MCTS Self-Paced Training Kit (Exam 70-652): Securing Hosts and Virtual Machines
- 6/17/2009
- Before You Begin
- Lesson 1: Securing the Resource Pool
- Lesson 2: Securing the Virtual Environment
- Case Scenario: Planning a Resource Pool Security Strategy
- Suggested Practices
- Chapter Summary
Case Scenario: Planning a Resource Pool Security Strategy
In the following case scenarios, you will apply what you’ve learned about securing hosts and virtual machines. You can find answers to these questions in the “Answers” section on the companion CD which accompanies this book.
You are the resource pool administrator for Lucerne Publishing. The Lucerne resource pool contains 12 main VMs in production running on 3 hosts. All hosts are managed with SCVMM and all hosts are running Hyper-V only. One new host has been brought in to support better levels of high availability in your machines. Lucerne also runs test and development environments on machines in other host groups.
Recently, one of your IT managers assisted a presentation on virtualization. The speaker talked a lot about security and the potential threats organizations face when working with virtual machines in production. Now the manager is all fired up and wants some answers to some tough questions. He has downloaded the Hyper-V Security Guide and is asking what kind of security has been implemented in your resource pool. He insists that it is necessary to document the security practices you put in place in the resource pool. Specifically, the manager wants answers to the following questions:
How is the resource pool configured and which components are running in it?
How do the resource pool components interact with each other?
How are the virtual machines running on the resource pool secured?