Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor

Free White Paper Available On Benefits Of Virtualisation

ISACA : 06 December, 2010  (Technical Article)
ISACA issues technical document that examines both the benefits and challenges associated with implementing a virtual environment and how to minimize risks during implementation
With its potential to reduce expenses, drive automation and provide flexibility, virtualization has earned its way onto the board agenda and is being implemented by enterprises worldwide. But with the many benefits of virtualization come considerable risks. Global IT association ISACA provides a balanced look at virtualization—and strategies to help enterprises maximize the value—in a new white paper available for free download from the ISACA web site.

According to the "Virtualization: Benefits and Challenges" white paper, virtualization risks can be divided into three groups:

* Attacks on virtualization infrastructure—The two primary types are hyperjacking and virtual machine (VM) jumping. Hyperjacking is still a theoretical attack scenario, but has earned significant attention because of the major damage it can potentially cause.
* Attacks on virtualization features—The more common targets include VM migration and virtual networking functions.
* Compliance and management challenges—The number and types of VM can easily get out of hand; VM sprawl and dormant VMs make it a challenge to get accurate results from vulnerability assessments, patching/updates and auditing.

To combat these risks, ISACA recommends the following:

1 Patch and harden the hypervisor and the guests it supports.
2 Use physical, network and virtualization-based separation to segment VMs and systems.
3 Use transport encryption to secure VM migration.
4 Implement virtualization-aware management products and services.

"Virtualization has recently become a more common practice and enterprises are already realizing cost savings and efficiencies by moving to virtualized environments," said Ramsés Gallego, CISM, CGEIT, CISSP, an author of the white paper and general manager at Entel IT Consulting. "However, to achieve this value, enterprises must consider the potential security risks and governance considerations. Having well-documented business processes and strong audit capabilities will help ensure the best possible value."

To download a free copy of "Virtualization: Benefits and Challenges" and a virtualization security checklist from HyTrust, visit the ISACA website.
Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo