VirtualBox

Changeset 38507 in vbox for trunk/doc


Ignore:
Timestamp:
Aug 23, 2011 2:00:43 PM (13 years ago)
Author:
vboxsync
Message:

doc/manual: more stuff for the security chapter

File:
1 edited

Legend:

Unmodified
Added
Removed
  • trunk/doc/manual/en_US/user_Security.xml

    r38027 r38507  
    44<chapter id="Security">
    55  <title>Security guide</title>
     6
     7  <sect1>
     8    <title>Overview</title>
     9    <para>
     10    </para>
     11
     12    <sect2>
     13      <title>General Security Principles</title>
     14
     15      <para>The following principles are fundamental to using any application
     16        securely.
     17        <glosslist>
     18          <glossentry>
     19            <glossterm>Keep Software Up To Date</glossterm>
     20            <glossdef>
     21              <para>
     22                One of the principles of good security practise is to keep all
     23                software versions and patches up to date. Activate the VirtualBox
     24                update notification to get notified when a new VirtualBox release
     25                is available. When updating VirtualBox, don't forget to update
     26                the Guest Additions. Keep the host operating system as well as the
     27                guest operating system up to date.
     28              </para>
     29            </glossdef>
     30          </glossentry>
     31
     32          <glossentry>
     33            <glossterm>Restrict Network Access to Critical Services</glossterm>
     34            <glossdef>
     35              <para>
     36                Use proper means, for instance a firewall, to protect your computer
     37                and your guest(s) from accesses from the outside.
     38              </para>
     39              <para>
     40                The default networking mode for VMs is NAT which means that
     41                the VM acts like a computer behind a router, see
     42                <xref linkend="network_nat"/>. If bridged networking is used,
     43                the VM acts like a computer inside the same network as the host,
     44                see <xref linkend="network_bridged"/>. In this case, a firewall
     45                might be necessary to protect other computers on the subnet from
     46                a potential malicious guest. In some cases it is worth to consider
     47                adding a forwarding rule for a specific port in NAT mode instead
     48                of using bridged networking.
     49              </para>
     50              <para>
     51                Sometimes a VM doesn't need to be connected to the public network
     52                at all. Internal networking (see <xref linkend="network_internal"/>)
     53                or host-only networking (see <xref linkend="network_hostonly"/>)
     54                are often sufficient to connect VMs among each other or to connect
     55                VMs only with the host but not with the public network.
     56              </para>
     57            </glossdef>
     58          </glossentry>
     59
     60          <glossentry>
     61            <glossterm>Follow the Principle of Least Privilege</glossterm>
     62            <glossdef>
     63              <para>
     64                The principle of least privilege states that users should be given the
     65                least amount of privilege to perform their jobs. We strongly discourage
     66                from executing VirtualBox with system privileges.
     67              </para>
     68            </glossdef>
     69          </glossentry>
     70
     71          <glossentry>
     72            <glossterm>Monitor System Activity</glossterm>
     73            <glossdef>
     74              <para>
     75                System security stands on three legs: good security protocols, proper
     76                system configuration and system monitoring. Auditing and reviewing audit
     77                records address this third requirement. Each component within a system
     78                has some degree of monitoring capability. Follow audit advice in this
     79                document and regularly monitor audit records.
     80              </para>
     81            </glossdef>
     82          </glossentry>
     83
     84          <glossentry>
     85            <glossterm>Keep Up To Date on Latest Security Information</glossterm>
     86            <glossdef>
     87              <para>
     88                Oracle continually improves its software and documentation. Check this
     89                note note yearly for revisions.
     90              </para>
     91            </glossdef>
     92          </glossentry>
     93
     94        </glosslist>
     95      </para>
     96    </sect2>
     97  </sect1>
     98
     99  <sect1>
     100    <title>Secure Installation and Configuration</title>
     101  </sect1>
     102
     103  <sect2>
     104    <title>Installation Overview</title>
     105    <para>
     106      General VirtualBox installation instructions for the supported hosts can
     107      be found in <xref linkend="installation"/>. On certain hosts it is possible
     108      to omit certain VirtualBox components from installing but the general case
     109      is to install the complete VirtualBox package. The installation must be
     110      done with system privileges.
     111    </para>
     112  </sect2>
     113
     114  <sect2>
     115    <title>Post Installation Configuration</title>
     116    <para>
     117      Normally there is no post installation configuration of VirtualBox components
     118      required. However, on Solaris and Linux hosts it is required to configure
     119      the proper permissions for users executing VMs which should be able to
     120      access certain host resources. Linux users must be member of the
     121      <emphasis>vboxusers</emphasis> group to pass USB devices to a guest. If a
     122      serial interface should be accessed from a VM, the proper permissions must
     123      be granted to the user as well. The same applies to raw partitions which
     124      should be accessible for a VM.
     125    </para>
     126  </sect2>
     127
     128  <sect1>
     129    <title>Security Features</title>
     130    <para>This section outlines the specific security mechanisms offered
     131      by VirtualBox.</para>
     132
     133    <sect2>
     134      <title>The Security Model</title>
     135      <para>
     136        One property of virtual machine monitors (VMMs) like VirtualBox is to encapsulate
     137        a guest by executing it in a dedicated environment, a virtual machine,
     138        running as a user process on the host operating system. The guest cannot
     139        communicate directly with the hardware or other computers but only through
     140        the VMM. The VMM provides emulated physical resources and devices to the
     141        guest which are used by the guest operating system to perform the required
     142        tasks. The VM settings control the amount of resources provided to the guest
     143        (for example the amount of guest RAM or the number of guest processors, (see
     144        <xref linkend="generalsettings"/>) and the selection of features enabled
     145        for a specific VM process (for example remote control, see
     146        <xref linkend="vrde"/>).
     147      </para>
     148    </sect2>
     149
     150    <!--
     151    <sect2>
     152      <title>Configuring and Using Authentication</title>
     153    </sect2>
     154
     155    <sect2>
     156      <title>Configuring and Using Access Control</title>
     157    </sect2>
     158
     159    <sect2>
     160      <title>Configuring and Using Security Audit</title>
     161    </sect2>
     162
     163    <sect2>
     164      <title>Congiguring and Using Other Security Features</title>
     165    </sect2>
     166    -->
     167
     168  </sect1>
     169
     170  <!--
     171  <sect1>
     172    <title>Security Considerations for Developers</title>
     173  </sect1>
     174  -->
    6175
    7176  <sect1>
Note: See TracChangeset for help on using the changeset viewer.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette