I'm looking for a way of securing my VM on untrusted host as much as possible.
This is my situation: I have a ssh access to a remote host machine which I don't trust. I will upload and run a virtual machine. VM contains encrypted partition with sensitive data and this partition will be mounted after VM start. What steps should I do to protect host machine from accessing to this VM?
I know it probably never be 100% secure if remote machine owner have access to physical memory on that machine. I just want to make access to this VM as difficult as possible. One of my ideas is to set up triggers which will auto-dismount encrypted partition in case of unauthorised try to access to VM. Is is a good idea? Is there some solution to do this job? What other options do I have?
Access to the physical memory would allow them to mount the encrypted partition separate to the VM. An auto-dismount encryption would protect against those accessing via the VM which helps.
Other than partition encryption you could also have secondary encryption on important files or folders on the partition. Also possibly setting up an email send on access to alert you when someone is accessing the partition. This may allow you to wipe it remotely if you feel its insecure.
If its really important an auto wipe encryption may be possible however it is always very difficult if you don't have physical access.
The best option at the moment is simply to encrypt using a trusted strong partition encryption software like http://www.truecrypt.org/
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With