Article

Article title INFORMATION PROTECTION SYSTEM REQUIREMENTS FOR VIRTUAL INFRASTRUCTURE
Authors K.V. Kurnosov, V.V. Selifanov
Section SECTION I. INFORMATION SECURITY RISKS MANAGEMENT
Month, Year 08, 2014 @en
Index UDC 004.9
DOI
Abstract Due to the lack of requirements for the evaluation of information security systems technology for implementing virtual infrastructure, the goal was set for their development. In accordance with the guiding and methodological documents in the field of technical protection of information, a model was developed infrastructure, built with the use of virtualization technologies, which contains information of restricted access, not containing information constituting state secrets. Were defined the types of potential offenders security, the urgent threats, and develop a set of requirements for safety assessment of such infrastructure. In solving these problems were analyzed national literature on the subject, normative and methodical documents in the field of information security, information infrastructure modeling, security threats and offender-specific virtualization technologies. The object of study in this paper advocates the virtual infrastructure, including its components. The subject of the study are the requirements and methodology for evaluation of safety information protection system for virtual infrastructures.

Download PDF

Keywords Virtualization; virtual infrastructure; virtual machine; hypervisor; information security; requirements for information security.
References 1. Zashchita informatsii. Zashchita informatsii pri ispol'zovanii tekhnologiy virtualizatsii. Obshchie polozheniya [Protection of information. Information security when using virtualization technologies. General provisions] [proekt GOST: razrab. FSTEK Rossii]. [okonchatel'naya redaktsiya]. Moscow, 2014, pp. 39.
2. Ledovskoy V.P. Virtual'nym infrastrukturam – progressivnaya zashchita [Virtual infrastructures - progressive protection], Anti-Malware.ru – nezavisimyy informatsionno-analiticheskiy tsentr. 2012. Available at: http://www.anti-malware.ru/analytics/Progressive_Defense_for_Virtual_Infrastructures (accessed: 28 April 2014).
3. Securing Virtual Applications and Servers, Cisco Systems, Inc. 2012. Available at: http://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/unified-network-services-uns/white_paper_c11-652663.html (accessed: 28 April 2014).
4. Model' ugroz i narushitelya bezopasnosti personal'nykh dannykh, obrabatyvaemykh v spetsial'nykh informatsionnykh sistemakh personal'nykh dannykh otrasli [The threat model and intruder security of personal data processed in a special personal data information systems industry]. Metodicheskiy dokument Ministerstva svyazi i massovykh kommunikatsiy Rossiyskoy
Federatsii: odobr. Reshenie sektsii №1 Nauchno-tekhnicheskogo soveta Minkomsvyazi Rossii «Nauchno-tekhnicheskoe i strategicheskoe razvitie otrasli» 21.04.2010 [Methodological document of the Ministry of communications and mass communications of the Russian Federation: approved The solution of section No. 1 of the Scientific-technical Council of the Ministry of communications of Russia Scientific-technical and strategic development of the sector 21.04.2010]. 1st ed. Moscow, 2010, pp. 50.
5. Mery zashchity informatsii v gosudarstvennykh informatsionnykh sistemakh [Measures for protection of information in government information systems]. Metodicheskiy dokument FSTEK Rossii: utv. FSTEK Rossii 11.03.2014 [Methodological document the FSTEC of Russia: appr. The FSTEC of Russia 11.03.2014]. Moscow, 2014, pp. 176.
6. Rossiyskaya Federatsiya. Prikazy. Ob utverzhdenii trebovaniy po zashchite informatsii, ne sostavlyayushchey gosudarstvennuyu taynu, soderzhashcheysya v gosudarstvennykh informatsionnykh sistemakh [of The Russian Federation. The orders. Approval requirements for protection of information, not state secrets contained in the state information systems] [prikaz FSTEK Rossii №17: izdan FSTEK Rossii 11.03.2013] [the order of the FSTEC of Russia No. 17: published by the Russian FSTEC 11.03.2013]. 1st ed. Moscow, 2013, pp. 37.
7. Rossiyskaya Federatsiya. Prikazy. Ob utverzhdenii sostava i soderzhaniya organizatsionnykh i tekhnicheskikh mer po obespecheniyu bezopasnosti personal'nykh dannykh pri ikh obrabotke v informatsionnykh sistemakh personal'nykh dannykh [of The Russian Federation. The orders. On approval of the composition and content of organizational and technical measures to ensure
the security of personal data during their processing in information systems of personal data] [prikaz FSTEK Rossii №21: izdan FSTEK Rossii 18.03.2013] [the order of the FSTEC of Russia No. 21: published by the Russian FSTEC 18.03.2013]. 1st ed. Moscow, 2013, pp. 20.
8. Boytsov I.V. Kak zashchitit' virtual'nuyu infrastrukturu po trebovaniyam FSTEK [How to protect virtual infrastructure requirements FSTEC], Informatsionnaya bezopasnost' [Information Security], 2014, No. 1, pp. 30-32.
9. Lapshin S.V., Konyavskaya S.V. Zashchita sistem virtualizatsii [Protection systems virtualization], Informatsionnaya bezopasnost' [Information Security], 2010, No. 6, pp. 34-35.

Comments are closed.