
BEST PRACTICES Network Segmentation in Virtualized Environments VMWARE BEST PRACTICES Table of Contents Introduction ........................................................................................................... 3 Three Typical Virtualized Trust Zone Configurations ............................................ 4 Partially Collapsed with Separate Physical Trust Zones ................................... 4 Partially Collapsed with Virtual Separation of Trust Zones .............................. 5 Fully Collapsed Trust Zones ............................................................................... 6 Best Practices for Achieving a Secure Virtualized Trust Zone Deployment ......... 7 Harden and Isolate the Service Console and Management Network ............... 7 Enforce Consistency of Network Configuration Across All Hosts ..................... 7 Set Layer 2 Security Options on Virtual Switches ............................................. 8 Enforce Separation of Duties ............................................................................. 8 Use ESX Resource Management Capabilities .................................................... 8 Regularly Audit the Virtualized Configuration ................................................. 8 Conclusion .............................................................................................................. 8 References .............................................................................................................. 8 2 VMWARE BEST PRACTICES Network Segmentation in Virtualized Environments Introduction trust zones together on one host, the degree of consolidation you achieve can remain low. In addition, you might not realize As virtualization becomes the standard infrastructure for server operational benefits from more advanced virtualization capabili- deployments, a growing number of organizations want to ties, such as live migration and high availability. consolidate servers that belong to different trust zones. A trust zone is loosely defined as a network segment within which data VMware customer experience and independent analyst flows relatively freely, whereas data flowing in and out of the research demonstrate that a virtualized trust zone configura- trust zone is subject to stronger restrictions. Examples of trust tion option can be secured. However, some network security zones include: professionals are concerned that trust zone virtualization might decrease security. This is understandable, because virtualization • Demilitarized zones (DMZs) involves new terminology and technology. • Payment card industry (PCI) cardholder data environment Fortunately, as a network security professional, you already have • Site-specific zones, such as segmentation according to the critical knowledge necessary to ensure the proper con- department or function figuration of virtual networks with a segmented infrastructure. • Application-defined zones, such as the three tiers of a Web Enforcement policies on a virtual network are the same as those application on a physical network. The difference is that the way in which The introduction of virtual technology does not have to signifi- these policies are enforced can be different in a virtual environ- cantly change the network topology. As with other parts of the ment. Gartner research supports this view by suggesting that network, virtual technology merely enables server consolidation security risks primarily emanate from administrative misconfigu- by replacing physical servers with virtual servers that function ration and not from the virtual infrastructure. (See the Resources exactly the same way — and need to be configured in much section for information on this Gartner report.) the same way — as their physical equivalents. You can con- This paper provides information that will enable you to solidate servers using virtual technology without mixing trust configure virtualized trust zones correctly and deploy them zones and continue to rely on your existing security infrastruc- seamlessly. It provides detailed descriptions of three different ture. virtualized trust zone configurations and identifies best practice However, replicating a purely physical network topology with approaches that enable secure deployment. It is very impor- virtual machines can greatly limit the benefits that virtualization tant to understand that the biggest risk to the virtual environ- can provide. If you do not run virtual machines of different ment is misconfiguration, not the technology. Thus you need strong audit controls to ensure that you avoid misconfiguration, either accidental or malicious. Internet Production LAN IDS/IPS Web zone Application zone Database zone Figure 1 — Example of trust zones in a physical environment 3 VMWARE BEST PRACTICES Three Typical Virtualized Trust Zone In this configuration, you do not need to configure dedicated Configurations virtual switches or use 802.1q VLANs within the virtual infra- structure. You perform all networking isolation on the physical A virtualized network can fully support and enforce a wide network, not within the virtual infrastructure. range of configurations to separate trust zones. The three options described in this section are typical. Advantages • Simpler, less complex configuration Partially Collapsed with Separate Physical Trust Zones Organizations that want to keep trust zones physically sepa- • Less change to physical environment, and thus less change rated tend to choose this method, shown in figure 2. In this to separation of duties and less change in staff knowledge configuration, each zone uses separate VMware® ESX hosts requirements or clusters. Zone isolation is achieved with air-gap separation • Less chance for misconfiguration because of lower complex- of servers and physical network security devices. The physical ity network does not require any change. The only difference Disadvantages between this configuration and a purely physical datacenter is that the servers within the trust zone are virtualized. • Lower consolidation and utilization of resources This configuration limits the benefits you can achieve from • Higher costs because of need for more ESX hosts and addi- virtualization because it does not maximize consolidation ratios, tional cooling and power but this approach is a good way to introduce virtual technology • Incomplete utilization of the operational efficiencies into a network. Because it has minimal impact on an existing virtualization can provide physical network, this configuration avoids certain risks. For instance, it minimizes the impact of the potential loss of separa- tion of duties. This, in turn, greatly reduces the chance that an unqualified individual might be in a position to introduce a vulnerability through misconfiguration. VMware vCenter server Internet Production Management LAN LAN Management Management Management interface interface interface network network network VM VM VM VM VM VM VM VM VM Manage- Manage- Manage- VMkernel ment VMkernel ment VMkernel ment interface interface interface IDS/IPS vSwitch vSwitch vSwitch vSwitch vSwitch vSwitch NIC NIC NIC VMware ESX team VMware ESX team VMware ESX team Web zone Application zone Database zone Figure 2 — Partially collapsed with separate physical trust zones 4 VMWARE BEST PRACTICES Partially Collapsed with Virtual Separation of Trust Because the trust zones in this configuration are enforced in the Zones virtualization layer, you should audit virtual switches regularly In this configuration, shown in Figure 3, you use virtual technol- for consistent policy and settings to mitigate the potential for a ogy to enforce trust zone separation. As a result, you can locate virtual machine to be placed on the wrong network. virtual servers with different trust levels on the same ESX host. Although Figure 3 shows separate virtual switches for each Although physical security devices are part of the configura- zone, you can accomplish the same goal by using 802.1q tion, this approach consolidates all virtual machines on the VLANs. The most important factor in determining which con- same hosts, thus requiring substantially fewer physical servers. figuration option to choose is typically the number of physical By achieving full server consolidation, you generate significant NICs present in the hardware. You should always dedicate cost savings for your IT organization. at least one physical NIC to the virtualization management Enforcement of the security zones at the network level takes network. If possible, use two physical NICs for the virtualization place in both virtual and physical realms. You use virtual management network to provide redundancy. switches to enforce which virtual servers are connected to Advantages which zone, but you use physical hardware to enforce the • Full utilization of resources network security between the zones. For this reason, virtual servers must use the physical network and pass through • Full utilization of the advantages of virtualization physical security devices to communicate between trust zones. • Lower cost The impact of the potential loss of separation of duties — and Disadvantages the associated risk that an unqualified individual might be in a • More complexity position to introduce vulnerabilities through misconfiguration — is greater in this case than when you have separate physical • Greater chance of misconfiguration requires explicit configu- trust zones, but the potential impact is minimized by the fact ration of separation of duties
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages9 Page
-
File Size-