Access "Ensuring virtual machine security"
This article is part of the August 2011, Vol. 34 issue of Keeping virtual machines secure
When preparing a server for production, you usually run the server through a series of processes and procedures that are designed to keep it secure. So how should you proceed when it’s time to secure virtual machines (VMs) as opposed to physical servers? This tip covers a few caveats for virtual machine security. The first set of caveats applies to the host server environment, and the second applies to the VMs themselves. Protecting host servers A virtual machine environment always consists of at least two environments: the host server environment, often referred to as the resource pool, and a production environment, which is maintained by VMs. There may be other environments—training, development, testing and more—but the first two are the most common. As a rule, you should always segregate the host environment from any VM environment (see Figure 1). This provides an initial layer of protection for all VMs. Figure 1. Segregating the resource pool from VM environments The resource pool should be linked to a resource directory service—one that is apart from ... Access >>>
Premium Content for Free.
How the evolution of virtualization redefined efficient data centers
by Mike Laverick
The evolution of virtualization has promoted more efficient data centers. Now IT shops can reduce costs while increasing performance.
- How the evolution of virtualization redefined efficient data centers by Mike Laverick
Ensuring virtual machine security
by Danielle Ruest and Nelson Ruest, Contributors
Focus on both the host server environment and the virtualization layer for the best virtual machine security strategy.
- Ensuring virtual machine security by Danielle Ruest and Nelson Ruest, Contributors
Reaching for the cloud at VMworld
by Christine Casatelli, Editor, Virtual Data Center
Can virtualization in the cloud deliver on its promises?
- Reaching for the cloud at VMworld by Christine Casatelli, Editor, Virtual Data Center
More Premium Content Accessible For Free
Virtualization admins' top concern is no longer choosing a hypervisor -- it's choosing the right tools that will help with management, improve VM ...
As hypervisor features have become more similar, the next vendor battleground will be over management software. Microsoft and VMware have similar ...
Workload mobility is a key part of virtualization, and it should continue to get better and become a bigger part of an IT admin's everyday operations...