As you know, physical firewalls don’t inspect or filter the vast amount of traffic that originates from a hypervisor running several virtualized servers. It turns out that this is a significant vulnerability when you consider that VMs start, stop, and move from one hypervisor to another at the click of a button.
Additionally, few hypervisors have the access controls that even the most basic file server has, and once someone gains access to the hypervisor, they could potentially access and control all of the VMs housed there.
Finally, protective features have to handle all these movements and activities, and agent backups are complex to manage — with one agent required per VM.
Even with the vulnerabilities clearly spelled out, many IT managers may still have “secure the hypervisor” way down on their to-do list – there are just so many priorities. That’s fine, of course – until the unthinkable happens.
So how should IT Managers protect VMs? Here are the four key things to consider: