If you plan on taking the Security+ exam you should have a good understanding of virtualization benefits and virtualization weaknesses. Virtualization has been gaining a lot of popularity over the years and has several benefits including:
- Reduced footprint
- Increased availability
- Isolation
Note: This blog is an excerpt from the
CompTIA Security+: Get Certified Get Ahead: SY0-301 Study Guide.
Reduced Footprint
The amount of physical space IT systems require and the amount of power they consume is sometimes referred to as their footprint. In this context, footprint is referring to an environmental footprint. For example, a carbon footprint refers to the total amount of carbon dioxide emitted due to the consumption of fossil fuels.
If an organization uses fewer physical servers, it reduces its footprint. A reduced footprint results in fewer wasted resources. Additionally, it can improve physical security, since the organization has less physical hardware to protect.
It’s worth noting that many organizations have underutilized servers. For example, a server may be running at less than 10 percent utilization, resulting in a significant amount of wasted resources. Not only is the extra processing power of these servers wasted, but all of the power and air to cool the servers is also wasted. This is one of the main drivers for physical to virtual (p2v) projects. For example, one company I know of did a survey and found that 80 percent of their servers were operating at less than 10 percent utilization. By virtualizing the servers, the company was able to save money on heating, ventilation, and cooling (HVAC) and server equipment.
Compare the deployment of five servers. If an organization installs five virtual servers on a single physical server instead of five, it saves on multiple fronts. The hardware costs less, takes up less space, consumes less power, and requires less cooling.
Similarly, if an organization converts a large datacenter from primarily physical servers to virtual servers, it can significantly reduce its datacenter’s footprint. For example, it may be able to reduce the size of a large datacenter from twenty rows of bays to just four rows.
Remember This
Virtualization reduces the footprint of an organization’s server room or datacenter and helps eliminate wasted resources. It also helps reduce the amount of physical equipment, reducing overall physical security requirements.
Increased Availability
Virtualization management software has improved over the years. Whether you’re using VMware’s virtualization products or Microsoft’s Hyper-V technology, you have tools that allow you to easily manage multiple physical servers hosting these virtual servers. Overall, this provides increased availability by reducing unplanned downtime for the virtual servers.
As mentioned previously, VMs are files. Just as you can copy a couple of text files from one system to another, you can also copy the VM files from one host to another.
For example, if one of your physical servers becomes overloaded, you can move virtual servers off the overloaded system to another physical server. Some virtual server management software makes this as simple as dragging and dropping the virtual servers from one host to another.
It’s also easy to restore a failed virtual server. If you create a backup of the virtual server files and the original server fails, you simply restore the files. You can measure the amount of time it takes to restore a virtual server in minutes. In contrast, rebuilding a physical server can take hours.
Most virtual management software also supports snapshots. For example, the following figure shows a snapshot from a Windows 7 VM. This can be very useful when testing updates. You can take a snapshot of a system prior to the update. If the update causes undesired results, you simply restore the snapshot and, as the saying goes, “it’s like it never happened.”
Isolation
Organizations usually configure online virtual servers so that they can communicate with other virtual and physical systems on the network. They use virtual network interface cards (NICs), and virtual networks for connectivity. However, it’s also possible to configure the virtual systems so that they are completely isolated.
For example, you can isolate a virtual server so that it can’t communicate with any other virtual or physical systems. In this way, it works just like a single system without a NIC. You can also group several virtual servers in their own virtual network so that they can communicate with each other but are isolated from hosts on the physical network.
Many security professionals use a virtual system or virtual network to test and investigate malicious software (malware). Malware released in an isolated environment presents minimal risk to the hardware and host operating system. Unfortunately, some malware is able to detect that it is running in a virtual environment. In some cases, malware developers have written code to change the behavior of the malware when it discovers it is running in a virtual environment.
Remember This
Security professionals use virtual systems to perform research on threats such as viruses. The virtual system remains isolated, preventing risk of contamination to the production environment.