Guarding against virtualization security risks and vulnerabilities

You can limit virtualization security risks and vulnerabilities by understanding attack vectors. This section of our virtualization security guide helps you prevent attacks.

An effective way to guard against virtualization security risks and unauthorized access is to think like an intruder. With this mindset -- as well as knowledge of attack vectors and vulnerabilities -- you can allocate your resources to weak spots in your environment.

Virtualization security guide
Server virtualization security best practices

Developing a virtual security plan

Guarding against virtualization security risks

VMware security best practices

Hyper-V virtualization security guidelines
The following section outlines various virtualization security risks, concerns and scenarios that can arise in any data center. Getting up to speed on the latest virtualization security vulnerabilities and exploits helps prevent attacks and ensures that you're prepared in the face of a security breach.

How to steal a virtual machine and its data in three easy steps
Because a virtual machine (VM) is reduced to a single file, it offers administrators ample flexibility. The tradeoff, however, is that VMs are easy to steal. This tip outlines how to swipe a VM so that you can guard against virtual theft.

Consolidation security issues
Before embarking on a server consolidation project, you need to prepare accordingly. Having several VMs share the same network interface card, for example, leaves your virtual environment susceptible to spamming attacks. This short expert Q&A provides a few server consolidation security risks of which you should be aware.

Protecting storage networks from virtual machine security risks
Virtualization security vulnerabilities extend beyond VMs. When attached to virtualization hosts, storage networks can be attack vectors for hackers. This tip outlines storage configurations that can leave your infrastructure vulnerable and why you should keep your hypervisor and VM storage separated.

Top 10 ways virtualization threatens security
You might be surprised by how many common IT practices and misconceptions leave a virtual environment unsecure. Do you have a service console in a demilitarized zone, or DMZ? Do you have absolute faith in Secure Sockets Layer protection? These are just two of several, common practices that leave data centers susceptible to virtualization security risks.

Four things to remember about server virtualization security concerns
Virtualization shouldn't change core security principles, but it may alter specific procedures. When you turn a hardware switch with 50 cables into a virtual switch that connects multiple virtualization hosts, for example, intrusion protection policies should be modified. This tip covers similar server virtualization security concerns that arise when implementing a new virtual environment.

This was first published in April 2010

Dig deeper on Virtualization security and patch management

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchVMware

SearchWindowsServer

SearchCloudComputing

SearchVirtualDesktop

SearchDataCenter

Close