blog




  • Essay / IT and Virtualization - 879

    IntroductionVirtualization has become an essential service that IT has offered internal users access strategies as a service. The result of this initiative was cost savings. Because of this success, the company mandated the adoption of this approach for our remote offices. However, the need for expansion of our business has resulted in the need to adopt new security strategies to protect our virtual infrastructure. These new requirements will require us to assess weaknesses in our current infrastructure and implement policies, new products or approaches to better serve our customers. The ProblemAccess Strategies virtual infrastructure was originally designed to simplify management and minimize administrative overhead. At the time, the design was perfect for a small environment, but the company has recently expanded. The result of this expansion was the need to redesign the virtual environment to accommodate new sites that would need virtual servers to power the infrastructure. This infrastructure was designed, but taking into account recent events in which several companies were exposed due to security breaches. Senior management has ordered an infrastructure review to verify that no flaws exist in the new infrastructure. Security weaknesses in any technology infrastructure are usually the result of poor design and implementation of any new technology. Identifying these threats requires being able to self-assess your infrastructure and examine each element of the design to verify that weaknesses are tolerable. This type of task should occur regularly and can be completed by thoroughly researching the technology you are looking for...... middle of paper ...... existing environment with physical security present. Works Cited Hietala, J.D. (2009, August). Top Virtualization Security Mistakes (and How to Avoid Them). Retrieved from https://www.sans.org/reading-room/analysts-program/McAfee-Catbird-Virtualization-Jul09Johnson, R. (2011). Security policies and implementation issues. Sudbury, MA: Jones & Bartlett Learning. Microsoft Corporation. (nd). Risk management discipline, fundamentals and components. Retrieved from Technet: http://technet.microsoft.com/en-us/library/cc526672.aspxPearce, M., Sherali, Z., and Hunt, R. (2013). Virtualization: problems, security threats and solutions. ACM Computer Investigations, 45(2), 17-17:39. doi:10.1145/2431211.2431216 Tsai, H., Siebenhaar, M., Miede, A., Huang, Y., & Steinmetz, R. (2012). Threat as a service? The impact of virtualization on cloud security. IT professional, 32-37.