Designing with Security in Mind
In this chapter, we'll change our point of view and look at a design from the perspective of a malicious user. We won't say hacker, because typically your virtual infrastructure isn't exposed to the outside world. Because this book isn't about how to protect your perimeter network from the outside world, but about vSphere design, we'll assume the security risks that need to be mitigated come primarily from the inside. We'll discuss these topics:
- The importance of security in every aspect of your environment
- Potential security risks and their mitigating factors
Why Is Security Important?
We're sure you don't need someone to explain the answer to this question. Your personal information is important to ...