-
Services
- Information Security Program (ISP)
-
Information Security Assessment Services (ISAS)
- Internal Security Assessment (ISA)
- External Vulnerability Assessment/Penetration Testing (EVA/PT)
- Physical Security Assessment (PSA)
- Remote Internal Vulnerability Assessment (R/IVA)
- Wireless Vulnerability Assessment (WVA)
- Branch Controls Assessment (BCA)
- Virtual Vulnerability Assessment (VVA)
- Website Penetration Testing Assessment (W/PTA)
- Mobile Device Management Assessment (MDM)
- Risk Management/Business Continuity Program
- CastleGarde NetAudit (CNA)
- Remote Social Engineering (RSE)
- Bank Secrecy Act/Anti-Money Laundering (BSA/AML) Audit
- Website Compliance Assessment (WCA)
- Resources
- Company
Virtual Vulnerability Assessment (VVA)
Virtual Vulnerability Assessment (VVA)
Specific Threats in a Virtual Infrastructure
Each virtualization method commercially available today employs a layer of hardware, software, and administrative management beyond that of pre-virtualization. Most of the physical characteristics are supported if not mimicked by virtualization. In addition to the vulnerabilities of the guests (the hosted operating systems), and entirely new attack vector is exposed by the Virtual Infrastructure Management layer.
The key points unique to Virtualization include:
- Isolation of networks between virtual guests – using VM-based software or physical devices, implementation using Firewalls and VLANs (802.1Q)
- Isolation of the management network
- Isolation of VM guests and IP storage (NAS, SAN) networks or fabric
- Isolation of client (guest) data networks from each other and from the management network
- Secure customer (guest machine users) access to the resources
- Secure, consistent backup and restoration procedures
- Strong authentication, authorization, and auditing mechanisms
- Management and currency of operating system templates or model guest machine images
- Resource management to identify and prevent over utilization of managed resources by guests monopolizing through accidental or DoS (Denial of Service) attack
- Training and certification of technical staff supporting the Virtual Infrastructure
- Encryption standards and practices applied to Virtual Infrastructure resources, such as backup of machine images, configuration databases
- Security and maintenance of guest operating systems for patch management, configuration settings, hardening the OS; all the items that would also apply to a non-virtualized (real) operating system
- Practices related to data copying, cloning, or migration of virtualized resources
- Control of data access includes “Image Cloning” (copying of virtual machine images, data store, and virtual machine and profile configurations)