Virtualization security guru Chris Whitener of Hewlett-Packard shares his field-tested advice on how to secure virtual servers. Consider these five tips as you evaluate your enterprise's virtualization security. n At last week’s Black Hat conference, virtualization security was one of the hottest topics and sources of debate. If you’re trying to get a grip on how your enterprise’s virtualization security stacks up, consider this advice from Chris Whitener, chief security strategist, HP Secure Advantage. 1. Protect your host operating system by using server hardening tools and methodologies. Additional OS features such as isolation capabilities and strong security between OS partitions makes it easier for you to decrease the “attack surface” of a host OS. MORE ON VIRTUALIZATION SECURITY SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe VMware’s Free ESXi Will Cost You if it’s Not Secured Properly How to Find and Fix 10 Real Security Threats on Your Virtual Servers Future Threats to Virtualization Security: Fact vs. Fiction 2. Ensure that your host OS is as secure as the guest operating system. A virtual machine inherits all vulnerabilities of a host OS. Select a virtualization technology which provides strong security isolation (enforces distrust) between guest OS instances if needed. If organizations are concerned about malicious software in one guest OS attacking another OS, or don’t have mutual trust among administrators of the different guest OSes, then the virtualization layer must be designed to enforce the idea of distrust. 3. Security policies in the host OS should reflect requirements of individual virtual machines. Using the host OS to implement compliance requirements further enhances your assurance of compliance. It can be relied upon independently of trust in the administration of the guest OS.4. Manage virtual processes more like you already manage your physical resources. The host OS security lifecycle and virtual machine security lifecycle(s) must both be managed efficiently thought the data center. Ideally, the virtual infrastructure would be managed in the same way as physical resources. This includes software configuration, updates and patches, auditing and performance monitoring.5. Stay vigilant about securely managing the physical infrastructure.Deploying workloads on virtualized platforms make them more mobile, and provides flexibility and agility; this does not mean that the physical infrastructure can be ignored. The physical infrastructure has a critical role in supporting the good execution of those workloads, and the security of the virtualized infrastructure depends on the physical resource configuration and access control being managed securely across the data center. For more advice on improving the security of your virtual infrastructure, see CIO.com’s in-depth feature article How to Find and Fix 10 Real Security Threats on Your Virtual Servers. Also see CIO.com’s virtualization security expert Edward L. Haletky’s blogs for continuing virtual security coverage. Related content opinion The changing face of cybersecurity threats in 2023 Cybersecurity has always been a cat-and-mouse game, but the mice keep getting bigger and are becoming increasingly harder to hunt. By Dipti Parmar Sep 29, 2023 8 mins Cybercrime Security brandpost Should finance organizations bank on Generative AI? Finance and banking organizations are looking at generative AI to support employees and customers across a range of text and numerically-based use cases. By Jay Limbasiya, Global AI, Analytics, & Data Management Business Development, Unstructured Data Solutions, Dell Technologies Sep 29, 2023 5 mins Artificial Intelligence brandpost Embrace the Generative AI revolution: a guide to integrating Generative AI into your operations The CTO of SAP shares his experiences and learnings to provide actionable insights on navigating the GenAI revolution. By Juergen Mueller Sep 29, 2023 4 mins Artificial Intelligence feature 10 most in-demand generative AI skills Gen AI is booming, and companies are scrambling to fill skills gaps by hiring freelancers to make the most of the technology. These are the 10 most sought-after generative AI skills on the market right now. By Sarah K. White Sep 29, 2023 8 mins Hiring Generative AI IT Skills Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe