Virtualisation and the US National Security Agency

Virtualisation brings security risks and also, potential benefits - and few know better what these are than the US National Security Agency.


Almost any IT department worth its salt is deploying virtualisation technology today to reduce power usage, make server and OS deployments more flexible, and better use storage and systems resources.

But as virtualisation technology gains in popularity, it may bring with it new risks, said Don Simard, the commercial solutions director at the US National Security Agency, the electronic intelligence and cryptographic agency once so secret its very existence was a secret. At the same time, virtualisation technology may bring new protections, he noted.

One of the NSA's roles is to work with technology providers to help them make their wares more secure, both to help government agencies using them and to reduce threats that could affect the commercial sector and thus the national economy. Sometimes, the NSA also wants to ensure it has back-door access to commercial systems.

In the case of virtualisation, the NSA has worked with EMC's VMware unit, IBM, AMD, Trusted Computing Group, and others for several years to identify potential threats and suggest workarounds. Later this year, chips from AMD and Intel will include technology that the NSA has helped develop.

The hidden hardware threat

Simard is a big fan of virtualisation. The technology has helped NSA employees, as well as other military and intelligence agents, access multiple secure networks from a single computer. It used to be that each network had to be accessed from a separate computer -- the PC or laptop essentially acted as a hardware authentication token -- so analysts and coordinators had to move from one computer to another depending on which intelligence network they were using at the time.

This led to equipment shortages and lots of boxes to carry around when traveling. In Simard's case, that meant using four computers, one each for the three intelligence networks he works on and one for unsecured, personal Internet access. Now he has one computer, with each network accessed from a separate virtual machine.

But the NSA realised that this benefit of virtualisation also introduced a new potential threat. After all, Simard said, "graphics cards and network cards today are really miniature computers that see everything in all the VMs."

In other words, they could be used as spies across all the VMs, letting a single PC spy on multiple networks. Although he's not aware of any such spyware today, it's not a problem the NSA wants to experience or see happen in other intelligence agencies.

That's where IBM and AMD come in. AMD's scientists had similar concerns to the NSA's, so they worked with the NSA to design an authentication mechanism at the chip level that would be able to control what hardware could do with the virtualisation engines that rely on their AMD-V on-chip virtualisation assistance technology.

"Recommended For You"

Virtualisation - Don't let security lag behind technology maturity LinuxWorld: Virtualisation is threat to Windows