Access your Pro+ Content below.
Virtualization security: How vulnerable is your hypervisor?
This article is part of the April 2010, Vol. 21 issue of Virtual Data Center
IT security is facing a bit of a paradox. On one hand, the sheer number of security-related regulations that network administrators must comply with is unprecedented. On the other hand, the industry is only just beginning to understand the security implications associated with virtualization. So what should virtual data centers do to address virtualization security? Before delving into virtualization security, let’s start out by taking a look at the hypervisor, which is used by virtualization platforms such as VMware ESX and Microsoft’s Hyper-V. There are a lot of myths surrounding the ability to exploit the hypervisor. One virtualization security myth is that it is possible for an attacker to compromise the hypervisor and then take control of the virtual machines (VMs) that are running on top of it. A similar myth is that an attacker may be able to use a weakness in a VM to break out of it -- known as an escape attack -- and seize control over the rest of the VMs running on the server. Although it is plausible that such attacks...
Features in this issue
IT managers should consider the pros and cons of cloud computing migration, and find a balance between the rewards and risks associated with moving a data center to the cloud.
Quickly provisioning virtual machines can create virtualization sprawl. Here are five VM sprawl warning signs that may signal bigger virtualization infrastructure problems.
Choosing the right hypervisor for your infrastructure is not only critical for deployment and management purposes, but it also comes into play with virtualization security.