Introduction
We are well aware that virtualization has been widely implemented, however, there are questions regarding adequate considerations for security threats, known or perceived. It appears that many organizations rest on superior security at the physical layer for a secure virtual layer. This is due in part to an organization that is not aware of the risks associated specifically with the virtual layer or individuals that lack the knowledge to implement adequate security measures.
This course covers all known and many perceived risks, demonstrates how to hack some of those risks and covers the best hardening practices known today. It covers many technologies related to the VMware vCloud Suite so that you know what you can and cannot do with the software as well as what needs to be added to your security posture to ensure a secure private cloud!
Some benefits of attending this course are:
- Learn the latest technologies used to secure the vSphere and Private Cloud Infrastructure.
- The risks to a virtual datacenter are higher than most organizations realize, be prepared to mitigate those risks.
- Become a leader in the industry by staying on top of the security issues related to the private cloud.
- We cover the best third party solutions related to virtualization and the private cloud.
- This course will teach you how to test some of these known risks.
- Our team of developers have worked in the security field for many years, they pioneered today’s designs for a secure virtual infrastructure and wrote the first course on virtual security, they have tried and true best practices throughout this course.
- Take the VM’s home with you for additional work after class!
- 50% of your time will be hands on.
Course Outline
Chapter 1 – Course Introduction
Chapter 2 – Virtualization and Cloud Overview
- Overview of Virtualization
- Overview of Cloud Technologies
- Design
- Functional Requirements
- Security Implications
- Examples
Chapter 3 – Developing a vSphere Private Cloud Security Posture
- CIA Triad
- Threat Modeling
- Emerging Threats
- External Threats
- Internal Threats
- Seven Step Approach to a Desired Security Posture
- Control Architecture
- Deep Dive into vSphere Risks
- Virtual Machine Risks
- ESXi Hosts Risks
- vNetwork Risks
- vCenter Risks
- vStorage Risks
- vCloud – Related to Private Cloud Risks
Chapter 4 – vSphere Native Controls
- ESXi Secure Architecture/ul>
- vCPU
- vMemory
- Virtual Machines Secure Architecture
- Virtual Machine Hardware
- Virtual Machine Files
- vCenter Features
- vMemory Management
- vCPU Management
iii. Clones and Templates
- Roles and Permissions
- Host and Cluster Native Controls
- VMKernel Preventative Controls
- vSphere 5.x Preventative Controls
- ESXi File Systems Structure
- Logging
- Lock Down Mode
- SSH Access
- ESXi Firewall
- vCloud Networking and Security
- Edge
- App Firewall
- VXLAN
- Data Security
- vCloud Ecosystem Framework
- vCenter Native Controls
- Single Sign-On
- High Availability
- Distributed Resource Scheduler
- vSphere Data Protection
- vSphere Replication
- Disaster Recovery Options
Chapter 5 – vNetwork Native Controls
- vSwitch Native Controls
- DvSwitch Native Controls
- How traffic routes
- Forged Packets
- VLANs
- PVLANs
- App Firewall
Chapter 6 – vStorage Security
- Understanding Storage within the Virtual Architecture
- Native Controls
- Storage Capabilities based on Versions
- Storage I/O Control
- vSphere Storage API’s
- All Paths Down and Permanent Device Loss
- Storage Profiles, Clusters and DRS
- Fiber Channel Security
- iSCSI Security
- NAS Security
Chapter 7 – Third Party Mitigation Solutions
- Catbird
- Cisco Adaptive Security Virtual Appliance
- Firefly Host – Juniper Networks Product
- HyTrust
- Sophos Endpoint Antivirus – Cloud
- Reflex VMC
- TrendMicro Deep Security
- WatchGuard
Chapter 8 – Assessing and Remediating
- Assessment Program Objectives
- Assessment Program Scope
- Prerequisites and Reliance
- Assessment Skills Requirement
Chapter 9 – Hardening the Virtual Machines
- The Basics
- Making best use of Templates
- Isolating the VM
- Managing Resources
- Advanced Settings
- Preventing Known Risks
- Auditing the VM
- Endpoint Security
Chapter 10 – Hardening the Host
- The Basics
- Managing Users
- DCUI Management
- Managing Access to Host
- Firewall Best Practices
- Advanced Settings
- vNetwork Hardening
- vStorage Hardening
- Managing Certificates
Chapter 11 – Hardening vCenter
- The Basics
- Controlling Access
- Managing Plug-Ins
- Converter
- Update Manager
- vCLI
- And Others
- Managing Certificates
- vCert Manager
- Using the App Firewall
Appendix – Additional Products only covered in extended hour’s delivery (Bootcamp Format)
- vCloud Native Controls
- How vCloud functions with vSphere
- Roles and Permissions
- Tenant and Landlord Controls
- vNetwork Controls
- vStorage Controls
- vApp Controls
- Compliance and vCenter Configuration Manager
- Overview of Compliance
- How Configuration Manager Helps
- Key components
- Free Compliance Checking Tools
- Additional vCloud Networking Deep Dive
- Edge
- VXLAN
- Data Security