Get started Bring yourself up to speed with our introductory content.

Virtual security: Developing a plan and procedures

This section of our virtual security guide covers how to design and execute a plan to protect your server virtualization infrastructure's sensitive information.

You should create a virtual security plan that protects your investment in virtual infrastructure. While sound practices can prevent sensitive information from landing in the wrong hands, you also want to guard against simple human error, which can subject your virtual infrastructure to data security breaches and other vulnerabilities.

Virtualization security guide
Server virtualization security best practices

Developing a virtual security plan

Guarding against virtualization security risks

VMware security best practices

Hyper-V virtualization security guidelines
The articles in this section highlight key considerations for a virtual security plan and how to get IT staff to incorporate virtual security practices into their daily routine.

How to build security into a virtualized server environment
Sometimes, the best way to secure a virtualized security environment is to think like an attacker. Using this approach, you should secure your high-value assets and work your way down to lower-priority assets. In this article, we offer more tips on how to harden your virtual security defenses from unauthorized access and theft.

Virtualization server security best practices
On internal networks, virtualization has redrawn the map of assets by moving dispersed servers and applications that were once separated by hardware and network filters onto a single server. While this process alleviates traditional security threats, it also poses new challenges. In this tip, we cover several virtual server security best practices for virtualization administrators striving to lock down their infrastructure.

Securing virtual environments: Three considerations
Getting an entire IT department on the same page is crucial for executing a virtual security plan. Confusion surrounding virtual environment semantics, guest OS management and virtualization administration network access can create virtual environment vulnerabilities. This tip explains how to secure an entire virtual infrastructure rather than just a hypervisor or management appliances.

How to integrate the security of physical and virtual machines
Managing the security of physical and virtual machines can be daunting. Further, many IT administrators receive little or no virtual security training. This tip explains how to categorize virtual environment risks and better evaluate security threats.

Improving VM security: Best practices
Even if you already have a virtual security plan in place, it's never too late to strengthen it. How do you assess risks? Do you have the proper permissions set up? How do you manage moving targets? You should routinely ask these kinds of questions, and this tip explains how to incorporate these considerations into your strategy to improve VM security.

Dig Deeper on Virtualization security and patch management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.