Virtual environments demand concrete security

1 March 2012 Information Security

In order to keep corporate information safe in the virtual environment, organisations will need to take an integrated approach. Consider the following five steps to successfully implementing virtualisation in an organisation.

Group applications by configuration: On physical machines, one server might host any number of different applications, each with its own configuration. This created a headache when it comes to policy management. The advantage offered by a virtual infrastructure is the ability to dynamically group these applications to more easily apply security policies.

Utilise reputation-based security: Traditional security solutions perform frequent file-by-file checks, which can be resource-intensive and ineffective at guarding against new threats. Reputation-based security, however, draws on anonymous usage data from millions of users worldwide to determine suspect files. Because of the need to scan fewer files less frequently, it minimises resource usage on the machine.

Implement central management for virtual machines: Managing traditional endpoints can be time-consuming and prone to security risks. A delay in patch management, or a lag in updating security setting on different machines, can be the difference between a secure infrastructure and a data breach. Take advantage of the benefits of virtualised endpoint management by implementing security practices and policies system-wide, to maximise protection of corporate data.

Group machines to control user access: A host-based approach allows organisations to separate groups of virtual machines to shield various system components, such as file systems, applications and registry keys. This allows an organisation to more easily restrict access to privileged networks, and determine access level for all users, including administrators.

Monitor the network: One of the greatest advantages, and sometimes a great challenge, of virtualisation is network monitoring. The ability of an organisation to centrally manage the system creates the potential for simplified monitoring of the system. Organisations should carefully consider the available solutions from vendors, and select the one that best meets the needs of the cloud configuration. Solutions should offer the following features:

* Automated control assessment functions, to optimise compliance with regulatory standards such as PCI and HIPAA.

* Flexible policy-based controls, to monitor for changes against established configurations.

* Consolidation of log monitoring and aggregate events, to detect changes to system resources.

* Adherence to VMware hardening guidelines, and automated system response, to monitor multiple files from multiples operating systems simultaneously.

And then to basics

In addition to the security guidelines that apply specifically to virtualised systems, adhering to well-established general security procedures will also improve the level of security in your data centre.

Establish two-factor authentication: Traditional, single-password systems do not provide sufficient security against today’s sophisticated attacks. Two-factor authentication is necessary to provide adequate security.

* Utilise encryption: Data encryption provides additional peace of mind in a virtualised system. It provides protection from outside threats, as well as inside risks such as loss of portable devices containing corporate information.

* Maintain traditional endpoint security: Even in a world of virtualised services, desktop/endpoint virtualisation should not be overlooked. Maintain your policies of a multifaceted endpoint security through utilisation of firewalls, antivirus and patching policies. In fact, Gartner predicts that within four years more than one-third of security solutions will be on virtualised systems.

As you look to take advantage of the vast potential of virtualisation, creating a comprehensive security plan is vital. While this can seem a daunting task, in principle it remains similar to protecting a traditional data centre, in that what you are really protecting is the information, rather than the hardware itself. Just as organisations have done for years, working to implement multitiered security solutions will minimise the risk of data loss from internal or external sources.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...
SIEM rule threat coverage validation
Information Security News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.