BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

More from VMWorld on Virtualization Security

Posted September 28, 2010    Peter McCalister

VMWorld we had the pleasure of meeting with Jon Brodkin from Network World, who published what might be the best-written explanation of how IT administrators can take advantage of the hypervisor yet.

Naturally, as Jon absorbed what our very own Principal Systems Engineer Jordan Bean showed him in a live demonstration and walked it over to VMWare’s booth, his line of questioning on ESX security may have put some of our virtualization partners on the defensive.

What we should add, is that the ability for IT administrators to use the hypervisor to cover their tracks, hide their activities and ultimately get away with data theft is NOT a VMWare vulnerability – it’s a virtualization vulnerability.

With administrative access and a few changes to the process, we could steal data undetected from any virtual server. This isn’t a shortcoming in their software, but a new danger for root-level access.

In many cases measures are already in place to protect the company from abuse of root-level access on physical servers, but awareness and understanding of how that translates onto their virtual counterparts is low. The answer to this vulnerability is a Privilege Identity Management solution.

You saw in our last post that most VMWorld attendees have virtualized at least some of their mission-critical servers and most believe their coworker could steal data from those servers if motivated. Applying ‘least privilege’ to mitigate risk from this kind of privileged access has always been our domain – virtual or not.VMWorld 2010]]>

Leave a Reply

Additional articles

powerbroker-for-mac-diagram-small

PowerBroker for Mac: A Least-Privileged Apple a Day…

Posted July 27, 2015    Jason Silva

BeyondTrust PowerBroker for Mac reduces the risk of privilege misuse by enabling standard users on Mac OS X to perform administrative tasks successfully without entering elevated credentials.

Tags:
, ,
PrivilegedAccountManagement

On Demand Webinar – Now is the time for Privileged Account Management

Posted July 24, 2015    BeyondTrust Software

In this webinar, SANS Instructor and Founder of Voodoo Security, Dave Shackleford, will revisit several hacking and breach scenarios that involved privileged accounts, and use these as examples while discussing tools and tactics to get this problem under control once and for all.

Tags:
, ,
dave-shackleford-headshot

Privileged Account Management: The Time is Now

Posted July 22, 2015    Dave Shackleford

There’s plenty of problems we don’t have great options for in InfoSec today. Malware is a pain point that keeps evolving rapidly. 0-day exploits are tough to prepare for. Privileged account management? We got this. We know the root causes, we know how it manifests, we know how to get it under control effectively, and there are great technology solutions that are enterprise-class.

Tags:
, ,