Secure your Microsoft Hyper-V environment with this new security guide

analysis
Apr 6, 20092 mins

Microsoft told you about the benefits of Hyper-V virtualization. And now it's telling you about how to address security concerns with its latest Solution Accelerator guide

Microsoft’s Hyper-V technology helps to provide consolidation of workloads in the datacenter, but what about security concerns after the fact?

The company has just published a finalized document just for this concern.  Part of Microsoft’s Solution Accelerator series, a new document, Microsoft Hyper-V Security Guide, is now available.  The guide is designed to provide you with guidance, instructions, and recommendations to help you elevate the security of virtualized Microsoft Windows Server 2008 environments to address your business-critical needs.  And it provides you with recommendations to address your key security concerns around server virtualization.

[ One of Hyper-V’s advertised strengths — the host partition’s ability to work with generic Windows device drivers — is also its greatest weakness: See “Hyper-V’s Achilles’ heel.” | Read the InfoWorld Test Center review: Microsoft’s Hyper-V does the trick ]

The Hyper-V Security Guide includes the following content:

  • Overview. The overview states the purpose and scope of the guide, defines the guide audience, and describes its structure to help you locate the information that is relevant to you. It also describes the user prerequisites for the guidance.
  • Chapter 1: Hardening Hyper-V. This chapter provides prescriptive guidance for hardening the Hyper-V role, including several best practices for installing and configuring Hyper-V with a focus on security. These best practices include measures for reducing the attack surface of Hyper-V as well as recommendations for properly configuring secure virtual networks and storage devices.
  • Chapter 2: Delegating virtual machine management. This chapter discusses methods for delegating virtual machine management so that virtual machine administrators only have the minimum permissions they require. It describes common delegation scenarios and includes detailed steps to guide you through using Authorization Manager (AzMan) and System Center Virtual Machine Manager 2008 (VMM 2008) to separate virtual machine administrators from virtualization host administrators.
  • Chapter 3: Protecting virtual machines. This chapter provides prescriptive guidance for securing virtual machine resources. It includes best practices and detailed steps for protecting virtual machines by using a combination of file system permissions, encryption, and auditing.

You can download the Hyper-V Security Guide now.