Protecting VMs
Let’s get started!
Problem
Understanding how to secure VMs.
Context
With virtualization, compute resources are made available in the cloud in the form of VMs. VMs are like a server environment created within a computer. They have a guest operating system. The management plane of the hypervisor enables us to create and run multiple VMs. All the threats that are relevant for bare-metal servers are also applicable to VMs.
You can see a visual representation of this in the following diagram:
Figure 5.7 – VMs
VMs are subjected to the following attacks, in addition to those that are applicable to bare-metal servers as well:
- A VM can get infected with malware or operating system rootkits at runtime. This is malicious software that gives unauthorized access to a computer. It is hard to detect and can conceal its presence within an infected system. Hackers use rootkit malware to remotely access the VM and manipulate...