The Center for Internet Security have released version 1.0 of their benchmarks for securing Virtual Machines.  CIS produce many excellent resources on how to secure various operating systems and devices on your network and this is another valuable guide in that series.  Anyone considering deploying Virtual Machines in their environment would do well to review this guide first.  Remember though to test the configuration changes before deploying them into a production environment.

About the Author: bhimport

Let’s Talk

Please leave your contact details and a member of our team will be in touch shortly.

"*" indicates required fields