Page 900 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 900

Manipulations (VENOM) was able to breach numerous VM products
               that employed a compromised open-source virtual floppy disc driver

               to allow malicious code to jump between VMs and even access the
               host.

               VM escaping can be a serious problem, but steps can be implemented
               to minimize the risk. First, keep highly sensitive systems and data on
               separate physical machines. An organization should already be
               concerned about overconsolidation resulting in a single point of

               failure, so running numerous hardware servers so each supports a
               handful of guest OSs helps with this risk. Keeping enough physical
               servers on hand to maintain physical isolation between highly
               sensitive guest OSs will further protect against VM escaping. Second,
               keep all hypervisor software current with vendor-released patches
               (especially with updates related to VM escaping vulnerabilities). Third,
               monitor attack, exposure, and abuse indexes for new threats to your
               environment.


               Virtualization is used for a wide variety of new architectures and
               system design solutions. Cloud computing is ultimately a form of
               virtualization (see Chapter 9, “Security Vulnerabilities, Threats, and
               Countermeasures,” for more on cloud computing). Locally (or at least
               within an organization’s private infrastructure), virtualization can be
               used to host servers, client operating systems, limited user interfaces

               (i.e., virtual desktops), applications, and more.


               Virtual Software

               A virtual application is a software product deployed in such a way that
               it is fooled into believing it is interacting with a full host OS. A virtual
               (or virtualized) application has been packaged or encapsulated to
               make it portable and able to operate without the full installation of its

               original host OS. A virtual application has enough of the original host
               OS included in its encapsulation bubble (technically called a virtual
               machine, or VM) that it operates/functions as if it were traditionally
               installed. Some forms of virtual applications are used as portable apps
               (short for applications) on USB drives. Other virtual applications are

               designed to be executed on alternative host OS platforms—for
               example, running a Windows application within a Linux OS.
   895   896   897   898   899   900   901   902   903   904   905