Securing VMs
VMs have the same capabilities as physical machines on-premises, allowing us to deploy our applications while having full control over all aspects (from security to maintainability) inside the VM operating system.
VMs are commonly used for legacy applications or migrating on-premises applications to the cloud.
Each cloud provider has its implementation of VMs (or virtual servers), but at the end of the day, the basic idea is the same:
- Select a machine type (or size) – a ratio between the amount of virtual CPU (vCPU) and memory, according to their requirements (general-purpose, compute-optimized, memory-optimized, and so on).
- Select a preinstalled image of an operating system (from Windows to Linux flavors).
- Configure storage (adding additional volumes, connecting to file-sharing services, and so on).
- Configure network settings (from network access controls to micro-segmentation, and others).
- Configure permissions to access cloud resources...