You are on page 1of 6

RBVRR WOMEN’S COLLEGE

SEMINAR PRESENTATION
ON

SECURITY FOR VIRTUALIZATION PRODUCT

COURSE TITLE: Cloud Computing


2023-2024

Name: S.Alekhya
Roll No:117222504023
MSc(Computer Science) 4th semester
SECURITY FOR VIRTUALIZATION PRODUCT

• The cloud provider is responsible for the security of the virtualization


software in all the public cloud deployments.
• It is the software that sits on top of the bare metal and enables the
provider or the customer to create,delete virtual machines .
• It enables several virtual machines or os instances to share the same
underlying server resources.
Cont…
• Some common hypervisors used by cloud providers are
▪ vSphere from VMware,
▪ Hype-v from Microsoft
▪ Xen from Citrix

• In Paas and Saas the VM’s are shared by several customers.In Iaas
each VM is owned by a customer
• Customers have no access or control of the virtualization software .
Cont…
• Since virtualization is used by all cloud providers and is critical to host
security, users should ask for details on mechanisms implemented to
keep the virtualization layers secure.
• There are several attacks on the hypervisor level and these are known
as bugs.
➢Hypervisor security : Ensuring security of the hypervisor is paramount to
prevent unauthorized access , tampering.
➢Network Access control : Implementing strong access controls at the host level
helps prevent unauthorized access to physical servers and the virtualization
layer. This includes restricting physical access to data centers, employing
multi-factor authentication, and enforcing least privilege principles.
Cont…
➢Intrusion Detection and Prevention Systems (IDPS):
Deploying IDPS solutions at the host level helps detect and mitigate threats in
real-time. These systems monitor network traffic, system logs, and behavior patterns
to identify suspicious activities

You might also like