April 9, 2014 By Vikash Abraham 2 min read

Optimum Cloud Security: Traffic Flowing between vSwitches Requires Monitoring

The cloud has been a major talking point for a couple of years now, and cloud security has become interesting material for gossip. We don’t need to dwell on the advantages of a cloud because we are all adept at the topic; however, the security aspect still remains something of a mystery.

It is often effective to deploy traditional security philosophies to new environments, and one of the “good” words we want more of in security is “visibility.” Whether by utilizing satellites to review national borders or installing video cameras in ATM kiosks, the idea is to have an “eye” watching over it all — with intelligence — to identify threats and mitigate them in time. A hacker focuses on finding the blind spots of the eye or disabling the eye itself.

The Blind Spot

Virtualization is one of the main components of the cloud. A virtual environment provides flexibility, allows optimization of the workloads running in the cloud and provides an essential benefit by detaching this workload from the underlying hardware. Virtualization can also be viewed as having invisible, miniature data centers that include virtual switches (vSwitches) and traffic that flows between these vSwitches. Being invisible to the physical eye, virtualization is a frequently ignored area within the cloud. Physical networks are monitored and have network protection solutions inspecting traffic; however, the traffic between vSwitches goes invisible, making it a sweet spot for hackers.

Why Is It a Risk?

In cloud environments, workloads and virtual machines (VMs) are working continuously to achieve optimal utilization or performance. This also means that infected workloads or VMs could be circulating. Therefore, logical network segmentation and security setting become imperative for cloud security. If one infected VM is communicating with another VM over the virtual layer, physical network protection solutions are not monitoring these communications and are consequently unable to disrupt the threats embedded within them. With the advanced persistent threat approach, attackers watch and wait for such opportunities.

How Do You Address It?

The answer is straightforward: Deploy that much-required visibility to monitor inter-vSwitch traffic as you would with other network traffic. There are different approaches to achieve this, one being to route inter-VM traffic through the physical network protection appliance already available on your network. This could be a tedious process, however, and could lead to a few performance concerns. A much more effective way of managing this would be to use a virtual appliance that sits on the virtual layer and is able to monitor and prevent threats within inter-vSwitch traffic and to provide logical network segmentation security settings.

More from Cloud Security

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Cloud threat report: Possible trend in cloud credential “oversaturation”

3 min read - For years now, the dark web has built and maintained its own evolving economy, supported by the acquisition and sales of stolen data, user login credentials and business IP. But much like any market today, the dark web economy is subject to supply and demand.A recent X-Force Cloud Threat Landscape Report has shed light on this fact, revealing a new trend in the average prices for stolen cloud access credentials. Since 2022, there has been a steady decrease in market…

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today