000
| 03389nam 2200409zi 4500 |
---|
001 | 9.900029 |
---|
003 | CaOODSP |
---|
005 | 20230713113543 |
---|
006 | m o d f |
---|
007 | cr cn||||||||| |
---|
008 | 210520e20200327onca ob f000 0 eng d |
---|
040 | |aCaOODSP|beng|erda|cCaOODSP |
---|
043 | |an-cn--- |
---|
086 | 1 |aD97-3/70-010-2020E-PDF |
---|
245 | 00|aCyber Centre data centre virtualization report : |bbest practices for data centre virtualization. |
---|
264 | 1|a[Ottawa] : |bCommunications Security Establishment = Centre de la sécurité des telecommunications, |cMarch 27, 2020. |
---|
300 | |a1 online resource (33 pages) : |bcolour illustrations. |
---|
336 | |atext|btxt|2rdacontent |
---|
337 | |acomputer|bc|2rdamedia |
---|
338 | |aonline resource|bcr|2rdacarrier |
---|
490 | 1 |aPractitioner ; |vITSP.70.010 |
---|
500 | |aIssued also in French under title: Rapport du Centre pour la cybersécurité sur la virtualisation des centres de données : pratiques exemplaires en matière de virtualisation des centres de données. |
---|
500 | |a"Unclassified." |
---|
500 | |a"Canadian Centre for Cyber Security." |
---|
500 | |aIssued also in HTML format. |
---|
504 | |aIncludes bibliographical references (pages 31-33). |
---|
520 | |a"To improve efficiency and streamline operations, many organizations are virtualizing their data centres. However, some are doing so without a proper understanding of the security implications of their decisions on the overall security posture of the data centre. By increasing their consolidation ratios (i.e. the number of virtual machines that can operate on each physical host machine), many organizations may unintentionally compromise their network security architecture. Moreover, any attempt to replace many of the physical isolation mechanisms with logical equivalents may introduce unacceptable risk into their network architecture. … A virtualized data centre (VDC) must address the threats, inherent vulnerabilities, and characteristic risks to data centres, as well as those specific to complex virtualized environments. Fortunately, VDCs can be made secure by using several safeguards and best practices. These safeguards and best practices involve addressing each layer of the virtual environment as well as addressing interactions between the various layers. This report provides an overview of a VDC, presents the inherent vulnerabilities in a VDC, and provides recommendations on how to design a secure VDC"--Overview, page 3. |
---|
650 | 0|aData centers|xSecurity measures|zCanada. |
---|
650 | 0|aVirtual computer systems|xSecurity measures|zCanada. |
---|
650 | 0|aComputer networks|xSecurity measures|zCanada. |
---|
710 | 2 |aCommunications Security Establishment (Canada), |eissuing body. |
---|
710 | 2 |aCanadian Centre for Cyber Security, |eissuing body. |
---|
775 | 08|tRapport du Centre pour la cybersécurité sur la virtualisation des centres de données : |w(CaOODSP)9.891340 |
---|
830 | #0|aPractitioner series, information technology security guidance (Communications Security Establishment (Canada))|vITSP.70.010.|w(CaOODSP)9.842846 |
---|
856 | 40|qPDF|s909 KB|uhttps://publications.gc.ca/collections/collection_2021/cstc-csec/D97-3-70-010-2020-eng.pdf |
---|
856 | 4 |qHTML|sN/A|uhttps://cyber.gc.ca/en/guidance/cyber-centre-data-centre-virtualization-report-best-practices-data-centre-virtualization |
---|