From the course: Security Testing: Vulnerability Management with Nessus

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Virtualization vulnerabilities

Virtualization vulnerabilities - Nessus Tutorial

From the course: Security Testing: Vulnerability Management with Nessus

Start my 1-month free trial

Virtualization vulnerabilities

- [Teacher] Virtualization is a strategy commonly used to optimize the use of hardware in both on premises and cloud data centers. Virtualization technology allows multiple virtual hosts to run at the same time on a single hardware platform. One physical server may run dozens or hundreds of virtual servers, allowing all of those virtual hosts to share memory and processing power. From a security perspective, this means that we have to be extra careful to ensure that systems are isolated from each other. Virtualization platforms use a component called the hypervisor to restrict each virtual machine so that it can only access areas of memory reserved for its use. The hypervisor also prevents virtual machines from accessing memory belonging to other virtual hosts running on the same hardware platform. You might think of the hypervisor as the security guard of the virtualized environment. This separation of access is especially important in a shared environment like the cloud, where many…

Contents