O'Reilly logo

Running Xen: A Hands-On Guide to the Art of Virtualization by Jeanna Matthews, Brendan Johnson, Patrick F. Wilbur, Jeremy Bongio, Wenjin Hu, Todd Deshane, Eli M. Dow

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Securing a Xen System

When administering a physical machine, one of the most important tasks is securing the system. This can take many forms, including applying the most recent patches, closing all unnecessary ports, and auditing for unusual or suspicious behavior. These activities are just as important when you run the same software in a virtual machine. In addition, running systems in Xen introduces new opportunities and challenges in security. As a trusted layer below the operating virtual machines, Xen can provide additional tools to monitor and secure the virtual systems. On the other hand, because Xen is a trusted layer below the virtual machines, any compromise to either Xen itself or the trusted Domain0 could cause problems ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required