Virtualization and Risk – Key Security Considerations for your Enterprise Architecture Taking a structured and systematic view of the impact of hardware virtualization on IT risk management
نویسنده
چکیده
As virtualization technology gains a stronger foothold in IT departments, many questions are being raised: " How will this technology affect my existing security posture? " ; " What new concerns need to be addressed to mitigate this risk? " and " What elements of risk does virtualization share with physical deployments? " As you would expect, there is no one size fits all solution to security, let alone one that can be extrapolated for virtualization technology. This white paper takes a pragmatic view of the different components of virtualization technologies and provides a perspective on how enterprises that are looking to deploy such technologies should think about their threat profile. It describes the people, process, and technology concerns that should be addressed before a full-scale deployment is undertaken. And finally, it provides some food for thought about the road ahead as this technology becomes more widespread.
منابع مشابه
Protect what you value. Virtualization and Risk: Key Security Considerations for Your Enterprise Architecture Taking a structured and systematic view of the impact of hardware virtualization on IT risk management
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....
متن کاملCritical Success Factors for Data Virtualization: A Literature Review
Data Virtualization (DV) has become an important method to store and handle data cost-efficiently. However, it is unclear what kind of data and when data should be virtualized or not. We applied a design science approach in the first stage to get a state of the art of DV regarding data integration and to present a concept matrix. We extend the knowledge base with a systematic literature review ...
متن کاملEnergy Aware Resource Management of Cloud Data Centers
Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a large part of the IT industry, making software even more attractive as a service and shaping the way IT hardware is designed and purchased. Virtualization technology forms a key concept for new cloud computing architectures. The data centers are used to provide cloud services burdening a significant...
متن کاملEnterprise Risk Management and Performance of Financial Institutions in Iraq: The Mediating Effect of Information Technology Quality
Enterprise risk management represents a process of assessing exposure to risks in an institution. It is a systematic mechanism and a comprehensive tool for predicting events, including unexpected events, and their impacts. This paper is a conceptual study. It aims at designing a model for testing the mediation effect of information technology (IT) quality on the relationship between the enterpr...
متن کاملVirtualization Based Security Framework (vBASE)
In general, computer security aims at providing confidentiality, integrity and availability to computing systems. Traditionally, researchers in the fields of computer security have used software and hardware mechanisms for implementing security in computing systems. Software only security approaches typically deal with application level and Operating System (OS) level security mechanisms. Thoug...
متن کامل