Zimory White Paper: Security in the Cloud pt 2/2
- 293 views
Once in the Cloud, various assumptions come to mind regarding security matters. For example, most system and network administrators decide to approach virtual network and virtual machine (VM) security ...
Once in the Cloud, various assumptions come to mind regarding security matters. For example, most system and network administrators decide to approach virtual network and virtual machine (VM) security the way they do their physical counterparts; applying similar security paradigms.
Security architectures designed for physical networks often fail to provide the required levels of security in the virtual world. Perimeter-based security alone is insufficient in a virtualized infrastructure partially because of virtual machines – which are sometimes, quite literally, moving targets. Dynamic networks, remote access requirements, and host machines to be carefully locked down, are some of the security concerns to be found in Cloud environments. With a little thought and imagination, however, securing your virtual infrastructure is possible provided you are willing to take a closer look.
The following document intends to analyze challenges regarding security in a virtualized environment, especially comparing implications of both physical and virtual environments. Security challenges of the Cloud environment are listed and analyzed, to finalize with possible solutions to face and resolve these challenges.
- Total Views
- Views on SlideShare
- Embed Views