I'd like to know how RSA plans to mitigate this latest Intel processor vulnerability and whether or not VM installs are vulnerable.
'Kernel Memory Leaking' Intel Processor Design Flaw Forces Linux, Windows Redesign - Slashdot
I'd like to know how RSA plans to mitigate this latest Intel processor vulnerability and whether or not VM installs are vulnerable.
'Kernel Memory Leaking' Intel Processor Design Flaw Forces Linux, Windows Redesign - Slashdot
This is currently under investigation and the official response is at: https://community.rsa.com/docs/DOC-85418
For VM deployments, the first step would be to contact you hardware vendor and virtualization ("hypervisor") vendor to obtain the appropriate BIOS and Host OS/Software patches for the virtualization system. Making sure the Host servers (as opposed to Guest VMs) are secure is the first step in securing your VMs from this issue.
As an interim step for Authentication Manager, make sure that SSH is disabled (which is the default) and verify that no local user accounts have been added to the appliance operating system. This issue requires access by a local user running a process on your appliance.
This is currently under investigation and the official response is at: https://community.rsa.com/docs/DOC-85418
For VM deployments, the first step would be to contact you hardware vendor and virtualization ("hypervisor") vendor to obtain the appropriate BIOS and Host OS/Software patches for the virtualization system. Making sure the Host servers (as opposed to Guest VMs) are secure is the first step in securing your VMs from this issue.
As an interim step for Authentication Manager, make sure that SSH is disabled (which is the default) and verify that no local user accounts have been added to the appliance operating system. This issue requires access by a local user running a process on your appliance.