Security Analysis - Virtualization
ÃÖÃÊÀÇ °¡»óÈ º¸¾È Á¦Ç°ÀÌ VMsafe ÇÁ·Î±×·¥À¸·Î VMwareÀÇ ¾ÖÇø®ÄÉÀÌ¼Ç ÇÁ·Î±×·¥ ÀÎÅÍÆäÀ̽º(API)¸¦ »ç¿ëÇϱâ·Î µ¿ÀÇÇÑ º¸¾È ¾÷ü¿¡ ÀÇÇØ ÇâÈÄ ¸î °³¿ù ³»¿¡ ±× º£ÀÏÀ» ¹þ°Ô µÈ´Ù.
±×·¯³ª ¸î¸î Æ´»õ ¾÷üµéÀÌ ÀÌ ¶óÀο¡ ¶Ù¾îµé¾î Æ®·¡ÇÈÀ» ¸ð´ÏÅÍÇϰí ÁÖ¿ä ½Ã½ºÅÛ¿¡ ħÀÔÇϱâ À§ÇØ °¡»óÈ ¼ÒÇÁÆ®¿þ¾îÀÇ ±¸¸ÛÀ» ÀÌ¿ëÇÏ·Á´Â °ø°ÝÀÚ¸¦ Â÷´ÜÇÏ´Â °¡»óÈ º¸¾È Á¦Ç°À» ¹Ð°í ÀÖ´Ù. ºÐ¼®°¡µéÀº ÀÌ ¼ÒÇÁÆ®¿þ¾î°¡ ÇÏÀÌÆÛ¹ÙÀÌÀú-°¡»óÈ È¯°æÀ» ÀÛµ¿½ÃŰ´Â ¼ÒÇÁÆ®¿þ¾î-¸¦ Ȱ¿ëÇÏÁö´Â ¾ÊÁö¸¸ ¹öÃß¾ó ȯ°æÀ» º¸È£ÇϰíÀÚ ÇÏ´Â ¾ó¸®¾î´äÅ͵鿡°Ô´Â Àû´çÇÑ Ãâ¹ßÁ¡À̶ó°í Æò°¡Çß´Ù.
¾ç۱׷ì(Yankee Group)ÀÇ ÇÊ È£Ä¡¹«½º(Phil Hochmuth) ¼ö¼® ºÐ¼®°¡´Â ¡°°ú¿µÈ ¼ºÇâÀÌ ÀÖ¾ú´Ù. »ç¶÷µéÀÌ ¹°¸®ÀûÀÎ ¹Ú½º¸¦ °¡»óÈÇÏ´Â °ÍÀÌ ºñ¿ë Àý°¨ÀÌ µÈ´Ù°í »ý°¢Ç߱⠶§¹®ÀÌ´Ù. ±×·¯³ª °¡»óÈ È¯°æ º¸È£¸¦ À§ÇØ ¼³°èµÈ ÅøÀÌ ¸¹Áö ¾Ê¾Ò°í »ç¶÷µéÀº ±× Á¡¿¡ ´ëÇØ »ý°¢ÇÏÁö ¸ø Çß´Ù¡±°í ¸»Çß´Ù.
3¿ù¿¡ ½ÃÀå¿¡ ÁøÃâÇÑ Altor Networks´Â ¹öÃß¾ó ½ºÀ§Ä¡ Æ®·¡ÇÈ-ÇÏÀÌÆÛ¹ÙÀÌÀúÀÇ »óÀ§ ³×Æ®¿öÅ© Æ®·¡ÇÈ ·¹À̾î-À» Ȱ¿ëÇÏ´Â ¹öÃß¾ó ½ÃÅ¥¸®Æ¼ ¾Ö³Î¶óÀÌÀú¸¦ º¸À¯Çϰí ÀÖ´Ù. ÀÌ ¾÷ü´Â VMsafe ÇÁ·Î±×·¥¿¡ Âü¿©Çϰí ÀÖÀ¸¸ç ¿ÃÇØ ¸»±îÁö ÁغñÇØ ¹öÃß¾ó ³×Æ®¿öÅ© ¹æÈº® Á¦Ç°À» ¹ß¸ÅÇÒ °èȹÀ̶ó°í ¹àÇû´Ù.
º¸¾È °¡»óÈ ¼ÒÇÁÆ®¿þ¾î·Î ÀÌ¹Ì ½ÃÀå¿¡ ÁøÃâÇÑ ÀϺΠƴ»õ ¾÷üµéµµ ¶ÇÇÑ ÀÌ ÇÁ·Î±×·¥¿¡ Âü¿©Çϰí ÀÖ´Ù. ±×µéÀº ÇÏÀÌÆÛ¹ÙÀÌÀú¸¦ Ȱ¿ëÇϱâ À§ÇØ ±âÁ¸ Á¦Ç°µéÀ» ¼Ò¼ö º¯°æÇÒ °èȹÀÌ´Ù. Ĺ¹öµå ³×Æ®¿÷½º(Catbird Networks)¿Í ¸®Ç÷º½º ½ÃÅ¥¸®Æ¼(Reflex Security)´Â ÇöÀç ¹öÃß¾ó ³×Æ®¿öÅ©¿¡ ´ëÇÑ Á¢±ÙÀ» ¸ð´ÏÅÍÇϰí ÅëÁ¦ÇÏ´Â ¾îÇöóÀ̾𽺸¦ ÆÇ¸ÅÇϰí ÀÖ´Ù. ºí·ç·¹ÀÎ Å×Å©³î·¯Áö(Blue Lane Technologies)´Â VMware Ç÷§ÆûÀ» Ȱ¿ëÇÏ´Â ¹öÃß¾ó½Çµå(VirtualShield)¶ó´Â À̸§ÀÇ ¼ÒÇÁÆ®¿þ¾î ±â¹Ý Ãë¾à¼º ½Çµå¸¦ °³¹ßÇß´Ù.
ÇÑÆí Montego Networksµµ ½ÃÀå ÁøÃâ ¿¹Á¤À¸·Î, Á¦ 3ÀÚ °¡»óÈ º¸¾È ¾÷üÀÇ Æ®·¡ÇÈ¿¡ ´ëÇÑ Á¤Ã¥ ±â¹Ý ½ºÀ§ÄªÀ» ó¸®ÇÏ´Â ÀÚ»çÀÇ ÇÏÀÌÆÛ½ºÀ§Ä¡(HyperSwitch) ¼ÒÇÁÆ®¿þ¾î¸¦ ¼Ò°³Çß´Ù.
<±Û¡¤·Î¹öÆ® ¿þ½ºÅͺ§Æ®(Robert Westervelt)>
Copyright ¨Ï 2006 Information Security and TechTarget
[Á¤º¸º¸È£21c Åë±Ç 95È£(info@boannews.com)]
<ÀúÀÛ±ÇÀÚ: º¸¾È´º½º(www.boannews.com) ¹«´ÜÀüÀç-Àç¹èÆ÷±ÝÁö>