rachel greenstadt: security and virtualized environments: an overview

24
!"#$"% ’(% )"*"+%,- .# !(/01$+$.(# +#2 3(,."$4 5+%6+%2 7#.6"%*.$4 !"#$%&’"(&$")* &*, -./%#"$0 1 2&3. 4 3#..*".5../678&#9&#,7.,% !"#$%&’( &* +&%’$,-&."/ 0*1&%2*3"*’4 !"#$%& ()%%*+,"-, .%*,%) /0) !%+%")#$ 0* .0123,",40* "*- 50#4%,6 7")8")- 5#$00& 0/ 9*:4*%%)4*: "*- ;22&4%- 5#4%*#%+ <#,0=%) >?@ A??B

Upload: evangeline

Post on 30-Jun-2015

364 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+43#..*".5../678&#9&#,7.,%

!"#$%&'()&*)+&%'$,-&."/)0*1&%2*3"*'4

!"#$%&'()%%*+,"-,

.%*,%)'/0)'!%+%")#$'0*'.0123,",40*'"*-'50#4%,67")8")-'5#$00&'0/'9*:4*%%)4*:'"*-';22&4%-'5#4%*#%+

<#,0=%)''>?@'A??B

Page 2: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+:3#..*".5../678&#9&#,7.,%

51"%1&"6

8+,9:%(1#2&(#&6.%$1+;.<+$.(#

=.%$1+;.<+$.(#&$(&0%($",$&*('$>+%"?0;+$'(%/*&'%(/&/+;>+%"

=.%$1+;.<+$.(#&$(&2"$",$&/+;>+%"

=.%$1+;.<"2&/+;>+%"

Page 3: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+;3#..*".5../678&#9&#,7.,%

78,')&4)1&%'$,-&.,'&2*9

@A*$%+,$.(#&('&,(/01$+$.(#+;&%"*(1%,"*

Page 4: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+<3#..*".5../678&#9&#,7.,%

+:7,%")2*)5!);

Page 5: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+=3#..*".5../678&#9&#,7.,%

0<,3=-"4)2>)1&%'$,-&.,'&2*

B/1;+$.(#&C&$%+#*;+$"&+;;&.#*$%1,$.(#*

DBE7F&8(,-*

G+%+6.%$1+;.<+$.(#&C&%"H1.%"*&,-+#:"*&$(&I3

7EJF&K"#

L+$.6"&6.%$1+;.<+$.(#&C&%"H1.%"&*+/"&+%,-.$",$1%"F&/(*$&.#*$%1,$.(#*&"M",1$"2&#+$.6";4

=EN+%"

I3OJ"6";&6.%$1+;.<+$.(#&C&*+/"&I3F&.*(;+$"&%"*(1%,"*

=3"%6"%

Page 6: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+>3#..*".5../678&#9&#,7.,%

?"#"*')@/1,*#"4)&*)1&%'$,-&.,'&2*

P+*$"%&-+%2>+%"

L">&-+%2>+%"&*100(%$Q&R#$";&O=S+#2&@ETO=

7*"*

!(/0+$.A.;.$4

R##(6+$.(#

5+%2>+%"&,(*$&,(#$%(;

3",1%.$4

Page 7: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+?3#..*".5../678&#9&#,7.,%

+&%'$,-&.,'&2*),*/)!"#$%&'(

R*(;+$"&+#2&0%($",$&*('$>+%"&'%(/&/+;.,.(1*&0%(:%+/*&U/+;>+%"V

3+#2A(M&0%(:%+/*&.#&(>#&+22%"**&*0+,"

E"2.+$"&>.$-&;"+#F&*",1%"&=EE

T"$",$&/+;>+%"

7*"&"/1;+$.(#&$(&%1#&/+;>+%"&.#&+&*+'"&"#6.%(#/"#$

3$(0F&/(6"F&%"0;+4&"6"#$*&.#&6.%$1+;&/+,-.#"*

=.%$1+;.<"2&/+;>+%"

)(($9.$*&$-+$&-.2"&1#2"%#"+$-&I3

Page 8: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+@3#..*".5../678&#9&#,7.,%

+&%'$,-&.,'&2*)>2%)A42-,'&2*

G%"*"#$.#:&6.%$1+;&.#$"%'+,"*&$(&%"*(1%,"*&,+#&;./.$&+#2&,(#$%(;&$-"&+,,"**&('&/+;.,.(1*&0%(:%+/*&$(&%"*(1%,"*

@&=.%$1+;&E+,-.#"&E(#.$(%&U=EEV&,+#&2(&/(%"&%.:(%(1*&+,,"**&,(#$%(;

Page 9: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+A3#..*".5../678&#9&#,7.,%

5*")B,='2=)C"%)D8&-/)

IJG!&0%(W",$&+./*&$(&:.6"&+;;&,-.;2%"#&;+0$(0*

!+##($&2"/+#2&X&4"+%&(;2&,-.;2%"#&*",1%"&$-".%&/+,-.#"*

L""2&>+4&$(&+;;(>&$-"/&$(&:"$&-+,9"2&+#2&*$.;;&A"&(9

@#*>"%Q&6.%$1+;.<+$.(#

Page 10: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+4B3#..*".5../678&#9&#,7.,%

5BCDE)+!"%1"%),*/)F&'>%24'

!1%%"#$&+00;.,+$.(#*&-+6"&#(&.*(;+$.(#&

3(;.$+.%"&,+#&+,,"**&#"$>(%9F&,+/"%+F&1*"%&2(,1/"#$*F&0+**>(%2*&"$,

G%(:%+/*&"M",1$"&.#&6.%$1+;&/+,-.#"*&U(%&*+#2A(M"*&(%&W+.;*V&$-+$&,+#&(#;4&*""&.$*&(>#&'.;"*?0%(,"**"*

G%(:%+/*&/1*$&%"H1"*$&+22.$.(#+;&0"%/.**.(#*&'%(/&$-"&=EE

Page 11: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+443#..*".5../678&#9&#,7.,%

G8&*)H(="%1&42%4

BM.*$.#:&I3&9"%#";*&$((&A.:&+#2&,(/0;"M&$(&+6(.2&61;#"%+A.;.$4

3/+;;&-40"%6.*(%&2("*&*,-"21;.#:F&.*(;+$.(#&

G+%"#$&0+%$.$.(#&/+#+:"*&0"%/.**.(#*

Y""0&-40"%6.*(%&*",1%"

G1*-&2+#:"%(1*&+00*&.#$(&6.%$1+;&/+,-.#"*

C&#,D&#.

E"*,)D6+80F.#9"6)#

2&#.*$+2&#.*$+2&$"$"")*2&$"$"")*

-.#9.#G)#.

HFF6

I-+4 I-+:

HFF6 HFF6

G8"',+G8"',+2&#$"$")*2&#$"$")*

G8"',+G8"',+2&#$"$")*2&#$"$")*

Page 12: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+4:3#..*".5../678&#9&#,7.,%

+&%'$,-&.,'&2*)'2)I"'"#'):,-6,%"

E+#4&0%(0"%$."*&('&6.%$1+;.<+$.(#&1*"'1;&'(%&2"$",$.#:&/+;.,.(1*&*('$>+%"

S+/0"%&%"*.*$+#,"

3+'"$4?R*(;+$.(#

R#*$%1/"#$+$.(#

)">.#2?%"0;+4&0%(0"%$."*

Page 13: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+4;3#..*".5../678&#9&#,7.,%

B&3&','&2*4)2>)J4&*K)+&%'$,-&.,'&2*)>2%):,-6,%")I"'"#'&2*

).,"Z*&$-"(%"/&C&#(#$%.6.+;&0%(0"%$."*&('&,(/01$"%&0%(:%+/*&,+##($&A"&2"$"%/.#"2&+1$(/+$.,+;;4

3"/+#$.,&:+0&C&/(%"&,(#$"M$&.#*.2"&('&+&6.%$1+;&/+,-.#"&$-+#&(1$*.2"&('&.$

@#&(0"%+$.#:&*4*$"/&*""*&0%(,"**"*&+#2&'.;"*&6"%*1*&%":.*$"%*F&2.*9&A;(,9*&+#2&/"/(%4&0+:"*&(1$*.2"

R#*$%1/"#$+$.(#&,+#&-";0&UA1$&0(**.A;4&,(%%10$.A;"V

Page 14: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+4<3#..*".5../678&#9&#,7.,%

03$-,'&2*)&*)@*'&L1&%$4)'22-4

E(2"%#&6.%1*"*&1*"&0(;4/(%0-.*/&$(&"6+2"&2"$",$.(#&A4&*.:#+$1%"

I#;4&>+4&$(&2"$",$&$-.*&/+;>+%"&.*&$-%(1:-&"/1;+$.(#&.#&+#&.*(;+$"2&6.%$1+;&/+,-.#"

30",.'.,&"/1;+$.(#&$",-#.H1"*&,+#&A"&,(1#$"%"2&A4&6.%1*&+1$-(%*&U21"&$(&;./.$+$.(#*&(#&0%"6.(1*&*;.2"V

)"*1;$Q&*",1%.$4&$-%(1:-&(A*,1%.$4&>(%9*&-"%"F&>+#$&$(&1*"&+&2.''"%"#$&+#$.O6.%1*&$((;&$-+#&$-"&/+**"*&

Page 15: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+4=3#..*".5../678&#9&#,7.,%

?$**&*K)5$'L2>L'8"LF2<)I"'"#'&2*)&*)'8")+&%'$,-):,#8&*")B,("%

K1M.+#&[.+#:&"$&+;&$(&+00"+%&@!E&!!3&\]]^

)",%"+$"&.#$"%#+;&*$+$"&"M$"%#+;;4&.#&$-"&=EE&UA%.2:"&$-"&*"/+#$.,&:+0V

)",(#*$%1,$&'.;"*?2.%",$(%."*&'%(/&%+>&6.%$1+;&2.*9

)",(#*$%1,$&0%(,"**&.#'(%/+$.(#&'%(/&6.%$1+;&/"/(%4

!(/0+%"&.#$"%#+;&6.">&>.$-&%",(#*$%1,$"2&6.">&$(&'.#2&%(($&9.$*

=.">&%",(#*$%1,$.(#&:((2&"#(1:-&$(&%1#&(1$O('O$-"OA(M&+#$.O6.%1*&*('$>+%"&U34/+#$",F&Y+0"%*94F&E,@'""F&PO3",1%"F&"$,V

Page 16: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+4>3#..*".5../678&#9&#,7.,%

+&%'$,-)H2*"(*"'4

5(#"4#"$*&+%"&1*"'1;&'(%&#"$>(%9&*",1%.$4

=.%$1+;.<+$.(#&+;;(>*&+&>-(;"&#"$>(%9&$(&A"&%1#&(#&+&*.#:;"&,(/01$"%

!(*$&*+6.#:*

Page 17: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+4?3#..*".5../678&#9&#,7.,%

M&*/&*K):,-&#&2$4)7"N4&'"4

>"A&\_]&/"+#*&>"A*.$"*&,+#&.#'",$&/+,-.#"*&1*.#:&A%(>*"%&61;#"%+A.;.$."*

!(/0%(/.*"2&-(*$.#:&'+,.;.$."*&/"+#&#($&W1*$&*9"$,-4&>"A*.$"*

`((:;"&1*"2&=E*&$(&+#+;4<"&>"AOA+*"2&/+;>+%"

)1#&RB&.#&+&6.%$1+;&/+,-.#"

)",(%2&+;;&5SSG&'"$,-"*F&#">&0%(,"**"*F&,-+#:"*&$(&%":.*$%4&+#2&'.;"&*4*$"/*

Page 18: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+4@3#..*".5../678&#9&#,7.,%

!=(C%2<()O:248#8$P)"'),-Q

7*"#.M&3",1%.$4&\]]^

S((;&$(&2"$",$&/+;.,.(1*&&>"A*.$"*

3$+$.,&+#+;4*.*

=E&2(>#;(+2*&$-"&>"A0+:"

R'&*+'"F&*"#2&$(&1*"%

)"*1;$*&01$&.#&$-"&,+,-"

P;+>Q&#(#2"$"%/.#.*/

526C)0D6

E%=

5F34-'#"#$%

C)0D6G)0*,'9*-

HI

Page 19: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+4A3#..*".5../678&#9&#,7.,%

+&%'$,-&."/):,-6,%"

L($&+;;&+22"2&*",1%.$4F&#">&(00(%$1#.$."*&'(%&/+;>+%"

=.%$1+;.<"2&%(($9.$*

3.2"&!-+##";&+$$+,9*

81:*&.#&=EE*

Page 20: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+:B3#..*".5../678&#9&#,7.,%

G,P")'8")RF-$")C&--S

T"6";(0"2&A4&[(+##+&)1$9(>*9+

=EE&+*&%(($&9.$

R#*$"+2&('&-.2.#:&4(1%&,(#$%(;&('&+&,(/0%(/.*"2&*4*$"/&.#&$-"&9"%#";F&.#*"%$&$-.#&-40"%6.*(%&A";(>&.$

)1#*&+$&+&-.:-"%&;"6";&('&0%.6.;":"F&*(&,+#&*$.;;&,(#$%(;&$-"&/+,-.#"

5+%2&$(&2"$",$&>.$-.#&$-"&I3

Page 21: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+:43#..*".5../678&#9&#,7.,%

G"#8*&T$"4)'2)I"'"#')+&%'$,-&."/):,-6,%"

="%4&2.''.,1;$&$(&-.2"&$-+$&6.%$1+;.<+$.(#&.*&-+00"#.#:

S./.#:&.**1"*

SJ8&0%('.;.#:

T"'"+$.#:&$-"*"&%"H1.%"*&+&A.:&,(2"&A+*"

5+%2&$(&2.*$.#:1.*-&a:((2b&=EE&'%(/&aA+2b&=EE

Page 22: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+::3#..*".5../678&#9&#,7.,%

!&/")D8,**"-)@'',#P4

5(>&.*(;+$"2&+%"&6.%$1+;&/+,-.#"*c&

!+#&$-"4&*04&(#&"+,-&($-"%c

=E*&*-+%"&$-"&%"*(1%,"*&('&+&*.#:;"&-(*$

R'&/1;$.0;"&=E*&$%4&$(&1*"&$-"&*+/"&%"*(1%,"&$-"4&/+4&#($.,"

E.$.:+$"2&A4&(#;4&+;;(>.#:&"+,-&/+,-.#"&+&*0",.'."2&*-+%"&('&$-"&%"*(1%,"

81$&#($&,(/0;"$";4F&+#2&+$&:%"+$&"''.,."#,4&;(**

Page 23: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+:;3#..*".5../678&#9&#,7.,%

M$'$%")I&%"#'&2*4

7A.H1.$(1*&6.%$1+;.<+$.(#&,-+#:"*&*",1%.$4&;+#2*,+0"

B''",$*&A($-&:((2&+#2&.;;

3",1%"&J+1#,-c

Page 24: Rachel Greenstadt: Security and Virtualized Environments: An Overview

!"#$"%&'(%&)"*"+%,-&.#&!(/01$+$.(#&+#2&3(,."$45+%6+%2&7#.6"%*.$4

!"#$%&'"(&$")*+&*,+-./%#"$0++1++2&3.+:<3#..*".5../678&#9&#,7.,%

D2*#-$4&2*4

=.%$1+;.<+$.(#&-+*&./0(%$+#$&*",1%.$4&./0;.,+$.(#*

a@%/*&%+,"b&A"$>""#&-+,9"%*&+#2&2"'"#2"%*

J($&('&.#$"%"*$.#:&>(%9&.#&$-.*&*0+,"