Full Virtualization Technologies: Guidelines for Secure Implementation and Management

476 KB | 3 files |  PDF

Virtualization technologies create efficiencies by viewing disparate physical systems as singular assets. But by putting all your management eggs in one virtual basket, you run the risk of compromising enormous segments of your infrastructure.

Virtualization promises enormous gains in efficiency and control for IT. However, virtualization adds layers of technology, which can increase security management concerns and require the implementation of additional security controls. Also, combining many systems onto a single physical computer can cause a larger impact on the organization if security is compromised.

This paper from the National Institute of Standards and Technology is designed to walk federal agencies through the steps needed to successfully roll out virtualization without compromising network security. The advice included in the article, such as ensuring that admin tools for the virtualization solution are completely locked down, is of course applicable to any organization.

Included in this zip file are:

  • Full Virtualization Technologies.doc
  • Intro Doc.pdf
  • Terms and Conditions.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

NIST is a non-regulatory federal agency within the U.S. Department of Commerce. NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards and technology in ways that enhance economic security and improve our quality of life.

All IT Downloads from National Institute of Standards and Technology» | Visit National Institute of Standards and Technology »
Related IT Downloads

IT_Man77 Job Description: Technology Project Manager

Whether you're looking to hire one or looking for a position yourself, use this detailed job description to find out what the role of a Technology Project Manager entails. ...  More >>

Strategy2.jpg Case Studies in Strategic Planning

Chapter 1 delves into the first four stages of systematic strategic planning, including clarifying current conditions, identifying competitive advantages, defining opportunities and developing strategies. ...  More >>

Infra81.jpg Software Quality Assurance: Integrating Testing, Security, and Audit

This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to manage defects, and an analysis of the root causes of defects. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.