Chapter 7. Securing Proxmox VE
"Abstraction may be discovered or produced, may be material or immaterial, but abstraction is what every hack produces and affirms....To hack is to produce or apply the abstract to information and the possibility of new worlds" | ||
-- A Hacker Manifesto, McKenzie Wark |
"Putting it bluntly, virtualization is deception." | ||
-- Data Center Virtualization Essentials, Gustavo Alessandro Andrade Santana |
"The enemy knows the system being used..." | ||
-- Shannon's Maxim |
"Security through obscurity is not an answer." | ||
-- Information Security: Principles and Practices, Merkow and Breithaupt |
"Containers have quickly become a popular cloud-optimization strategy for enterprises, however, what do we really know about the security implications?" | ||
-- Kowsik Guruswamy |
The end goal of this chapter is to support you in mitigating threats to the security of your Proxmox VE infrastructure.
We start by enumerating and articulating the potential benefits of virtualization on infrastructure...