Virtual Guidelines Help Secure Cloud

Thursday, February 10, 2011 @ 06:02 AM gHale

The final version to securely configure and use full computing virtualization technologies is now ready to go.

The security recommendations are in the Guide to Security for Full Virtualization Technologies (NIST Special Publication (SP) 800-125), according to the National Institute of Standards and Technology (NIST). The draft report went out for public comment July 2010.

Virtualization adds a low-level software layer that allows multiple, even different operating systems and applications to run simultaneously on a host.

“Full virtualization” provides a complete simulation of underlying computer hardware, enabling software to run without any modification. Because it helps maximize the use and flexibility of computing resources — multiple operating systems can run simultaneously on the same hardware — full virtualization is a key technology for cloud computing, but it introduces new issues for IT security.

For cloud computing systems in particular, full virtualization can increase operational efficiency because it can optimize computer workloads and adjust the number of servers in use to match demand, thereby conserving energy and information technology resources.

The guide describes security concerns associated with full virtualization technologies for server and desktop virtualization and provides recommendations for addressing these concerns. Most existing recommended security practices also apply in virtual environments and the practices described in this document build on and assume the implementation of practices described in other NIST computer security publications.

The guide is for system administrators, security program managers, security engineers and anyone else involved in designing, deploying or maintaining full virtualization technologies. NIST SP 800-125 recommends organizations:

• Secure all elements of a full virtualization solution and maintain their security;
• Restrict and protect administrator access to the virtualization solution;
• Ensure that the hypervisor, the central program that runs the virtual environment, is properly secured; and
• Carefully plan the security for a full virtualization solution before installing, configuring and deploying it.
Click here to download the NIST SP 800-125, Guide to Security for Full Virtualization Technologies.

Leave a Reply

You must be logged in to post a comment.