Virtual environments demand concrete security

1 March 2012 Information Security

In order to keep corporate information safe in the virtual environment, organisations will need to take an integrated approach. Consider the following five steps to successfully implementing virtualisation in an organisation.

Group applications by configuration: On physical machines, one server might host any number of different applications, each with its own configuration. This created a headache when it comes to policy management. The advantage offered by a virtual infrastructure is the ability to dynamically group these applications to more easily apply security policies.

Utilise reputation-based security: Traditional security solutions perform frequent file-by-file checks, which can be resource-intensive and ineffective at guarding against new threats. Reputation-based security, however, draws on anonymous usage data from millions of users worldwide to determine suspect files. Because of the need to scan fewer files less frequently, it minimises resource usage on the machine.

Implement central management for virtual machines: Managing traditional endpoints can be time-consuming and prone to security risks. A delay in patch management, or a lag in updating security setting on different machines, can be the difference between a secure infrastructure and a data breach. Take advantage of the benefits of virtualised endpoint management by implementing security practices and policies system-wide, to maximise protection of corporate data.

Group machines to control user access: A host-based approach allows organisations to separate groups of virtual machines to shield various system components, such as file systems, applications and registry keys. This allows an organisation to more easily restrict access to privileged networks, and determine access level for all users, including administrators.

Monitor the network: One of the greatest advantages, and sometimes a great challenge, of virtualisation is network monitoring. The ability of an organisation to centrally manage the system creates the potential for simplified monitoring of the system. Organisations should carefully consider the available solutions from vendors, and select the one that best meets the needs of the cloud configuration. Solutions should offer the following features:

* Automated control assessment functions, to optimise compliance with regulatory standards such as PCI and HIPAA.

* Flexible policy-based controls, to monitor for changes against established configurations.

* Consolidation of log monitoring and aggregate events, to detect changes to system resources.

* Adherence to VMware hardening guidelines, and automated system response, to monitor multiple files from multiples operating systems simultaneously.

And then to basics

In addition to the security guidelines that apply specifically to virtualised systems, adhering to well-established general security procedures will also improve the level of security in your data centre.

Establish two-factor authentication: Traditional, single-password systems do not provide sufficient security against today’s sophisticated attacks. Two-factor authentication is necessary to provide adequate security.

* Utilise encryption: Data encryption provides additional peace of mind in a virtualised system. It provides protection from outside threats, as well as inside risks such as loss of portable devices containing corporate information.

* Maintain traditional endpoint security: Even in a world of virtualised services, desktop/endpoint virtualisation should not be overlooked. Maintain your policies of a multifaceted endpoint security through utilisation of firewalls, antivirus and patching policies. In fact, Gartner predicts that within four years more than one-third of security solutions will be on virtualised systems.

As you look to take advantage of the vast potential of virtualisation, creating a comprehensive security plan is vital. While this can seem a daunting task, in principle it remains similar to protecting a traditional data centre, in that what you are really protecting is the information, rather than the hardware itself. Just as organisations have done for years, working to implement multitiered security solutions will minimise the risk of data loss from internal or external sources.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...
African industries may overestimate cyber defences
Information Security
A significant perception gap exists in security awareness training: 68% of leaders believe training is tailored to roles, yet only a third of employees feel adequately trained. Many organisations only conduct annual or biannual generic training that may not effectively change behaviour.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.