Full Virtualization Technologies: Guidelines for Secure Implementation and Management
Virtualization promises enormous gains in efficiency and control for IT. However, virtualization adds layers of technology, which can increase security management concerns and require the implementation of additional security controls. Also, combining many systems onto a single physical computer can cause a larger impact on the organization if security is compromised.
This paper from the National Institute of Standards and Technology is designed to walk federal agencies through the steps needed to successfully roll out virtualization without compromising network security. The advice included in the article, such as ensuring that admin tools for the virtualization solution are completely locked down, is of course applicable to any organization.
Included in this zip file are:
- Full Virtualization Technologies.doc
- Intro Doc.pdf
- Terms and Conditions.pdf