O'Reilly logo

Virtualization Security: Protecting Virtualized Environments by Dave Shackleford

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5

Virtualization Management and Client Security

The management servers and clients connecting to virtual infrastructures can also be points of potential exposure. The security issues cover a wide spectrum—access to privileged accounts, excessive privileges and permissions, operating system hardening, network access controls, and issues with the management platforms and connectivity to them. Security best practices play a big role in locking down management platforms, and there are a few specific steps to keep in mind that go beyond the basics.

The good news is that by following some simple best practices related to database installation, local users, secure connectivity, and hardening and securing the OS, you can greatly improve the security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required