More and more enterprises are now deploying desktops and http://www.aliyun.com/zixun/aggregation/13995.html "> server virtualization technologies that bring all the resources of racks, compute, storage, networking, etc. Integration into the resource pool, while the future development trend is toward "the more compact the more powerful, lower energy consumption, easy to use" development.
However, as enterprises move more from physical platforms to virtualization, the creation and deployment of cloud services is becoming more and more convenient and security becomes a top priority. So, in the cloud environment, how to effectively protect the virtual system? Below, we provide the following ten tips for everyone:
First, the traditional security control is still available
In the transition to the virtual environment, we still can not forget some of the traditional security tools. Such as virus protection tools, firewalls, intrusion detection, etc., they are still on the server and virtual console to show their skills. It is worth mentioning that these security tools may lead to unexpected service disruptions during major security upgrades.
Second, protect the Hypervisor
Access is provided at the top of the virtual environment. Virtual Security Control helps prevent unauthorized changes and interventions to the hypervisor.
Third, create a virtual security policy
We usually have a security policy in the physical environment, but we also need that security policy in a virtual environment. There are a lot of them that can be used together, but there are many other aspects that are different from those in the physical environment.
Fourth, collaboration between departments
Virtualization generally involves all parts of the enterprise, so it is also prone to security incidents. There is a need to ensure that, in times of conflict and security incidents, there is open access to all parts of the company.
Fifth, create a virtual endpoint security
Traditional firewalls and intrusion prevention monitoring systems can play many roles in the virtual environment and in the migration to the cloud architecture. Virtual firewalls and IPS need to be deployed at some of the key architectural points. Similarly, monitoring and tracking of enterprise integrated security information and event management systems can not be ignored.
Six, batch management
There are many similar or similar issues in the cloud, and virtual environments need to be massively managed based on the critical values of the system and data.
Seven, follow the management privileges
Role-based access control in the virtual environment can be promising. You can continue to set administrative access permissions based on priority rules.
Eight, the deployment of virtual debate and defense in depth
Each system, the virtual environment will be a problem. Deploy debates in virtual systems Log in and analyze to increase the depth of defense for each virtualization device with more visualization.
Nine, devote more energy to training
Virtual safety training differs from safety training in the physical world. Almost all the deployment of traditional tools, management in a virtual environment will be different. Budgeting and planning for team training.
Ten, pay attention to compliance issues
Compared to the physical environment, the virtual environment will be more skeptical view. Therefore, it is necessary to provide deeper security to detect and manage virtual systems, keeping us close to the requirements of security compliance.
(Editor: left good)