Book Image

Hyper-V Security

Book Image

Hyper-V Security

Overview of this book

Table of Contents (15 chapters)
Hyper-V Security
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Chapter 6. Securing Hyper-V Storage

One of the most vulnerable components of your Hyper-V deployment is its storage. If an attacker is able to gain access to the locations that house your virtual hard disks, compromising their data is fairly simple. While most administrators are well aware of the importance of locking down the access points to live storage, many overlook the necessity of using and securing data redundancy systems as well.

In this chapter, we will focus on the following topics:

  • Configuring NTFS security for virtual machine storage

  • Securing SMB 3.0 shares for virtual machine storage

  • Securing iSCSI connections

  • Using Secure Boot

  • Using BitLocker

  • Using Encrypted Cluster Disks

  • Understanding the role of backup