IntroductionVirtualization has become an essential service that the IT department has offered to internal users of access-as-a-service strategies. The result of this initiative was cost savings. Due to its success, the company mandated this approach for our remote offices. However, our need for business expansion has led to the need to adopt new security strategies to protect our virtual infrastructure. These new requirements will require us to evaluate the weaknesses of our current infrastructure and implement policies, new products or approaches to better serve our customers. The ProblemAccess Strategies virtual infrastructure was initially designed to ensure simplified management and minimized administrative overhead. The design at the time was perfect for a small space, but the company has recently expanded. One result of this expansion was the need to redesign the virtual environment to accommodate new sites that would need virtual servers to power the infrastructure. This infrastructure was designed, but in light of recent events where several companies were exposed due to security flaws. Upper management has ordered an infrastructure review to ensure that no holes exist within the new infrastructure. Security solution weaknesses in any technology infrastructure are usually the result of poor design and implementation of any new technology. Identifying these threats requires the ability to self-assess your infrastructure and review each part of the design to verify that weaknesses are tolerable. This type of activity should occur regularly and can be completed by performing thorough research into the technology you are looking for… middle of paper… existing environment with physical security in place. Works Cited Hietala, J.D. (2009, August). Top virtualization security mistakes (and how to avoid them). Retrieved from https://www.sans.org/reading-room/analysts-program/McAfee-Catbird-Virtualization-Jul09Johnson, R. (2011). Security policies and implementation issues. Sudbury, MA: Jones & Bartlett Learning.Microsoft Corporation. (n.d.). Risk management discipline, fundamental principles and components. Retrieved from Technet: http://technet.microsoft.com/en-us/library/cc526672.aspxPearce, M., Sherali, Z., and Hunt, R. (2013). Virtualization: Problems, Security Threats, and Solutions. ACM Computing Surveys, 45(2), 17-17:39. doi:10.1145/2431211.2431216Tsai, H., Siebenhaar, M., Miede, A., Huang, Y., & Steinmetz, R. (2012). Threat as a service? The impact of virtualization on cloud security. IT professional, 32-37.
tags