{"id":31526,"date":"2017-03-01T17:40:58","date_gmt":"2017-03-01T22:40:58","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/set-up-vmware-vm-encryption-for-hypervisor-level-security-techtarget.php"},"modified":"2017-03-01T17:40:58","modified_gmt":"2017-03-01T22:40:58","slug":"set-up-vmware-vm-encryption-for-hypervisor-level-security-techtarget","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/set-up-vmware-vm-encryption-for-hypervisor-level-security-techtarget.php","title":{"rendered":"Set up VMware VM Encryption for hypervisor-level security &#8211; TechTarget"},"content":{"rendered":"<p><p>    The new VM Encryption tool in vSphere 6.5 goes beyond standard    VM-level security by performing the encryption at...  <\/p>\n<p>          Enjoy this article as well as all of our content,          including E-Guides, news, tips and more.        <\/p>\n<p>            By submitting your personal information, you agree that            TechTarget and its partners may contact you regarding            relevant content, products and special offers.          <\/p>\n<p>              You also agree that your personal information may be              transferred and processed in the United States, and              that you have read and agree to the Terms of Use and the Privacy Policy.            <\/p>\n<p>    the hypervisor level.  <\/p>\n<p>    Doing the encryption at the hypervisor level instead of in the    virtual machine makes encryption agnostic, as well as    policy-driven -- VMware VM Encryption is managed via storage    policy. While the main purpose of the tool is to enhance    security, it means encryption is no longer an all-or-nothing    proposal; encryption of the storage area network or underlying    storage are no longer the only options.  <\/p>\n<p>    There is a small overhead for VM Encryption, though this is to    be expected in any encryption    system. For what it's worth, I hardly noticed the overhead    during my experimentation with ESXi encryption.  <\/p>\n<p>    Implementing VM Encryption is quite simple. You can easily set    up a basic proof of concept (POC) implementation     for the encryption infrastructure, as VMware has designed    the underlying cryptographic system to use third-party plugins.    VMware's current list of approved vendors includes RSA and    Symantec, as well as several others. There is currently no    VMware implementation.  <\/p>\n<p>      Before implementing the encryption system, it's important to      understand how VM Encryption works. Put simply, the      encryption is handed from the encryption VM to its client,      the vCenter.    <\/p>\n<p>    Setting up the cryptographic back end is straightforward. Most    vendors will ship a VM appliance that can be installed, powered    on and configured. Since configuring the cryptography for each    of the vendor plugins is beyond the scope of this guide, I    simply used the modified POC encryption manager that VMware    released to beta testers.  <\/p>\n<p>    This test version only keeps encryption keys for the duration    of the machine's uptime. This is just a demonstration system    and the encryption key will be lost upon reboot, so don't    encrypt any machines you actually use. The best way to avoid    running into trouble is to create a couple of test VMs.  <\/p>\n<p>    Before implementing the encryption system, it's important to    understand how VM Encryption works. Put simply, the encryption    is handed from the encryption VM to its client, the vCenter.    The vCenter then provides keys as needed to the ESXi hosts.    These are     stored in a secure manner to enable you to unlock the VM.    The keys are never written to the disk on the ESXi host.    However, the intermediate keys for locking and unlocking the    VMs are stored in a secure encryption enclave.  <\/p>\n<p>    To set up the encryption server, you need to set up a Linux    host with Docker. Once you've done this, pull down the Docker    image and run the instance with the following command:  <\/p>\n<p>    sudo docker pull lamw\/vmwkmip  <\/p>\n<p>    sudo docker run --rm -it -p 5696:5696 lamw\/vmwkmip  <\/p>\n<p>    At this point the Docker image should be running on port 5696.  <\/p>\n<p>    Now that we've covered how encryption is applied, let's look at    how to set up the infrastructure. First, add the     Key Management Service (KMS) server to the vCenter by going    to the top level of the vCenter configuration menu and    selecting Key Management Servers from the hyperlink on    the left.  <\/p>\n<p>    This will bring up a dialog box that allows you to enter KMS    server details. The exact details will vary, and some KMS    server configurations may require a username and password. We    don't need to use one in this instance. The server address    should be that of the Ubuntu server. The port used for this    example is 5696.  <\/p>\n<p>    Once you've submitted the KMS details, you'll be prompted to    accept a certificate; accept this, and KMS will be set to the    default.  <\/p>\n<p>    At this point, the cryptographic configuration is complete.    However, a single KMS is a single point of failure, therefore,    I recommend     configuring a minimum of two. Do not encrypt the vCenter or    it will prevent vCenter from booting. You need to avoid this    because vCenter is a key component of the cryptographic    infrastructure.  <\/p>\n<p>    The next step is to create an encryption storage policy. If you    navigate to VM Storage Policies, you'll see a new storage    policy titled VM Encryption Policy. There are several    options that you can modify if necessary.  <\/p>\n<p>    At this point, you can encrypt the VM. It's best practice to    only encrypt the disks; it's possible to encrypt other items,    but it's unadvisable unless you have an overriding reason to do    so.  <\/p>\n<p>    From here on out, encrypting the VM is clear-cut. Before    encrypting a device, you must first power it off. Navigate to    the VM you plan on encrypting and right-click to edit its    setting and expand the disks to encrypt. Select the VM    Encryption Policy from the VM storage policy drop-down menu.  <\/p>\n<p>    Disabling VM Encryption is as easy as changing the policy to    the default data store policy. Again, you must power off the VM    to perform the necessary actions.  <\/p>\n<p>    There are a few caveats to using VM Encryption. For    one, it does not support exporting encrypted VMs to open    virtualization format. The use of cryptography on a per VM    basis is dependent on the business and security requirements of    the company in question. Exercise caution when implementing the    encryption and make sure you fully understand and recognize the    ramifications and functionality of encryption.  <\/p>\n<p>    NSX     leads the pack for VMware security  <\/p>\n<p>    Explore     ESXi hypervisor security features  <\/p>\n<p>    What's next in the     world of cryptography?  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read this article:<br \/>\n<a target=\"_blank\" href=\"http:\/\/searchvmware.techtarget.com\/tip\/Set-up-VMware-VM-Encryption-for-hypervisor-level-security\" title=\"Set up VMware VM Encryption for hypervisor-level security - TechTarget\">Set up VMware VM Encryption for hypervisor-level security - TechTarget<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The new VM Encryption tool in vSphere 6.5 goes beyond standard VM-level security by performing the encryption at... <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-31526","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31526"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=31526"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31526\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=31526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=31526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=31526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}