Four Steps to Virtualization Security
While virtualization changes the way organizations use servers, provision applications and configure networks, it doesn't change bedrock security principles. In fact, virtualization makes those principles more necessary than ever. This report outlines four steps, or processes, that organizations can take to manage the risks inherent in a virtualization environment.
The first step is to address the various layers of the virtualization infrastructure, starting with the hypervisor and guest OSes and working all the way out to the network, the virtualization management system and storage. Storage is a key layer because it stores full copies of VMs, but may often be overlooked by IT. (S3601011)