Agents, installed on guest VM running on the
same Virtualization Product host where the
Deployment Enforcer Monitor is. Agent
Communicator uses the virtualization product
API to communicate with Deployment Enforcer
Agents.
• Identification – Responsible for supplying
identification information of the Deployment
Enforcer Monitor to Deployment Enforcer
Agents.
• Deployment Verification - Verifies whether
guest VMs deployed on the Virtualization
Product are compliant with the enterprise
security policy.
• Deployment Rules Cache – Maintains a local
cache of enterprise deployment policies.
• Deployment Rules Fetcher - Fetches enterprise
deployment policies from the centralized
enterprise security management server. The
enterprise security management server is an
existing component that contains deployment
policies as defined by a Privileged Access
Management administrator.
• Deployment Status - Sends deployment status
information of VMs running on the virtualization
product to the Access Control Enterprise
Management Server.
2.2 Prototypical Scenarios
In order to exemplify the conceptual architecture,
several scenarios (use cases) are presented.
2.2.1 Activation Scenario – Theft Prevention
Every time an administrator tries to load a guest VM
on the Virtualization Product, the Deployment
Validator (which is a component of Deployment
Enforcer Agent) sends a request for environment
verification from the Deployment Enforcer Monitor
(installed on a virtual appliance on the same
Virtualization Product). The Agent Communicator
component receives this request and passes it to the
Identification component. The Identification
component replies back through the Agent
Communicator component with information which
uniquely identifies the Deployment Enforcement
Monitor. The Deployment Validator component
receives the information and validates whether it is
trusted. When the validation fails, it will prevent the
VM from becoming active; when validation is
successful, it will allow running the virtual machine.
2.2.2 Activation Scenario – Governance and
Compliance
Deployment Rules Fetcher (a component of
Deployment Enforcer Monitor) receives enterprise
deployment rules from the existing Enterprise
Management component. Enterprise deployment
rules are saved on the Deployment Rules Cache
component. Deployment Verification component
validates that the deployed VMs are compliant with
the enterprise deployment rules. In the case of
deviation, the Deployment Status component reports
to the Enterprise Management security server with
the deviation information.
2.3 Prototypical Implementation
Figure 2 describes the implementation of our
solution in a VMware environment that has several
virtualization products, such as VMware ESXi.
The ESXi virtualization product can run many
VMs on it, such as Windows and Linux VMs. The
system administrator installs Deployment Enforcer
Agents on these VM. The administrator deploys
Virtual Appliance VM with the Deployment Enforcer
Monitor on the ESXi virtualization product system.
2.3.1 Use Case 1: Theft Prevention
When a VM starts the Deployment Enforcer Agent
that is installed on it, it verifies the existence of a
trusted Deployment Enforcer Monitor on the ESXi
Virtualization Product. Different methods can be
used for verification, for example, validating that the
Deployment Enforcer Monitor passes a certificate
(token) issued by a trusted source. If the Deployment
Enforcer Agent fails to validate the Deployment
Enforcer Monitor, it will not allow the virtual
machine to be started. This act prevents theft of
virtual machines.
2.3.2 Use Case 2: Governing the Compliance
of Deployment within the Enterprise
Boundaries
The Deployment Enforcer Monitor receives the
enterprise’s deployment rules from the Enterprise
Management security component. The Deployment
Enforcer Monitor validates that every image
deployed on the local VMware ESXi server is
compliant with the deployment rules it fetched from
Access Control Enterprise Management. An
example of such validation is that Deployment
Enforcer Monitor can check that all VMs are
compliant with the enterprise deployment policy that
CLOSER2012-2ndInternationalConferenceonCloudComputingandServicesScience
604