The guest operating system that runs in the virtual machine is vulnerable to the same security risks as any physical system.
To boost security in your virtual environment, you can add a virtual Trusted Platform Module (vTPM) to your ESXi hosts. You can also enable virtualization-based security (VBS) for the virtual machines that run the latest Windows 10 and Windows Server 2016 operating systems. You can provide additional security to your workloads by using Virtual Intel® Software Guard Extensions (vSGX) for virtual machines.
Activate vSGX on a Virtual Machine in the VMware Host Client
To protect the enclave contents from disclosure and modifications, you can activate vSGX on a virtual machine in the VMware Host Client.
- Secure Virtual Machines with vSGX
- vSphere enables you to configure vSGX for virtual machines. Some modern Intel CPUs implement a security extension called Intel ® Software Guard Extension (Intel ® SGX). Intel SGX allows user-level code to define private regions of memory, called enclaves. Intel SGX protects the enclave contents from disclosure or modification in such a way that code running outside the enclave cannot access them.
Some operations and features are not compatible with SGX.
- Migration with Storage vMotion
- Suspending or resuming the virtual machine
- Taking a snapshot of the virtual machine
- Fault Tolerance
- Enabling Guest Integrity (GI, platform foundation for VMware AppDefense 1.0)
Prerequisites
-
Power off the virtual machine.
- Verify that the virtual machine uses EFI firmware.
- Verify that the ESXi host is version 7.0 or later.
- Verify that the guest operating system in the virtual machine is Linux, Windows 10 (64-bit) or later, or Windows Server 2016 (64-bit) or later.
- Verify that you have the privilege on the virtual machine.
- Verify that the ESXi host is installed on an SGX-capable CPU, and SGX is enabled in the BIOS of the ESXi host. For information about the supported CPUs, see https://kb.vmware.com/s/article/71367.
Procedure
Deactivate vSGX on a Virtual Machine in the VMware Host Client
To deactivate vSGX on a virtual machine, you can use the VMware Host Client.
Procedure
- In the VMware Host Client inventory, click Virtual Machines.
- Right-click a virtual machine in the list and select Edit settings from the pop-up menu.
- On the Virtual Hardware tab, expand Security devices.
- Deselect the Enable check box and click Save.
Results
vSGX is deactivated on the virtual machine.
Remove a vTPM device from a VM in the VMware Host Client
The Trusted Platform Module (TPM) is a specialized chip that stores host-specific sensitive information, for example private keys and OS secrets. The TPM chip is also used to perform cryptographic tasks and attest the integrity of the platform. In the VMware Host Client, you can only remove the vTPM device from a virtual machine.
The virtual TPM device is a software emulation of the TPM functionality. You can add a virtual TPM (vTPM) device to the virtual machines in your environment. The vTPM implementation does not require a physical TPM chip on the host. ESXi uses the vTPM device to exert the TPM functionality in your vSphere environment.
vTPM is available to virtual machines that have Windows 10 and Windows Server 2016 operating systems. The virtual machine must be of hardware version 14 or later.
You can add a virtual TPM device to a virtual machine only in the vCenter Server instance. For more information, see the vSphere Security documentation.
In the VMware Host Client, you can only remove the virtual TPM device from a virtual machine.
Prerequisites
- The virtual machine must be of hardware version 14 or later.
- The guest OS must be Windows 10 or Windows Server 2016 and later.
- The virtual machine must be powered off.
Procedure
Activate or Deactivate Virtualization-based Security on an Existing VM in the VMware Host Client
Virtualization-based security (VBS) uses the Microsoft Hyper-V based virtualization technology to isolate core Windows OS services in a separate virtualized environment. Such isolation provides an additional level of protection, because it makes it impossible for the key services in your environment to be manipulated.
You can change the level of security of a virtual machine by enabling or disabling Microsoft virtualization-based security (VBS) on existing virtual machines for supported Windows guest operating systems.
Activating VBS on a virtual machine automatically activates the virtual hardware that Windows requires for the VBS feature. By enabling VBS, a variant of Hyper-V starts in the virtual machine and Windows starts running inside the Hyper-V root partition.
VBS is available on the latest Windows OS versions, for example Windows 10 and Windows Server 2016. To use VBS on a virtual machine, the virtual machine compatibility must be ESXi 6.7 and later.
In the VMware Host Client, you can activate VBS during a virtual machine creation. Alternatively, you can activate or deactivate VBS for an existing virtual machine.
Prerequisites
You can activate VBS on a virtual machine only if the TPM validation of the host is successful.
Using Intel CPUs for VBS requires vSphere 6.7 or later. The virtual machine must have been created using hardware version 14 or later and one of the following supported guest operating systems:
- Windows 10 (64 bit) or later releases
- Windows Server 2016 (64 bit) or later releases
Using AMD CPUs for VBS requires vSphere 7.0 Update 2 or later. The virtual machine must have been created using hardware version 19 or later and one of the following supported guest operating systems:
- Windows 10 (64 bit), version 1809 or later releases
- Windows Server 2019 (64 bit) or later releases
Ensure that you install the latest patches for Windows 10, version 1809, and Windows Server 2019, before enabling VBS.
For more information about activating VBS on virtual machines on AMD platforms, see the VMware KB article at https://kb.vmware.com/s/article/89880.