![]() ![]() ![]() When an engineer quits, such ‘personal’ virtual machines are simply killed together with all ‘accumulated experience’. Even though they are required only for labs, in reality, they communicate with each other and with the Internet via the production infrastructure. as a result, such infrastructures often include port groups. In addition to ‘personal’ VMs running on different ESXi hosts, segmented networks are required to test firewalls, run malware, etc. Most likely, other team members won’t be able to use such VMs without preliminary research. As a result, you have a horde of differently configured virtual machines running almost the same software. Experience shows that without a standardized approach, each engineer eventually builds up a similar infrastructure with a unique blackjack. Integration tasks are usually typical, too: setting up authentication via AD/Radius, connecting to mail servers, rolling out agents, assembling a cluster, providing mirrored traffic, submitting logs or flows to analysts, etc. In addition, any infrastructure includes some standard hierarchy of user groups, network segmentation, software, and network equipment (switches, routers, firewalls, etc.). There are plenty of vendors and solutions, but most of the engineers focused on the protection of the same kind of systems and standard corporate infrastructure: workstations, AD servers, file shares, mail servers, web servers, and database servers. They explored, deployed, integrated, and tested various products. The idea to test a modern emulation platform came to me when I was overseeing a team of cybersecurity engineers. I suggest another way: set up an emulation platform using EVE-NG and create on its basis a universal scalable cyberpolygon enabling networking and security specialists to polish their skills. Some admins reinvent the wheel by assembling fearsome combinations of virtual machines and all kinds of software. Virtualization tools are required in many situations: testing of security utilities, personnel training in attack scenarios or network infrastructure protection, etc. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |