Hyper-V How To: Plan Security
The Hyper-V Planning and Deployment Guide has just been updated with information about security best practices (including AzMan) and backup:
Using Authorization Manager for Hyper-V Security
Configure Hyper-V for Role-based Access Control
Did we miss anything for these topics? What is the next topic you need? Leave comments.
Additional Resources:
Hyper-V Attack Surface Reference Workbook The Windows Server 2008 Security Guide includes a spreadsheet you can download that lists all the attack surfaces for Windows Server 2008. This guide was initially published before Hyper-V role RTM. When the Security Guide is updated, a new worksheet in the Attack Surface Reference Workbook will be added that lists the attack surfaces for Hyper-V. Until then, you can find the same information in the Hyper-V Attack Surface Reference Workbook, available for download at https://download.microsoft.com/download/8/2/9/829bee7b-821b-4c4c-8297-13762aa5c3e4/Windows Server 2008 Hyper-V Attack Surface Reference.xlsx
Virtualization Security Best Practices Podcast: https://download.microsoft.com/download/5/c/b/5cb1943c-751d-4fd4-a897-38926e90a86f/BrandonBakerHyperVSecurity2Podcast.wma
Windows Server Virtualization and Windows Hypervisor: https://www.blackhat.com/presentations/bh-usa-07/Baker/Presentation/BH07_Baker_WSV_Hypervisor_Security.pdf
"Security in a Virtual World": https://technet.microsoft.com/en-us/library/cc974514.aspx