Given all the talk about Hyper-V, I have some security questions, but so far, not many good answers. Hyper-V’s current security is dependent upon the security of Windows 2008 Server. Sounds like a hosted solution to me, even though Hyper-V is a type 1 hypervisor—which is designed to run on bare metal and therefore be completely independent of the operating system itself. So why does Hyper-V depend on Windows 2008 Server security? What zero-day attacks will cause heart-ache for all adopters? Can they be prevented?And which boots first? If it is Hyper-V, then 2008 should run within a VM, but does it? If Windows 2008 Server crashes or is forced to crash by something malicious, will all the VMs running upon it also come tumbling down? SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe Does 2008 act as a management appliance, or is it something more that is essential to the running of Hyper-V? Can it run without it? The Hyper-V virtual switch is actually a bridge, not a Layer-2 Switch, so any VM on the bridge can be seen by any other VM. How many bridges is it possible to create? Since it is a bridge, and Windows 2008 Server plays a role in bridging, can Windows Server 2008 see every packet as it goes across the bridge? You should definitely put one before your Server 2008 instance to protect it from attack. But if Server 2008 participates in all the bridging, how can you protect it from the VMs? From a storage perspective, can disks that store VMs be encrypted, and can Hyper-V work with these?Can VMs be placed on USB storage? What happens when the storage is taken away when a VM is running?How do you handle forensics of a Hyper-V VM? Can they be killed as if you were pulling the plug? Is this hampered by the lack of any ability to migrate live VMs? These questions aren’t limited to Hyper-V. Most of Microsoft’s virtualization competitors have already faced these questions, and answered most of them. It does show how long a list of questions are still unanswered about Hyper-V security, though, and that it’s Microsoft’s turn to be behind the virtual security eight-ball. Virtualization expert Edward L. Haletky is the author of “VMWare ESX Server in the Enterprise: Planning and Securing Virtualization Servers,” Pearson Education (2008.) He recently left Hewlett-Packard, where he worked in the Virtualization, Linux, and High-Performance Technical Computing teams. Haletky owns AstroArch Consulting, providing virtualization, security, and network consulting and development. Haletky is also a champion and moderator for the VMware discussion forums, providing answers to security and configuration questions. Related content opinion Four questions for a casino InfoSec director By Beth Kormanik Sep 21, 2023 3 mins Media and Entertainment Industry Events Security brandpost Four Leadership Motions make leading transformative work easier The Four Leadership Motions can be extremely beneficial —they don’t just drive results among software developers, they help people make extraordinary progress wherever they lead. By Jason Fraser, Director, Product Management & Design, VMware Tanzu Labs, Public Sector Sep 21, 2023 5 mins IT Leadership feature The year’s top 10 enterprise AI trends — so far In 2022, the big AI story was the technology emerging from research labs and proofs-of-concept, to it being deployed throughout enterprises to get business value. This year started out about the same, with slightly better ML algorithms and improved d By Maria Korolov Sep 21, 2023 16 mins Machine Learning Artificial Intelligence opinion 6 deadly sins of enterprise architecture EA is a complex endeavor made all the more challenging by the mistakes we enterprise architects can’t help but keep making — all in an honest effort to keep the enterprise humming. By Peter Wayner Sep 21, 2023 9 mins Enterprise Architecture IT Strategy Software Development Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe