Dear all,
I am planning to use Proxmox in an enterprise environment. We are very much concerned about the security of the virtualization plattform and that is why I am trying to take a deeper dive into the possibilities to harden a Proxmox installation.
There is a very extensive security analysis of KVM/QEMU from the Federal Office for Information Security in Germany (BSI):
https://www.bsi.bund.de/SharedDocs/...erheitsanalyse_KVM/Sicherheitsanalyse_KVM.pdf
(Sorry that this is only available in German)
There are basically the following hardening recommendations:
Peter
PS: Are there any hardening tipps for Proxmox available somewhere? Would that be something for the wiki?
I am planning to use Proxmox in an enterprise environment. We are very much concerned about the security of the virtualization plattform and that is why I am trying to take a deeper dive into the possibilities to harden a Proxmox installation.
There is a very extensive security analysis of KVM/QEMU from the Federal Office for Information Security in Germany (BSI):
https://www.bsi.bund.de/SharedDocs/...erheitsanalyse_KVM/Sicherheitsanalyse_KVM.pdf
(Sorry that this is only available in German)
There are basically the following hardening recommendations:
- Disable KSM can be easily done since 4.x
- Enabling a Mandatory Access Control (for Debian AppArmor) and confine each VM with a separate AppArmor profile. In the setup they investigated, this is done by the sVirt security driver of libvirt
- An appropriate network environment: Remove IP of the guest network, disable package forwarding (net.ipv4.ip_forward) and enable the reverse path filter (net.ipv4.conf.all.rp_filter). This should be possible from the CLI.
Peter
PS: Are there any hardening tipps for Proxmox available somewhere? Would that be something for the wiki?