More

    Full Virtualization Technologies: Guidelines for Secure Implementation and Management

    Full Virtualization Technologies: Guidelines for Secure Implementation and Management

    Virtualization technologies create efficiencies by viewing disparate physical systems as singular assets. But by putting all your management eggs in one virtual basket, you run the risk of compromising enormous segments of your infrastructure.

    Virtualization promises enormous gains in efficiency and control for IT. However, virtualization adds layers of technology, which can increase security management concerns and require the implementation of additional security controls. Also, combining many systems onto a single physical computer can cause a larger impact on the organization if security is compromised.

    This paper from the National Institute of Standards and Technology is designed to walk federal agencies through the steps needed to successfully roll out virtualization without compromising network security. The advice included in the article, such as ensuring that admin tools for the virtualization solution are completely locked down, is of course applicable to any organization.

    Included in this zip file are:

    • Full Virtualization Technologies.doc
    • Intro Doc.pdf
    • Terms and Conditions.pdf

    Get the Free Newsletter!

    Subscribe to Daily Tech Insider for top news, trends, and analysis.

    Latest Articles