Limit Virtual Machine Propagation
In the virtualized environment, existing server images can quickly and easily be duplicated and new ones introduced. Without a system in place to track virtual machines in the enterprise, several undesirable effects can materialize.
First, unauthorized, rogue virtual machines can be created in the virtual space that can log and intercept network traffic, disseminate malware, or burden the physical layer running applications for hackers or employees.
Serious issues can also arise from the ability to clone virtualized servers. With just a click of a mouse, an entire server and its data can be uploaded to the Internet or downloaded to a physical drive and taken home. Proprietary information can easily be leaked to competitors or sold to the highest bidder, so companies should have a plan in place to control virtual server replication.
Of course, not all problems arising from cloning are malicious. For example, a staffer may be tempted to clone a server to increase capacity, forgetting to change IP addresses and other settings, creating conflicts on the network that can disrupt network access.
Another problem with a multiplying array of virtual servers is management. Accounting for all the servers in the data center and ensuring that they are all patched with the latest updates and fixes, and scanned for viruses can be daunting enough without the needless replication of virtual machines.