On 10/25/07, L. V. Lammert <[EMAIL PROTECTED]> wrote:
> The 'obvious' security benefits were in two or three other posts, . but, to
> summarize:
>
>  > Separate UID/PWs for each domain/VM

Uh, how else would it work? How is this specific to virtualization?

>  > Separate admin configurations & tools

See above.

>  > Separate authentication configurations (UID/PW, LDAP, ...)

See above.

>  > Separate configs for network services (apache, samba)

See above.

>  > Separate machine configurations (Ruby, Tomcat, or HTML)

See above.

>  > Isolation of each OS guest (this has been a major discussion point, the
> consensus being that with the possiblility of DOMU -> DOM0 exploits,
> running 'insecure' VMs post a higher risk to DOM0 and the entire machine);

Separation of guest OS's is a feature of VM's. It does'nt even apply
to non-VM situations since it solves a problem that only exists in
virtualization.

> As pointed out previously, the discussion was originally about the benefits
> of separate application domains within an enterprise.

I'm sure there are benefits for certain situations.

---
Lars Hansson

Reply via email to