The IT Department and Virtualization

879 Words2 Pages

Introduction

Virtualization has become an essential service that the IT department has offered to Access strategies internal users as a service. The result of this initiative has been a cost saving. As a result of the success, the company has mandated this approach to be adopted for our remote offices. However, our business need for expansion has resulted in the need for adopting new security strategies to protect our virtual infrastructure. These new requirements will require us to evaluate our current infrastructure for weakness and to implement policies, new products, or approaches to better serve our customers.
The Problem

Access Strategies virtual infrastructure was initially designed to account for simplified management and minimized administrative overhead. The design at the time was perfect for a small environment, but the company has recently expanded. A result of this expansion was the need to redesign the virtual environment was ordered to accommodate the new sites that would need virtual servers to power the infrastructure. This infrastructure was designed, but given recent events in where several companies were exposed because of security deficiencies. Upper management has order a review of the infrastructure to verify that no holes exist within the new infrastructure.
The Solution
Security weaknesses in any technology infrastructure are usually a result of poor design and implementation of any new technology. Identifying these threats takes precedents of being able to self evaluate your infrastructure and to review every piece of the design to verify that weaknesses are tolerable. This type of task should occur regularly and can be completed by performing a thorough research into the technology that you are lookin...

... middle of paper ...

... existing environment with the physical security present.

Works Cited

Hietala, J. D. (2009, August). Top Virtualization Security Mistakes (and How to Avoid Them). Retrieved from https://www.sans.org/reading-room/analysts-program/McAfee-Catbird-Virtualization-Jul09
Johnson, R. (2011). Security Policies and Implementation Issues. Sudbury, MA: Jones & Bartlett Learning.
Microsoft Corporation. (n.d.). Risk Management Discipline, Core Principles, and Components. Retrieved from Technet : http://technet.microsoft.com/en-us/library/cc526672.aspx
Pearce, M., Sherali, Z., & Hunt, R. (2013). Virtualization: Issues, Security Threats, and Solutions. ACM Computing Surveys, 45(2), 17-17:39. doi:10.1145/2431211.2431216
Tsai, H., Siebenhaar, M., Miede, A., Huang, Y., & Steinmetz, R. (2012). Threat as a Service? Virtualization's Impact on Cloud Security. IT Professional, 32-37.

More about The IT Department and Virtualization

Open Document