Secure Virtualization Using SELinux (sVirt)
Source: Dan Walsh - Posted by Anthony Pell   
SELinux While virtualization seems to be next big thing, providing great opportunities in resource allocation, system management, savings on power and cooling, and the ability to grow and shrink resources depending on demand. But what about the security?

What happens when a cracker breaks into a virtual machine and takes it over? What happens if there is a bug in the hypervisor? Before virtualization, we had isolated servers. A cracker taking over one server meant that he controlled just that server. The cracker would then have to launch network attacks against other servers in the environment. System administrators had lots of tools to defend against network attacks on machines: firewalls, network traffic analysis tools, intrusion detection tools, etc.

Read this full article at Dan Walsh

Only registered users can write comments.
Please login or register.

Powered by AkoComment!