Virtual Host on LAN with VMs on DMZ – Security Considerations

dmzSecurityvirtualization

Just kicking this idea around, and wanted to see if you'll be so kind as to point out the problems I don't see.

If I set up this new HyperV host as a normal domain member, the benefits are obvious. I can manage it through SCVMM, and it's got its own NIC, so the traffic should theoretically be isolated from the dirty, filthy DMZ NIC the VMs will be using.

Obviously I'll want to set up the virtual network as Private, to isolate the host from them completely. I'm trusting the documentation on this – is that naive?

I could be overthinking things, because the thought of having my LAN and my DMZ both plugged into the same physical box makes me twitch, but I don't have any concrete reasons why.

Thanks for your thoughts.

Best Answer

I would say the main risk would be any exploit that allows someone to break out of the VM and attack the host. This has happened with VMWare before. So this would put your LAN at a higher risk from the DMZ than totally isolated machines, but I wouldn't say it's stupid either. Just depends on how secure it really has to be...

Also take into account this sounds a little more 'complicated', and therefore you might be more likely to overlook something. I bet more security is hacked because of Administrative mistakes than exploits.

One more thing to think about is if you work in place / industry that might have audits. Even if this method is no less secure really, there might be some BS audit rule about the DMZ and LAN residing on the same physical server.

Related Topic