Professional Documents
Culture Documents
SEMINAR PRESENTATION
ON
Name: S.Alekhya
Roll No:117222504023
MSc(Computer Science) 4th semester
SECURITY FOR VIRTUALIZATION PRODUCT
• In Paas and Saas the VM’s are shared by several customers.In Iaas
each VM is owned by a customer
• Customers have no access or control of the virtualization software .
Cont…
• Since virtualization is used by all cloud providers and is critical to host
security, users should ask for details on mechanisms implemented to
keep the virtualization layers secure.
• There are several attacks on the hypervisor level and these are known
as bugs.
➢Hypervisor security : Ensuring security of the hypervisor is paramount to
prevent unauthorized access , tampering.
➢Network Access control : Implementing strong access controls at the host level
helps prevent unauthorized access to physical servers and the virtualization
layer. This includes restricting physical access to data centers, employing
multi-factor authentication, and enforcing least privilege principles.
Cont…
➢Intrusion Detection and Prevention Systems (IDPS):
Deploying IDPS solutions at the host level helps detect and mitigate threats in
real-time. These systems monitor network traffic, system logs, and behavior patterns
to identify suspicious activities