Chapter 11

Additional Security Considerations for Virtual Infrastructure

This chapter will explore several different areas of virtualization, with some general security guidelines and considerations for each. The first area that will be covered is desktop virtualization. More and more organizations are investigating virtual desktop technologies as their existing workstations and laptops grow obsolete. There are a number of use cases that make sense for some organizations, and security concerns and challenges will vary from one to the next. The second area that we'll cover in this chapter is storage virtualization and the security concepts and controls that administrators need to be aware of within their storage environments. Finally, this chapter ...

Get Virtualization Security: Protecting Virtualized Environments now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.