Drawbacks of adopting Virtualization
Last Updated :
20 Dec, 2023
Virtualization is a technique how to separate a service from the underlying physical delivery of that service. It is the process of creating a virtual version of something like computer hardware. It was initially developed during the mainframe era. It involves using specialized software to create a virtual or software-created version of a computing resource rather than the actual version of the same resource. With the help of Virtualization, multiple operating systems and applications can run on the same machine and its same hardware at the same time, increasing the utilization and flexibility of hardware.
In other words, one of the main cost-effective, hardware-reducing, and energy-saving techniques used by cloud providers is Virtualization. Virtualization allows the sharing of a single physical instance of a resource or an application among multiple customers and organizations at one time. It does this by assigning a logical name to physical storage and providing a pointer to that physical resource on demand. The term virtualization is often synonymous with hardware virtualization, which plays a fundamental role in efficiently delivering Infrastructure-as-a-Service (IaaS) solutions for cloud computing. Moreover, virtualization technologies provide a virtual environment for not only executing applications but also for storage, memory, and networking. For knowing more about virtualization refer to https://www.geeksforgeeks.org/virtualization-cloud-computing-types
Drawbacks of adopting Virtualization
Below are some of the most common issues that occur while adopting virtualization that every organization must consider.
Detection
You can't manage what you can't see! IT departments are often unprepared for the complexity associated with understanding what VMs (virtual machines)exist and which are active or inactive. To overcome these challenges, discovery tools need to extend to the virtual world by identifying Virtual Machine Disk Format (.vmdk) files and how many exist within the environment. This will identify both active and inactive VMs.
Correlation
Difficulty in understanding which VMs are on which hosts and identifying which business-critical functions are supported by each VM is a common and largely unforeseen problem encountered by IT departments employing virtualization. Mapping guest-to-host relationships and grouping the VMs by criticality & application is a best practice when implementing virtualization.
Configuration Management
Ensuring VMs are configured properly is crucial in preventing performance bottlenecks and security vulnerabilities. Complexities in VM provisioning and offline VM patching is a frequent issues for IT departments. A Technical Controls configuration management database (CMDB) is critical to understanding the configurations of VMs, especially dormant ones. The CMDB will provide the current state of a VM even if it is dormant, allowing a technician to update the configuration by auditing and making changes to the template.
Additional Security Considerations
If a host is vulnerable, all associated guest VMs and the business applications on those VMs are also at risk. This could lead to far more reaching impact than the same exploit on a single physical server. Treat a Virtual Machine just like any other system and enforce security policies and compliance. Also, use an application that dynamically maps guest-to-host relationships and tracks guest VM’s as they move from host to host .
VM Identity Management Issues
Virtualization introduces complexities that often lead to issues surrounding separation of duties. Who manages these machines? Do application owners have visibility into changes being made? Identify roles and criticality and put them through the same processes you leverage for physical devices including change management, release management and hardening guidelines.
VM Network Configuration Control
With multiple operating systems sharing a single IP address behind a NAT, network access control becomes much more complex in a virtual network. To address this use AD, DNS and NetBIOS to identify bridged VM’s. IP sweeps in most cases will not pick these up.
Identifying and Controlling VM Proliferation
VM’s can pop up and move to any location in an instant. To manage this potential issue, you must establish and enforce a process for Virtual Machine deployment.
VM Host Capacity Planning
Virtualization can make understanding what applications are running and how many resources are being leveraged much more difficult. To better deal with this issue, organizations must track how many guest to host relationships exist and the configuration of the VM’s.
ESX Host Driver and ACL Information
How is the ESX System itself configured? Does it meet your PCI requirements? Who has permissions to the system? Does it meet your regulatory compliance needs? Organizations must proactively manage ESX machines by tracking and trending their security configurations over time to make sure they don’t "drift" from corporate standards.
ESX Host Configuration Management
If a guest is infected with a worm or virus it will attack the other local VMs. If that image is moved to another host, it will continue to do damage across the organization. Do you have visibility into guest to host relationships and their configurations? Guest to host mapping and their configuration history is critical to the success of managing virtual machines.
Intellectual Property
Virtualization makes it more difficult to know who has what information. How do you know your VMs are not walking out the door with critical information and data? Verifying encrypted data and historical information on your guest VMs can help manage and secure intellectual property.
Similar Reads
What Is Cloud Computing ? Types, Architecture, Examples and Benefits
Nowadays, Cloud computing is adopted by every company, whether it is an MNC or a startup many are still migrating towards it because of the cost-cutting, lesser maintenance, and the increased capacity of the data with the help of servers maintained by the cloud providers. Cloud Computing means stori
15 min read
Virtualization in Cloud Computing and Types
Virtualization is the technology that enables to create virtual environments from a single physical machine. In this article, you will learn what a virtual machine is, why it is important, the different types of virtualization, how it works, and the benefits and disadvantages associated with it. Vir
11 min read
Architecture of Cloud Computing
Cloud Computing, is one of the most demanding technologies of the current time and is giving a new shape to every organization by providing on-demand virtualized services/resources. Starting from small to medium and medium to large, every organization uses cloud computing services for storing inform
6 min read
AWS Interview Questions
Amazon Web Services (AWS) stands as the leading cloud service provider globally, offering a wide array of cloud computing services. It's the preferred choice for top companies like Netflix, Airbnb, Spotify, and many more due to its scalability, reliability, and extensive feature set. AWS was started
15+ min read
Cloud Based Services
Cloud Computing means using the internet to store, manage, and process data instead of using your own computer or local server. The data is stored on remote servers, that are owned by companies called cloud providers such as Amazon, Google, Microsoft). These companies charge you based on how much yo
11 min read
Types of Cloud Computing
There are three commonly recognized Cloud Deployment Models: Public, Private, and Hybrid Cloud Community Cloud and Multi-Cloud are significant deployment strategies as well. In cloud computing, the main Cloud Service Models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and So
12 min read
Introduction to Amazon Web Services
Amazon Web Services (AWS) is one of the world's leading cloud platforms in providing the web services of various domains. AWS follows the trends of digital IT and comes up needy services with optimized performances covering a wide range of services from Compute to Storage. It covers a wider range of
12 min read
Characteristics of Cloud Computing
There are many characteristics of Cloud Computing here are few of them : On-demand self-services: The Cloud computing services does not require any human administrators, user themselves are able to provision, monitor and manage computing resources as needed.Broad network access: The Computing servic
2 min read
What is Elastic Compute Cloud (EC2)?
EC2 stands for Elastic Compute Cloud a service from Amazon Web Services (AWS). EC2 is an on-demand computing service on the AWS cloud platform. It lets you rent virtual computers to run your applications. You pay only for what you use. Instead of buying and managing your own servers, EC2 gives you a
10 min read
Top 10 Cloud Platform Service Providers in 2025
Cloud Computing has revolutionized IT solutions, replacing traditional hard drive storage with accessible services delivered over the Internet. From storage to processing, networking, and software, cloud computing offers a range of solutions. Whether updating social media or banking online, chances
13 min read