Chapter 11. Security and VMware ESX
This is a catch-all chapter that include things not covered in the other chapters. Specifically, it discusses how best to harden the individual virtualization hosts within your virtual environment, whether they are VMware ESX or VMware ESXi. Although this book was not only about hardening the virtual infrastructure, it is nonetheless an important aspect of the security of the virtual environment.
This chapter looks at the tasks required to properly harden the virtualization hosts, regardless of VMware hardening guidelines or benchmarks. Actually, many of these steps are consistent with them all and combine the steps into one larger standard. Furthermore, we look more into the business reasons for compliance ...
Get VMware vSphere™ and Virtual Infrastructure Security: Securing the Virtual Environment now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.