Virtual environments demand concrete security

1 March 2012 Information Security

In order to keep corporate information safe in the virtual environment, organisations will need to take an integrated approach. Consider the following five steps to successfully implementing virtualisation in an organisation.

Group applications by configuration: On physical machines, one server might host any number of different applications, each with its own configuration. This created a headache when it comes to policy management. The advantage offered by a virtual infrastructure is the ability to dynamically group these applications to more easily apply security policies.

Utilise reputation-based security: Traditional security solutions perform frequent file-by-file checks, which can be resource-intensive and ineffective at guarding against new threats. Reputation-based security, however, draws on anonymous usage data from millions of users worldwide to determine suspect files. Because of the need to scan fewer files less frequently, it minimises resource usage on the machine.

Implement central management for virtual machines: Managing traditional endpoints can be time-consuming and prone to security risks. A delay in patch management, or a lag in updating security setting on different machines, can be the difference between a secure infrastructure and a data breach. Take advantage of the benefits of virtualised endpoint management by implementing security practices and policies system-wide, to maximise protection of corporate data.

Group machines to control user access: A host-based approach allows organisations to separate groups of virtual machines to shield various system components, such as file systems, applications and registry keys. This allows an organisation to more easily restrict access to privileged networks, and determine access level for all users, including administrators.

Monitor the network: One of the greatest advantages, and sometimes a great challenge, of virtualisation is network monitoring. The ability of an organisation to centrally manage the system creates the potential for simplified monitoring of the system. Organisations should carefully consider the available solutions from vendors, and select the one that best meets the needs of the cloud configuration. Solutions should offer the following features:

* Automated control assessment functions, to optimise compliance with regulatory standards such as PCI and HIPAA.

* Flexible policy-based controls, to monitor for changes against established configurations.

* Consolidation of log monitoring and aggregate events, to detect changes to system resources.

* Adherence to VMware hardening guidelines, and automated system response, to monitor multiple files from multiples operating systems simultaneously.

And then to basics

In addition to the security guidelines that apply specifically to virtualised systems, adhering to well-established general security procedures will also improve the level of security in your data centre.

Establish two-factor authentication: Traditional, single-password systems do not provide sufficient security against today’s sophisticated attacks. Two-factor authentication is necessary to provide adequate security.

* Utilise encryption: Data encryption provides additional peace of mind in a virtualised system. It provides protection from outside threats, as well as inside risks such as loss of portable devices containing corporate information.

* Maintain traditional endpoint security: Even in a world of virtualised services, desktop/endpoint virtualisation should not be overlooked. Maintain your policies of a multifaceted endpoint security through utilisation of firewalls, antivirus and patching policies. In fact, Gartner predicts that within four years more than one-third of security solutions will be on virtualised systems.

As you look to take advantage of the vast potential of virtualisation, creating a comprehensive security plan is vital. While this can seem a daunting task, in principle it remains similar to protecting a traditional data centre, in that what you are really protecting is the information, rather than the hardware itself. Just as organisations have done for years, working to implement multitiered security solutions will minimise the risk of data loss from internal or external sources.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
The deepfake crisis is here and now
Information Security Training & Education
Deepfakes are a growing cybersecurity threat that blur the line between reality and fiction. These AI-generated synthetic media have evolved from technological curiosities to sophisticated weapons of digital deception, costing companies upwards of $600 000 each.

Read more...
What does Agentic AI mean for cybersecurity?
Information Security AI & Data Analytics
AI agents will change how we work by scheduling meetings on our behalf and even managing supply chain items. However, without adequate protection, they become soft targets for criminals.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
Crypto in SA: between progress and precaution
Information Security
“As cryptocurrency gains momentum and legitimacy, it’s becoming increasingly important for people to pay attention to financial security”, says Richard Frost, head of technology and innovation at Armata Cyber Security.

Read more...
Cyber recovery requires a different approach to disaster recovery
Information Security
Disaster recovery is about getting operations back on track after unexpected disruptions; cyber recovery, however, is about calculated actions by bad actors aiming to disrupt your business, steal sensitive data, or hold your system hostage.

Read more...
MDR users claim 97,5% less
Sophos Information Security
The average cyber insurance claim following a significant cyberattack is just $75 000 for MDR users, compared with $3 million for endpoint-only users, according to a new independent study.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...