Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

How is access restricted to protected resources and what kind of controls can be placed on such access?

0
Posted

How is access restricted to protected resources and what kind of controls can be placed on such access?

0

Configuration Management The first configuration decision related to virtualization technology that could affect an organizations security posture is the specific technology they choose to deploy. By this we do not mean which vendor is selected, but rather the specific virtualization stack they decide upon. Companies are faced with two choices: 1. Use a virtualization-aware operating system, or run on a highly optimized for virtualization layer with no standard operating system in the mix at the host layer. 2. Run on a vanilla unmodified operating system like Microsoft Windows XP or Red Hat Enterprise Linux, where the virtualization layers are built as applications and drivers on top of this standard operating system. Based on which choice organizations make, the levels of performance would differ, as would the feature sets and the level of administrative complexity. It is important to make this choice carefully, taking into account the skill sets of your staff. For example, if your te

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123