Here’s a foundation topic, whose rationale fits in the virtual world just as it did in the physical world.
Unnecessary or accessible hardware devices can be used against you by attackers to gain access or compromise information.
Unlike the physical world, where we can just lock hardware away in racks, the virtual world requires you to remove or disable the devices.
Alright, I understand removing unused hardware devices. I don’t even remember the last time I mounted a flp image to a floppy drive and the COM/LPT ports and NICs not being used, easy peasy, remove them.
But the device I see getting the most resistance from other engineers is the CD/DVD drives. I can see the need to enforce a policy of sorts as I find mounted ISO’s all the time, just left lonely and neglected after an install.
I see three options:
- Do nothing and have a script unmount ISO’s and remove specific hardware device on a scheduled basis. This would be more reactionary and still leave opportunity for compromise
- Disable the CD/DVD when not in use and enable and connect when needed.
- Delete the CD/DVD when not in use and add it when needed.
The majority of the time I’ll mount an ISO using the Guest OS, so there will little change to my processes.
It would seem that the options of disabling and deleting sound about the same amount of work/time.
What do you do in the real world?
The removal of unnecessary hardware devices from a virtual machine has been a VMware best practice that has existed since at least version 4. [1,2,3]
This includes devices such as Floppy disks, CD/DVD drives, COM/LPT ports, network cards, and storage cards.
The reasoning in the VMware Documetation sites that any enabled or connected devices as avenues of attack and for security reasons you should remove unnecessary hardware devices or disable them when not being used.
However, the VMware vSphere Design book by Forbes Guthrie and Scott Lowe also gives a real world physical reason that
“Rationale: Each virtual hardware device assigned to a VM requires interrupts on the physical CPU; reducing the number of unnecessary interrupts reduces the overhead associated with a VM.”
- Virtual Machine Security Best Practices – https://pubs.vmware.com/vsphere-60/index.jsp?topic=%2Fcom.vmware.vsphere.security.doc%2FGUID-600D24C8-0F77-4D96-B273-A30F256B29D4.html
- Securing Virtual Machines – https://pubs.vmware.com/vsphere-51/index.jsp?topic=%2Fcom.vmware.vsphere.security.doc%2FGUID-822B2ED3-D8D2-4F57-8335-CA46E915A729.html
- Security Best Practices and Scenarios – https://pubs.vmware.com/vsphere-4-esx-vcenter/index.jsp?topic=/com.vmware.vsphere.server_configclassic.doc_41/esx_server_config/security_deployments_and_recommendations/c_removing_unnecessary_hardware_devices.html
- VMware vSphere Design by Forbes Guthrie and Scott Lowe – https://books.google.com/books?id=Wsglfnflv-kC&pg=PA259&lpg=PA259&dq=reducing+the+number+of+unnecessary+interrupts+reduces+the+overhead+associated+with+a+VM&source=bl&ots=Exmbe-TRKU&sig=5m6WwHwk9Xc-8yto4bSto-LGa6A&hl=en&sa=X&ved=0ahUKEwiCj_nW9_fOAhWCTSYKHS_pBocQ6AEIJjAB#v=onepage&q=reducing%20the%20number%20of%20unnecessary%20interrupts%20reduces%20the%20overhead%20associated%20with%20a%20VM&f=false
- VMware vSphere Design by Forbes Guthrie and Scott Lowe
- Forbes Guthrie @forbesguthrie www.vreference.com
- Scott Lowe @scott_lowe blog.scottlowe.org