Virtualization is everywhere. Need a new VM ? - it's easy, clone from template and spin it up!
IMHO, the biggest security issue with "static" templates - is the time frame when your recent cloned from template machine boot up and get updates being at the same time not fully protected and up to day.
Instead of using "static" templates, you can use "live" templates - just normal running VMs (CPU and memory are really cheap now). So ,what the pros:
- part of you live infrastructure
But let's take a close look at the classical "static" templates security cons:
- Static disk image file
- get updated from time to time ( in most cases not often)
- security policies (or hardening) on it updated only after deployment
- not being monitored by any part of your security monitoring infrastructure (no events coming, no AV or vulnerabilities scans, etc.)
Templates are the key component of your infrastructure - you are cloning all you running machines from them.
To keep templates on the same security level you need: spin up a vm from this template, update it, check stability after updates, scan it for vulnerabilities and re-template back (and do not forget to update checksums. You are checking templates' checksums before deployment, aren't you? :-) ).
IMHO, the biggest security issue with "static" templates - is the time frame when your recent cloned from template machine boot up and get updates being at the same time not fully protected and up to day.
Instead of using "static" templates, you can use "live" templates - just normal running VMs (CPU and memory are really cheap now). So ,what the pros:
- part of you live infrastructure
- get updates as soon as updates are issued or/and approved
- get current version of the security(or hardening) policy implemented
- monitored and covered by your security infrastructure(AV scanners, HIDS/NIDS, log management)
- monitored for up time and stability after each update
Script, shown below, being placed in cron.daily will keep your RH based linux template up to day (for VMware virtualization)
PS. Script also address annoying problem which requires rerun vmware configuration utility after each kernel update to make vmware tools run .
PS2 And self-destruct on non-template hosts.
- get current version of the security(or hardening) policy implemented
- monitored and covered by your security infrastructure(AV scanners, HIDS/NIDS, log management)
- monitored for up time and stability after each update
Script, shown below, being placed in cron.daily will keep your RH based linux template up to day (for VMware virtualization)
#!/bin/sh # Doing self-update if we are running on host with template in name and self-destruction on other hosts if [[ "$HOSTNAME" == y??0?centos?tmpl* ]]; then /usr/bin/yum update -y > /var/log/self_update.log 2>&1 else /bin/rm -v /etc/cron.daily/self_update > /var/log/self_update.log 2>&1 fi # Comparing installed and running kernel and reboot in case if they differ LAST_KERNEL=$(/bin/rpm -q --last kernel | /usr/bin/perl -pe 's/^kernel-(\S+).*/$1/' | /usr/bin/head -1) CURRENT_KERNEL=$(/bin/uname -r) if [ $LAST_KERNEL != $CURRENT_KERNEL ]; then /bin/echo '/usr/bin/vmware-config-tools.pl -d ; /bin/sed -i "/.*vmware.*/d" /etc/rc.local' >> /etc/rc.local /sbin/reboot; fi exit 0
PS. Script also address annoying problem which requires rerun vmware configuration utility after each kernel update to make vmware tools run .
PS2 And self-destruct on non-template hosts.