CIPUG Morgan King Virtualization
CIPUG Morgan King Virtualization
CIPUG Morgan King Virtualization
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Virtual Machines• Dynamic nature – “VM Sprawl”o How are unauthorized virtual cyber assets prevented?• Virtual Machines should be treated no differently thanphysical machines in terms of -o Segmentationo Physical Securityo Least Privilege Accesso Security Patchedo Subject to Change control/Configuration Managemento Proper Disposal/Redeployment47