Skip to Main Content
IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition
book

IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition

by Chris Davis, Mike Schiller, Kevin Wheeler
February 2011
Intermediate to advanced content levelIntermediate to advanced
512 pages
15h 37m
English
McGraw-Hill
Content preview from IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition

CHAPTER 11Auditing Virtualized Environments

Innovations in operating system virtualization and server hardware permanently changed the footprint, architecture, and operations of data centers. This chapter discusses auditing virtualized environments, and begins with an overview of common virtualization technologies and key controls. The virtualization audit combines the concerns of the hypervisor and the guest operating systems. Although the focus of this chapter is the hypervisor and server virtualization, you can apply many of the same steps and concepts to desktop virtualization. We make the assumption that these system components are under your control. You should reference Chapter 14, “Auditing Cloud Computing and Outsourced Operations” for ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Legal and Privacy Issues in Information Security, 3rd Edition

Legal and Privacy Issues in Information Security, 3rd Edition

Joanna Lyn Grama
Auditing IT Infrastructures for Compliance, 3rd Edition

Auditing IT Infrastructures for Compliance, 3rd Edition

Robert Johnson, Marty Weiss, Michael G. Solomon

Publisher Resources

ISBN: 9780071742382