Hyper-V and Security
Are you one of those IT and Security professionals looking for best practices, recommendations to secure a Virtual Infrastructure based on Microsoft Hyper-V.
Well look no further, Microsoft has just released Hyper-V Security guide.
Some lines from this guide:
The guide provides authoritative guidance that relates to the following strategies for securing virtualized environments:
Hardening the Hyper-V role. The guide provides prescriptive guidance for hardening the Hyper-V role, including several best practices for installing and configuring Hyper-V with a focus on security. Among these best practices are measures for reducing the attack surface of Hyper-V as well as recommendations for properly configuring secure virtual networks and storage devices.
Delegating virtual machine management. The ability to safely and securely delegate administrative access to virtual machine resources within an organization is essential. The guide highlights several available methods to administer different aspects of a virtual machine infrastructure and ways to control administrative access to
different servers and at different levels.
Protecting virtual machines. The guide also provides prescriptive guidance for securing virtual machine resources, including best practices and detailed steps for protecting virtual machines by using
a combination of file system permissions, encryption, and auditing.
Download the full guide from Microsoft Download Center