InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Infrastructure and Virtualization Security

Presented by

Simon Leech (Director, Hewlett Packard Enterprise) and John B. Oseh (Information Security Consultant, Handensbanken Plc, UK)

About this talk

In this presentation we delve into the Infrastructure and Virtualization Security (IVS) domain, which comprises nine control specifications designed to guide both Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs) in securing infrastructure and virtualization technologies. This domain covers the protection of hardware, software, networks, and facilities essential for delivering IT services, as well as the virtualization technologies that abstract hardware resources into virtual environments. Under the Shared Security Responsibility Model (SSRM), both CSPs and CSCs are typically responsible for implementing IVS controls. CSPs are generally tasked with securing the underlying infrastructure, including platform technologies (like hypervisors and virtual machines), network virtualization, and providing capabilities for resource planning. CSCs are responsible for securing their allocated resources within the virtualized environment, such as hardening guest operating systems, applying security patches, and managing access to platforms and control interfaces.
Cloud Security Alliance: CloudBytes

Cloud Security Alliance: CloudBytes

80677 subscribers1017 talks
Educational series on cloud computing, security and privacy.
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa
Related topics