My networking group is working with our applications group about virtualizing one of our enterprise systems. This system has a lot of sensitive information on it. My infosec team is not keen on virtualizing the host and secure network it sits on into our virtual infrastructure for fear of crossing a Host/guest os boundary or the virtual VLAN switching boundaries. Has anyone has any experience with something similar? Is this in fact a threat to our infrastructure? Ask questions if there is anything I need to clear up. thanks
No comments:
Post a Comment