800-125/SP800-125-final.pdf VMware hardening guides http://blogs.vmware.com/security/2010/04/vsphere-40-hardening-guide-released.html Cloud Security Alliance http://www.cloudsecurityalliance.org/ NIST Definition of Cloud Computing http://www.nist.gov/itl/cloud/index.cfm Center for Internet Security (CIS) Benchmarks on Server Virtualization http://cisecurity.org/en-us/?route=downloads.benchmarks Defense Information System Agency (DISA) http://iase.disa.mil/stigs/index.html
  • 39. Questions? Kevin Wharram [email_address]

Hinweis der Redaktion

  1.   
  2.   
  3. 03/05/11 Integrated Solutions Management, Inc. Enterprise Governance in a Virtual World
  4. Virtual Desktop Infrastructure (VDI)
  5. Previously, it made a lot of sense to dedicate a separate physical server to each specific application. By isolating applications on dedicated hardware, you could limit their exposure to potential security threats – and when security failures did happen, you could limit them to a single machine. By dedicating a physical computer and its operating system to a single application, IT departments maintain greater protection against attackers, who have to find another way in. Virtualization platforms have made it far easier and much faster to create and deploy servers and applications than was possible when physical limitations governed system rollouts.