SQL Clone
SQLServerCentral is supported by Redgate
Log in  ::  Register  ::  Not logged in

Virtualization for Security

By Steve Jones,

This editorial was originally published on Nov 7, 2006. It is being re-run as Steve is at SQL in the City today.

I read a novel some time back about the CIA. Well, not exactly about the CIA, but it was a spy novel and the CIA was in it. One thing in there that caught me eye, and probably the only thing since I can't remember which book it was, was the use of a secondary computers by one of the analysts.

In this situation, the analyst had a computer that was connected to the internal network, but not anything outside. Instead there was a second machine that could connect to the Internet and allow research, checking on things outside the internal network, etc. There wasn't an easy way to transfer information between the computer (other than typing it in), so it provided some aspect of security.

That same type of architecture may be the answer to IT control of user's browsing. Imagine if a virtual computer were installed on everyone's machine. With the high power we have and free Virtual PC, this might make sense. Have it automatically installed and connect on a different IP network than the regular machine. This virtual machine could have outside access for Hotmail, browsing, etc., while the internal machine would only allow access to corporate information.

I know there are some issues and the cut-and-paste problem could still exist. There also might be issues with trying to track browsing for regulatory and compliance purposes, but it would prevent some of the secruity issues.

Have a virus hit? Clean out and reset the virtual machine.

It would also help propgations by users who run as adminsitrator. I know you're not supposed to do this, but sometimes it's not practical. You're doing a lot of administrative work and need to check something on TechNet. With cross site scripting issues, even this might not be safe anymore.

Actually the more I think about it, this might be the solution out here at the ranch for letting the kids browse their music sites :)

Total article views: 49 | Views in the last 30 days: 1
Related Articles

Computer Haiku

For the artsy DBAs out there. Here's a little computer inspired poetry.


Machine Learning Challenges

Machine Learning is an exciting branch of computer science, but it doesn't solve all our problems.


Computed Columns

Computed columns are an interesting way to cover some queries that might otherwise require a table s...


Our Race with Machines

A future world where the machines rule, as shown in films like Terminator and the Matrix, isn't what...


Computed Columns and UDFs

I wrote about the basics of computed columns and also using CASE in a computed column recently, but ...