Hyper-V Security Guide
The Solution Accelerators team has just released a new Hyper-V Security guide that may prove helpful in designing secure Project Server deployments in Hyper-V.
The guide is available for download here: http://www.microsoft.com/downloads/details.aspx?FamilyID=2220624b-a562-4e79-aa69-a7b3dffdd090&displaylang=en
Secure your virtualized server environment with the Hyper-V Security Guide
For organizations that seek cost-effective operations, the benefits of virtualization are more evident than ever. Microsoft Hyper-V technology allows consolidation of workloads that are currently spread across multiple underutilized servers onto a smaller number of servers. This capability provides you with a way to reduce costs through lower hardware, energy, and management overhead while creating a more dynamic IT infrastructure.
Virtualization technologies are causing enterprise organizations to shift their thinking about IT. The Hyper-V Security Guide can help you elevate the security of virtualized Windows Server® environments to address your business-critical needs. This accelerator provides IT professionals like you with recommendations to address your key security concerns around server virtualization. The guide provides authoritative guidance that relates to the following strategies for securing virtualized environments:
Hardening the Hyper-V role. The guide provides prescriptive guidance for hardening the Hyper-V role, including several best practices for installing and configuring Hyper-V with a focus on security. Among these best practices are measures for reducing the attack surface of Hyper-V as well as recommendations for properly configuring secure virtual networks and storage devices.
Delegating virtual machine management. The ability to safely and securely delegate administrative access to virtual machine resources within an organization is essential. The guide highlights several available methods to administer different aspects of a virtual machine infrastructure and ways to control administrative access to different servers and at different levels.
Protecting virtual machines. The guide also provides prescriptive guidance for securing virtual machine resources, including best practices and detailed steps for protecting virtual machines by using a combination of file system permissions, encryption, and auditing.