Use virtualization with the flexibility to install multiple MID Servers in virtualized operating systems and networks in shared physical hardware.

Access to the hypervisor and virtual infrastructure management consoles must be protected to prevent unauthorized cloning of the virtualized MID Server:
  • Limit the access to the hypervisor and virtual infrastructure management consoles by the trusted few admins.
  • Only allow connections to the internal trusted network for management console such as ESX Server and VirtualCenter.
  • Use VLANs to prevent network attacks.
  • Follow the security guidelines published in the virtualization hardening guides from the vendors.