The system administrators working in my company do not want to let user access to the internal network with OS that are not under their control and they only support Windows at the moment.
I would like to propose QubesOS as an alternative, with a Windows VM managed by them inside it, connected to the internal network via VPN (we already have this VPN in place for accessing the internal network while working outside of the building). In addition to this, users could run the operating systems and the applications they want in different VMs, thanks to QubesOS features.
The system administrators would not have to support QubesOS, just the Windows VM, but this solution could only be accepted if I am able to show that there is a reasonable guarantee that tampering the Windows VM from QubesOS is as hard as tampering the same Windows system installed on a regular machine (with secure boot, hardware encryption, etc.).
My question is: how secure is a VM if a user tries to tampers it? Is SGX a technology that can be used to provide that level of security? If so, is it used by QubesOS at the moment?
Any suggestion, comment or link would be greatly appreciated.
Frafra
Frafra -
When NxTop was released I did some beta work with them and was sad when Citrix acquired them, renamed the product XenClient XT, stopped considering non-enterprise use cases and then, finally, killed the product. [See slide #8: https://www.slideshare.net/xen_com_mgr/xen-project-15-years-down-the-line ]
Anyway. The open source OpenXT (open source based on the above) is/was designed for the use case discussed in this thread and is the underlying platform of DoD's SecureView environment.
The enterprise-level admin console can:
- Control access to and disable/wipe clients
- Push out Xen/dom0 updates
- Push out VM and/or template updates
- Delete and/or redeploy enterprise owned VMs
- Delete and/or redeploy local user's personal VM (e.g. after malware incident)
Local-machine limited admin console (dom0):
- Refresh or redeploy user's personal VM.
Not sure about VPN functionality external to the VMs themselves (e.g. does it support configurable proxying per VM?). If not, probably best to to segregate VMs by VM-hosted VPNs and the local LAN would always be considered hostile.
In any case, might be worth looking into OpenXT for this. It's a quiet project, not sure how actively maintained, but there is some movement in github.
Brendan
Yeah, I don't think you really can do that without sys admin control of the workstation itself...well, not without Intel SGX that works, I suppose.
But your point is taken, my proposal does not meet the criteria...though I don't believe anything available can meet that criteria. :)
> This kind of total (enterprise) control was planned for qubes 4.x -
> however I don't hear about real life usage.
Yeah, I recall reading about that.
Thanks,
Brendan
Because the company doesn't control dom0.
Typically Management/admins:
a) trusting you with physical access
b) expecting you to limit your behavior, contractually limiting your use of the device and contents (e.g. "do not install non-approved software", "do not connect non-approved devices", "do not sell customer data to third parties",
c) sometimes also monitoring certain logs and/or events that trigger on breaches of some of these demands (as well as on malware), logs that the user are generally locked out of modifying and sometimes even accessing.
d) enforcing at-rest data security policy (e.g. centrally-administered full disk encryption), for corporate or regulatory reasons (E.g. HIPAA).
** Much of the above only reliably works for the company if they control dom0. **
If the *user* controls dom0, the user may become an adversary from their perspective. dom0 can pause/inspect the windows VM, extract/inject data/code, etc., even if the VM has centrally managed encryption within the VM.
That's why OpenXT/XenClient XT/NxTop seems like a better fit for enterprise use, at least from the perspective of the computer/data owner (not the perspective of user freedom, of course).
Brendan