Windows Server 2008 Hyper-V Security Guide – beta now available
For organizations that seek cost-effective operations, the benefits of virtualization are more evident than ever. Microsoft® Hyper-V technology allows consolidation of workloads that are currently spread across multiple underutilized servers onto a smaller number of servers. This capability provides you with a way to reduce costs through lower hardware, energy, and management overhead while creating a more dynamic IT infrastructure.
Virtualization technologies are causing enterprise organizations to shift their thinking about IT. The Hyper-V Security Guide can help you elevate the security of virtualized Windows Server® environments to meet your business-critical needs. This accelerator provides IT professionals like you with recommendations to address your key security concerns around server virtualization. The guide provides authoritative guidance that relates to the following strategies for securing virtualized environments:
- Hardening Hyper-V. The guide provides prescriptive guidance for hardening the Hyper-V server role, including several best practices for installing and configuring Hyper-V with a focus on security. These best practices include measures for reducing the attack surface of Hyper-V as well as recommendations for properly configuring secure virtual networks and storage devices on a Hyper-V host server.
- Virtual machine management and delegation. The ability to safely and securely delegate administrative access to virtual machine resources within an organization is essential. The guide highlights several available methods to administer different aspects of a virtual machine infrastructure and ways to control administrative access to different servers and at different levels.
- Protecting virtual machines. The guide also provides prescriptive guidance for securing virtual machine resources, including best practices and detailed steps for protecting virtual machines by using a combination of file system permissions, encryption, and auditing.
Published Thursday, February 05, 2009 11:32 PM by Keith Combs