A (25:45)
Yes. Really interesting question. So I think, I think the main thing is to, and we see this a lot is to understand the risk. Yeah. So. And part of that is acknowledging that the Hypervisor, so your VMware environment, it's a tier zero asset. Yeah. So you have to treat it like that. So in terms of like zero trust, privilege, access management, those kind of things. So it needs to be a very much a strategic approach. So understand what you have. You know, you're going to have a lot of organizations will have multiple sites, thousands of VMs. So audit what you have. Yeah. And identify them risks that exist in that environment. So if you have AD as an identity provider and that's by default will increase the attack surface layer, then perhaps remove that. Look at introducing phishing resistant MFA across the environment. So if you think of Virtual center is a control plane and ESXi, they both can be added to Active Directory. There's no need for ESXI to be added to Active Directory. So remove that and then you remove that risk and then you Start to centralize all management through VirtualCenter. Yeah, so if you centralize all management through VirtualCenter then you really want to make sure that that's completely locked down. So apply the principles release privilege around roles. We spoke about that earlier. And also if you can, and I know this is difficult for a lot of organizations if you're saying okay, because we've been saying use active directory, use centralized identity providers, but if you can use modern authentication, so you can use something like Azure Entra or something that supports phishing resistant MFA such as Fido 2, make sure you leverage the capabilities such as conditional access points policies so you can identify kind of context aware access. So yeah, okay, that uses him, but then what's he doing? Where is he logging in from? That kind of stuff. And then once you have that kind of, from a, from a high level strategic kind of planning in place, then kind of create a plan. Just coming back to that, that first part in terms of the strategic and understanding what you have and identifying where there may be gaps. Some organizations may not have the bandwidth or the skill so maybe leverage a third party to come in and come and understand and help you along and inform your risk, your risk identification there. That will kind of really help, I think. And then once you have that plan, you need to kind of need like a two fold strategy. So kind of have a plan to implement those controls. And then if you think about the big problem with logging, so okay, so you can't use edi. So what can we do to make sure that I can understand what's going in that environment? Because essentially what you need to do is use the controls. If you have identified via the kind of first phase when you're kind of understanding what you have, understanding the risk and then essentially what you need to do then is use those, any deviation from those controls. Like for an example would be perhaps a user logging on from a specific IP or device that's not allowed at Virtual Center. So essentially what you're doing there is your, any friction around those controls then create alerting for that and then feed that into your sim and then you can create kind of a different way and a different playbook to kind of deal with any potential anomalous activity. And then so you have that you, you, you've determined the risk, you determine the scope, you have a plan, you kind of implemented those controls and then you kind of need to understand how do you monitor and assess that. It's, it's different. I'll be honest, it's difficult for a Lot of organizations who've got big, large VMware environments to really understand what's going on there. Because most, most tasks, for example, we spoke earlier about like for instance, creating a snapshot or creating a VM that might be essentially a daily task. A management task could also be anomalous activity. So what is important there is you kind of create correlation rules with perhaps your identity provider and your ESX site host and virtualcenter. So if you create, if you create some kind of detection engineering that kind of bundles that all together, then that kind of will help you identify what is an anomalous activity as opposed to kind of standard type VMware admin type activity. There are some real quick wins you can do in terms of locking down ESXI host. So use lockdown modes, prevent SSH access. You can't deploy ransomware on an ESXI host unless you have shell access. There's also a really good setting that will prevent the execution of binary such as ransomware called exec installed only. It's just a simple switch. You have to enable it on all ESXI hosts, use kind of TPM modules, kind of get that secure boot every host in place and then once you have that, you kind of, you've kind of locked down your, which essentially your data plane, which is the ESXI host. So it's really difficult to kind of a threat actor, to kind of move laterally there. And then if you think about virtual center. So make sure that, that again, as we mentioned earlier, you're using MFA there. Make sure that there's limited access and users that can perform tasks that are privileged. And I think a really interesting one as well. And I think a lot of organizations are grappling with this at the moment is product versions. So a lot of organizations will be on Vsphere 7 and it's actually becoming end of life. I believe it's next month when you upgrade to a different version of VMware, which should be eight. You're increasing your posture just by default because the vulnerabilities are dealt with. You can have new features that are more security focused. So don't just use it as a kind of an upgrade path. Use it as kind of an inflection point to say, okay, we're going to, we're going to look at, look at virtual sensor, look at my ESXi host. How can I leverage these new features to perhaps increase the posture of my environment? So yeah, there, there is a lot to it, but it's not, as you say, it's not insurmountable and it's definitely something that again, if you, if you take a kind of risk based approach and you understand what's happening in your environment in terms of dealing with that EDR blind spot, you know, you, you have that comfort then of okay, if someone does access the environment, perhaps virtual center level. I know that I've built my detection engineering so that I will know what's happening. I can act upon an event. We spoke about this earlier as well, that it's. You don't want to be alerting that, you know, hundreds of virtual machines have just been shut down as a precursor to ransomware. You really want to be dealing with alerts that perhaps there's been kind of an anomalous logon at a specific time or there's been an enablement of SSH on a host or something like that, that's really what you want to be logging on.