O'Reilly logo

IT Auditing: Using Controls to Protect Information Assets by Kevin Wheeler, Mike Schiller, Chris Davis

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 11Auditing Virtualized Environments

Innovations in operating system virtualization and server hardware permanently changed the footprint, architecture, and operations of data centers. This chapter discusses auditing virtualized environments, and begins with an overview of common virtualization technologies and key controls. The virtualization audit combines the concerns of the hypervisor and the guest operating systems. Although the focus of this chapter is the hypervisor and server virtualization, you can apply many of the same steps and concepts to desktop virtualization. We make the assumption that these system components are under your control. You should reference Chapter 14, “Auditing Cloud Computing and Outsourced Operations” for ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required