How To Manage Virtualization

Size: px
Start display at page:

Download "How To Manage Virtualization"

Transcription

1 An ISACA Emerging Technology White Paper Virtualization: Benefits and Challenges Abstract Virtualization is a high-tech buzzword in broad use today, but its increasing importance is based on more than just the passing fancy of the crowd. With its potential to reduce capital expenses and energy costs, virtualization presents an attractive solution for enterprises looking to save money and generate value from their IT investments. Virtualization can indeed offer many benefits to enterprises, but the benefits must be weighed against the potential threats to information assets and the business itself. This white paper examines some of the business benefits that accrue to virtualized solutions, identifies security concerns and suggests possible solutions, investigates some change considerations that should be considered before moving to a virtualized environment, and provides practical guidance on auditing a virtualized system.

2 ISACA With 95,000 constituents in 160 countries, ISACA ( is a leading global provider of knowledge, certifications, community, advocacy and education on information systems (IS) assurance and security, enterprise governance and management of IT, and IT-related risk and compliance. Founded in 1969, the nonprofit, independent ISACA hosts international conferences, publishes the ISACA Journal, and develops international IS auditing and control standards, which help its constituents ensure trust in, and value from, information systems. It also advances and attests IT skills and knowledge through the globally respected Certified Information Systems Auditor (CISA ), Certified Information Security Manager (CISM ), Certified in the Governance of Enterprise IT (CGEIT ) and Certified in Risk and Information Systems Control TM (CRISC TM ) designations. ISACA continually updates COBIT, which helps IT professionals and enterprise leaders fulfill their IT governance and management responsibilities, particularly in the areas of assurance, security, risk and control, and deliver value to the business. Disclaimer ISACA has designed and created Virtualization: Benefits and Challenges (the Work ), primarily as an educational resource for security, governance and assurance professionals. ISACA makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of all proper information, procedures and tests or exclusive of other information, procedures and tests that are reasonably directed to obtaining the same results. In determining the propriety of any specific information, procedure or test, security, governance and assurance professionals should apply their own professional judgment to the specific control circumstances presented by the particular systems or information technology environment. Reservation of Rights 2010 ISACA. All rights reserved. No part of this publication may be used, copied, reproduced, modified, distributed, displayed, stored in a retrieval system or transmitted in any form by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written authorization of ISACA. Reproduction and use of all or portions of this publication are permitted solely for academic, internal and noncommercial use and for consulting/advisory engagements, and must include full attribution of the material s source. No other right or permission is granted with respect to this work. ISACA 3701 Algonquin Road, Suite 1010 Rolling Meadows, IL USA Phone: Fax: info@isaca.org Web site: Virtualization: Benefits and Challenges CRISC is a trademark/service mark of ISACA. The mark has been applied for or registered in countries throughout the world. 2

3 ISACA wishes to recognize: Project Development Team Ramses Gallego, CISM, CGEIT, CISSP, SCPM, ITIL, Six Sigma Black Belt, Entel IT Consulting, Spain, Chair Jason Chan, VMWare, USA Michael Hoesing, CISA, CPA, CISSP, CIA, University of Nebraska at Omaha, USA Steve Orrin, Intel Corporation, USA Expert Reviewers David Finnis, CISA, CGEIT, CISSP, Ekko Consulting, USA Roger Gallego, Entel IT Consulting, Spain Edward Haletky AstroArch Consulting, Inc., USA Florian Murillo, Cloud Consulting, Spain ISACA Board of Directors Emil D Angelo, CISA, CISM, Bank of Tokyo-Mitsubishi UFJ Ltd., USA, International President Christos K. Dimitriadis, Ph.D., CISA, CISM, INTRALOT S.A., Greece, Vice President Ria Lucas, CISA, CGEIT, Telstra Corp. Ltd., Australia, Vice President Hitoshi Ota, CISA, CISM, CGEIT, CIA, Mizuho Corporate Bank Ltd., Japan, Vice President Jose Angel Pena Ibarra, CGEIT, Alintec S.A., Mexico, Vice President Robert E. Stroud, CGEIT, CA Technologies, USA, Vice President Kenneth L. Vander Wal, CISA, CPA, Ernst & Young LLP (retired), USA, Vice President Rolf M. von Roessing, CISA, CISM, CGEIT, Forfa AG, Germany, Vice President Lynn C. Lawton, CISA, FBCS CITP, FCA, FIIA, KPMG Ltd., Russian Federation, Past International President Everett C. Johnson Jr., CPA, Deloitte & Touche LLP (retired), USA, Past International President Gregory T. Grocholski, CISA, The Dow Chemical Co., USA, Director Tony Hayes, CGEIT, AFCHSE, CHE, FACS, FCPA, FIIA, Queensland Government, Australia, Director Howard Nicholson, CISA, CGEIT, CRISC, City of Salisbury, Australia, Director Jeff Spivey, CPP, PSP, Security Risk Management, USA, ITGI Trustee Guidance and Practices Committee Kenneth L. Vander Wal, CISA, CPA, Ernst & Young LLP (retired), USA, Chair Kamal N. Dave, CISA, CISM, CGEIT, Hewlett-Packard, USA Urs Fischer, CISA, CRISC, CIA, CPA (Swiss), Switzerland Ramses Gallego, CISM, CGEIT, CISSP, Entel IT Consulting, Spain Phillip J. Lageschulte, CGEIT, CPA, KPMG LLP, USA Ravi Muthukrishnan, CISA, CISM, FCA, ISCA, Capco IT Service India Pvt. Ltd., India Anthony P. Noble, CISA, CCP, Viacom Inc., USA Salomon Rico, CISA, CISM, CGEIT, Deloitte, Mexico Frank Van Der Zwaag, CISA, Westpac New Zealand, New Zealand 3

4 ISACA and IT Governance Institute (ITGI) Affiliates and Sponsors American Institute of Certified Public Accountants ASIS International The Center for Internet Security Commonwealth Association for Corporate Governance Inc. FIDA Inform Information Security Forum Information Systems Security Association Institut de la Gouvernance des Systèmes d Information Institute of Management Accountants Inc. ISACA chapters ITGI Japan Norwich University Solvay Brussels School of Economics and Management University of Antwerp Management School Analytix Holdings Pty. Ltd. BWise B.V. Hewlett-Packard IBM Project Rx Inc. SOAProjects Inc. Symantec Corp. TruArx Inc. 4

5 Impacts of Virtualization By definition, virtualization is rendering something in virtual (rather than actual) form. In enterprise information technology (IT), virtualization alters the technical architecture because it allows different resources to be executed in a single (or multilayer) environment. In general, it turns one piece of hardware into the host for many other pieces and, consequently, over time, has the potential to reduce enterprise capital expenses, costs of administration and other financial costs. Virtualization, as a term and a concept, has broad utility and can be applied to several areas: virtualized servers, virtualized storage, virtualized processors, virtual memory, virtual desktops, virtualized network, etc. Because of its extensive applications and cost savings, it is being evaluated by chief information officers (CIOs) worldwide as they strategize how to provide agility and computing power to meet their enterprise needs. In addition, because organizations today require a quick and reliable way to provision technical resources that enable a faster time to market, virtualization is on the C-level agenda and is already enhancing the effectiveness of many enterprises around the globe. Originally virtualization was used mostly to facilitate server consolidation, but now many other approaches present themselves. Virtualization starts during the design phase of the technical environment, when the design team considers how to support the business processes and identifies assets needed to convert the plan to reality. It is during this phase that enterprises often realize that the life cycle of provisioning the right hardware and other equipment can go on longer than expected and that there is a faster way to deploy them: by building in some abstraction from the physical world and hosting different virtual resources within the boundaries of a unique physical resource. Virtual is the opposite of physical, not of real. Virtualization is very real; it is here to stay and some new technologies such as cloud and grid computing rely on it to deliver their promise. Business Benefits of Virtualization Virtualization is here to stay and some new technologies rely on it to deliver their promise. There are many benefits of implementing virtualization within enterprise IT. Among them are: Cost reduction By consolidating many instances of (virtualized) servers onto a physical one, enterprises lower their hardware expenditures. In addition to lower capital expenditures, virtualized environments enable enterprises to save on maintenance and energy, often resulting in a reduced total cost of ownership (TCO). Automation Technology allows some virtualized environments to be provisioned as needed and on the fly, thus facilitating automation of business processes and eliminating the need to continually resource and manage portions of the technical environment that support sporadic business needs. Some virtualization technology facilitates the automatic allocation of a process for its optimal performance within a pool of virtualized environments. Responsiveness Since the virtual environment has the ability to provision itself to get the best out of available resources, response times are faster and downtimes can be reduced to near zero, improving agility and performance. Decoupling Processes that once needed to exist within the same physical machine can now be easily separated while still maintaining the robustness and security required. The different virtualized worlds (network, operating system [OS], database, application, etc.) can be decoupled (even distributed in different geographic locations) without threatening integrity within the process. Flexibility The relatively easy creation or preparation of the right environment for the right application enables enterprises to provide flexibility to the infrastructure, not only in the test or preproduction phases but also in the production area. When a new procedure or technical/business requirement arises, virtualization s ability to enable rapid creation of the environment allows the business to test the environment without having to wait for the regular provisioning process to be executed and delivered. 5

6 Agility Agility facilitates quick adaptation to business needs, such as when orders peak and additional computing power is needed. An enterprise may even choose to overcommit the resources of a physical machine since virtualization facilitates rapid movement of the different resources that live in one physical machine to other virtual machines. In this way, virtualization supports alignment with business needs. Workload balancing Deploying several virtual environments guarantees the good practices of high availability, redundancy and failover since workloads can go where they are more efficient. Thus, virtualization focuses not only on effectiveness (doing the right things) but also efficiency (doing things in a faster, cheaper and more reliable way). Simplification Virtual IT is still IT, so some of the typical IT difficulties exist even within a virtual environment. However, reducing the number of physical servers significantly reduces the probability of failure and the cost of management and results in simplification one of the promises of virtualization. Space utilization Server consolidation saves space in the data center and facilitates scalability since many servers exist within one server. Sustainability Virtualized environments use less environmental resources. Energy consumption in data centers is often wasted on machines that are consistently underutilized. Since virtualization allows for many virtual machines to run on one physical machine, less energy is needed to power and cool devices. In summary, the business benefits of virtualization can be expressed as shown in figure 1. Figure 1 Five Reasons to Virtualize Outcome How it is Achieved 1. Reduce IT complexity. Applications and their operations systems are encapsulated in virtual machines that are defined in software, making them easy to provision and manage. 2. Enable standardization. Since applications are decoupled from hardware, the data center may converge on a narrower range of hardware devices. 3. Improve agility. Applications and virtual machines can be copied and moved in real time and in the cloud in response to changing business conditions. 4. Improve cost-efficiency. Virtual machines can easily be moved to consume spare capacity wherever it exists, thus generating more work from less hardware. 5. Facilitate automation. Virtual infrastructure is easily provisioned and orchestrated by software-driven processes, especially when the underlying hardware is standardized. Risks and Security Concerns With Virtualization As with any technology, there are risks associated with virtualization. Those risks can be categorized into three groups: Attacks on virtualization infrastructure There are two primary types of attacks on virtualization infrastructure: hyperjacking and virtual machine (VM) jumping (or guest-hopping). Hyperjacking is a method of injecting a rogue hypervisor (also called virtual machine monitor [VMM]) under the legitimate infrastructure (VMM or OS) with control over all interactions between the target system and the hardware. Some examples of hyperjacking-style threats include Blue Pill, 1 SubVirt 2 and Vitriol. 3 These proofs of concept and their associated documentation illustrate various ways of attacking a system to inject rogue hypervisors under existing OSs or virtualization systems. Regular security measures are ineffective against these threats because the OS, running above the rogue hypervisor, is unaware that the machine has been compromised. To date, hyperjacking is still only a theoretical attack scenario, but it has garnered considerable press attention due to the potential damage it could cause. 1 Rutkowska, Joanna; Introducing Blue Pill, The Invisible Things Lab blog, 22 June 2006, theinvisiblethings.blogspot.com/2006/06/introducing-blue-pill.html 2 King, Samuel T.; Peter M. Chen; Yi-Min Wang; Chad Verbowski; Helen J. Wang; Jacob R. Lorch; SubVirt: Implementing Malware With Virtual Machines, 3 Dai Zovi, Dino A.; Hardware Virtualization Rootkits, 6

7 VM jumping or guest-hopping is a more realistic 4 possibility and poses just as serious a threat. This attack method typically exploits vulnerabilities in hypervisors that allow malware or remote attacks to compromise VM separation protections and gain access to other VMs, hosts or even the hypervisor itself. These attacks are often accomplished once an attacker has gained access to a low-value, thus less secure, VM on the host, which is then used as a launch point for further attacks on the system. Some examples have used two or more compromised VMs in collusion to enable a successful attack against secured VMs or the hypervisor itself. Attacks on virtualization features Although there are multiple features of virtualization that can be targeted for exploitation, the more common targets include VM migration and virtual networking functions. VM migration, if done insecurely, can expose all aspects of a given VM to both passive sniffing and active manipulation attacks. Empirical Exploitation of Live Virtual Machine Migration, by Oberheide, Cooke and Jahanian, 5 shows examples of sniffing passwords and keys from memory as well as methods of manipulating system configuration while VMs are migrated across the network. Also described is an example of injecting malware into a VM s memory on the fly. Virtualization: Enough Holes to Work Vegas, a presentation by D.J. Capelis, 6 illustrates security issues with the networking features and support typically used by virtualization infrastructures. Other networking examples include differing ways in which media access control (MAC) address assignment, local routing and layer 2 traffic may be exploited. It is important to note that the local virtualized network plane on the system works differently from the external real world network, and many of the controls and security mechanisms available on the external network do not readily apply to local traffic on the system between VMs. Compliance and management challenges Compliance auditing and enforcement, as well as day-to-day system management, are challenging issues when dealing with virtualized systems. VM sprawl introduces a challenge to the enterprise. Because VMs are much easier to provision and deploy than physical systems, the number and types of VMs can easily get out of hand. Further, VM provisioning is often administered by different groups within an organization, making it difficult for the IT function to control what applications, OSs and data are deployed to them. VM sprawl and even dormant VMs will make it a challenge to get accurate results from vulnerability assessments, patching/updates and auditing. Strategies for Addressing Virtualization Risks Currently, the best method for mitigating the threat of hyperjacking is to use hardware-rooted trust and secure launch of the hypervisor. Technologies in the processor and chipsets, along with Trusted Execution Technology (TXT) and a Trusted Platform Module (TPM), provide the ingredients necessary to execute a secure or measured launch of the system from hardware through the hypervisor (sometimes referred to as the measured launch environment, or MLE). The Trusted Computing Group (TCG) 7 has defined a set of standards for performing a hardware-based measured launch and for creating the chain of trust from Currently, the best method for mitigating the threat of hyperjacking is to use hardware-rooted trust and secure launch of the hypervisor. hardware to the MLE. Manufacturers and original equipment manufacturers (OEMs), as well as many virtualization software vendors, have adopted TCG-compliant implementations of measured launch and roots of trust. 8 Enabling and utilizing these features will help manage the risks associated with hyperjacking. Addressing risks associated with VM jumping and virtual machine migration attacks begins with remembering that the hypervisor and the guests it supports are software and, as such, need to be patched and hardened. 4 Higgins, Kelly Jackson; VMs Create Potential Risk, 21 February 2007, 5 Oberheide, Jon; Evan Cooke; Farnam Jahanian; Empirical Exploitation of Live Virtual Machine Migration, migration.pdf 6 Capelis, D.J.: Virtualization: Enough Holes to Work Vegas, Defcon 15, 7 The Trusted Computing Group, 8 Intel, Intel Trusted Execution Technology, 7

8 The use of isolation and segmentation will also greatly reduce the risks. It is effective to use physical, network and virtualization-based separation to segment VMs and systems, and to couple the separation with leveraging policy or security levels to cluster like VMs/applications together such that a low-value (and, therefore, less scrutinized) application cannot have a negative impact on high-value VMs/applications. VM segmentation can be implemented through the virtualization management infrastructure or can be accomplished manually, depending on the tools and products used. Segmentation is also an important tool in dealing with the networking risks associated with virtualization. As noted previously, separating VMs of differing security postures reduces the risk for the higher-value VMs. Additionally, the use of transport encryption is recommended for securing VM migration. Virtual private network (VPN) tunnels can be deployed system to system or, in some cases, it is possible to leverage features available from virtualization vendors or security software solutions that provide for encrypted VM migration. Solving the management and compliance challenges requires implementing virtualization-aware management products and services, as well as virtualization-aware security products. This enables the existing management infrastructure to recognize and track VMs just as it does systems and applications in the data center. There are products specifically developed for virtualization security management, and add-ons or upgrades to existing infrastructure products that provide virtualization awareness and the necessary compliance and management features. Governance and Change Issues With Virtualization The governance of enterprise IT can be defined as the process that ensures that IT aligns with business strategy and effectively furthers organizational objectives. At a simplified level, the governance of enterprise IT can be defined as the process that ensures that IT aligns with business strategy and effectively furthers organizational objectives. Just as server virtualization impacts the overall technology landscape, its increasing use impacts the governance of enterprise IT in a number of critical areas as well. That impact can be best understood by considering the various characteristics of virtualization and their potential positive or negative impacts. A common goal of efforts to govern an enterprise s IT is to ensure that IT can quickly and flexibly deliver technology solutions that support achievement of the enterprise s overall business goals. Server virtualization assists in this area because virtualization can lead to faster build and deploy times through the use of tools and technology that obviate the need to physically rack and stack when new systems are provisioned. Cost control is also central to IT governance, and virtualization can deliver in this area as well, reducing the enterprise s hardware, power and facility costs. Another common IT governance goal is to ensure business continuity through robust technology solutions that can handle and adapt to increased load and disaster scenarios. Server virtualization enables significant capabilities in these areas, providing the IT organization with previously unavailable options for flexibly scaling for load and dynamically shifting and aligning resources to respond to business continuity and disaster events. On the negative side, increased virtualization does pose some risks to the goals of IT governance. One primary risk is related to the skill sets and organizational experience available to support the use of server virtualization in missioncritical environments. While virtualization has become quite common, it is still a relatively new technology and organizations may have difficulty securing the experienced workers needed to ensure that IT is able to deliver on its goals. A related risk is associated with the roles and responsibilities involved with managing a virtualized infrastructure. Traditionally, technology has been managed by IT within various functional and technical areas, such as storage, networking, security and computers/servers. With virtualization, these lines are significantly blurred, so enterprises that embrace virtualization need to mature their support models to reap all of the benefits that virtualization can provide. 8

9 Organizational Change As with overall governance of IT, server virtualization raises a number of important questions related to IT organizational change. The first, and likely most significant, change relates to technology management and the associated support model for the virtualization layer. Virtualization introduces a new layer of technology and, with it, a new requirement for administration and management. To integrate virtualization successfully and ensure that the associated organizational change is implemented, enterprises must consider where responsibility for virtualization architecture and management will reside. Another key area of IT organizational change is the system management life cycle, from procurement and deployment to retirement and decommissioning. Historically, the deployment process has been gated by hardware ordering and procurement processes, which were predecessors to physically installing a server and releasing it into production. In some sense, this helped facilitate a controlled life cycle that was driven by checklists and processes for purchasing, physical installation, build and configuration, and production release. With virtualization, a server (or cluster of servers) can be deployed into production with a single mouse click, potentially bypassing the controls associated with traditional system life cycle management. On the positive side, the virtual system life cycle is lightweight, flexible, and entirely contained and visible in a single management infrastructure, which provides the IT organization with a cradle-to-grave view of the life cycle. IT organizations that modify operating processes to take full advantage of this agility and visibility are best equipped to maximize their investment in virtualization. When transitioning to a virtualized environment it is important for IT professionals to work with those within IT and with professionals outside of IT. When transitioning to a virtualized environment it is important for IT professionals to work with those within IT, such as security, system developers and support, and with professionals outside of IT, such as the project management office and audit. It is critical for all parties involved to understand the business process changes that occur as a result of migrating to a virtualized environment. Assurance Considerations for Virtualization The assessment process compares current-state metrics to the enterprise s standards. Recommendations for control and security standards for virtualization have been created by independent security and control professional organizations (such as ISACA and the Center for Internet Security), vendors (hypervisor vendors and those in the industry selling related goods and services), and government agencies (e.g., the US Defense Information Systems Agency Security Technical Implementation Guide [DISA STIG] for virtualization). These documents have produced a variety of benchmarks that can be used to help ensure that the enterprise s standard has appropriately addressed particular risks and no risk has been overlooked. Assessing Infrastructure Risks A mix of high- and low-tech assessment techniques can serve the auditor well in the virtualized world. Those leading virtualization deployment should have a documented strategy for ensuring that hypervisor software and hardware are compatible with the chosen hypervisor(s) requirements. The auditor should review the supporting documentation for these components to confirm the components ability to fulfill deployment agility, continuity and other items congruent with the business strategy of the enterprise. Observation of host start processes can ensure appropriate technical checks and invocation of TPM before the OS startup. It can also determine whether other pre-hypervisor (BIOS, boot-loader, etc.) steps and configurations are invoked according the enterprise s standards. Physical security may not be the newest of risk mitigation techniques, but the auditor s virtualization assessment should ensure that all related hardware is appropriately restricted regarding physical access, thereby reducing the chance of alteration of CPU boot processes. In addition, auditors should review any remote methodology that gives access to the host motherboard for remote startup to ensure that the configuration allows only authorized use. 9

10 The guest virtual machine must communicate with the host to receive and use resources. However, the host should make the final determination regarding the communication channels used and the results of requests. Assessment procedures should ensure that the hypervisor and related management tools are kept current with vendor patches so that communication and related actions take place as designed. The auditor also needs to check the configuration of the host and related management tools in accordance with the enterprise s standard (which has been compared to the industry standards mentioned previously). There are many ways to gather configuration metrics from hypervisors and other vendor management tools. Low-cost metrics gathering may include the commands at the console of the host console, vendor-developed free tools that collect metrics (although they may be limited to the number of hosts or the number of features assessed), and free application programming interfaces (APIs) and scripting tools offered by hypervisor vendors to pull information from their hosts in an automated and scheduled fashion. Marginal cost alternatives for host metrics gathering also include vendor management tools and thirdparty management or security tools, if already purchased by the enterprise. Finally, there are commercial tools of varying price ranges to discover and footprint the virtual environment. Assessing Features Risks Virtual guests move their information around the enterprise s network for production, optimization, continuity or other reasons. All network paths used should be used only by those authorized; the auditor can usually review segmentation of networks via the management console. The auditor should verify that: (1) the hosts in similar clusters and guests serviced by the same host are similarly grouped and on the correct network, (2) host management networks are separate from production networks, and (3) the virtual networks used to transfer guest resource provisioning to a different host are on yet another network segment. Furthermore, the auditor can review via the management console the segregation of guests on different hosts and networks. The auditor can review the networking configuration via the management console or by gathering host configuration data with tools mentioned previously. The auditor should review virtual switches and other virtual networking components, particularly noting whether MAC configuration and addressing; virtual local area network (VLAN) assignment, routing, protocols and encryption; and other networking information align with the enterprise s standard. Assessing Management Risks The auditor should first determine the existence and accuracy of the enterprise s IT asset inventory, including virtual items. An assumption implied in the assessment steps described previously is that the enterprise maintains an accurate inventory of known authorized components comprising its environment. To assess guest sprawl, the auditor should first determine the existence and accuracy of the enterprise s IT asset inventory, including virtual items. Once the known inventory is validated, the auditor can review management s process to detect unauthorized guests. The auditor may use commercial management or assessment tools to poll the environment and compare what is found to the authorized inventory. Since most hypervisor vendors provide APIs and scripting tools, the auditor may be able to develop his/her own discovery tools at minimal or no cost (other than time). Also, many commercial security products covering virtualization have a discovery module since they cannot protect what they do not know. If the auditor s enterprise has already purchased these types of tools, the auditor should inquire whether the discovery results may be reviewed for comparison with the authorized documented asset inventory. Tools have emerged to detect dormant guests, wake them up and correct deficiencies found before the dormant guest is reactivated. The auditor should inquire about the use of these tools, the frequency with which they are run, and their success in locating and correcting dormant guests. 10

11 Assessing Governance Risks The auditor should review management s policies, procedures and practices for: Board or executive review and approval of the virtualization strategy Postimplementation comparisons of cost savings actually achieved to amounts expected Gathering evidence that the key components of the change management process remain in place authorization, testing (including security certification to the organization standard), back-out plans and notification to affected parties and that only the time line (not functionality) for each step has been reduced by virtualization Training for staff with new virtualization responsibilities and ongoing training for existing virtualization staff when architecture changes are made or major vendor updates occur Knowledge transfer from third parties assisting with deployment Revision of role descriptions for staff whose prior technical boundary has been made less clear due to virtualization Revision of accountability for communication between previously more independent teams prior to virtualization (host, networking, storage) Inventory procedures that produce accurate documented results that facilitate licensing compliance, correct maintenance fee payments, insurance and other administrative support functions Conclusion Mitigating threats and having well-documented business processes and strong audit capabilities will help ensure that enterprises generate the highest possible value from their IT environments. Virtualization has affected the way enterprises run their IT operations. While virtualization has only recently left emergent technology status and become a more common practice, enterprises have already seen benefits to moving to virtualized environments. Those benefits include lower TCO, increased efficiency, positive impacts to sustainable IT plans and increased agility. However, enterprises must also consider the potential security risks and change implications that accompany moving to a virtualized environment. Mitigating many of these threats and having well-documented business processes and strong audit capabilities will help ensure that enterprises generate the highest possible value from their IT environments. Additional resources related to virtualization are available at 11

CLOUD GOVERNANCE: Questions Boards of Directors Need to Ask AN ISACA CLOUD VISION SERIES WHITE PAPER

CLOUD GOVERNANCE: Questions Boards of Directors Need to Ask AN ISACA CLOUD VISION SERIES WHITE PAPER AN ISACA CLOUD VISION SERIES WHITE PAPER CLOUD GOVERNANCE: Questions Boards of Directors Need to Ask Cloud computing is gaining momentum. As cloud offerings gain maturity, cloud service providers are becoming

More information

Social Media: Business Benefits and Security, Governance and Assurance Perspectives

Social Media: Business Benefits and Security, Governance and Assurance Perspectives An ISACA Emerging Technology White Paper Social Media: Business Benefits and Security, Governance and Assurance Perspectives Abstract Initiated as a consumer-oriented technology, social media is increasingly

More information

Security Information and Event Management: Business Benefits and Security, Governance and Assurance Perspectives

Security Information and Event Management: Business Benefits and Security, Governance and Assurance Perspectives An ISACA Emerging Technology White Paper Security Information and Event Management: Business Benefits and Security, Governance and Assurance Perspectives Abstract In today s information-driven business

More information

Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives

Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives An ISACA Emerging Technology White Paper Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives Abstract Globalization and recent economic pressures have resulted in increased

More information

INFORMATION SECURITY CAREER PROGRESSION S U R V E Y R E S U LTS

INFORMATION SECURITY CAREER PROGRESSION S U R V E Y R E S U LTS INFORMATION SECURITY CAREER PROGRESSION S U R V E Y R E S U LTS ISACA With more than 75,000 members in more than 160 countries, ISACA (www.isaca.org) is a recognized worldwide leader in IT governance,

More information

Data Leak Prevention. An ISACA White Paper

Data Leak Prevention. An ISACA White Paper An ISACA White Paper Data Leak Prevention Abstract Data leak prevention (DLP) is a suite of technologies aimed at stemming the loss of sensitive information that occurs in enterprises across the globe.

More information

Microsoft SQL Server Database Audit/Assurance Program

Microsoft SQL Server Database Audit/Assurance Program Microsoft SQL Server Database Audit/Assurance Program ISACA With 95,000 constituents in 160 countries, ISACA (www.isaca.org) is a leading global provider of knowledge, certifications, community, advocacy

More information

Virtualization System Security

Virtualization System Security Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability

More information

Control your corner of the cloud.

Control your corner of the cloud. Chapter 1 of 5 Control your corner of the cloud. From the halls of government to the high-rise towers of the corporate world, forward-looking organizations are recognizing the potential of cloud computing

More information

W H I T E P A P E R E n a b l i n g D a t a c e n t e r A u t o mation with Virtualized Infrastructure

W H I T E P A P E R E n a b l i n g D a t a c e n t e r A u t o mation with Virtualized Infrastructure W H I T E P A P E R E n a b l i n g D a t a c e n t e r A u t o mation with Virtualized Infrastructure Sponsored by: VMware Tim Grieser August 2008 IDC OPINION Global Headquarters: 5 Speen Street Framingham,

More information

Mitigating Information Security Risks of Virtualization Technologies

Mitigating Information Security Risks of Virtualization Technologies Mitigating Information Security Risks of Virtualization Technologies Toon-Chwee, Wee VMWare (Hong Kong) 2009 VMware Inc. All rights reserved Agenda Virtualization Overview Key Components of Secure Virtualization

More information

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has

More information

Demystifying Virtualization for Small Businesses Executive Brief

Demystifying Virtualization for Small Businesses Executive Brief Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................

More information

G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING

G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING IS AUDITING GUIDELINE G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply

More information

CRISC is a trademark/service mark of ISACA. The mark has been applied for or registered in countries throughout the world.

CRISC is a trademark/service mark of ISACA. The mark has been applied for or registered in countries throughout the world. ISACA Model Curriculum for IS Audit and Control, 3 rd Edition ISACA With 95,000 constituents in 10 countries, ISACA (www.isaca.org) is a leading global provider of knowledge, certifications, community,

More information

W H I T E P A P E R A u t o m a t i n g D a t a c e n t e r M a nagement: Consolidating Physical and Virtualized Infrastructures

W H I T E P A P E R A u t o m a t i n g D a t a c e n t e r M a nagement: Consolidating Physical and Virtualized Infrastructures W H I T E P A P E R A u t o m a t i n g D a t a c e n t e r M a nagement: Consolidating Physical and Virtualized Infrastructures Sponsored by: HP Stephen Elliot April 2008 IDC OPINION Global Headquarters:

More information

Virtualization Essentials

Virtualization Essentials Virtualization Essentials Table of Contents Introduction What is Virtualization?.... 3 How Does Virtualization Work?... 4 Chapter 1 Delivering Real Business Benefits.... 5 Reduced Complexity....5 Dramatically

More information

A Look at the New Converged Data Center

A Look at the New Converged Data Center Organizations around the world are choosing to move from traditional physical data centers to virtual infrastructure, affecting every layer in the data center stack. This change will not only yield a scalable

More information

CA Cloud Overview Benefits of the Hyper-V Cloud

CA Cloud Overview Benefits of the Hyper-V Cloud Benefits of the Hyper-V Cloud For more information, please contact: Email: sales@canadianwebhosting.com Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter

More information

Taking control of the virtual image lifecycle process

Taking control of the virtual image lifecycle process IBM Software Thought Leadership White Paper March 2012 Taking control of the virtual image lifecycle process Putting virtual images to work for you 2 Taking control of the virtual image lifecycle process

More information

Learn the Essentials of Virtualization Security

Learn the Essentials of Virtualization Security Learn the Essentials of Virtualization Security by Dave Shackleford by Dave Shackleford This paper is the first in a series about the essential security issues arising from virtualization and the adoption

More information

Evolution from the Traditional Data Center to Exalogic: An Operational Perspective

Evolution from the Traditional Data Center to Exalogic: An Operational Perspective An Oracle White Paper July, 2012 Evolution from the Traditional Data Center to Exalogic: 1 Disclaimer The following is intended to outline our general product capabilities. It is intended for information

More information

Unisys ClearPath Forward Fabric Based Platform to Power the Weather Enterprise

Unisys ClearPath Forward Fabric Based Platform to Power the Weather Enterprise Unisys ClearPath Forward Fabric Based Platform to Power the Weather Enterprise Introducing Unisys All in One software based weather platform designed to reduce server space, streamline operations, consolidate

More information

Overcoming Security Challenges to Virtualize Internet-facing Applications

Overcoming Security Challenges to Virtualize Internet-facing Applications Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing

More information

Secure your Virtual World with Cyberoam

Secure your Virtual World with Cyberoam White paper Secure your Virtual World with Cyberoam www.cyberoam.com Virtualization The Why and the What... Rising Data Center costs... Ever-increasing demand for data storage... Under-utilized processors...

More information

How To Protect Your Cloud From Attack

How To Protect Your Cloud From Attack A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to

More information

G11 EFFECT OF PERVASIVE IS CONTROLS

G11 EFFECT OF PERVASIVE IS CONTROLS IS AUDITING GUIDELINE G11 EFFECT OF PERVASIVE IS CONTROLS The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply specifically

More information

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE VMware Security Briefing Rob Randell, CISSP Senior Security Specialist SE Agenda Security Advantages of Virtualization Security Concepts in Virtualization Architecture Operational Security Issues with

More information

Learn the essentials of virtualization security

Learn the essentials of virtualization security Learn the essentials of virtualization security White Paper Table of Contents 3 Introduction 4 Hypervisor connectivity and risks 4 Multi-tenancy risks 5 Management and operational network risks 5 Storage

More information

REDEFINE SIMPLICITY TOP REASONS: EMC VSPEX BLUE FOR VIRTUALIZED ENVIRONMENTS

REDEFINE SIMPLICITY TOP REASONS: EMC VSPEX BLUE FOR VIRTUALIZED ENVIRONMENTS REDEFINE SIMPLICITY AGILE. SCALABLE. TRUSTED. TOP REASONS: EMC VSPEX BLUE FOR VIRTUALIZED ENVIRONMENTS Redefine Simplicity: Agile, Scalable and Trusted. Mid-market and Enterprise customers as well as Managed

More information

An Oracle White Paper November 2010. Oracle Real Application Clusters One Node: The Always On Single-Instance Database

An Oracle White Paper November 2010. Oracle Real Application Clusters One Node: The Always On Single-Instance Database An Oracle White Paper November 2010 Oracle Real Application Clusters One Node: The Always On Single-Instance Database Executive Summary... 1 Oracle Real Application Clusters One Node Overview... 1 Always

More information

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com 1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption

More information

TECHNOLOGYBRIEF. The Impact of Virtualization on Network Security. Discover. Determine. Defend.

TECHNOLOGYBRIEF. The Impact of Virtualization on Network Security. Discover. Determine. Defend. The Impact of Virtualization on Network Security Discover. Determine. Defend. EXECUTIVE SUMMARY Virtualization is a concept that has become highly visible in the last few years because of its perceived

More information

Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms

Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms Intel Cloud Builders Guide Intel Xeon Processor 5600 Series Parallels* Security Monitoring and Service Catalog for Public Cloud VPS Services Parallels, Inc. Intel Cloud Builders Guide: Cloud Design and

More information

Why a Server Infrastructure Refresh Now and Why Dell?

Why a Server Infrastructure Refresh Now and Why Dell? Why a Server Infrastructure Refresh Now and Why Dell? In This Paper Outdated server infrastructure contributes to operating inefficiencies, lost productivity, and vulnerabilities Worse, existing infrastructure

More information

Securing the Intelligent Network

Securing the Intelligent Network WHITE PAPER Securing the Intelligent Network Securing the Intelligent Network New Threats Demand New Strategies The network is the door to your organization for both legitimate users and would-be attackers.

More information

IS Standards, Guidelines and Procedures for Auditing and Control Professionals

IS Standards, Guidelines and Procedures for Auditing and Control Professionals IS Standards, Guidelines and Procedures for Auditing and Control Professionals Code of Professional Ethics IS Auditing Standards, Guidelines and Procedures IS Control Professionals Standards Current as

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration White Paper Published: August 09 This is a preliminary document and may be changed substantially prior to final commercial release of the software described

More information

Executive Snapshot. Production server virtualization impact on IT service management procedures and controls. Research Report Summary

Executive Snapshot. Production server virtualization impact on IT service management procedures and controls. Research Report Summary Executive Snapshot Production server virtualization impact on IT service management procedures and controls Research Report Summary This executive snapshot is a summary of the IT Process Institute server

More information

Auditors Need to Know June 13th, 2012. ISACA COBIT 5 for Assurance

Auditors Need to Know June 13th, 2012. ISACA COBIT 5 for Assurance COBIT 5 What s New, What Auditors Need to Know June 13th, 2012 Anthony Noble Viacom Inc. ISACA COBIT 5 for Assurance Task Force Chair Special thanks to Derek Oliver & ISACA for supplying material for this

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed

More information

GUIDELINE. on SERVER CONSOLIDATION and VIRTUALISATION. National Computer Board, 7th Floor Stratton Court, La Poudriere Street, Port Louis

GUIDELINE. on SERVER CONSOLIDATION and VIRTUALISATION. National Computer Board, 7th Floor Stratton Court, La Poudriere Street, Port Louis GUIDELINE on SERVER CONSOLIDATION and VIRTUALISATION National Computer Board, 7th Floor Stratton Court, La Poudriere Street, Port Louis Introduction There is an ever increasing need for both organisations

More information

Network Access Control in Virtual Environments. Technical Note

Network Access Control in Virtual Environments. Technical Note Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved

More information

Securing Virtual Applications and Servers

Securing Virtual Applications and Servers White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating

More information

International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 ISSN 2278-7763

International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 ISSN 2278-7763 International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 VIRTUALIZATION Vikas Garg Abstract: The main aim of the research was to get the knowledge of present trends

More information

THE INS AND OUTS OF CLOUD COMPUTING

THE INS AND OUTS OF CLOUD COMPUTING THE INS AND OUTS OF CLOUD COMPUTING and Its Impact on the Network April 2010 Rev. A 04/10 SPIRENT 1325 Borregas Avenue Sunnyvale, CA 94089 USA Email: Web: sales@spirent.com http://www.spirent.com AMERICAS

More information

HBA Virtualization Technologies for Windows OS Environments

HBA Virtualization Technologies for Windows OS Environments HBA Virtualization Technologies for Windows OS Environments FC HBA Virtualization Keeping Pace with Virtualized Data Centers Executive Summary Today, Microsoft offers Virtual Server 2005 R2, a software

More information

THOUGHT LEADERSHIP. Journey to Cloud 9. Navigating a path to secure cloud computing. Alastair Broom Solutions Director, Integralis

THOUGHT LEADERSHIP. Journey to Cloud 9. Navigating a path to secure cloud computing. Alastair Broom Solutions Director, Integralis Journey to Cloud 9 Navigating a path to secure cloud computing Alastair Broom Solutions Director, Integralis March 2012 Navigating a path to secure cloud computing 2 Living on Cloud 9 Cloud computing represents

More information

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server

More information

Citrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. citrix.com

Citrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. citrix.com Citrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. 2 While the core server virtualization market has matured, virtualization itself is seeing

More information

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation

More information

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects

More information

STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA STATE OF NORTH CAROLINA INFORMATION SYSTEMS AUDIT OFFICE OF INFORMATION TECHNOLOGY SERVICES INFORMATION TECHNOLOGY GENERAL CONTROLS OCTOBER 2014 OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA STATE AUDITOR

More information

How To Protect A Virtual Desktop From Attack

How To Protect A Virtual Desktop From Attack Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R O r a c l e V i r t u a l N e t w o r k i n g D e l i v e r i n g F a b r i c

More information

How To Protect Virtualized Data From Security Threats

How To Protect Virtualized Data From Security Threats S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust

More information

Taking the Leap to Virtualization

Taking the Leap to Virtualization WHITE PAPER: TAKING THE LEAP TO VIRTUALIZATION........................................ Taking the Leap to Virtualization Who should read this paper Midsized Business IT Directors, IT Managers and IT Administration

More information

Top virtualization security risks and how to prevent them

Top virtualization security risks and how to prevent them E-Guide Top virtualization security risks and how to prevent them There are multiple attack avenues in virtual environments, but this tip highlights the most common threats that are likely to be experienced

More information

About the VM-Series Firewall

About the VM-Series Firewall About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/

More information

Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization

Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization www.redhat.com Table of contents Introduction Page 3 Benefits of virtualization Page 3 Virtualization challenges

More information

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions AMD DAS (DASH, AMD Virtualization (AMD-V ) Technology, and Security) 1.0 is a term used to describe the various

More information

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer kklemperer@blackboard.com Agenda Session Length:

More information

the limits of your infrastructure. How to get the most out of virtualization

the limits of your infrastructure. How to get the most out of virtualization the limits of your infrastructure. How to get the most out of virtualization Business white paper Table of contents Executive summary...4 The benefits of virtualization?...4 How people and processes add

More information

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.

More information

Data Center Networking Managing a Virtualized Environment

Data Center Networking Managing a Virtualized Environment Data Center Networking Managing a Virtualized Environment There is nothing more important than our customers. Data Center Networking Managing a Virtualized Environment Introduction There is an industry-wide

More information

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation

More information

Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration

Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration Part I of an ebook series of cloud infrastructure and platform fundamentals not to be avoided when preparing

More information

Altiris Server Management Suite 7.1 from Symantec

Altiris Server Management Suite 7.1 from Symantec Altiris Server Suite 7.1 from Symantec Standardized control for distributed, heterogeneous server environments Data Sheet: Endpoint Overview The complexity of managing today s data centers is complicated

More information

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL

More information

What is Virtualization and How Do I Audit It? Rick Schnierer and Chris Tennant

What is Virtualization and How Do I Audit It? Rick Schnierer and Chris Tennant What is Virtualization and How Do I Audit It? Rick Schnierer and Chris Tennant Nationwide Insurance Learning Objectives Understand the fundamentals of virtualization and supporting architecture Develop

More information

IT Control Objectives

IT Control Objectives IT Control Objectives for Cloud Computing: Controls and Assurance in the Cloud 2 IT Control Objectives for Cloud Computing ISACA With 95,000 constituents in 160 countries, ISACA (www.isaca.org) is a leading

More information

The role of Access and Control in DCIM

The role of Access and Control in DCIM Data Center Infrastructure Management for System Administrators The role of Access and Control in DCIM Table of Contents 1. Executive Summary... 3 2. Server Access & Control... 4 2.1 Remote Access Tools

More information

Hardware-Assisted Workspace Virtualization RingCube vdesk on Intel Core vpro Processors

Hardware-Assisted Workspace Virtualization RingCube vdesk on Intel Core vpro Processors Hardware-Assisted Workspace Virtualization RingCube vdesk on Intel Core vpro Processors About the Authors Dr. Charlton Barreto Platform Architect Intel Corporation Charlton Barreto is a member of Intel

More information

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization

More information

Introducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland

Introducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland Introducing Markus Erlacher Technical Solution Professional Microsoft Switzerland Overarching Release Principles Strong emphasis on hardware, driver and application compatibility Goal to support Windows

More information

The Business Case Migration to Windows Server 2012 R2 with Lenovo Servers

The Business Case Migration to Windows Server 2012 R2 with Lenovo Servers The Business Case Migration to Windows Server 2012 R2 with Lenovo Servers New levels of integration and capabilities provide the foundation for building more successful businesses with this new infrastructure

More information

The Cloud, Virtualization, and Security

The Cloud, Virtualization, and Security A Cloud: Large groups of remote servers that are networked to allow centralized, shared data storage and online access to computer services or resources A Cloud: Large groups of remote servers that are

More information

Managing Traditional Workloads Together with Cloud Computing Workloads

Managing Traditional Workloads Together with Cloud Computing Workloads Managing Traditional Workloads Together with Cloud Computing Workloads Table of Contents Introduction... 3 Cloud Management Challenges... 3 Re-thinking of Cloud Management Solution... 4 Teraproc Cloud

More information

What s New with VMware Virtual Infrastructure

What s New with VMware Virtual Infrastructure What s New with VMware Virtual Infrastructure Virtualization: Industry-Standard Way of Computing Early Adoption Mainstreaming Standardization Test & Development Server Consolidation Infrastructure Management

More information

VMware ESXi 3.5 update 2

VMware ESXi 3.5 update 2 VMware ESXi 3.5 update 2 VMware ESXi 3.5 Exec Summary What is it? What does it do? What is unique? Who can use it? How do you use it? Next generation, thin hypervisor for FREE Partitions servers to create

More information

Leveraging a Maturity Model to Achieve Proactive Compliance

Leveraging a Maturity Model to Achieve Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance White Paper: Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance Contents Introduction............................................................................................

More information

How Customers Are Cutting Costs and Building Value with Microsoft Virtualization

How Customers Are Cutting Costs and Building Value with Microsoft Virtualization How Customers Are Cutting Costs and Building Value with Microsoft Virtualization Introduction The majority of organizations are incorporating virtualization into their IT infrastructures because of the

More information

Oracle On Demand Infrastructure: Virtualization with Oracle VM. An Oracle White Paper November 2007

Oracle On Demand Infrastructure: Virtualization with Oracle VM. An Oracle White Paper November 2007 Oracle On Demand Infrastructure: Virtualization with Oracle VM An Oracle White Paper November 2007 Oracle On Demand Infrastructure: Virtualization with Oracle VM INTRODUCTION Oracle On Demand Infrastructure

More information

Virtualization. Dr. Yingwu Zhu

Virtualization. Dr. Yingwu Zhu Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the

More information

Windows Server Virtualization & The Windows Hypervisor

Windows Server Virtualization & The Windows Hypervisor Windows Server Virtualization & The Windows Hypervisor Brandon Baker Lead Security Engineer Windows Kernel Team Microsoft Corporation Agenda - Windows Server Virtualization (WSV) Why a hypervisor? Quick

More information

VirtualclientTechnology 2011 July

VirtualclientTechnology 2011 July WHAT S NEW IN VSPHERE VirtualclientTechnology 2011 July Agenda vsphere Platform Recap vsphere 5 Overview Infrastructure Services Compute, Storage, Network Applications Services Availability, Security,

More information

How To Make A Virtual Machine Aware Of A Network On A Physical Server

How To Make A Virtual Machine Aware Of A Network On A Physical Server VMready Virtual Machine-Aware Networking White Paper Table of Contents Executive Summary... 2 Current Server Virtualization Environments... 3 Hypervisors... 3 Virtual Switches... 3 Leading Server Virtualization

More information

Understanding & Improving Hypervisor Security

Understanding & Improving Hypervisor Security The Essentials Series: Security Concerns & Solutions Understanding & Improving Hypervisor Security sponsored by by Greg Shields Understanding & Improving Hypervisor Security...1 What Is the Hypervisor?...1

More information

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)

More information

Network Virtualization Solutions - A Practical Solution

Network Virtualization Solutions - A Practical Solution SOLUTION GUIDE Deploying Advanced Firewalls in Dynamic Virtual Networks Enterprise-Ready Security for Network Virtualization 1 This solution guide describes how to simplify deploying virtualization security

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Expert Overview of Costs, Trends and More

Expert Overview of Costs, Trends and More TechTarget Data Center Media E-Guide Server Virtualization: Expert Overview of Costs, Trends and More Successful virtualization initiatives require IT pros to have a comprehensive understanding of both

More information

McAfee epolicy Orchestrator * Deep Command *

McAfee epolicy Orchestrator * Deep Command * SOLUTION BLUEPRINT IT SECURITY MANAGEMENT McAfee epolicy Orchestrator * Deep Command * Industry IT security management across industries Business Challenge Comprehensive security management solution allowing

More information

SOFTWARE DEFINED NETWORKING

SOFTWARE DEFINED NETWORKING SOFTWARE DEFINED NETWORKING Bringing Networks to the Cloud Brendan Hayes DIRECTOR, SDN MARKETING AGENDA Market trends and Juniper s SDN strategy Network virtualization evolution Juniper s SDN technology

More information

Virtualization, SDN and NFV

Virtualization, SDN and NFV Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,

More information

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION

More information

IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet

IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet IBM PowerSC Security and compliance solution designed to protect virtualized datacenters Highlights Simplify security management and compliance measurement Reduce administration costs of meeting compliance

More information

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery

More information