- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
Network World - Security and regulatory concerns have some users warily eyeing the move to server virtualization.
For example, during the past year, the Stanford Hospital & Clinics, part of Stanford University in Palo Alto, Calif., has shifted about half of its applications from traditional server platforms to VMware-based virtual machines (VM) -- and found it strongly impacted decision-making on security.
"You change the character of the IT infrastructure," says Mike Mucha, information security officer at the hospital, about what he's seen in virtualization's impact. "There's uncertainty."
"Virtualization tends to be an extension of the server component and it's led by the server team," Mucha says. But virtualization's
switching aspect means the traditional network itself is altered, which Mucha notes has generated some "pushback" from the
network and storage teams that also have to be at the table when it comes to making decisions.
"The server people are taking on non-traditional roles, making decisions about network architecture," he says about virtualization's impact in his organization.
Security questions come up, such as where to deploy intrusion-detection and management systems or firewalls, in a virtualized world.
There's awe in the instantaneous speed that VMware offers in set up and tear down of VMs but worry about potential abuse of that power, too, deliberate or unintentional.
Mucha decided Stanford Hospital & Clinics would benefit by adding another layer of security controls for VMware's ESX servers and management console by inserting the policy-enforcement appliance from start-up HyTrust.
The HyTrust appliance places controls on administrative and user decision-making responsibilities, plus adds some VM-focused intrusion-detection capability.
"It gives us some controls," Mucha says, adding when it comes to virtualization, a new era of risk mitigation is emerging that has to be addressed, especially as Cisco, Juniper and other traditional switch vendors introduce further virtualized switching technologies.
Others also caution that virtualization should be seen as introducing new risks that need to be understood, especially by any organization subject to regulatory concerns, such as the Payment Card Industry Data Security Standard (PCI DSS), which anyone processing payment-cards has to follow.
For anyone who has had no experience at all in virtualization, "if you have a choice, I highly recommend you don't adopt virtualization for any regulated projects," said Joshua Corman, principal security strategist at IBM's Internet Security Systems division, speaking on the topic at the recent Interop conference.
He said virtualization brings new attack surfaces, operational and availability risks, and increased complexity with features such as live migration. Live migration features that move VMs from one physical server to another open up new attack possibilities, he pointed out. Data center managers should be asking if their VMs are moving to less-secure servers.