Abstract:
In a computer-implemented method for automatically auditing virtual machines for security hardening compliance security policies of virtual machines in a virtualization infrastructure are accessed by a centralized compliance manager of the virtualization infrastructure. Security hardening compliance of the virtual machines automatically audited based on the security policies by the centralized compliance manager.
Abstract:
Credentials management and usage in application modernization can be implemented as computer-readable methods, media and systems. A notification identifying an application modernization operation is received. The operation is to be performed on an application deployed by multiple resources arranged in multiple hierarchical levels. A resource residing at a hierarchical level of the multiple hierarchical levels is identified. The application modernization operation is to be performed on the identified resource which has a resource type. A search for a credential is performed. The credential grants access to the resource to enable performing the application modernization operation. In response to the searching, a credential included in the multiple credentials is identified. The identified credential grants access either to the resource or to resources of the resource type. In response to receiving the notification, the identified credential is provided.
Abstract:
In a computer-implemented method for automatic security hardening of an entity at time of creation in a virtualization infrastructure, creation of an entity is initiated in the virtualization infrastructure. In response to initiating provisioning of the entity, security policy is automatically associated to the entity such that the entity is automatically security hardened at the time of provisioning.
Abstract:
Examples provide for automatically provisioning hosts in a cloud environment. A cloud daemon generates a cloud host-state configuration, for a given cloud instance of a host, stored on a cloud metadata service prior to first boot of the given cloud instance of the host. A first boot of a plurality of cloud instances of hosts is performed using a stateless, master boot image lacking host-specific configuration data. On completion of the first boot of a given cloud instance of a host, the cloud host-state configuration is installed on the master boot image to generate a self-configured boot image including host-specific configuration data for the given cloud instance of the host. A second boot is performed on the given cloud instance of the host by executing the self-configured boot image to automatically provision the given cloud instance of the host in the cloud environment.
Abstract:
In a computer-implemented method for automatic real-time alerting of security hardening non-compliance security policies of virtual machines in a virtualization infrastructure are accessed. Impending non-compliance of at least one of said security policies is determined. In response to the impending non-compliance of at least one of said security policies, a real-time alert of the impending non-compliance of at least one of the security policies is automatically generated.
Abstract:
In a computer-implemented method for security hardening of a virtual machine at time of creation, creation of a virtual machine hosted by a pre-configured hyper-converged computing device is initiated in a virtualization infrastructure, wherein a centralized management tool is for centralized management of the virtualization infrastructure. User selected parameters for a security policy are accessed via the centralized management tool. The security policy is associated to the virtual machine such that the virtual machine is security hardened at the time of creation, wherein the security policy associated with the virtual machine comprises the user selected parameters.