VCD Roundtable: Episode 47 – The Importance of Hardening Software

Welcome to the VCD Roundtable Episode 47.

We want to talk about the importance of hardening.

So hardening software.

So we added the software at the end.

Oh, I didn't know that.

I thought...

The topic is around hardening, but OK.

If it goes around VMware products,

maybe I can help as well.

Hi, this is Matthias,

also a part of the VCD Roundtable stream again.

Today's guest speaker with us is Fabian.

Fabian, for the introduction.

Hello.

So I've been here many episodes ago.

I don't know, maybe one of the first and never came back.

But now if things get hard, I'm back in the team.

Fabian, architect at comdividion.

I do a lot around architecture and consulting service

providers when things get tough.

Nah, just kidding.

No, but the topic around hardening is something

I dropped in during our Kickoff

because we see that a lot of service providers

need to be prepared

against any kind of cyber threats

and attacks and also audits.

So be prepared for the audits.

That's why hardening is an important thing.

And maybe I can drop the one or other story

to give you guys out there some feedback around that.

Absolutely.

What's also interesting, based on the questions

we get from many customers and service providers,

is do we need hardening only if we need to get certified

or is it also relevant in normal environments?

Yeah, I mean, hardening is a general concept for many years

to change your software probably in a way

that differs from the default settings.

Yeah, there were many years ago

when... was telling you

how to harden your Windows systems

and all kinds of software can be

hardened by disabling features,

by also giving you guidance around operational steps.

You need to patch your environment.

You need to make sure people are trained.

All those things come together

when we talk about the topic hardening.

That's why I always see it as a three-part thing.

One is the architecture around solution.

That must be hardened.

One is the configuration, how is it applied?

Those hardening settings.

And also how is it lived?

So how are daily procedures hardened against security?

This is something you always need to observe

as a complete item from my opinion.

And if someone promised you,

"Hey, we deploy Aria Operations or VCF Operations"

and you have automatically your environment hardened

or get reports of the hardening status.

In my opinion, that's not true.

It's one important toolkit for it.

But there's much more to hardening

than just installing something

and saying, "Now it's hardened."

I wouldn't phrase it that simple

because honestly speaking using Operations Manager

and the implemented policy or the implemented framework

with the hardening configuration is pretty straightforward.

It just reflects Broadcom's default view:

which configuration should be taken

or which feature could be reconfigured

to have a hardened infrastructure

from a Broadcom perspective.

That is one of many approaches.

It might fit your needs.

It might not, but you get a proper

report based on Broadcom's default view,

how it should be done.

If you don't agree, if you have a different approach

on hardening your infrastructure

or you have different security

and recommendations/needs,

you just need to reconfigure the

framework within Operations Manager

to fit your needs.

Then you have a proper report based on your infrastructure

and you can start reconfiguring everything.

Yeah, totally right.

But from my point of view,

as you know Ops Manager has a limited view on things.

If I think about the environment of the service provider

who might also have NSX, Advanced Load Bancer

or I don't know Cloud Director in place,

that's typically something the

Operations Manager does not get.

If we talk about those, let's say hardening relevant items

like "Hey, your Active Directory must be secured."

Let's say, immutable against any kind of attacks.

That's also something we cannot.

So we have only this limited view

and I really love using those built-in compliance options

from Aria Operations as a starting point.

But still, and you did a great point by saying,

"Hey, it's everything related to risk

and everyone needs to decide fon their own

if they want to accept the risk of not applying this item

or maybe this item does not fit

for your specific use case environment."

And from my experience over the last years,

I did a lot of... I was involved in a lot of audits

around Enterprise solutions.

And the important thing is you

need to have something in place.

That's the first thing.

So you need to do this kind of hardening.

VMware has done a great job over the years

together with the community of

creating those hardening guides;

in the past they were called

security configuration guides.

Those big Excel sheets

where you have the default setting,

that's what it should be.

That's the argument why you should have that.

And what we always did, what we still do nowadays

is taking that extension for certain customers

and have the discussion -- item per item with the customer.

"Hey, how does it look like in your environment?

Is it a risk we take?

Shall we live with the operational downside

of enabling lockdown mode?"

Which obviously makes sense

from a security perspective in many scenarios,

but sometimes from operational perspective,

it can be quite annoying.

So we need to get the risks together,

calculate what's relevant for the customer

and then make a decision.

And I think that's a very important point you just covered,

because even though a guide tells a customer or a CSP

setting ABC needs to be reconfigured to whatever,

you can still come up with a decision

against the recommendations.

Say, "I'll configure a feature

in a certain way because of..."

And even if you have an audit...

so an auditor has no chance to make any...

He cannot force you to reconfigure it

to a certain configuration.

But if you have it configured differently

based on common guidelines,

you always need to have a justification in place.

You need to take a proper decision and justify

why is it configured that way?

And as long as you have a justification,

you're good to go.

Because if you have a justification,

you made the decision and you're perfectly aware

about the pros and cons.

Yeah, depends on the justification.

I don't encrypt because it's complicated.

[laughter]

Would be the...

I mean, from my point of view,

most auditors I work with, most of them,

they audit a broad area of IT.

They're not experts in VMware.

But they react differently

if they have a question and want to see something

or some documents, artifacts, whatever.

And you take something out of the box.

Here, that's a complete list.

It looks great with bullet

points and score and justification.

You show it to them.

You then take an extract from the Aria Operations report.

So they see there is a mechanism in place

to prove that certain configurations are in place.

This is something that really helps you

during the audit.

And for sure, for your own sake,

it's up to you to still make the best design decision

that secures you, but still keeps operations alive.

And this is really relevant from my point of view.

That's why, I mean, if you do those security engagements

or hardening engagements,

three to five days of architecture is easily gone.

You have one, two, three days of workshops,

then everyone goes back together and make maybe different

decision about those 10, 15 complex points.

You need to, let's say, also,

or try to get the proof for certain statements.

Yeah, maybe that the backup is encrypted.

Simply something you cannot see.

You need to assume that the backup is encrypted.

But still, when we go out there, I ask them,

hey, give me some proof or some configuration proof

that the backups in the back end are encrypted.

And this is really relevant.

So those engagements are really important,

but also take a little while.

And that's what I said.

You cannot simply deploy Aria Operations.

Say, now it's hardened and let it run.

You need to discuss that.

It's an architectural decision you need to take

around the environment.

And even if you have some configuration monitoring

in place, like Operations Manager, for example,

it's just a supporting tool,

because you need to make the architecture.

You take the decisions, you justify.

The monitoring is just a tool supporting you

to prove that you implemented what you have discussed

and designed.

That's one point.

But what we also often saw on the health checks,

for example, that there is hardening

or hardening was done, hardening was documented.

But then they had an issue and needed to open SSH

or direct access to hosts

again and never configured it back.

So from that perspective, I think, it is necessary

to have proper control of all mechanisms and changes made

during the hardening process to ensure they remain active.

And totally, totally true.

And one example that always comes to mind is,

for example, I'm a big fan of

segmenting the VMkernel ports

of the ESXi, onboard firewall.

We simply say only management networks can interact

with the ESXi VMkernel, which is easy to do

and gives you direct or reduces the attack vectors.

And even though there's some

malware in your infrastructure,

they cannot reach the ESXi network.

Except, I mean, you could, if

you have some within data center

firewall, you could do something similar.

But it's one way to make sure the packets don't arrive

from unknown networks at the ESXi.

And when I look at all... fortunately, over the last two

years, I've known many companies had

some issues with crypto attacks

on their VMware environment.

Fortunately, none of my direct customers were

attacked by that, or it was broken or encrypted.

But the primary way I got engaged afterwards,

it was always the same thing.

Some older version, non-patched version of ESXi,

they were reachable from one of the desktops

that had some malware installed.

So client network, server network,

server network, they could scan the network,

figure out ESXi host, figure out older versions,

and did some attacks.

And the other perspective was always

around this active directory integration of the ESXi host.

So also one thing, when the ESXi host was integrated

in Active Directory for use authentication,

there were a lot of attacks happening over this path.

And today, I think in the hardening guide for security,

there's still the recommendation

to add the ESXi host to the Active Directory,

to have a proper directory or non-route-based log on

as possible, even though that's the official statement.

And you also see in the CIS guidelines

for security or other documentation

when you want to reach a certification,

I always argume," hey, let's not do that right now."

There were so many bad things happening over this way.

We do log them out.

We segment the ESXi from the network,

and we make sure we have some alerting in place

when the root user is used on the ESXi host.

So you have Log insight configured, making alerts

if roots are doing any actions

out of our role-based authentication mechanism,

because that is really important

to make sure every action is accountable

to a specific user or system.

But that's... all the topics you've mentioned.

They're all part of a proper hardening,

because hardening is not a tool.

It's not a solution.

It's a process, right?

It's something--

It's a lifestyle.

It's a lifestyle, right?

That we're not going down there.

Yves is not here, Fabian is here, and we're drifting.

So it's a process you take.

It's an approach, and also monitoring,

and many different things that come to your mind

might be part of a hardening process.

Like you said, if a user is used to log into a system,

or you mentioned the AD thing with the ESXi host,

it's also pretty fine.

But I think even if a recommendation exists

and you come up with, "no, I

don't think that this is a good idea,"

like joining an ESXi host to the Active Directory,

you just justify it.

The downside of it is, and just being really blunt,

is there are many auditors out there without any clue--

No, I should not say without any clue.

That's not good.

Not being in depth with a certain product behavior.

We'll tell you in the report, your ESXi host

is not joined with Active Directory, so you get a minus

score for something which does not make any sense

because they have no clue.

And then if they have a good name,

if the company has a very well-known name,

they are always right, even though they are wrong.

Absolutely.

But the good thing is, those are the items,

even if everything's correct,

those are the things they can find.

But they feel good.

We feel good.

But still, the Active Directory thing,

and if anyone is here

listening, I would be really interested

how you are dealing that around the ESXi hosts,

because I have a clear opinion just based on what I saw.

Because I saw things, and I don't want to see them again.

I think if you're coming up with your approach

and how you would configure infrastructure,

I think as long as you have,

as long as you take the decision

document the decision, that's the proper justification,

you're good to go because that documents

that you're perfectly aware of what you're doing.

I think that's one very important point

around the whole hardening and those topics.

True.

Sasha, how can Cloud Foundation help us with hardening?

I want to hear some sales talk, come on.

Yeah.

It's the best solution.

Absolutely.

So you get a lot of configurations pre-configured by VCF,

so that's interesting.

But I think the one topic also for me,

a big part in hardening is to work with certificates.

Work with public certificates,

make sure that you have a trusted CA

behind your certificates and not working with

self-signed certificates out of the host.

And having a hardened certificate authority.

Now we start again.

Yeah, I mean, that's also a thing.

Absolutely.

It doesn't matter if your

certificate authority is compromised.

That's a huge thing.

I always get the feeling when you go down the security

in Hardening Road, it's opening the box of Pandora

because from one item, you get to the next one, ask,

hey, what kind of CA certificate authority do you have?

Is that something we can

assume as being reliable and secure?

We don't know to be honest. Especially if you talk

to smaller corporations where

that was set up by, I don't know,

Erwin and Dieter.

And they left the company 20 years ago.

You know, Erwin and Dieter, that's a common German name,

just for Mike and Jane, if you're from the US.

But still, this is something where you then also say,

okay, perfect.

When we are done with our, I would say, assessment

or hardening sessions, and everyone is really hard.

No, that's not the right thing.

And everyone is really getting items to work

in the VMware infrastructure.

There's also a lot of to-dos to figure out

if we assume the right things around Active Directory,

certificate authorities, and other topics.

Erwin and Dieter.

Come on, you said we can cut this later on.

So therefore--

Well, we'll let it slide.

So, cool.

But again, it's also the combination

with the monitoring tool.

Because you need to have a report,

because we are all just human beings.

And if we are tasked to configure something,

and even though it's very well prepared and documented,

and we receive a monkey, see monkey, do instruction set,

there is still the chance that

you're fat-fingered something.

And that's the reason you need to have a pool

in the backend, monitoring the infrastructure,

being aware what should be configured,

and compare it with what is configured.

And, Sascha, I love the example you came up with earlier on

with the SSH.

So that's a common use case, like,

"oh, I need to troubleshoot something."

I enable SSH.

What is perfectly fine, right?

And at the end, because you disabled all the warnings,

because they drive you bonkers in the UI,

you forgot to turn off the SSH service

at the end of your troubleshooting session.

So latest and next day,

the compliance report within the monitoring tool,

which is Operations,

you shall have only one Operations Management tool,

pops up saying, "I found this...

"design and deployed by comdivision"

Yeah.

... here is a new host, and this host has

SSH turned on," and then you receive an alert,

saying, all right, I detected a configuration drift.

Please help me turn off SSH.

And even though you have an incident,

so you violate one of your policies,

but if you have a monitoring tool, you get an alert,

and then you can react on, like, "oh, I forgot.

I turned the SSH servers off."

That's a proper approach, and that's perfectly fine.

The worst thing is you are not

aware of that a configuration

drift happened, and you are not

compliant with your old policies anymore.

That's the worst thing.

Yeah, totally something we need to keep in mind.

I mean, the good thing is over the years,

the core VMware products, and

if you now look into the security

configuration guide for vSphere 8, there's not so much more

in it anymore.

The product team did a great job over the years

to bring the core hypervisor to a

level where you should typically,

or you don't need to tweak that much.

I think Mike Foley, who was also in the product team,

he's very often shouting out on LinkedIn that he

was very keen after getting the hardening into the product.

We see that VMware is getting

better and better in a lot of areas.

That will also be much more better than with VCF 9.

I'm pretty sure about that because

now they all try to make it secure

right from the beginning.

But again, there are a lot of things we need to decide.

Second factor of indication, for example,

that's nothing you can bake into the product.

We need to make a proper decision, and

then also how to configure it concretely.

Even if that's not a real word, I think.

But also Cloud Director.

I mean, we are big old fans of good ol' Cloud Director,

and also there are still a lot of

things we need to tweak afterwards

to make sure it is hardened according to the recommendation

that VMware put it out also many years ago.

Maybe not Broadcom.

Maybe the recommendation which

comes from either comdivision

or even better from the customer themself.

Because that's one thing we do with our CSPs and customers

is interview them.

What's your expectation?

What are your business

requirements towards security hardening?

And those bits and pieces.

Another interesting topic.

Let's move away a bit from the base infrastructure.

And let's maybe for the last few minutes

focus a bit more on the workloads which are running

on the already successfully hardened base infrastructure.

So we have guest operating systems.

We have applications and a ton of stuff running.

And if we are now back into the CSP game, it's a CSP.

You need to make sure that you

have proper network implementation.

Because you have no clue what your

customers are doing inside the virtual machine.

They install the guest user and you just don't know

if the customer applying all the

security patches as recommended

by the operating system vendor for example.

Yeah.

And remember those site channel attacks a few years ago.

You know where they said, "Oh, disable hyper threading."

Because there were chances of

whatever this is something that could be.

Could be a real...

So winning the lottery had a higher chance than that one.

But...

I'm not sure.

I mean there were attack patterns

where you could extract certain things.

And this is something you

cannot control as a service provider.

The thing here.

What was the name of it?

Spectre and Meltdown.

Winning the lottery has a higher chance than that.

No, I prove it wrong in the show notes.

Do we have show notes?

We will get some.

So I can tell you on the side why.

But the thing is you have your...

And that's not a guest OS thing.

It was a hypervisor attack.

So two different things.

But you have no clue what your

customers are doing inside the virtual machine.

And if they're patching their OSs,

if they apply security patches to the applications.

And we are perfectly aware, because

virtualization is a big invitation to keep

expired software running year after year

after year out of support, out of everything,

not supported anymore.

So many companies do that.

So as a service provider, you never know

what's happening inside the infrastructure.

So it's even more important

from our perspective to take care

that the underlying infrastructure is properly secured.

And also you are logging all the

traffic between tenant networks

and the CSP basic network infrastructure.

Separate.

And additional to that and additional to hardening.

So really take a look what

options you have to help your customers,

your end customers, to bring more

security inside their environment.

So take a look at advanced threat protection with NSX,

which you can buy as an add-on.

So that's one point.

And the other point is take a look at advanced ALB.

So advanced load balancer.

So for all the web services your customers hosting.

So you can activate web application firewall on top of it

and make your environment or the

customers' environments more secure.

So ATP, so I first mentioned

ATP, that's a different ballgame.

It's an amazing feature.

It's there and even with DPUs it gets usable.

Because you're offloading everything to the smart name.

And use those features because I haven't.

So I've been in IT for more than 25 years.

So over time, year after year, you just see more different

different patterns.

It got more and more and more.

There was no year where you had less

threats running around the internet

than the year before.

So it gets worse and worse.

Okay.

And then in the end, you always need to have

Operations in the back end for monitoring.

Awesome.

So if you are not hardened already, what can we do?

Sascha, how much is our hardening?

Standard offering.

What do you say?

You need now to turn on the red light.

And then...

Wait a sec.

So if you need...

Not red enough, I would say.

So if you need it really hard.

No, wait a sec.

Guys, you are aware that it's a podcast.

Most people won't see the video.

Really?

We're now waiting for the audio description.

That's why we talked about the red light.

Yeah.

So for all the audience who's not watching the video,

the light in my room is now pretty red.

And joking aside, if you need any guidance around that,

if you feel your VMware

environment could use a third party look up

around the topic of security

hardening, just drop us a message

and we can make you pretty quick and offer to help you

nearly on all continents nowadays, isn't it?

Sure.

Yeah.

Feel free to ping us.

Feel free to drop us messages on

LinkedIn, as an email, over our webpage, etc.

and we can sit together and talk

with you about what we can do for you.

How can we solve your problems and provide hardening

or a design for hardening for your environment?

Yeah, also from my side, thanks for tuning in.

Famous last words, I think hardening is very important.

Also monitoring and implementing

the stuff, but always keep in mind

that you keep your risks and hardening

aligned with your business requirements

to have a solution because in the

end you need an infrastructure solution

which supports the goals the business has.

Otherwise it doesn't make the best sense out of it.

Short outlook Ep. 48.

I heard a rumor.

I heard a rumor that Episode 48 will

be around Orchestration Automation.

Yeah, I want to come back.

So that's the rumor.

So we won't discuss VCF

Automation because that's not released.

So Orchestration Automation will be

around Cloud Director and Orchestrator.

That's the plan.

Interesting.

I'm looking forward to this one.

Who will present, not me.

I'm sure you.

He's Mr. Orchestrator.

Come on.

I know.

Okay, thanks for tuning in.

Have a great day.

We're more than happy to help just ping us.

See you in the next episode.

See you.

Creators and Guests

Yves Sandfort
Host
Yves Sandfort
Yves Sandfort - VMware cloud and infrastructure architect and evangelist, CEO comdivision group. VCDX-CMA,VCIX-CMA, VCIX-DCV, vExpert, Nutanix NTC, pilot
VCD Roundtable: Episode 47 – The Importance of Hardening Software
Broadcast by