Chapter 9. Designing with Security in Mind
In this chapter, we'll change our point of view and look at a design from the perspective of a malicious user. We won't say hacker, because usually your virtual infrastructure won't be exposed to the outside world. Because this book isn't about how to protect your perimeter network from the outside world, but about vSphere design, we'll assume that the security risks that need to be mitigated come from the inside. We'll discuss these topics:
The importance of security in every aspect of your environment
Potential security risks and their mitigating factors
Why Is Security Important?
We're sure that you don't need someone to explain the answer to this question. Your personal information is important to you. ...