Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Hyper-V Security

You're reading from   Hyper-V Security Secure your Hyper-V hosts, their guests, and critical services from intruders and malware

Arrow left icon
Product type Paperback
Published in Dec 2014
Publisher Packt
ISBN-13 9781782175490
Length 184 pages
Edition 1st Edition
Tools
Arrow right icon
Authors (2):
Arrow left icon
Andy Syrewicze Andy Syrewicze
Author Profile Icon Andy Syrewicze
Andy Syrewicze
Eric Siron Eric Siron
Author Profile Icon Eric Siron
Eric Siron
Arrow right icon
View More author details
Toc

Table of Contents (10) Chapters Close

Preface 1. Introducing Hyper-V Security FREE CHAPTER 2. Securing the Host 3. Securing Virtual Machines from the Hypervisor 4. Securing Virtual Machines 5. Securing the Network 6. Securing Hyper-V Storage 7. Hyper-V Security and System Center VMM 8. Secure Hybrid Cloud Management through App Controller Index

A starting point to security

Now that you have some idea of what you're up against, you can start thinking of how you want to approach the problems. The easiest thing to do is look over the preceding items and identify what your current configuration is weakest against. You'll also want to identify what your organization considers the most important points and data to protect. Once that's done, it's a good idea to perform some sort of an inventory in an attempt to discover sensitive points that may not have made the list for some reason or another. Sometimes, this can be done simply by asking questions such as "What would the impact be if someone saw that file?".

At all times, it's important to remember that there is no way a system can be truly secured without making it completely inaccessible to anyone. If even one person can get into the system, it's also possible for someone else. Computer security is not a one-time event; it is an ongoing process of re-evaluation.

It's also important to remember that computers are just machines. No matter how advanced the hardware and software is, the computer does not think. If an instruction makes it all the way to the CPU, it won't stop to ponder if the user or program that submitted it should be allowed to do so. It won't consider the moral implications of carrying out the instruction. It will simply do as it's told. Security is a human endeavor.

This book advocates both for taking specific steps to secure specific systems and for a defense in depth approach. The defense in depth style recognizes that not all attacks can be known or planned for in advance, so it attempts to mitigate them by using a layered strategy. If the firewall is penetrated, an internal network access control list may halt a break-in. If that doesn't work, intrusion prevention software may stop the attack. If that also fails, a simple password challenge may keep the intruder out.

You have been reading a chapter from
Hyper-V Security
Published in: Dec 2014
Publisher: Packt
ISBN-13: 9781782175490
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime