Summary
The security and information that assurance administrators can realistically provide is clearly never as exhaustive as it is exhausting.
In the first section of this chapter, you learned that hardware virtualization has inherent security benefits.
However, you also learned that many promising benefits are undermined if they're not supported by thorough planning of the virtual infrastructure, explicit policy-making up front, and a flawless deployment, all followed by unflagging policy enforcement and ongoing virtual server lifecycle management.
We then outlined threats that are either unique to virtualized infrastructures or aggravated in the context of virtualization. Each point was followed by either concrete action to mitigate the threat ...