How do you secure a KVM?
Combine Physical and Logical controls to protect against unauthorized electronic emanation surveillance
Features of a Secure KVM
Secure Shell (SSH)
A protocol used to administer remote devices over network using TCP, Port 22
uses symmetric and asymmetric cryptography
If using asymmetric, the ssh-keygen command is used to generate the public private key pair
Remote Desktop Protocol (RDP)
List features
Allows a remote connection to a workstation or server via port 3389
Features include:
Customer Management Console-based Access
What securing features should it include?
A proprietary API that the CSP creates to allow the cloud customer to access, configure, and manage virtual machines
Securing Features should include:
DNSSEC
provides for integrity of DNS resolver request, responses and zone transfer
List DNSSEC resource records?
DNSKEY - holds public key that resolvers can use to verify DNSSEC signatures in RRSIG records
RRSIG - a record that holds DNSSEC digital signature for a records
To prevent DNS hijacking and unauthorized manipulation of resolve request what should you ensure of your email domain?
Ideally ensure your email domain has a
DMARC - Domain Based Message Authentication Reporting and Compliance
policy with
SPF - Sender Policy Framework
and/or
DKIM - Domain Keys Identified Mail
and that you enforce such policies provided by other domains on your email system
List DNS Attacks
DNS cache poisoning
Hijack DNS servers
MiTM can send a fake DNS response
DNS Shawdowing - attacker compromises registry account and registers subdomains to host fake sites
How can MiTM DNS attacks be addressed?
DNS Security - DNSSEC - designed to prevent DNS cache poisoning - uses digital signatures to verify that DNS data is coming from authenticated source
Virtual LAN (VLAN)
Methods of separating layer 3 networks using a layer 2 switch
You still need a router and ACLs to properly forward and control
Used to create isolation beyond traffic segmentation
Maximum allowed networks in VLAN is 4096
VXLAN
VXLAN (X is for extensible) is an encapsulation protocols that provide data center connectivity using tunneling to stretch Layer 2 connections over an underlying Layer 3 network
VXLAN is the most commonly used protocol to create overlay networks that encapsulates layer 2 over layer 3 (L2oL3) enabling the user of virtual networks, and allows for 16.7 million separate networks or VXLANs
How does VXLAN enable cloud?
It supports virtualization of the data center network while addressing the needs of multi tenant data centers by providing the necessary segmentation on a large scale.
VXLAN allows for scalability and allows cloud providers to effectively separate and isolate tenants from each other.
VXLAN Tunnel End Point (VTEP)
is a hypervisor based function that allows VMs to communicate via source and destination IP addresses
Virtual Private Network (VPN)
Allows two private networks to communicate with each other over a public network (Internet)
OpenVPN
A open source VPN solution that provides up to 256-bit encryption.
It is very customizable, can bypass firewalls and can support several types of encryption algorithms.
Point to Point Tunneling (PPTP)
AKA
Uses a 128 bit encryption called Microsoft Point to Point Encryption (MPPE) which is weak and has been compromised.
Secure Socket Tunneling Protocol
Developed by Microsoft to replace PPTP and is proprietary. Offers 256-bit encryption.
SoftEther
An open source VPN protocol that uses 256-bit encryption.
Used on workstations and mobile devices.
Layer 2 Tunneling Protocol (L2TP)
A VPN joint effort by Cisco and Microsoft. Typically secured by using IPSEC.
256 bit encryption.
Used everywhere.
Supports multi threading, but slower.
Internet Key Exchange v2 (IKE)
An IPSEC protocol based on the ISAKMP framework and the Oakley key negotiation protocol
IKE is for building and managing Security Associations (SA’s), it encrypts the AH or ESP
2 ways to exchange keys Diffie Helman (DH) style negotiation (routers) or public keys (users)
IP Security (IPSEC)
A layer 3 protocol used to secure IP traffic for VPNs
IP SEC Transport Mode
Only the payload portion of each packet is protected (end to end encryption for ex between client and server)
IP SEC Tunnel Mode
The entire original packet is protected including IP header (link encryption e.g. firewall to firewall)