官术网_书友最值得收藏!

Summary

The goal of this introductory chapter was to provide an overview of the threats and vulnerabilities that apply to a virtual infrastructure. From a security and compliance standpoint, every system should undergo a proper risk assessment. The risk equation has been presented along with a high-level introduction to the defense-in-depth philosophy.

Example threats and vulnerabilities have been highlighted for the hypervisor, guest virtual machine, network, storage, and physical categories. As threats continue to evolve and vulnerabilities are identified, vendors such as VMware provide patches and updates to keep their products secure and ensure system integrity. It is always a good idea to check new software versions for vulnerabilities before performing an upgrade.

While this chapter provided an overview and baseline information, the remainder of the book will be presented in the typical cookbook format. Each chapter will provide specific recipes for securing your vSphere infrastructure.

主站蜘蛛池模板: 玉环县| 侯马市| 遵义市| 永修县| 尚义县| 塘沽区| 成安县| 兰西县| 逊克县| 且末县| 龙井市| 新沂市| 长宁区| 天峻县| 衡东县| 克什克腾旗| 武鸣县| 弋阳县| 冕宁县| 图片| 吉隆县| 望都县| 曲靖市| 望都县| 临潭县| 德惠市| 汉沽区| 桦南县| 湘潭市| 石渠县| 巴中市| 中超| 同江市| 兴国县| 青海省| 县级市| 南漳县| 云安县| 长汀县| 腾冲县| 刚察县|