Virtualization Software and Security has very close relationship. Here are some important points on Virtualization Software.
How the security can maintained on servers using Virtualization Software
The Security of Virtualization Software, mainly based on XenServer,?we can make classify the ways in to 3 levels :
- Access to the administration
- Remote Disk Access
- External network access
Details on the points of Virtualization Software and Security
Access to administration
Any Virtualization software‘s API listens for HTTP through port 80 and for HTTPS, port 443; that is SSL encryption. The interconnection between XenCenter and XenAPI HTTPS, for example is always encrypted. The problem we have in the Virtualization Software plugins provided by the third parties that do not implement SSL for requests for our servers. Another good practice would be the firewalls – access to our servers running Virtualization on port 80 from any network can be secured to allow only HTTPS. It is also necessary to access our servers running Virtualization via SSH. Access to SSH with a weak password exposes your entire Virtualization environment to attack.
Remote Disk Access
If you are having a remote disk access via iSCSI or NFS running Virtualization, it is important to have an isolation through dedicated interfaces at the same storage. This will never expose the traffic to any access network. If you are using NFS, VHD files in your repository, it is especially important that you only have access to these resources.
External network access
Unless necessary, a machine running any Virtualization software does not have access to the management network environment. It is good practice to establish an isolated physical interface for management Virtualization deployed environment?and others with a switch.