

However, information theft does not require the physical removal of anything these days.

It is difficult but not impossible to steal a physical server or other substantial hardware resource from a physically secured data center assuming the spectrum of traditional security controls is implemented.

The vulnerability to theft of a physical object from a properly secured data center is likely to be low. There are certainly other vulnerabilities inherent to virtual environments that should be understood by information security personnel. The point is to show how physical security and physical access is relevant to virtualized environments because of the inherent concentration of risk. The focus here will be on VM attack vectors that are facilitated by physical security vulnerabilities or have a physical component. However, what are the security implications of virtualization?Įxcellent technical reviews of attack vectors targeting virtual technology are available online and are principal sources of information in the following discussion. It is clear that increased efficiency is a by-product of a virtualized environment. Young, in Information Security Science, 2016 Virtualization and Physical Security Risk
