Describe how you would secure a physical host in a typical IT setup and compare
ID: 3702231 • Letter: D
Question
Describe how you would secure a physical host in a typical IT setup and compare this against how you would secure a virtual host in a public cloud-based environment. What special considerations does the virtualized host have that you may take for granted in a physical system? What makes does the virtualized host make easier? Describe how you would secure a physical host in a typical IT setup and compare this against how you would secure a virtual host in a public cloud-based environment. What special considerations does the virtualized host have that you may take for granted in a physical system? What makes does the virtualized host make easier? Describe how you would secure a physical host in a typical IT setup and compare this against how you would secure a virtual host in a public cloud-based environment. What special considerations does the virtualized host have that you may take for granted in a physical system? What makes does the virtualized host make easier?Explanation / Answer
Definition:
A virtual infrastructure is a software-based IT infrastructure being hosted on another physical infrastructure and meant to be distributed as a service as in cloud computing’s Infrastructure as a Service (IaaS) delivery model. It provides organizations, particularly smaller ones, that cannot afford to build their own physical infrastructure, access to enterprise-grade technology such as servers and applications. The distribution is often done via the cloud, meaning over large networks such as the Internet.
The main purpose of a virtual infrastructure is to bring enterprise-level technology to organizations that cannot afford the large capital required to pay for the hardware, software licenses, setup and continual maintenance of an actual data center infrastructure. The technology involves virtualization, which is the utilization of physical server resources to host logical or virtual servers and networking hardware in order to optimize resources and drive costs down by hosting multiple virtual servers in a single host server.
The idea is that no single server is actually taxed enough to the point that its resource limits are reached so it would be more prudent to make use of these resources by running multiple logical servers that, together, can make use of the actual capacity of the host. This lean approach allows for sharing and distributing resources, which, in turn, promotes flexibility, scalability and lower total cost of ownership.
Benefits of a virtual infrastructure:
Scalable - Allows provisioning as many or as few logical servers as required, and users only pay for what they use.
Flexible - Allows for multiple server and networking configurations as compared to a hardwired physical infrastructure, which requires more capital and effort to change.
Secure - Allows more security to be layered on top of whatever security is already present in the virtual infrastructure because all traffic to the virtual infrastructure goes through the actual physical infrastructure.
Load balancing - Allows software-based servers to share workloads easily and distribute them properly so that no single logical server is taxed more than the others.
Backup and recovery - Promotes easier backups because everything can be saved somewhere, allowing for quick recovery in other hosts if a few hosts are down. This is almost impossible with physical servers, which have to be revived before services can resume.
Virtualization provides new security challenges for firms. The virtual components and environment cannot be protected by existing security mechanisms and processes alone. Virtualization creates a different network that is a hybrid between the established physically centered network and the new virtual or logical environment. Additional considerations and protections must be put into place to ensure a strong security posture, and much planning and preparation as well as training needs to be implemented in advance. Virtualization security must not become an afterthought after the new virtual infrastructure and components are put into place. Security in this area will improve as virtualization technology advances, and standards will need to be put into place so that firms have guidelines to follow to secure their new environments.
1 Administrator Access and Separation of Duties
2 Desktop Virtualization and Security
3 Network Security
4 Storage Networks
5 Disaster Recovery
6 Auditing and Logging
7 Virtual Machine Security
8 Hypervisor Security
9 Time Synchronization
10 Remote Access
11 Backups
12 Configuration and Change Management
13 Server Pools and Virtual Service Offerings