Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.


Welcome to the Virtualization topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now

This Topic Has:
338 Members
0 Online
6706 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 10 total

Must be a Topic member to contribute
View All »
hi Can anyone help with a work program  / checklist for the purpose of auditing Windows 7 Desktop on VDI (virtual Desktop Infrastructure).
Bader-Addin511 | 3/16/2018 12:40:15 PM | COMMENTS(7)
Hi everybody. I am performing an audit on a Redhat Enterprise Virtualization 4.1 environment. Are you aware of some ISACA checklist related to this technology? I also tried to look for hardening and security configuration guides about the same techn...
Andrea035 | 11/8/2017 5:20:35 AM | COMMENTS(2)
I want to know how to Audit VMWare environment i.e. VMWare Virtualization and private cloud build on VMWare.
Vinay189 | 2/19/2016 3:39:03 AM | COMMENTS(2)
Hi,I was wondering  if  auditing a vmware based infrastructure is  quite different from auditing a Hyper-V based one. Is  thereany recommended hands-on material for finishing up similar tasks?Many thanks in advance, Kostas
Konstantinos741 | 6/26/2015 8:12:07 AM | COMMENTS(3)
What types of controls should be put in place over SOX systems when they are moved from a physical to a virtual environment? 
cwalker52 | 12/4/2014 4:48:25 AM | COMMENTS(1)
We are considering to utilize VDI technology and use it for end-user computing. Anyone likes to share experience regarding the following:Was it driven by Business (better ROI, Agility, Security) or by IT (newer technology, ease of administration)Were you ...
-adnan- | 8/21/2014 2:37:09 AM | COMMENTS(0)

Documents & Publications: 15 total

Must be a Topic member to contribute
View All »
Posted by ISACA 1655 days ago
Posted by ISACA 992 days ago
Posted by ISACA 997 days ago
Posted by ISACA 1138 days ago
ICQs and Audit Programs
Posted by ISACA 1305 days ago

Events & Online Learning: 1 total

Journal Articles: 9 total

Volume 4, 2016
by Tony Wang
The growth in connected devices that could reside anywhere in the world has increased the complexity and difficulty of managing them and the related network traffic.
Volume 4, 2016
SDN refers to all of the protocols and technologies that work in synchrony to create a global view of the network and provide a centralized, intelligence-based network service, delivery and control.
Volume 3, 2016
by Davi Ottenheimer and Matthew Wallace | Reviewed by A. Krista Kivisild, CISA, CA, CPA
This book is aimed at anyone with an interest in security and compliance in virtualized and cloud environments—appealing to both technical and nontechnical readers.
Volume 6, 2013
by Markus Pfister, CISA
This article explains the basic concepts of buffer overflows and presents seven points IS auditors should consider in their audit programs.
Volume 5, 2013
Cloud computing is a significant step in the Internet’s evolution, providing the means through which everything can be delivered as a service wherever and whenever needed.
Volume 1, 2011
by Abhik Chaudhuri, MCA, PMP, SH (Basie) von Solms, and Dipanwita Chaudhuri, ACA (ICAI), MIIA
This article discusses virtual IT systems and the inherent risks that need to be audited for proper risk mitigation.

Wikis: 2 total

Blog Posts: 1 total

Must be a Topic member to view blog posts
Information Security and Privacy is hot issue at present time. Number of security breaches is rapidly increasing.  In case of late detection, costs of breaches are skyrocketing. In the same time Artificial Intelligence (AI), Machine Learning (ML) are fast...
Posted By : Dragan Pleskonjic | 0 comments