Access "Virtual security: New attack vectors, new ballgame"
This article is part of the February 2011, Vol. 31 issue of How to make the transition from physical to virtual and back
When it comes to securing virtual environments, you have to take different measures from those for traditional physical security. With virtual security, new attack vectors --that is, the means by which a hacker gains control of a server OS -- must be protected to prevent breaches. Because of these vectors -- and thus risks -- virtual security requires you to secure the host and each virtual machine (VM). In this tip, we cover the kinds of attacks you should be concerned about as you develop a virtualization security strategy as well as considerations and best practices for the various components of your infrastructure. More on virtual machine security Virtual machine security Virtual security: developing a plan and procedures Server virtualization security best practices guide Virtual machine monitoring and security guide Physical security There are many physical attack vectors, from physical consoles to a guest OS to the applications that run on an OS. To secure a physical system, you must have a locked data center that restricts access to the console. Next... Access >>>
Premium Content for Free.
Considerations for V2V and V2P workload migrations
by Stephen J. Bigelow, Senior Technology Editor
Although there are few situations in which V2V or V2P migrations are necessary, administrators needing to make these moves must be prepared to handle unique challenges.
Inside the capacity management process: Resource supply and demand
by Greg Shields, Contributor
Keep your servers up to snuff by ensuring that resources have been optimally allocated. Understanding resource supply and demand is the key to a strong capacity management process.
- Considerations for V2V and V2P workload migrations by Stephen J. Bigelow, Senior Technology Editor
Virtual security: New attack vectors, new ballgame
by Eric Siebert
With physical security, you don't have to consider breaches of virtual machines, utilities or virtual disk files. But virtualization creates new security risks and vulnerabilities.
- Virtual security: New attack vectors, new ballgame by Eric Siebert
More Premium Content Accessible For Free
Virtualization admins' top concern is no longer choosing a hypervisor -- it's choosing the right tools that will help with management, improve VM ...
As hypervisor features have become more similar, the next vendor battleground will be over management software. Microsoft and VMware have similar ...
Workload mobility is a key part of virtualization, and it should continue to get better and become a bigger part of an IT admin's everyday operations...