You are previewing Virtualization Security: Protecting Virtualized Environments.
O'Reilly logo
Virtualization Security: Protecting Virtualized Environments

Book Description

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices, and strategies used for securing physical environments do not provide sufficient protection for virtual environments. This book includes step-by-step configurations for the security controls that come with the three leading hypervisor--VMware vSphere and ESXi, Microsoft Hyper-V on Windows Server 2008, and Citrix XenServer.

  • Includes strategy for securely implementing network policies and integrating virtual networks into the existing physical infrastructure

  • Discusses vSphere and Hyper-V native virtual switches as well as the Cisco Nexus 1000v and Open vSwitch switches

  • Offers effective practices for securing virtual machines without creating additional operational overhead for administrators

  • Contains methods for integrating virtualization into existing workflows and creating new policies and processes for change and configuration management so that virtualization can help make these critical operations processes more effective

This must-have resource offers tips and tricks for improving disaster recovery and business continuity, security-specific scripts, and examples of how Virtual Desktop Infrastructure benefits security.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Publisher's Note
  5. Dedication
  6. Acknowledgments
  7. About the Author
  8. Introduction
  9. Chapter 1: Fundamentals of Virtualization Security
    1. Virtualization Architecture
    2. Threats to a Virtualized Environment
    3. How Security Must Adapt to Virtualization
  10. Chapter 2: Securing Hypervisors
    1. Hypervisor Configuration and Security
    2. Configuring VMware ESXi
    3. Configuring Microsoft Hyper-V on Windows Server 2008
    4. Configuring Citrix XenServer
  11. Chapter 3: Designing Virtual Networks for Security
    1. Comparing Virtual and Physical Networks
    2. Virtual Network Security Considerations
    3. Configuring Virtual Switches for Security
    4. Integrating with Physical Networking
  12. Chapter 4: Advanced Virtual Network Operations
    1. Network Operational Challenges
    2. Network Operations in VMware vSphere
    3. Network Operations in Microsoft Hyper-V
    4. Network Operations in Citrix XenServer
  13. Chapter 5: Virtualization Management and Client Security
    1. General Security Recommendations for Management Platforms
    2. Network Architecture for Virtualization Management Servers
    3. VMware vCenter
    4. Microsoft System Center Virtual Machine Manager
    5. Citrix XenCenter
  14. Chapter 6: Securing the Virtual Machine
    1. Virtual Machine Threats and Vulnerabilities
    2. Virtual Machine Security Research
    3. Locking Down VMware VMs
    4. Locking Down Microsoft VMs
    5. Locking Down XenServer VMs
  15. Chapter 7: Logging and Auditing
    1. Why Logging and Auditing Is Critical
    2. Virtualization Logs and Auditing Options
    3. Integrating with Existing Logging Platforms
    4. Effective Log Management
  16. Chapter 8: Change and Configuration Management
    1. Change and Configuration Management Overview
    2. How Virtualization Impacts Change and Configuration Management
    3. Best Practices for Virtualization Configuration Management
    4. Cloning and Templates for Improved Configuration Management
    5. Integrating Virtualization into Change and Management
    6. Additional Solutions and Tools
  17. Chapter 9: Disaster Recovery and Business Continuity
    1. Disaster Recovery and Business Continuity Today
    2. Shared Storage and Replication
    3. Virtualization Redundancy and Fault Tolerance for DR/BCP
    4. High Availability and Fault Tolerance
  18. Chapter 10: Scripting Tips and Tricks for Automation
    1. Why Scripting Is Essential for Admins
    2. VMware Scripting: Power CLI and vCLI
    3. Microsoft Scripting for Hyper-V: PowerShell
    4. Citrix Scripting: Shell Scripts
  19. Chapter 11: Additional Security Considerations for Virtual Infrastructure
    1. VDI Overview
    2. Leveraging VDI for Security
  20. Index