Episode 50 — Evaluate virtualization platforms and hypervisor attack surfaces
カートのアイテムが多すぎます
カートに追加できませんでした。
ウィッシュリストに追加できませんでした。
ほしい物リストの削除に失敗しました。
ポッドキャストのフォローに失敗しました
ポッドキャストのフォロー解除に失敗しました
-
ナレーター:
-
著者:
概要
This episode explains virtualization security as an assessment topic that often gets overlooked until a real incident or a hard exam question forces you to connect the hypervisor layer to PCI impact. You’ll define the virtualization stack, including hypervisors, management consoles, virtual switching, and shared storage, then connect those components to risks like privilege concentration, lateral movement, and hidden administrative pathways into in-scope systems. We’ll discuss how to harden virtualization platforms through restricted management access, strong authentication, segmentation of management networks, patching discipline, and logging that captures administrative actions with attribution. You’ll learn what evidence demonstrates control effectiveness, such as role definitions, console access logs, configuration baselines, and change records for critical settings that affect multiple workloads at once. Troubleshooting scenarios will include shared admin accounts on the console, management interfaces reachable from general networks, snapshot sprawl that exposes data, and unpatched hypervisors due to uptime pressure, along with practical steps to reduce attack surface while keeping operations stable. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.