Be the first to like this
Once in the Cloud, various assumptions come to mind regarding security matters. For example, most system and network administrators decide to approach virtual network and virtual machine (VM) security the way they do their physical counterparts; applying similar security paradigms.
Security architectures designed for physical networks often fail to provide the required levels of security in the virtual world. Perimeter-based security alone is insufficient in a virtualized infrastructure partially because of virtual machines – which are sometimes, quite literally, moving targets. Dynamic networks, remote access requirements, and host machines to be carefully locked down, are some of the security concerns to be found in Cloud environments. With a little thought and imagination, however, securing your virtual infrastructure is possible provided you are willing to take a closer look.
The following document intends to analyze challenges regarding security in a virtualized environment, especially comparing implications of both physical and virtual environments. Security challenges of the Cloud environment are listed and analyzed, to finalize with possible solutions to face and resolve these challenges.