New security threats from every which way

As virtualization, SOA and mobility projects proliferate and converge, they open the enterprise to a rash of troublesome network security problems

As enterprises seek out ways to reduce IT costs, optimize resources and improve operational efficiencies, three technology trends have started to dominate: virtualization, service-oriented architecture and mobility. More promising yet is the intertwining of these unique technologies.

Some examples: Mercy Medical Center, in the US, is piloting virtual desktops rolled out on encrypted USB devices to its mobile doctors and residents. RedRoller, an online-shopping comparison service, created an SOA to connect its small-and-midsize business (SMB) customers to best pricing at shipping carriers -- a system that's likely to go virtual down the road. Delaware Electric, gives field workers with tablet PCs access to an SOA infrastructure.

What does this mean from a security perspective? It means myriad new layers of risk being created along the stack -- all of which must be securely deployed and managed. "We're talking layers and layers you need to pay attention to, both in isolation and also where they're mixing up with unexpected interactions," says Dennis Moreau, CTO of Configuresoft, a configuration management company.

Take the virtual machine environment. This environment comprises a virtual machine manager (VMM) or hypervisor that's shimmed between the kernel and the host operating system to create a layer of layers, or as some call it, a "virtual stack." In that stack are the hypervisor and guest layers that call among themselves and cannot be monitored by most of today's tools.

"There's a whole series of security dilemmas IT professionals are facing with these new technologies," says M. Victor Janulaitis, CEO of Janco Associates, an IT and business analysis firm. "The most prevalent problems are change management and version control, all the way to the cellular phones," he says.

Best practices, standards and tools are emerging, but they're mostly piecemeal, open to interpretation and incomplete in their coverage. Today that makes comprehensive management of any of these technologies problematic.

Exploits on all fronts

In its annual security report, Cisco outlines likely attacks against virtualization, SOA and mobility infrastructures. Here are some excerpts:

On SOA: Malware attacks exploiting application vulnerabilities will grow and become more significant during the next several years. Expect more sophisticated attacks from professional attackers. Organizations probably will see an increasing number of infected systems attempting to access protected networks.

On virtualization: Malware rootkits that execute entirely in system memory emerged during 2007. As average RAM size continues to increase, such strategies probably will grow in popularity.

On mobility: The huge increase during the past year in the use of multipurpose smart phones, such as Apple's iPhone, means there are more mobile devices with fully functional operating systems in use than ever before. Future mobile malware will take advantage of the richer capabilities of these operating systems. Expect future mobile-malware attacks to propagate via mobile e-mail, Short Message Service, Wi-Fi, and instant messaging applications.

More malware will target portable media and gaming devices. As more users take advantage of growing storage capacity in iPods and other flash media to store sensitive business information, expect attackers to target these devices.

Across all three technologies: Expect more multiplatform attacks.

Source: Cisco 2007 Annual Security Report

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about AppleBillionCircuit CityCiscoCitrix Systems Asia PacificCitrix Systems Asia PacificConfigureSofteBayEndPointsExposureForrester ResearchGartnerGatewayIBM AustraliaIDC AustraliaIntelJanco AssociatesLaserLumensionMacsMicrosoftNovellPatchlinkPatchlinkPlateSpinReflex SecuritySSHSymantecVIAVMware AustraliaVSAXenSource

Show Comments
[]