TY - GEN
T1 - A Virtualized Environment Security (VES) model for a secure virtualized environment
AU - Tolnai, Annette
AU - Von Solms, Sebastiaan
PY - 2010
Y1 - 2010
N2 - Security in virtualized environments has become a serious concern, as it gained acceptance in corporate data centers. The importance of the operational, organizational and economic context has been placed into the background, while much of the focus remained on the virtualization technology itself. The security of a virtualized environment requires a multi-faceted approach, where technical as well as non-technical aspects need to be taken into account. For example, securing the virtual machine alone will not secure the virtualized environment. The management of the virtual machines, users' roles and permissions, as well as the implementation of policies and procedures in the organization all plays a role in the overall security of the virtualized environment. Without compliance and best practice guidelines, amongst others, the organization is at risk. This paper will discuss the Virtualized Environment Security (VES) model, illustrating the necessary dimensions needed in order to secure a virtualized environment.
AB - Security in virtualized environments has become a serious concern, as it gained acceptance in corporate data centers. The importance of the operational, organizational and economic context has been placed into the background, while much of the focus remained on the virtualization technology itself. The security of a virtualized environment requires a multi-faceted approach, where technical as well as non-technical aspects need to be taken into account. For example, securing the virtual machine alone will not secure the virtualized environment. The management of the virtual machines, users' roles and permissions, as well as the implementation of policies and procedures in the organization all plays a role in the overall security of the virtualized environment. Without compliance and best practice guidelines, amongst others, the organization is at risk. This paper will discuss the Virtualized Environment Security (VES) model, illustrating the necessary dimensions needed in order to secure a virtualized environment.
UR - http://www.scopus.com/inward/record.url?scp=79951505779&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:79951505779
SN - 9781424488629
T3 - 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010
BT - 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010
T2 - 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010
Y2 - 8 November 2010 through 11 November 2010
ER -