000 03342cam  2200409zi 4500
0019.900029
003CaOODSP
00520221107175301
006m     o  d f      
007cr cn|||||||||
008210520e20200327onca    ob   f000 0 eng d
040 |aCaOODSP|beng|erda|cCaOODSP
043 |an-cn---
0861 |aD97-3/70-010-2020E-PDF
24500|aCyber Centre data centre virtualization report : |bbest practices for data centre virtualization.
264 1|a[Ottawa] : |bCommunications Security Establishment = Centre de la sécurité des telecommunications, |cMarch 27, 2020.
300 |a1 online resource (33 pages) : |bcolour illustrations.
336 |atext|btxt|2rdacontent
337 |acomputer|bc|2rdamedia
338 |aonline resource|bcr|2rdacarrier
4901 |aPractitioner ; |vITSP.70.010
500 |aIssued also in French under title: Rapport du Centre pour la cybersécurité sur la virtualisation des centres de données : pratiques exemplaires en matière de virtualisation des centres de données.
500 |a"Unclassified."
500 |a"Canadian Centre for Cyber Security."
500 |aIssued also in HTML format.
504 |aIncludes bibliographical references (pages 31-33).
520 |a"To improve efficiency and streamline operations, many organizations are virtualizing their data centres. However, some are doing so without a proper understanding of the security implications of their decisions on the overall security posture of the data centre. By increasing their consolidation ratios (i.e. the number of virtual machines that can operate on each physical host machine), many organizations may unintentionally compromise their network security architecture. Moreover, any attempt to replace many of the physical isolation mechanisms with logical equivalents may introduce unacceptable risk into their network architecture. … A virtualized data centre (VDC) must address the threats, inherent vulnerabilities, and characteristic risks to data centres, as well as those specific to complex virtualized environments. Fortunately, VDCs can be made secure by using several safeguards and best practices. These safeguards and best practices involve addressing each layer of the virtual environment as well as addressing interactions between the various layers. This report provides an overview of a VDC, presents the inherent vulnerabilities in a VDC, and provides recommendations on how to design a secure VDC"--Overview, page 3.
650 0|aData centers|xSecurity measures|zCanada.
650 0|aVirtual computer systems|xSecurity measures|zCanada.
650 0|aComputer networks|xSecurity measures|zCanada.
7102 |aCommunications Security Establishment (Canada), |eissuing body.
7102 |aCanadian Centre for Cyber Security, |eissuing body.
77508|tRapport du Centre pour la cybersécurité sur la virtualisation des centres de données : |w(CaOODSP)9.891340
830#0|aPractitioner series, information technology security guidance ;|vITSP.70.010.|w(CaOODSP)9.842846
85640|qPDF|s909 KB|uhttps://publications.gc.ca/collections/collection_2021/cstc-csec/D97-3-70-010-2020-eng.pdf
8564 |qHTML|sN/A|uhttps://cyber.gc.ca/en/guidance/cyber-centre-data-centre-virtualization-report-best-practices-data-centre-virtualization