Security recommendations for hypervisor deployment on servers
- Published: Tuesday, 30 January 2018 10:15
NIST has published new guidance to assist organizations with managing security on server-deployed hypervisors. The recommendations made in the guidance relate to the baseline functions of the hypervisor and are agnostic to the hypervisor architecture.
The abstract for ‘Security recommendations for hypervisor deployment on servers’ reads as follows (verbatim):
The Hypervisor is a collection of software modules that provides virtualization of hardware resources (such as CPU/GPU, Memory, Network and Storage) and thus enables multiple computing stacks (made of an operating system (OS) and Application programs) called Virtual Machines (VMs) to be run on a single physical host. In addition, it may have the functionality to define a network within the single physical host (called virtual network) to enable communication among the VMs resident on that host as well as with physical and virtual machines outside the host. With all this functionality, the hypervisor has the responsibility to mediate access to physical resources, provide run time isolation among resident VMs and enable a virtual network that provides security-preserving communication flow among the VMs and between the VMs and the external network. The architecture of a hypervisor can be classified in different ways. The security recommendations in this document relate to ensuring the secure execution of baseline functions of the hypervisor and are therefore agnostic to the hypervisor architecture. Further, the recommendations are in the context of a hypervisor deployed for server virtualization and not for other use cases such as embedded systems and desktops.
Read the document (PDF).