close menu
Bookswagon-24x7 online bookstore
close menu
My Account
28%
Virtualization Security: Protecting Virtualized Environments(English)

Virtualization Security: Protecting Virtualized Environments(English)

          
5
4
3
2
1

Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices, and strategies used for securing physical environments do not provide sufficient protection for virtual environments. This book includes step-by-step configurations for the security controls that come with the three leading hypervisor--VMware vSphere and ESXi, Microsoft Hyper-V on Windows Server 2008, and Citrix XenServer.

  • Includes strategy for securely implementing network policies and integrating virtual networks into the existing physical infrastructure
  • Discusses vSphere and Hyper-V native virtual switches as well as the Cisco Nexus 1000v and Open vSwitch switches
  • Offers effective practices for securing virtual machines without creating additional operational overhead for administrators
  • Contains methods for integrating virtualization into existing workflows and creating new policies and processes for change and configuration management so that virtualization can help make these critical operations processes more effective

This must-have resource offers tips and tricks for improving disaster recovery and business continuity, security-specific scripts, and examples of how Virtual Desktop Infrastructure benefits security.



Table of Contents:
Introduction xix

Chapter 1 Fundamentals of Virtualization Security 1

Virtualization Architecture 1

Threats to a Virtualized Environment 4

Operational Threats 4

Malware-Based Threats 5

VM Escape 6

Vulnerabilities in Virtualization Platforms 9

How Security Must Adapt to Virtualization 9

Challenges for Securing Virtualized Environments 10

Challenges of Vulnerability Testing in a Virtualized Environment 10

Chapter 2 Securing Hypervisors 15

Hypervisor Configuration and Security 15

Configuring VMware ESXi 17

Patching VMware ESXi 17

Securing Communications in VMware ESXi 27

Change and Remove Default Settings on VMware ESXi 33

Enable Operational Security on VMware ESXi 34

Secure and Monitor Critical Configuration Files in VMware ESXi 38

Secure Local Users and Groups on VMware ESXi 40

Lock Down Access to Hypervisor Console 47

Configuring Microsoft Hyper-V on Windows Server 2008 52

Patching Hyper-V 53

Securing Communications with Hyper-V 53

Changing Hyper-V Default Settings 56

Enabling Operational Security for Hyper-V 59

Securing and Monitoring Critical Confi guration Files for Hyper-V 60

Secure Local Hyper-V Users and Groups 63

Lock Down Access to the Hyper-V Hypervisor Platform 68

Configuring Citrix XenServer 72

Patching XenServer 72

Secure Communications with XenServer 75

Change XenServer Default Settings 76

Enabling XenServer Operational Security 80

Secure and Monitor Critical XenServer Configuration Files 81

Secure Local Users and Groups 81

Lock Down Access to the XenServer Platform 88

Chapter 3 Designing Virtual Networks for Security 93

Comparing Virtual and Physical Networks 93

Virtual Network Design Elements 95

Physical vs Virtual Networks 98

Virtual Network Security Considerations 99

Important Security Elements 99

Architecture Considerations 100

Configuring Virtual Switches for Security 102

Defining Separate vSwitches and Port Groups 103

Configuring VLANs and Private VLANs for Network Segmentation 112

Limiting Virtual Network Ports in Use 117

Implementing Native Virtual Networking Security Policies 122

Securing iSCSI Storage Network Connections 125

Integrating with Physical Networking 129

Chapter 4 Advanced Virtual Network Operations 131

Network Operational Challenges 131

Network Operations in VMware vSphere 133

Load Balancing in vSphere Virtual Environments 133

Traffic Shaping and Network Performance in VMware vSphere 135

Creating a Sound Network Monitoring Strategy in VMware vSphere 136

Network Operations in Microsoft Hyper-V 141

Load Balancing in Hyper-V Virtual Environments 141

Traffic Shaping and Network Performance in Hyper-V 142

Creating a Sound Network Monitoring Strategy in Hyper-V 144

Network Operations in Citrix XenServer 145

Load Balancing in XenServer Virtual Environments 145

Traffic Shaping and Network Performance in XenServer 148

Creating a Sound Network Monitoring Strategy in XenServer 148

Chapter 5 Virtualization Management and Client Security 151

General Security Recommendations for Management Platforms 151

Network Architecture for Virtualization Management Servers 152

VMware vCenter 155

vCenter Service Account 157

Secure Communications in vCenter 158

vCenter Logging 160

Users, Groups, and Roles in vCenter 163

Role Creation Scenarios 167

vSphere Client 168

Microsoft System Center Virtual Machine Manager 168

SCVMM Service Account 169

Secure Communications with SCVMM 170

SCVMM Logging 171

Users, Groups, and Roles in SCVMM 172

Client Security 175

Citrix XenCenter 175

Secure Communication with XenCenter 175

Logging with XenCenter 176

Users, Groups, and Roles in XenCenter 176

Chapter 6 Securing the Virtual Machine 177

Virtual Machine Threats and Vulnerabilities 177

Virtual Machine Security Research 178

Stealing Guests 179

Cloud VM Reconnaissance 179

Virtual Disk Manipulation 180

Virtual Machine Encryption 180

Locking Down VMware VMs 185

VMware Tools 188

Copy/Paste Operations and HGFS 188

Virtual Machine Disk Security 189

VM Logging 189

Device Connectivity 190

Guest and Host Communications 191

Controlling API Access to VMs 192

Unexposed Features 193

Locking Down Microsoft VMs 195

Locking Down XenServer VMs 197

Chapter 7 Logging and Auditing 201

Why Logging and Auditing Is Critical 201

Virtualization Logs and Auditing Options 202

Syslog 203

Windows Event Log 204

VMware vSphere ESX Logging 205

VMware vSphere ESXi Logging 207

Microsoft Hyper-V and SCVMM Logging 211

Citrix XenServer and XenCenter Logging 218

Integrating with Existing Logging Platforms 221

Enabling Remote Logging on VMware vSphere 221

Enabling Remote Logging on Microsoft Hyper-V 223

Enabling Remote Logging for XenServer 225

Effective Log Management 226

Chapter 8 Change and Configuration Management 229

Change and Configuration Management Overview 229

Change Management for Security 230

The Change Ecosystem 231

How Virtualization Impacts Change and Configuration Management 234

Best Practices for Virtualization Configuration Management 235

Cloning and Templates for Improved Confi guration Management 237

Creating and Managing VMware vSphere VM Templates and Snapshots 238

Creating and Managing Microsoft Hyper-V VM Templates and Snapshots 242

Creating and Managing Citrix XenServer VM Templates and Snapshots 247

Integrating Virtualization into Change and Management 249

Additional Solutions and Tools 250

Chapter 9 Disaster Recovery and Business Continuity 253

Disaster Recovery and Business Continuity Today 253

Shared Storage and Replication 254

Virtualization Redundancy and Fault Tolerance for DR/BCP 256

Clustering 256

Resource Pools 262

High Availability and Fault Tolerance 270

Setting Up High Availability and Fault Tolerance in VMware vSphere 270

Setting Up High Availability and Fault Tolerance in Microsoft Hyper-V 274

Setting Up High Availability and Fault Tolerance in Citrix XenServer 277

Chapter 10 Scripting Tips and Tricks for Automation 281

Why Scripting Is Essential for Admins 281

VMware Scripting: Power CLI and vCLI 282

Scripting with PowerCLI 282

Configuring VMs with PowerCLI 283

Configuring VMs with vCLI 285

Configuring VMware ESXi with PowerCLI 286

Configuring VMware ESXi with the vCLI 289

Configuring VMware Virtual Networks with PowerCLI 290

Configuring VMware Virtual Networks with the vCLI 293

Configuring VMware vCenter with PowerCLI 294

Microsoft Scripting for Hyper-V: PowerShell 297

Getting Information about VMs 298

Getting Information about the Virtual Network 299

Assessing Other Aspects of the Virtual Environment 299

Citrix Scripting: Shell Scripts 300

Chapter 11 Additional Security Considerations for Virtual Infrastructure 303

VDI Overview 303

VDI Benefits and Drawbacks: Operations and Security 304

Security Advantages and Challenges 304

VDI Architecture Overview 307

Leveraging VDI for Security 310

Storage Virtualization 310

Application Virtualization 313

Index 317


Best Seller

| | See All

Product Details
  • ISBN-13: 9781118288122
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Sybex Inc.,U.S.
  • Depth: 19
  • Language: English
  • Returnable: N
  • Spine Width: 23 mm
  • Weight: 567 gr
  • ISBN-10: 1118288122
  • Publisher Date: 04 Dec 2012
  • Binding: Paperback
  • Height: 234 mm
  • No of Pages: 368
  • Series Title: English
  • Sub Title: Protecting Virtualized Environments
  • Width: 185 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Be The First to Review
Virtualization Security: Protecting Virtualized Environments(English)
John Wiley & Sons Inc -
Virtualization Security: Protecting Virtualized Environments(English)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Virtualization Security: Protecting Virtualized Environments(English)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    | | See All


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA