Welcome!

Linux Containers Authors: Liz McMillan, Elizabeth White, Zakia Bouachraoui, Pat Romanski, Stefana Muller

Related Topics: Containers Expo Blog, Cloud Security

Containers Expo Blog: Blog Post

Security Teams Must Take Control of Virtual Networks

Any new virtual server being added to the virtual network is not subject to the same corporate security policy for network acces

It’s safe to say, nearly all enterprise network security teams tightly control what physical devices get connected to their networks. Most have clearly defined process and procedures in place with regard to controlling and securing any new devices plugging into their physical networks. Industry statistics show that the vast majority of security breaches initiate from inside the network, and not from an intruder penetrating the perimeter, physical network access control has become standard practice. As a result, it is increasingly rare to allow anyone in an organization to plug in a new server or system without first making sure the new device has been adequately secured in accordance with their corporate security standards including anti-virus protection, firewall policies, etc.  For physical devices, the process begins as soon as the ‘box’ hits the receiving dock; the equipment is intercepted and is put through the process of being secured. Once it’s been properly configured to meet the corporate requirements as defined by the security policy, it’s distributed for deployment. Then, and only then, is it plugged into the physical network.

Enter the virtual system, be it a virtual server or virtual desktop. These devices are nothing more than software however, to users, they look and feel exactly like actual physical devices on the network. At issue is the ease in which these systems can be created and connected to the corporate network. In about as much time as it takes to make a peanut butter and jelly sandwich, a VM administrator can spin up a new virtual server with all of the attributes of its physical server counterpart including nic, disk, memory, etc. However, this new virtual server can be deployed and added to the network without ever being secured by the security process described earlier. Furthermore, because the virtual server is deployed inside the internal network on a VMware ESX host with vswitches and full connectivity to the network it represents significant security vulnerability if it has not been properly secured.

What’s more, because the network traffic traversing inside the virtual network is invisible to network monitoring tools operated on the physical network, the network traffic to and from these unsecured virtual servers inside the ESX host goes completely undetected. The virtual network is in reality an internal network inside the physical network. There is simply no way to see or control the traffic running within the virtual infrastructure.

Companies are exposed to numerous security vulnerabilities and compliance issues because of the high percentage of security breaches coming from the internal network along with the fact that the ESX Host(s) represent invisible networks inside the internal network. Any new virtual server being added to the virtual network is not subject to the same corporate security policy for network access control as physical servers.

For all of these reasons, security teams must take control of their virtual networks. They must ensure that any system, be it physical or virtual, be properly secured. We encourage security teams to explore virtualized security in detail.

"VMware" and "ESX" are trademarks of VMware, Inc. [NYSE: VMX]

Read more on this topic:
"Why Do We Need Virtual Security?"

More Stories By Catherine Edwards

Catherine Edwards is a marketing consultant.

IoT & Smart Cities Stories
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected pat...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
Codete accelerates their clients growth through technological expertise and experience. Codite team works with organizations to meet the challenges that digitalization presents. Their clients include digital start-ups as well as established enterprises in the IT industry. To stay competitive in a highly innovative IT industry, strong R&D departments and bold spin-off initiatives is a must. Codete Data Science and Software Architects teams help corporate clients to stay up to date with the mod...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Druva is the global leader in Cloud Data Protection and Management, delivering the industry's first data management-as-a-service solution that aggregates data from endpoints, servers and cloud applications and leverages the public cloud to offer a single pane of glass to enable data protection, governance and intelligence-dramatically increasing the availability and visibility of business critical information, while reducing the risk, cost and complexity of managing and protecting it. Druva's...
BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe.
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
DSR is a supplier of project management, consultancy services and IT solutions that increase effectiveness of a company's operations in the production sector. The company combines in-depth knowledge of international companies with expert knowledge utilising IT tools that support manufacturing and distribution processes. DSR ensures optimization and integration of internal processes which is necessary for companies to grow rapidly. The rapid growth is possible thanks, to specialized services an...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...