SlideShare a Scribd company logo
1 of 20
Download to read offline
SECURITY BOOTCAMP 2012 | Make yourself to be an expert!




            1




                        2




Common issues of Virtualization
          Security
           Nguyễn Hinh | hinhnguyen00@gmail.com
SECURITY BOOTCAMP 2012 | Make yourself to be an expert!




            2                       About Me
          Hinh Nguyen



                        2
      hinhnguyen00@gmail.com




               UIT



     Focus on
   Virtualization
     & Cloud
    Computing
SECURITY BOOTCAMP 2012 | Make yourself to be an expert!




                        3
                                  Content

    I. Overview
                                       2

    II. Benefits of Virtualization

    III. Risks for Virtualized Environments

    IV. Recommendations


Common issues of Virtualization Security                           2
SECURITY BOOTCAMP 2012 | Make yourself to be an expert!



               Virtualization Overview
                   4




                                       2



                                           With vMotion instances
                                           launching every second,
                                            there are more VMs in
                                             motion globally than
                                            actual aircraft.” -- Paul
                                            Maritz, CEO, VMware


Common issues of Virtualization Security                                3
SECURITY BOOTCAMP 2012 | Make yourself to be an expert!



    Virtualization Security Overview
            5

 • Gartner: 60% of VMs
   will be LESS
   SECURE than the 2
   Physical Servers they
   replace (through 2012)




     http://www.gartner.com/it/page.jsp?id=1322414
                                                     Better   Less Secure


Common issues of Virtualization Security                                    4
SECURITY BOOTCAMP 2012 | Make yourself to be an expert!




                        6
                                  Why???
           Why - “Hypervisor creates new
                             attack surface”
                                  2


                             - Designer/Operator




Common issues of Virtualization Security                           5
SECURITY BOOTCAMP 2012 | Make yourself to be an expert!




                        7




                                       2




       II. BENEFITS OF
       VIRTUALIZATION

Common issues of Virtualization Security                           6
SECURITY BOOTCAMP 2012 | Make yourself to be an expert!



                        II.1. Reduce cost
                        8

 • Reduce maintenance
   cost, save power
                       2
 • Reduce quantity of
   hardware & software
   to purchase
 • Reduce “server
   sprawl”




Common issues of Virtualization Security                           7
SECURITY BOOTCAMP 2012 | Make yourself to be an expert!



                              II.2. More Secure
                              9



                                Disaster Recovery &                   Forensic analysis
Sandboxing                             2
                                HA                                    capabilities

 unstable app & compromised
                                  HA, FT, ….                            snapshot
 server
                                  Mixed: 1 physical server (master)
 Risk: “VM Escape”
                                  – VMs (slave)




  Common issues of Virtualization Security                                                8
SECURITY BOOTCAMP 2012 | Make yourself to be an expert!




                        10




                                       2




       III. RISKS FOR VIRTUALIZED
       ENVIRONMENTS

Common issues of Virtualization Security                           9
SECURITY BOOTCAMP 2012 | Make yourself to be an expert!



 III. Risks for Virtualized Environments
             11




                                       2




Common issues of Virtualization Security                           10
SECURITY BOOTCAMP 2012 | Make yourself to be an expert!



 III. Risks for Virtualized Environments
             12

 • Hypervisor
 • Host/platform
                        2
 • Communication
 • Isolation between guest
   and guest
 • Isolation between guest
   and host



Common issues of Virtualization Security                           11
SECURITY BOOTCAMP 2012 | Make yourself to be an expert!




                        13




                                       2




       IV. RECOMMENDATIONS


Common issues of Virtualization Security                           12
SECURITY BOOTCAMP 2012 | Make yourself to be an expert!



                 IV.14Recommendations
 • Restrict physical access
 • Implement defense2 in depth
 • Enforce least privilege and separation of
   duties
 • Harden the hypervisor
 • Harden virtual machines and other
   components


Common issues of Virtualization Security                           13
SECURITY BOOTCAMP 2012 | Make yourself to be an expert!



                 IV.15Recommendations

                                       2




Common issues of Virtualization Security                           14
SECURITY BOOTCAMP 2012 | Make yourself to be an expert!



                 IV.16Recommendations

                                       2




Common issues of Virtualization Security                           15
SECURITY BOOTCAMP 2012 | Make yourself to be an expert!



                 IV.17Recommendations

                                       2




Common issues of Virtualization Security                           15
SECURITY BOOTCAMP 2012 | Make yourself to be an expert!



                                       • Update OS,… like physical server
           18
                    VM                 • Limit sharing console: 2
                                       • Control access resource, disconnet
                                         unauthorized device

                                       • Use AD, verify “ESX Admin” group

                  ESXi 2               • passwork policy
                                       • Config FW (SSH), NTP, SNMP…
                                       • SSL for NFC

                                       • Assign role to specific users
                                       • Verify vSphere plug-in
                vCenter                • Client connect vCenter by SSL with
                                         trusted CA-signed cert
                                       • Disable datastore browser
                                       • Management, vMotion & storage traffic
                                         is isolated

                vNetwork               • Forged Transmits & MAC address
                                         change policy: reject
                                       • Port groups are not native VLAN
SECURITY BOOTCAMP 2012 | Make yourself to be an expert!




                        19
                                    Q&A

                                       2




Common issues of Virtualization Security
SECURITY BOOTCAMP 2012 | Make yourself to be an expert!




           20




                       2

More Related Content

Viewers also liked

SBC 2012 - Lỗ hổng trong cài đặt giao thức OAuth và nguy cơ với người dùng (N...
SBC 2012 - Lỗ hổng trong cài đặt giao thức OAuth và nguy cơ với người dùng (N...SBC 2012 - Lỗ hổng trong cài đặt giao thức OAuth và nguy cơ với người dùng (N...
SBC 2012 - Lỗ hổng trong cài đặt giao thức OAuth và nguy cơ với người dùng (N...
Security Bootcamp
 
SBC 2012 - Linux Hardening (Mẫn Thắng)
SBC 2012 - Linux Hardening (Mẫn Thắng)SBC 2012 - Linux Hardening (Mẫn Thắng)
SBC 2012 - Linux Hardening (Mẫn Thắng)
Security Bootcamp
 
SBC 2012 - Phát hiện tấn công DDoS sử dụng mạng Neural (Trần Nguyên Ngọc)
SBC 2012 - Phát hiện tấn công DDoS sử dụng mạng Neural (Trần Nguyên Ngọc)SBC 2012 - Phát hiện tấn công DDoS sử dụng mạng Neural (Trần Nguyên Ngọc)
SBC 2012 - Phát hiện tấn công DDoS sử dụng mạng Neural (Trần Nguyên Ngọc)
Security Bootcamp
 
Security Bootcamp 2012 - Bảo vệ Web App với Mod Security (Sử Hoàng Sơn)
Security Bootcamp 2012 - Bảo vệ Web App với Mod Security (Sử Hoàng Sơn)Security Bootcamp 2012 - Bảo vệ Web App với Mod Security (Sử Hoàng Sơn)
Security Bootcamp 2012 - Bảo vệ Web App với Mod Security (Sử Hoàng Sơn)
Security Bootcamp
 
SBC 2012 - Database Security (Nguyễn Thanh Tùng)
SBC 2012 - Database Security (Nguyễn Thanh Tùng)SBC 2012 - Database Security (Nguyễn Thanh Tùng)
SBC 2012 - Database Security (Nguyễn Thanh Tùng)
Security Bootcamp
 
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
Security Bootcamp
 

Viewers also liked (6)

SBC 2012 - Lỗ hổng trong cài đặt giao thức OAuth và nguy cơ với người dùng (N...
SBC 2012 - Lỗ hổng trong cài đặt giao thức OAuth và nguy cơ với người dùng (N...SBC 2012 - Lỗ hổng trong cài đặt giao thức OAuth và nguy cơ với người dùng (N...
SBC 2012 - Lỗ hổng trong cài đặt giao thức OAuth và nguy cơ với người dùng (N...
 
SBC 2012 - Linux Hardening (Mẫn Thắng)
SBC 2012 - Linux Hardening (Mẫn Thắng)SBC 2012 - Linux Hardening (Mẫn Thắng)
SBC 2012 - Linux Hardening (Mẫn Thắng)
 
SBC 2012 - Phát hiện tấn công DDoS sử dụng mạng Neural (Trần Nguyên Ngọc)
SBC 2012 - Phát hiện tấn công DDoS sử dụng mạng Neural (Trần Nguyên Ngọc)SBC 2012 - Phát hiện tấn công DDoS sử dụng mạng Neural (Trần Nguyên Ngọc)
SBC 2012 - Phát hiện tấn công DDoS sử dụng mạng Neural (Trần Nguyên Ngọc)
 
Security Bootcamp 2012 - Bảo vệ Web App với Mod Security (Sử Hoàng Sơn)
Security Bootcamp 2012 - Bảo vệ Web App với Mod Security (Sử Hoàng Sơn)Security Bootcamp 2012 - Bảo vệ Web App với Mod Security (Sử Hoàng Sơn)
Security Bootcamp 2012 - Bảo vệ Web App với Mod Security (Sử Hoàng Sơn)
 
SBC 2012 - Database Security (Nguyễn Thanh Tùng)
SBC 2012 - Database Security (Nguyễn Thanh Tùng)SBC 2012 - Database Security (Nguyễn Thanh Tùng)
SBC 2012 - Database Security (Nguyễn Thanh Tùng)
 
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
 

More from Security Bootcamp

GOLDEN TICKET - Hiểm hoa tiềm ẩn trong hệ thống Active Directory
GOLDEN TICKET -  Hiểm hoa tiềm ẩn trong hệ thống Active DirectoryGOLDEN TICKET -  Hiểm hoa tiềm ẩn trong hệ thống Active Directory
GOLDEN TICKET - Hiểm hoa tiềm ẩn trong hệ thống Active Directory
Security Bootcamp
 
PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018
PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018
PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018
Security Bootcamp
 

More from Security Bootcamp (20)

Ransomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdf
 
Hieupc-The role of psychology in enhancing cybersecurity
Hieupc-The role of psychology in enhancing cybersecurityHieupc-The role of psychology in enhancing cybersecurity
Hieupc-The role of psychology in enhancing cybersecurity
 
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s view
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s viewNguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s view
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s view
 
Sbc 2020 bao gio vn co anm dua vao cong nghe mo
Sbc 2020 bao gio vn co anm dua vao cong nghe moSbc 2020 bao gio vn co anm dua vao cong nghe mo
Sbc 2020 bao gio vn co anm dua vao cong nghe mo
 
Deception change-the-game
Deception change-the-gameDeception change-the-game
Deception change-the-game
 
Giam sat thu dong thong tin an toan hang hai su dung sdr
Giam sat thu dong thong tin an toan hang hai su dung sdrGiam sat thu dong thong tin an toan hang hai su dung sdr
Giam sat thu dong thong tin an toan hang hai su dung sdr
 
Sbc2019 luong-cyber startup
Sbc2019 luong-cyber startupSbc2019 luong-cyber startup
Sbc2019 luong-cyber startup
 
Insider threat-what-us-do d-want
Insider threat-what-us-do d-wantInsider threat-what-us-do d-want
Insider threat-what-us-do d-want
 
Macro malware common techniques - public
Macro malware   common techniques - publicMacro malware   common techniques - public
Macro malware common techniques - public
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learning
 
Tim dieu moi trong nhung dieu cu
Tim dieu moi trong nhung dieu cuTim dieu moi trong nhung dieu cu
Tim dieu moi trong nhung dieu cu
 
Threat detection with 0 cost
Threat detection with 0 costThreat detection with 0 cost
Threat detection with 0 cost
 
Build SOC
Build SOC Build SOC
Build SOC
 
AD red vs blue
AD red vs blueAD red vs blue
AD red vs blue
 
Securitybox
SecurityboxSecuritybox
Securitybox
 
GOLDEN TICKET - Hiểm hoa tiềm ẩn trong hệ thống Active Directory
GOLDEN TICKET -  Hiểm hoa tiềm ẩn trong hệ thống Active DirectoryGOLDEN TICKET -  Hiểm hoa tiềm ẩn trong hệ thống Active Directory
GOLDEN TICKET - Hiểm hoa tiềm ẩn trong hệ thống Active Directory
 
PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018
PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018
PHÂN TÍCH MỘT SỐ CUỘC TẤN CÔNG APT ĐIỂN HÌNH NHẮM VÀO VIỆT NAM 2017-2018
 
Api security-present
Api security-presentApi security-present
Api security-present
 
Lannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksLannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber Attacks
 
Letrungnghia-gopyluananm2018
Letrungnghia-gopyluananm2018Letrungnghia-gopyluananm2018
Letrungnghia-gopyluananm2018
 

Recently uploaded

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 

SBC 2012 - Một số vấn đề bảo mật trong Virtualization (Nguyễn Hinh)

  • 1. SECURITY BOOTCAMP 2012 | Make yourself to be an expert! 1 2 Common issues of Virtualization Security Nguyễn Hinh | hinhnguyen00@gmail.com
  • 2. SECURITY BOOTCAMP 2012 | Make yourself to be an expert! 2 About Me Hinh Nguyen 2 hinhnguyen00@gmail.com UIT Focus on Virtualization & Cloud Computing
  • 3. SECURITY BOOTCAMP 2012 | Make yourself to be an expert! 3 Content I. Overview 2 II. Benefits of Virtualization III. Risks for Virtualized Environments IV. Recommendations Common issues of Virtualization Security 2
  • 4. SECURITY BOOTCAMP 2012 | Make yourself to be an expert! Virtualization Overview 4 2 With vMotion instances launching every second, there are more VMs in motion globally than actual aircraft.” -- Paul Maritz, CEO, VMware Common issues of Virtualization Security 3
  • 5. SECURITY BOOTCAMP 2012 | Make yourself to be an expert! Virtualization Security Overview 5 • Gartner: 60% of VMs will be LESS SECURE than the 2 Physical Servers they replace (through 2012) http://www.gartner.com/it/page.jsp?id=1322414 Better Less Secure Common issues of Virtualization Security 4
  • 6. SECURITY BOOTCAMP 2012 | Make yourself to be an expert! 6 Why??? Why - “Hypervisor creates new attack surface” 2 - Designer/Operator Common issues of Virtualization Security 5
  • 7. SECURITY BOOTCAMP 2012 | Make yourself to be an expert! 7 2 II. BENEFITS OF VIRTUALIZATION Common issues of Virtualization Security 6
  • 8. SECURITY BOOTCAMP 2012 | Make yourself to be an expert! II.1. Reduce cost 8 • Reduce maintenance cost, save power 2 • Reduce quantity of hardware & software to purchase • Reduce “server sprawl” Common issues of Virtualization Security 7
  • 9. SECURITY BOOTCAMP 2012 | Make yourself to be an expert! II.2. More Secure 9 Disaster Recovery & Forensic analysis Sandboxing 2 HA capabilities unstable app & compromised HA, FT, …. snapshot server Mixed: 1 physical server (master) Risk: “VM Escape” – VMs (slave) Common issues of Virtualization Security 8
  • 10. SECURITY BOOTCAMP 2012 | Make yourself to be an expert! 10 2 III. RISKS FOR VIRTUALIZED ENVIRONMENTS Common issues of Virtualization Security 9
  • 11. SECURITY BOOTCAMP 2012 | Make yourself to be an expert! III. Risks for Virtualized Environments 11 2 Common issues of Virtualization Security 10
  • 12. SECURITY BOOTCAMP 2012 | Make yourself to be an expert! III. Risks for Virtualized Environments 12 • Hypervisor • Host/platform 2 • Communication • Isolation between guest and guest • Isolation between guest and host Common issues of Virtualization Security 11
  • 13. SECURITY BOOTCAMP 2012 | Make yourself to be an expert! 13 2 IV. RECOMMENDATIONS Common issues of Virtualization Security 12
  • 14. SECURITY BOOTCAMP 2012 | Make yourself to be an expert! IV.14Recommendations • Restrict physical access • Implement defense2 in depth • Enforce least privilege and separation of duties • Harden the hypervisor • Harden virtual machines and other components Common issues of Virtualization Security 13
  • 15. SECURITY BOOTCAMP 2012 | Make yourself to be an expert! IV.15Recommendations 2 Common issues of Virtualization Security 14
  • 16. SECURITY BOOTCAMP 2012 | Make yourself to be an expert! IV.16Recommendations 2 Common issues of Virtualization Security 15
  • 17. SECURITY BOOTCAMP 2012 | Make yourself to be an expert! IV.17Recommendations 2 Common issues of Virtualization Security 15
  • 18. SECURITY BOOTCAMP 2012 | Make yourself to be an expert! • Update OS,… like physical server 18 VM • Limit sharing console: 2 • Control access resource, disconnet unauthorized device • Use AD, verify “ESX Admin” group ESXi 2 • passwork policy • Config FW (SSH), NTP, SNMP… • SSL for NFC • Assign role to specific users • Verify vSphere plug-in vCenter • Client connect vCenter by SSL with trusted CA-signed cert • Disable datastore browser • Management, vMotion & storage traffic is isolated vNetwork • Forged Transmits & MAC address change policy: reject • Port groups are not native VLAN
  • 19. SECURITY BOOTCAMP 2012 | Make yourself to be an expert! 19 Q&A 2 Common issues of Virtualization Security
  • 20. SECURITY BOOTCAMP 2012 | Make yourself to be an expert! 20 2