Skip to Content
Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD
book

Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD

by Davi Ottenheimer, Matthew Wallace
May 2012
Intermediate to advanced
456 pages
12h 6m
English
Wiley
Content preview from Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD

Chapter 10

Building Compliance into Virtual and Cloud Environments

The question isn't who is going to let me; it's who is going to stop me.

— Ayn Rand

Ah, but a man's reach should exceed his grasp, Or what's a heaven for?

— Robert Browning

Compliance and security often are confused, debated, and rated as separate and distinct. There may actually be more alignment than discord. The idea of a secure environment being compliant and the idea of a compliant environment being secure can actually mean the same thing.

What makes them different is more a matter of decision and procedure than talent or technology. This chapter attempts to explain the differences to bring the previous nine chapters into perspective for anyone working with regulations and compliance in virtual and cloud environments. It also presents details of a sample set of regulations to illustrate how to achieve compliance with virtualization.

Compliance versus Security

Perhaps the simplest and clearest definition of security is that it is a singular perspective of protection against risk. Whenever you assess security, you are working from your own criteria. Compliance, on the other hand, always involves more than one perspective; it introduces an outside or foreign set of criteria that might not match your own.

That might seem like an unsatisfying definition. Suppose a security consultant says that compliance is a lower bar than security. She suggests that if you follow her list of recommendations, you will be far more ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Internet Security: How to Defend Against Attackers on the Web, 2nd Edition

Internet Security: How to Defend Against Attackers on the Web, 2nd Edition

Mike Harwood
Cisco Network Admission Control, Volume I: NAC Framework Architecture and Design

Cisco Network Admission Control, Volume I: NAC Framework Architecture and Design

Denise Helfrich, Lou Ronnau, Jason Frazier, Paul Forbes

Publisher Resources

ISBN: 9781118239261Purchase book