- VMware vSphere Security Cookbook
- Mike Greer
- 280字
- 2021-08-05 17:16:04
Physical threats
The topic of physical security might seem out of place in a book on virtual security; however, it plays a key role. As referenced in the defense-in-depth model, the most thorough design and implementation can be breached if physical security fails. For example, if one can physically access a console logged in with administrative credentials, security controls are effectively neutralized.
Physical threats by nature are threats that require physical access to the hardware in order to exploit the systems. In the case of virtualization hardware, the threat vector is somewhat lessened if you assume that the hardware will reside in some form of secure datacenter structure, be it a secure facility or room. In addition, carrying out administrative tasks on management desktops situated in secure locations without access to any public networks will also reduce risk.
Even with equipment residing in a secure facility, there are a number of threats that remain, including nonmalicious factors such as extreme weather and power outages. Other threat vectors include security and authentication mechanisms to the facility and within the facility to the server location. Typically, in a highly secure facility, a cage within the datacenter is used to secure the server hardware. Entry into the cage is limited to certain personnel and controlled by biometric or card reader devices.
Another potential threat is the personnel that staff the facility. A dishonest employee, even one who has been fully vetted and background-checked can gain access to sensitive equipment and potentially the data residing on that equipment. Alternatively, a dishonest employee can grant access to an outsider who is intending to attack a particular company's server or virtualization environment contained in the facility.
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- 黑客攻防技巧
- INSTANT Metasploit Starter
- 諸神之眼:Nmap網(wǎng)絡(luò)安全審計技術(shù)揭秘
- ARM匯編與逆向工程:藍(lán)狐卷·基礎(chǔ)知識
- Falco云原生安全:Falco原理、實踐與擴展
- 信息安全導(dǎo)論(第2版)
- 情報驅(qū)動應(yīng)急響應(yīng)
- 數(shù)據(jù)安全與流通:技術(shù)、架構(gòu)與實踐
- 信息技術(shù)基礎(chǔ):提高篇·實驗與習(xí)題
- 數(shù)據(jù)安全架構(gòu)設(shè)計與實戰(zhàn)
- Mastering Malware Analysis
- INSTANT Kali Linux
- 黑客攻防與電腦安全從新手到高手(超值版)
- Web代碼安全漏洞深度剖析