Virtual security: Developing a plan and procedures
This section of our virtual security guide covers how to design and execute a plan to protect your server virtualization infrastructure's sensitive information.
![]() |
||||
|
![]() |
|||
![]() |
Sometimes, the best way to secure a virtualized security environment is to think like an attacker. Using this approach, you should secure your high-value assets and work your way down to lower-priority assets. In this article, we offer more tips on how to harden your virtual security defenses from unauthorized access and theft.
Virtualization server security best practices
On internal networks, virtualization has redrawn the map of assets by moving dispersed servers and applications that were once separated by hardware and network filters onto a single server. While this process alleviates traditional security threats, it also poses new challenges. In this tip, we cover several virtual server security best practices for virtualization administrators striving to lock down their infrastructure.
Securing virtual environments: Three considerations
Getting an entire IT department on the same page is crucial for executing a virtual security plan. Confusion surrounding virtual environment semantics, guest OS management and virtualization administration network access can create virtual environment vulnerabilities. This tip explains how to secure an entire virtual infrastructure rather than just a hypervisor or management appliances.
How to integrate the security of physical and virtual machines
Managing the security of physical and virtual machines can be daunting. Further, many IT administrators receive little or no virtual security training. This tip explains how to categorize virtual environment risks and better evaluate security threats.
Improving VM security: Best practices
Even if you already have a virtual security plan in place, it's never too late to strengthen it. How do you assess risks? Do you have the proper permissions set up? How do you manage moving targets? You should routinely ask these kinds of questions, and this tip explains how to incorporate these considerations into your strategy to improve VM security.
Start the conversation
0 comments