The new Hyper-V Security Guide has been released. It provides methods and best practices to strengthen the security of computers running the Hyper-V role on Windows Server® 2008. The guide covers the following three topics:
We provide you with prescriptive guidance for hardening the Hyper-V role and discuss several best practices for installing and configuring Hyper-V on a Windows Server 2008 server with a focus on security. Our best practices include measures for reducing the attack surface of a server running Hyper-V and recommendations for properly configuring secure network and storage devices.
For this topic we discuss several available methods for delegating virtual machine management so that virtual machine administrators only have the minimum permissions they require. We describe common delegation scenarios, and include detailed steps to guide you through using Authorization Manager (AzMan) and System Center Virtual Machine Manager 2008 (VMM 2008) to separate virtual machine administrators from virtualization host administrators.
Here we provide you with prescriptive guidance for securing virtual machine resources. We discuss best practices and include detailed steps for protecting virtual machines by using a combination of file system permissions, encryption, and auditing. We also include resources for hardening and updating the operating system instances running within your virtual machines.
To read more about the guide, click here.
To download the guide, click here.
Read about our other security Solution Accelerators.
Listen to a Podcast on virtualization security best practices.
PingBack from http://rapasasolutions01.com/72/solution_accelerators-security-blog-we-just-released-the-hyper-v/