Professional Documents
Culture Documents
CET324 - Advanced Cyber Security Assignment 2
CET324 - Advanced Cyber Security Assignment 2
Cyber Security
Assignment 2
Prince Appiah (Student ID: 209181913)
CET234 – Advanced Cyber Security
28 May 2021
Introduction
ABC Insurance explored the possibility of migrating their current JRA server architecture to
virtual machines. As part of the feasibility study for this migration, an in-depth study was
conducted to ascertain whether this was the correct decision from a security perspective. Given
the amount of sensitive data held on the servers, it was imperative to examine the vulnerabilities
of the various assets of the organization when implementing a virtualized server environment.
Furthermore, the likelihood of the vulnerabilities being exploited was to be discussed as well as
the danger posed to the assets upon successful exploitation of the discussed vulnerabilities.
The NIST methodology is an important tool that will be used to gauge risk levels associated with
the vulnerabilities and mitigation steps are discussed on how these vulnerabilities can be
covered. From these considerations, a final justification and recommendation is given to the
Chief Information Security Officer on whether the idea to virtualize is the best decision to make
for the company.
1. Vulnerabilities to Assets
Server virtualization provides benefits to organizations like reduced electricity usage, a
reduction in maintenance costs and improved information security due to centralization (Lee et
al., 2015). Following practical tests in the form of DR drills, Sligh and Owusu, (2014) asserted
that the lower reliance applications have on the hardware layer bodes well for enterprises,
specifically in the case of disaster recovery since virtual images are can easily be uploaded and
restored. ABC’s assets can be divided into Server Technologies, Company Data Assets and
Customer Data Assets. The vulnerabilities associated with each of these assets are shown in
table 1. Given the peculiarities of ABC Insurance’s case, however, further vulnerabilities exist
outside of unforeseen disasters. Some general threats facing virtualized platforms are
enumerated below:
Vulnerability A (VM used to gain access to a Host)
This threat emanates from an attacker leveraging the lack of isolation and communication
restrictions in virtualized environments that require communication between applications running
on separate VMs and Hosts. As shown below in figure 1 an attacker may gain full access to a
host’s resources, leaving its file system vulnerable.
Figure 1 – Attack on a host by attacker that gains access to a VM (Kent et al., 2011)
Vulnerability B (VM used to monitor activity from another VM)
Like vulnerability B, the case of a lack of isolation leaves VMs prone to monitoring and control
by other VMs within a network. Although modern CPU architectures include a built-in feature
that hypervisors use to isolate memory between VMs, virtualization environments normally
make use of a virtual hub or switch to connect VMs. This gives attackers the possibility of
sniffing sent packets or utilizing ARP spoofing techniques to redirect sent packets from or to
affected VMs.
Vulnerability C (VM Escape)
VM Escape occurs when a compromised guest machine gains full access to the host machine’
by completely bypassing the VM layer and gaining control of the hypervisor (Nagireddi et al.,
2013). Controlling the hypervisor ultimately gives the attacker administrator privileges in the
virtualization environment, including access to all VMs running in the territory as well as the data
they have stored. According to Sabahi (2012), This probably makes VM escape the most
significant security risk facing virtualization environments.
Clients making use of a virtual machine instance may unknowingly compromise the whole
server virtualization environment by running insecure applications on their machine (Buch and
Bhatt, 2018). A malicious application may request rights to make significant system changes
that can render the security defences in place redundant. Furthermore, the successful
installation of malware such as worms, viruses and backdoors can subvert restricted user rights
to attack the entire virtualized system after successfully finding an entry point.
ID Asset Vulnerabilities
Server Technologies
1 Main Server Hardware ▪ A, B, C, D, E
2 Database Server ▪ A, B, C, D, E
3 J2EE Application Server ▪ A, B, C, D, E
4 Web Application Server ▪ A, B, C, D, E
Company Data
5 Employee Virtual ▪ A, B, C, D, E
Machines
6 Agent credential data ▪ A, B, C, E
Customer Data
7 Customer credential & ▪ A, B, C, E
insurance policy data
(Individual & Business)
8 Customer Personal Data ▪ A, B, C, E
Table 1 – Vulnerabilities associated with ABC Insurance’s assets
2. Likelihood of vulnerabilities being exploited.
According to the NIST methodology, the likelihood rating of each discussed vulnerability
represents ‘the probability that [the] potential vulnerability may be exercised within the construct
of the associated threat environment’ (Stoneburner et al., 2002). To guide the determination of
this probability, the following can be considered:
❖ The source of the threat, its motivation and capability
❖ The nature of the vulnerability
❖ The presence and effectiveness of current controls in place
Furthermore, a literature review was done on past case studies that roughly match the identified
vulnerabilities so as compare the events that led to the exploit the company’s situation and
policies. This helps to determine how likely a similar situation is to occur in the case of ABC
Insurance.
As outlined in the NIST Special publication, this likelihood can be deemed either high, medium,
or low as shown in figure 2, where each rating is described:
Figure 2 – Rating the likelihood of a vulnerability being exploited (Stoneburner et al., 2002)
The likelihood of each vulnerability being exploited as well as a short justification is detailed
below in table 2:
Table 3 below uses the NIST methodology to determine the risk level associated with each
vulnerability as well as a justification for the risk rating:
ID Vulnerability Risk Level Justification
A VM used to gain access High Given the system requirements and
to a Host resulting high likelihood of an exploit,
corrective actions is time critical to
ensure that while the whole IT system
performs its business functions, the
company’s assets are not left
vulnerable.
B VM used to monitor High Given the system requirements and
activity from another VM resulting high likelihood of an exploit,
corrective actions is time critical to
ensure that while the whole IT system
performs its business functions, the
company’s assets are not left
vulnerable.
As seen seem, there exists a connection between the end users and a virtual switch and
another connection from the virtual switch to the virtual firewall. The virtual firewall exists at the
interface between the virtual switch and virtual server, where packet the decision is made to
either allow or block traffic flowing from outside sources (packet filtering). It also offers additional
protection from threats such as spoofing (Vulnerability B) and packet over flooding (Vulnerability
D).
Vulnerability D (DOS attacks) can be also mitigated against by ensuring that the virtualized
environment is properly configured to prevent one guest from consuming excess resources and
ensure that open resources cannot be exploited without permission from the systems
administrator (Moghadam, 2013).
To combat against vulnerability E, Buch and Bhatt, (2018) suggested an approach that involves
active monitoring. This method would provide a hook within the kernel of the Virtual Machine to
actively trap different forms of malware, diverting it to another dedicated Virtual Machine for
detection. This is an improvement on more passive approaches whereby monitoring is only
carried out by privileged VMs using remote access. Equally, Noura et al, (2013) suggested a
defense strategy whereby a single administrator is setup in virtualization zones and worked in
two stages. The first stage would involve a real time process operating in a sandbox with trojan
and virus cleaning capabilities while the second stage, operating in an inaccessible zone, would
be responsible with communicating with the internet to regularly update libraries that keep track
of the latest vulnerabilities and their required security patches.
6. Recommendations and Justification
Upon careful consideration of the various vulnerabilities, risks, potential adverse impacts, and
mitigation strategies, it is recommended that ABC Insurance takes up the opportunity to
virtualize the JRA architecture. Lambropoulos et al., (2021) noted that despite the new security
concerns raised by implementing virtualization solutions, the growing need for organizations in
the financial services sector to provide their customers with more services necessitates the
migration.
It was determined, using the NIST methodology, that most of the vulnerabilities associated with
the technology were high. Despite this, from the mitigation strategies discussed it was found
that if the right actions and best practices are thoroughly followed in the initial installation, most
of the risks deescalate to medium or low. This would help ensure the security of the virtual
environment for guest operating systems, clients, and all relevant stakeholders in relation to the
organization’s regulations and policies.
This is supported by the observation of Kent et al., (2011) that most of the performance and
security issues can be attributed to a lack of adequate planning and management controls.
Such steps, which have been taken, result in a maximization in security of the infrastructure and
a further minimization of costs in the long term as well. This will be because much fewer security
issues are likely to be raised after deploying the secure virtualized environment and the costs
associated with addressing breaches is much higher after deployment than during the initial
implementation.
Summary
A comprehensive risk assessment was done on behalf of ABC Insurance Company whereby the
vulnerabilities associated with the IT system to be implemented (virtualization) were identified.
The likelihood of each vulnerability being exploited as well as the potential adverse impacts
were also discussed before the risk level of each vulnerability was assessed based on the
likelihood and potential impacts. Finally, strategies to mitigate and control the risks are
presented. After weighing all the factors discussed, it was recommended that ABC Insurance
goes ahead with the migration to a virtualized environment while taking special care to ensure
that the initial setup is carefully done to safeguard all their crucial assets.
List of References
Buch, D. and Bhatt, H., 2018. Taxonomy on Cloud Computing Security Issues as Virtualization
Layer. International Journal of Advanced Research in Engineering and Technology (IJARET),
9(4), pp.50-69.
Kent, K., Souppaya, M. and Hoffman, P., 2011. Guide to security for full virtualization
technologies. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and
Technology, pp.3-1, 3-2.
Lambropoulos, G., Mitropoulos, S. and Douligeris, C., 2021. Improving Business Performance
by Employing Virtualization Technology: A Case Study in the Financial Sector. Computers,
10(52), p.4.
Lee, Y., Kim, H. and Kim, B., 2015. Desktop Computer Virtualization for Improvement Security,
Power Consumption and Cost by SBC (Server Based Computer). International Journal of
Security and Its Applications, 9(5), p.141.
Moghadam, S., 2013. A survey of virtualization security. International Journal of Scientific &
Engineering Research, 4(9), pp.1533-1536.
Nagireddi, V., Jindal, R. and Mishra, S., 2013. Security Issues in Server Virtualization
Environment. International Journal of Advanced Research in Computer Science, 4(3), pp.266-
270.
Noura, M., Mohammadalian, S., Fathi, L. and Torabi, M., 2013. Secure Virtualization for Cloud
Environment Using Guest OS and VMM-based Technology. 2013, 1(2), pp.61-67.
Sabahi, F., 2012. Secure Virtualization for Cloud Environment Using Hypervisor-based
Technology. International Journal of Machine Learning and Computing, 2(1), pp.39-42.
Sligh, D. and Owusu, T., 2014. Considerations for Employing Server Virtual
Technologies. Issues in Information Systems, 15(1), pp.418-426.
Stoneburner, G., Goguen, A. and Feringa, A., 2002. Risk management guide for information
technology systems. Gaithersburg: U.S. Dept. of Commerce, National Institute of Standards and
Technology, pp.1-36.
Tayab, A., Junaid, Talib, W. and Fuzail, M., 2015. Security Challenges for Virtualization in
Cloud. Technical Journal, University of Engineering and Technology (UET) Taxila, Pakistan,
20(3), p.113.