Chapter 11

Additional Security Considerations for Virtual Infrastructure

This chapter will explore several different areas of virtualization, with some general security guidelines and considerations for each. The first area that will be covered is desktop virtualization. More and more organizations are investigating virtual desktop technologies as their existing workstations and laptops grow obsolete. There are a number of use cases that make sense for some organizations, and security concerns and challenges will vary from one to the next. The second area that we'll cover in this chapter is storage virtualization and the security concepts and controls that administrators need to be aware of within their storage environments. Finally, this chapter ...

Get Virtualization Security: Protecting Virtualized Environments now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.