TL;DR
Yes, you can significantly improve guest kernel security at the hypervisor level using techniques like virtualisation-based security (VBS), integrity monitoring, secure boot for guests, and restricting access to hardware. This guide explains how.
Protecting Guest Kernels: A Step-by-Step Guide
- Understand the Threat Model
- Guest kernel compromises can lead to complete virtual machine (VM) takeover.
- Attacks can come from within the guest OS, or through hypervisor vulnerabilities.
- Consider threats like rootkits, bootkits, and malicious drivers.
- Enable Virtualisation-Based Security (VBS)
- Hyper-V: Enable Core Guard in Hyper-V Manager. This requires compatible hardware (Intel VT-x/AMD-V with EVI).
- VMware ESXi: Use Confidential VMs, which utilise AMD SEV or Intel TDX technology if your hardware supports it.
- KVM: Use technologies like Intel VT-d and IOMMU to isolate devices and memory.
- Implement Guest Integrity Monitoring
- File Integrity Monitoring (FIM): Use tools within the guest OS (e.g., Tripwire, AIDE) or hypervisor-level solutions to detect changes to key binaries and configuration files.
- Example (AIDE – Linux Guest):
sudo apt install aidesudo aide --initsudo aide --check - Automate integrity checks using scheduled tasks or a central security information and event management (SIEM) system.
- Secure Boot for Guests
- UEFI Secure Boot: Enable UEFI Secure Boot within the guest VM settings. This requires a Trusted Platform Module (TPM) or equivalent virtual TPM.
- Hypervisor Support: Most modern hypervisors support passing through a virtual TPM to the guest OS.
- Restrict Hardware Access
- IOMMU/VT-d: Use IOMMU (Input/Output Memory Management Unit) to isolate devices and prevent guests from directly accessing memory outside their allocated range.
- Direct Device Assignment (DDA): Carefully control which devices are assigned directly to VMs, minimising the attack surface. Avoid unnecessary DDA.
- Hypervisor-Level Firewalls: Implement firewalls within the hypervisor to restrict network access for guests.
- Kernel Patching and Updates
- Automate patching using tools like Ansible, Chef, or Puppet.
- Regularly scan for vulnerabilities using vulnerability management systems.
- Hypervisor Security Hardening
- Keep the hypervisor software up-to-date.
- Implement strong access controls and multi-factor authentication for hypervisor management interfaces.
- Regularly audit hypervisor logs for suspicious activity.
VBS uses hardware features to create a secure enclave for critical system components. This can protect the guest kernel from tampering.
Regularly check the integrity of critical guest kernel files.
Ensure that only trusted kernels are loaded during boot.
Limit the guest’s direct access to hardware resources.
Keep guest kernels up-to-date with the latest security patches.
A secure hypervisor is crucial. Protect the hypervisor itself.

