Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Virtualization

Welcome to the Virtualization topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now

 
This Topic Has:
331 Members
1 Online
6581 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 10 total

Must be a Topic member to contribute
View All »
Hi everybody. I am performing an audit on a Redhat Enterprise Virtualization 4.1 environment. Are you aware of some ISACA checklist related to this technology? I also tried to look for hardening and security configuration guides about the same techn...
Andrea035 | 11/8/2017 5:20:35 AM | COMMENTS(2)
hi Can anyone help with a work program  / checklist for the purpose of auditing Windows 7 Desktop on VDI (virtual Desktop Infrastructure).
Bader-Addin511 | 5/5/2017 4:20:03 PM | COMMENTS(0)
I want to know how to Audit VMWare environment i.e. VMWare Virtualization and private cloud build on VMWare.
Vinay189 | 2/19/2016 3:39:03 AM | COMMENTS(2)
Hi,I was wondering  if  auditing a vmware based infrastructure is  quite different from auditing a Hyper-V based one. Is  thereany recommended hands-on material for finishing up similar tasks?Many thanks in advance, Kostas
Konstantinos741 | 6/26/2015 8:12:07 AM | COMMENTS(3)
What types of controls should be put in place over SOX systems when they are moved from a physical to a virtual environment? 
cwalker52 | 12/4/2014 4:48:25 AM | COMMENTS(1)
We are considering to utilize VDI technology and use it for end-user computing. Anyone likes to share experience regarding the following:Was it driven by Business (better ROI, Agility, Security) or by IT (newer technology, ease of administration)Were you ...
-adnan- | 8/21/2014 2:37:09 AM | COMMENTS(0)

Documents & Publications: 15 total

Must be a Topic member to contribute
View All »
Downloads
Posted by ISACA 1536 days ago
Posted by ISACA 873 days ago
Posted by ISACA 878 days ago
Books
Posted by ISACA 1019 days ago
ICQs and Audit Programs
Posted by ISACA 1186 days ago

Events & Online Learning: 1 total

Journal Articles: 9 total

Volume 4, 2016
by Tony Wang
The growth in connected devices that could reside anywhere in the world has increased the complexity and difficulty of managing them and the related network traffic.
Volume 4, 2016
by Nikesh Dubey, CISA, CISM, CRISC, CCISO, CISSP
SDN refers to all of the protocols and technologies that work in synchrony to create a global view of the network and provide a centralized, intelligence-based network service, delivery and control.
Volume 3, 2016
by Davi Ottenheimer and Matthew Wallace | Reviewed by A. Krista Kivisild, CISA, CA, CPA
This book is aimed at anyone with an interest in security and compliance in virtualized and cloud environments—appealing to both technical and nontechnical readers.
Volume 6, 2013
by Markus Pfister, CISA
This article explains the basic concepts of buffer overflows and presents seven points IS auditors should consider in their audit programs.
Volume 5, 2013
by Shah H. Sheikh, CISA, CISM, CRISC, CISSP, CCSK
Cloud computing is a significant step in the Internet’s evolution, providing the means through which everything can be delivered as a service wherever and whenever needed.
Volume 1, 2011
by Abhik Chaudhuri, MCA, PMP, SH (Basie) von Solms, and Dipanwita Chaudhuri, ACA (ICAI), MIIA
This article discusses virtual IT systems and the inherent risks that need to be audited for proper risk mitigation.

Wikis: 2 total

Blog Posts: 0 total

Must be a Topic member to view blog posts

No Results Found