论文部分内容阅读
数据中心传统安全的实施依赖于边界的物理设备,但这对于虚拟基础设施环境内安全相关的活动是完全不能感知的。虚拟化和云计算带来新的基础架构问题,安全服务提供商在构建安全基础应对这些问题和威胁时必须加以考虑。本文通过企业或组织在部署和采用虚拟化和云计算基础设施时面对的安全威胁进行分析的基础上,包括:访问控制、策略管理、配置控制和活动日志等,探讨了虚拟化对每个威胁产生了怎样的影响。在此基础上,概述了企业和组织可以采用的创新性的方法,并提供自动化控制和合规性的保护方案。
The traditional implementation of data center security relies on physical devices at the boundaries, but this is completely imperceptible to security-related activities within the virtual infrastructure environment. Virtualization and cloud computing lead to new infrastructure issues that security service providers must consider when building a security foundation to address these issues and threats. Based on an analysis of security threats that enterprises or organizations face when deploying and deploying virtualization and cloud computing infrastructures, including access control, policy management, configuration control, and event logging, this article explores how virtualization works for each What impact the threat has had? From there, it outlines innovative approaches that businesses and organizations can adopt and offers automated control and compliance protection schemes.