10.08.2015 Views

Risico’s van een gevirtualiseerde IT-omgeving

Risico's van een gevirtualiseerde IT-omgeving - Vurore

Risico's van een gevirtualiseerde IT-omgeving - Vurore

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Risico’s</strong> <strong>van</strong> <strong>een</strong> <strong>gevirtualiseerde</strong> <strong>IT</strong>-<strong>omgeving</strong>Possen & Ulrich---------------------------------------------------------------------------------------------------------------------------InhoudsopgaveSamenvatting........................................................................................................................................... 1Inhoudsopgave ........................................................................................................................................ 31. Introductie ...................................................................................................................................... 51.1 Aanleiding ............................................................................................................................. 51.2 Doelstelling ............................................................................................................................ 61.3 Onderzoeksvraag ................................................................................................................... 71.4 Onderzoeksaanpak ................................................................................................................. 72. Virtualisatie .................................................................................................................................... 92.1 Definitie <strong>van</strong> virtualisatie ...................................................................................................... 92.2 Virtualisatie achtergrond ....................................................................................................... 92.3 Virtualisatie: mogelijke voordelen of pure noodzaak? ........................................................ 102.3.1 Voordelen <strong>van</strong> server virtualisatie ................................................................................... 102.3.2 Noodzaak voor toekomstige ontwikkeling ...................................................................... 112.3.3 Virtualisatie <strong>van</strong> de databaseserver ................................................................................. 122.4 Server virtualisatie ............................................................................................................... 132.4.1 Volledige virtualisatie ..................................................................................................... 132.4.2 Paravirtualisatie ............................................................................................................... 132.4.3 Virtualisatie ondersteunende hardware ........................................................................... 132.5 Componenten bij volledige virtualisatie .............................................................................. 142.5.1 Virtualization Layer ........................................................................................................ 142.5.2 Virtual Machines ............................................................................................................. 152.5.3 Service Console ............................................................................................................... 152.5.4 VirtualCenter ................................................................................................................... 152.5.5 Virtual Networking Layer ............................................................................................... 152.5.6 Virtual Storage ................................................................................................................ 152.6 Consequenties voor infrastructuur en beheer ...................................................................... 152.6.1 Consequenties voor het netwerk ..................................................................................... 162.6.2 Consequenties voor de data opslag ................................................................................. 162.6.3 Consequenties voor infrastructuur en gebruikersbeheer ................................................. 173. <strong>IT</strong> - Audit <strong>van</strong> <strong>een</strong> databaseserver <strong>omgeving</strong> ............................................................................... 193.1 Audit aanpak ........................................................................................................................ 193.1.1 Beschikbaarheid .............................................................................................................. 193.1.2 Integriteit ......................................................................................................................... 203.1.3 Vertrouwelijkheid ........................................................................................................... 203.2 <strong>IT</strong>- beheersmaatregelraamwerken ....................................................................................... 204. Delta identificatie voor <strong>IT</strong>-beheerprocessen bij virtualisatie ....................................................... 254.1 Define the information architecture (PO02) ........................................................................ 254.2 Assess and manage <strong>IT</strong> risks (PO09) .................................................................................... 264.3 Manage changes (AI06)....................................................................................................... 284.4 Manage performance and capacity (DS03) ......................................................................... 324.5 Ensure continuous service (DS04) ...................................................................................... 354.6 Ensure systems security (DS05) .......................................................................................... 394.6.1 Algem<strong>een</strong> ........................................................................................................................ 394.6.2 Virtual machine (VM)..................................................................................................... 404.6.3 Service Console ............................................................................................................... 44---------------------------------------------------------------------------------------------------------------------------Pagina 3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!