Summary

The security and information that assurance administrators can realistically provide is clearly never as exhaustive as it is exhausting.

In the first section of this chapter, you learned that hardware virtualization has inherent security benefits.

However, you also learned that many promising benefits are undermined if they're not supported by thorough planning of the virtual infrastructure, explicit policy-making up front, and a flawless deployment, all followed by unflagging policy enforcement and ongoing virtual server lifecycle management.

We then outlined threats that are either unique to virtualized infrastructures or aggravated in the context of virtualization. Each point was followed by either concrete action to mitigate the threat ...

Get Learning Proxmox VE now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.