BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

More from VMWorld on Virtualization Security

Posted September 28, 2010    Peter McCalister

VMWorld we had the pleasure of meeting with Jon Brodkin from Network World, who published what might be the best-written explanation of how IT administrators can take advantage of the hypervisor yet.

Naturally, as Jon absorbed what our very own Principal Systems Engineer Jordan Bean showed him in a live demonstration and walked it over to VMWare’s booth, his line of questioning on ESX security may have put some of our virtualization partners on the defensive.

What we should add, is that the ability for IT administrators to use the hypervisor to cover their tracks, hide their activities and ultimately get away with data theft is NOT a VMWare vulnerability – it’s a virtualization vulnerability.

With administrative access and a few changes to the process, we could steal data undetected from any virtual server. This isn’t a shortcoming in their software, but a new danger for root-level access.

In many cases measures are already in place to protect the company from abuse of root-level access on physical servers, but awareness and understanding of how that translates onto their virtual counterparts is low. The answer to this vulnerability is a Privilege Identity Management solution.

You saw in our last post that most VMWorld attendees have virtualized at least some of their mission-critical servers and most believe their coworker could steal data from those servers if motivated. Applying ‘least privilege’ to mitigate risk from this kind of privileged access has always been our domain – virtual or not.VMWorld 2010]]>

Leave a Reply

Additional articles

How To Implement The Australian Signals Directorate’s Top 4 Strategies

Posted October 20, 2014    Morey Haber

The Australian Signals Directorate (ASD), also known as the Defence Signals Directorate, has developed a list of strategies to mitigate targeted cyber intrusions. The recommended strategies were developed through ASD’s extensive experience in operational cyber security, including responding to serious security intrusions and performing vulnerability assessments and penetration testing for Australian government agencies. These recommendations…

Tags:
, , , ,
asp-mvc

Exploiting MS14-059 because sometimes XSS is fun, sometimes…

Posted October 17, 2014    BeyondTrust Research Team

This October, Microsoft has provided a security update for System.Web.Mvc.dll which addresses a ‘Security Feature Bypass’. The vulnerability itself is in ASP.NET MVC technology and given its wide adoption we thought we would take a closer look. Referring to the bulletin we can glean a few useful pieces of information: “A cross-site scripting (XSS) vulnerability exists…

Tags:
4bestpracticesaudits-blog

Four Best Practices for Passing Privileged Account Audits

Posted October 16, 2014    Chris Burd

Like most IT organizations, your team may periodically face the “dreaded” task of being audited. Your process for delegating privileged access to desktops, servers, and infrastructure devices is a massive target for the auditor’s microscope. An audit’s findings can have significant implications on technology and business strategy, so it’s critical to make sure you’re prepared…

Tags:
, , , ,