Hyper-V How To: Plan Security

The Hyper-V Planning and Deployment Guide has just been updated with information about security best practices (including AzMan) and backup:

Planning for Hyper-V Security

Planning for Backup

Using Authorization Manager for Hyper-V Security

Configure Hyper-V for Role-based Access Control

Did we miss anything for these topics? What is the next topic you need? Leave comments.

Additional Resources:

Hyper-V Attack Surface Reference Workbook The Windows Server 2008 Security Guide includes a spreadsheet you can download that lists all the attack surfaces for Windows Server 2008. This guide was initially published before Hyper-V role RTM. When the Security Guide is updated, a new worksheet in the Attack Surface Reference Workbook will be added that lists the attack surfaces for Hyper-V. Until then, you can find the same information in the Hyper-V Attack Surface Reference Workbook, available for download at http://download.microsoft.com/download/8/2/9/829bee7b-821b-4c4c-8297-13762aa5c3e4/Windows Server 2008 Hyper-V Attack Surface Reference.xlsx    

Virtualization Security Best Practices Podcast: http://download.microsoft.com/download/5/c/b/5cb1943c-751d-4fd4-a897-38926e90a86f/BrandonBakerHyperVSecurity2Podcast.wma

Windows Server Virtualization and Windows Hypervisor: https://www.blackhat.com/presentations/bh-usa-07/Baker/Presentation/BH07_Baker_WSV_Hypervisor_Security.pdf

"Security in a Virtual World": http://technet.microsoft.com/en-us/library/cc974514.aspx